diff --git "a/python/dejacode/depscan.html" "b/python/dejacode/depscan.html" --- "a/python/dejacode/depscan.html" +++ "b/python/dejacode/depscan.html" @@ -14,16 +14,15 @@ .r9 {color: #7f7f7f; text-decoration-color: #7f7f7f; font-weight: bold} .r10 {color: #ffba9e; text-decoration-color: #ffba9e; font-weight: bold} .r11 {color: #ff7f7f; text-decoration-color: #ff7f7f} -.r12 {color: #ff753d; text-decoration-color: #ff753d; font-weight: bold} -.r13 {font-weight: bold; font-style: italic} -.r14 {color: #800000; text-decoration-color: #800000; font-style: italic} -.r15 {color: #5f5f5f; text-decoration-color: #5f5f5f} -.r16 {color: #800000; text-decoration-color: #800000} -.r18 {color: #acbdc7; text-decoration-color: #acbdc7; font-style: italic} -.r19 {color: #008000; text-decoration-color: #008000} -.r20 {color: #008000; text-decoration-color: #008000; font-weight: bold} -.r21 {color: #008000; text-decoration-color: #008000; font-style: italic} -.r22 {color: #808000; text-decoration-color: #808000; font-weight: bold} +.r12 {font-weight: bold; font-style: italic} +.r13 {color: #800000; text-decoration-color: #800000; font-style: italic} +.r14 {color: #5f5f5f; text-decoration-color: #5f5f5f} +.r15 {color: #800000; text-decoration-color: #800000} +.r17 {color: #acbdc7; text-decoration-color: #acbdc7; font-style: italic} +.r18 {color: #008000; text-decoration-color: #008000} +.r19 {color: #008000; text-decoration-color: #008000; font-weight: bold} +.r20 {color: #008000; text-decoration-color: #008000; font-style: italic} +.r21 {color: #808000; text-decoration-color: #808000; font-weight: bold} body { color: #000000; background-color: #ffffff; @@ -32,9 +31,9 @@ body {

-                                                                                                     Prioritized Vulnerabilities                                                                                                      
+                                                                                                 Prioritized Vulnerabilities                                                                                                  
 
-The vulnerabilities below have been prioritized by depscan. Follow your team’s remediation workflow to address these findings.                                                                                                        
+The vulnerabilities below have been prioritized by depscan. Follow your team’s remediation workflow to address these findings.                                                                                                
 
                                                                   Top Priority (BOM)                                                                  
 ╔═════════════════╤═══════════════════╤══════════════╤═══════════════════════════════════════════════════════════════════════════════════════════════╗
@@ -48,1530 +47,140 @@ The vulnerabilities below have been prioritized by depscan. Follow your team’s
                                                                  Prioritized count: 1                                                                 
 
 
-                                                                                                          Proactive Measures                                                                                                          
-
-Below are the top reachable packages identified by depscan. Set up alerts and notifications to actively monitor them for new vulnerabilities and exploits.                                                                            
-
-      💥 Top Endpoint-Reachable Packages       
-╔═══════════════════════════╤═════════════════╗
-║ Package                    Reachable Flows ║
-╟───────────────────────────┼─────────────────╢
-║ pkg:pypi/django@5.2       │ 1288            ║
-╟───────────────────────────┼─────────────────╢
-║ pkg:pypi/django@5.1.8     │ 737             ║
-╟───────────────────────────┼─────────────────╢
-║ pkg:pypi/django-otp@1.5.0 │ Predicted       ║
-╚══════════════════════���════╧═════════════════╝
-
-
-                                                                                                   Vulnerability Disclosure Report                                                                                                    
-
-The table below lists all vulnerabilities identified in this project. Use this information for your records, as not all vulnerabilities require immediate remediation.                                                                
-
-                                                              Dependency Scan Results (BOM)                                                               
-╔══════════════════════════════════════════════════════════════════════════════════╤══════════════════════════════╤═══════════════════╤══════════╤═══════╗
-║ Dependency Tree                                                                   Insights                      Fix Version        Severity  Score ║
-╟──────────────────────────────────────────────────────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                7.88.1-10+deb12u7  MEDIUM      5.0 ║
-║ └── curl@7.88.1 ⬅ DSA-5460-1                                                                                                                       ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── curl@7.88.1 ⬅ CVE-2025-0167                                                                                                                    ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── curl@7.88.1 ⬅ CVE-2024-9681                                                                                                                    ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── curl@7.88.1 ⬅ CVE-2024-8096                                                                                                                    ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── curl@7.88.1 ⬅ CVE-2024-7264                                                                                                                    ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── curl@7.88.1 ⬅ CVE-2024-2398                                                                                                                    ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── curl@7.88.1 ⬅ CVE-2024-2004                                                                                                                    ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── curl@7.88.1 ⬅ CVE-2024-11053                                                                                                                   ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── curl@7.88.1 ⬅ CVE-2023-46219                                                                                                                   ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── curl@7.88.1 ⬅ CVE-2023-46218                                                                                                                   ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── curl@7.88.1 ⬅ CVE-2023-38545                                                                                                                   ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── curl@7.88.1 ⬅ CVE-2023-38039                                                                                                                   ║
-╟──────────────────────────────────────────────────────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                2.5.0-1+deb12u1    MEDIUM      5.0 ║
-║ └── expat@2.5.0 ⬅ CVE-2024-45490                                                                                                                   ║
-╟──────────────────────────────────────────────────────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                2.39.5-0+deb12u2   MEDIUM      5.0 ║
-║ └── git@2.39.5 ⬅ CVE-2024-50349                                                                                                                    ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── git@2.39.5 ⬅ CVE-2023-25652                                                                                                                    ║
-╟──────────────────────────────────────────────────────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                2.36-9+deb12u3     MEDIUM      5.0 ║
-║ └── glibc@2.36 ⬅ CVE-2025-0395                                                                                                                     ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── glibc@2.36 ⬅ CVE-2024-33599                                                                                                                    ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── glibc@2.36 ⬅ CVE-2024-2961                                                                                                                     ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── glibc@2.36 ⬅ CVE-2023-6246                                                                                                                     ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── glibc@2.36 ⬅ CVE-2023-4911                                                                                                                     ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── glibc@2.36 ⬅ CVE-2023-4806                                                                                                                     ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── glibc@2.36 ⬅ CVE-2023-4527                                                                                                                     ║
-╟──────────────────────────────────────────────────────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                3.7.9-2+deb12u2    MEDIUM      5.0 ║
-║ └── gnutls28@3.7.9 ⬅ CVE-2024-28835                                                                                                                ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── gnutls28@3.7.9 ⬅ CVE-2024-28834                                                                                                                ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── gnutls28@3.7.9 ⬅ CVE-2024-12243                                                                                                                ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── gnutls28@3.7.9 ⬅ CVE-2024-0567                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── gnutls28@3.7.9 ⬅ CVE-2024-0553                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── gnutls28@3.7.9 ⬅ CVE-2023-5981                                                                                                                 ║
-╟──────────────────────────────────────────────────────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                1.20.1-2+deb12u1   MEDIUM      5.0 ║
-║ └── krb5@1.20.1 ⬅ CVE-2024-37370                                                                                                                   ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── krb5@1.20.1 ⬅ CVE-2023-36054                                                                                                                   ║
-╟──────────────────────────────────────────────────────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                4.19.0-2+deb12u1   MEDIUM      5.0 ║
-║ └── libtasn1-6@4.19.0-2 ⬅ CVE-2024-12133                                                                                                           ║
-╟──────────────────────────────────────────────────────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                6.1.135-1          MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-40364                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-22021                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-22020                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-22018                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21835                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21832                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21830                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21829                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21826                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21823                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21821                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21820                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21819                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21814                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21812                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21811                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21806                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21804                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21802                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21799                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21796                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21795                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21794                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21792                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21791                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21790                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM   ���   5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21787                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21785                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21782                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21781                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21780                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21779                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21776                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21775                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21772                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21767                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21766                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21765                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21764                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21763                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21762                                                                                                          ��       ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21761                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21760                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21758                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21753                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21750                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21749                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21748                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21745                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21744                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21738                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21736                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21735                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21734                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21731                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ��
-║ └── linux@6.1.112 ⬅ CVE-2025-21728                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21727                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21726                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21725                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21724                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21722                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21719                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21718                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21716                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21715                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21711                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21708                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21707                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21706                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21705                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21704                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21703                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21701                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21700                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21699                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21697                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21694                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21692                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21690                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21689                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21688                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21687                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21684                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2025-21629                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-8805                                                                                                                  ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-58087                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-58086                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-58085                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-58083                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-58080                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-58077                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-58076                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-58072                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-58071                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-58069                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-58068                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-58063                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-58061                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-58058                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-58056                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-58055                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-58054                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-58052                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-58051                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-58034                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-58020                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-58017                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-58016                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-58014                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-58013                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-58011                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-58010                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-58009                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-58007                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-58001                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-57998                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-57997                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-57996                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-57993                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-57986                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-57981                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-57980                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-57979                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-57978                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-57973                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-57951                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-57949                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-57946                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-57938                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-57931                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-57930                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-57903                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-57902                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-57901                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-57897                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-57896                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-57893                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-57890                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-57889                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-57884                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-57882                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-57876                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-57874                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-57850                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-57849                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-57841                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-57838                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-57834                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-57807                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-57802                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-57798                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-57792                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-57791                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56787                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56785                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56783                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56781                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56780                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56779                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56778                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56777                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56776                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56774                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56770                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56769                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56767                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56766                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56765                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56763                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56759                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56756                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56755                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56754                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56751                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56748                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56747                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56746                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56745                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56739                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56728                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56727                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56726                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56725                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56724                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56723                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56722                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56720                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56718                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56717                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56716                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56715                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56709                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56708                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56707                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56705                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56704                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56701                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56700                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56698                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56694                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56693                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56691                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56690                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56688                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56687                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56683                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56681                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56679                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56678                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56677                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56675                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56672                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56670                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56665                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56663                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56662                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56661                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56660                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56659                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56658                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56651                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56650                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56648                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56645                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56644                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56643                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56642                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56640                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56637                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56636                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56634                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56633                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56630                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56629                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56628                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56627                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56626                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56625                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56623                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56622                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56619                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56616                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56615                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56614                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56610                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56606                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56605                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56604                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56603                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56602                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56601                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56600                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56598                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56597                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56596                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56595                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56594                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56593                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56590                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56589                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56587                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56586                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56585                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56584                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56582                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56581                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56579                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56578                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56576                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56575                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56574                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56572                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56570                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56569                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56568                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56567                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56562                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56558                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56557                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56549                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56548                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56546                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56539                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56533                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56532                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56531                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-56369                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-55916                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-55881                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-54458                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-54031                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53690                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53680                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53241                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53240                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53239                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53237                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53233                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53231                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53230                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53227                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53226                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53220                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53217                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53215                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53214                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53213                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53210                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53208                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53207                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53206                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53198                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53197                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53196                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53194                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53190                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53184                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53183                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53181                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53180                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53175                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53174                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53173                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53172                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53171                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53165                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53164                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53161                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53158                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53157                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53156                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53155                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53154                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53151                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53150                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53148                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53146                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53145                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53144                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53142                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53141                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53140                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53138                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53136                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53135                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53131                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53130                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53129                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53127                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53125                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53123                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53122                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53121                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53120                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53119                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53113                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53112                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53110                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53106                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53105                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53104                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53103                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53101                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53100                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53099                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53097                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-53096                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-52332                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50275                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50258                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50248                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50210                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50209                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50208                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50205                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50202                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50201                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50200                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50199                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50198                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50196                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50195                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50194                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50193                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50192                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50191                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50189                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50188                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50187                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ ��── linux@6.1.112 ⬅ CVE-2024-50186                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50185                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50184                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50183                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50182                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50180                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50179                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50176                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50171                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50168                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50167                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50163                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50162                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50160                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50156                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50155                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50154                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50153                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50151                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50150                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50148                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50147                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50146                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50145                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50143                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50142                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50141                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50138                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50136                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50134                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50133                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50131                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50128                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50127                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50125                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50124                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50121                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50117                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50116                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50115                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50110                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50108                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50103                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50101                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50099                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50098                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50096                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50095                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50093                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50088                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50087                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50086                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50085                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50083                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50082                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50078                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50077                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50074                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50073                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50069                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50062                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50061                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50060                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50059                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50058                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50055                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50051                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50049                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50048                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50046                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50045                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50044                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50041                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50040                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50039                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50038                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50035                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50033                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50031                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50026                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50024                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50022                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50019                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50015                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50013                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50010                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50008                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50007                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50006                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50003                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50002                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50001                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-50000                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49997                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49996                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49992                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49989                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49985                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49983                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49982                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49981                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49978                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49977                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49975                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49973                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49969                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49966                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49965                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49963                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-�� └── linux@6.1.112 ⬅ CVE-2024-49962                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49961                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49959                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49958                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49957                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49955                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49954                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49952                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49951                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49949                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49948                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49946                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49944                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49939                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49938                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49937                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49936                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49935                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49934                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49933                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49930                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49929                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49927                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49925                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49924                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49917                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49915                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49913                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49912                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49911                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49909                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49907                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49905                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49903                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49902                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49900                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49899                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49898                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49897                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49896                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49895                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49894                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49892                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49891                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49890                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49889                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49886                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49884                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49883                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49882                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49881                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49879                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49878                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49877                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49875                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49871                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49870                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49868                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49867                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49866                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49863                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49861                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49860                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49859                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49858                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49856                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49855                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49854                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49853                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49852                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49851                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49850                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-49571                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-48881                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47757                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47756                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47751                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47750                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47749                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47748                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47747                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47745                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47743                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47742                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47740                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47739                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47738                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47737                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47735                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47734                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47731                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47730                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47728                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47727                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47726                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47723                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47720                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47718                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47713                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47712                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47710                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47709                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47707                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47706                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47705                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47701                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47699                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47698                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47697                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47696                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47695                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47693                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47692                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47690                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47686                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47685                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47684                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47683                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47682                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47679                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47678                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47674                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47673                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47672                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47671                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47670                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47669                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47668                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47667                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47665                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47663                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47660                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47659                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47408                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-47143                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-46896                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-46871                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-46841                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-46809                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-46710                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-46695                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-45828                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-45001                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-44950                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-43866                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-43098                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-42319                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-42315                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-42252                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-42122                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-42069                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-41014                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-40945                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-39497                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-39282                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-38632                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-37021                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-36899                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-36479                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-36476                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-35963                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-35956                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-35870                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-27407                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-27072                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-26596                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2024-26595                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2023-53034                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2023-52926                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2023-52918                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2023-52916                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2023-52857                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2023-45896                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2023-31083                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2022-49034                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── linux@6.1.112 ⬅ CVE-2022-45888                                                                                                                 ║
-╟──────────────────────────────────────────────────────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                1.52.0-1+deb12u2   MEDIUM      5.0 ║
-║ └── nghttp2@1.52.0 ⬅ CVE-2024-28182                                                                                                                ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── nghttp2@1.52.0 ⬅ CVE-2023-44487                                                                                                                ║
-╟──────────────────────────────────────────────────────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                3.0.15-1~deb12u1   MEDIUM      5.0 ║
-║ └── openssl@3.0.14 ⬅ CVE-2024-9143                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── openssl@3.0.14 ⬅ CVE-2024-6119                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── openssl@3.0.14 ⬅ CVE-2024-5535                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── openssl@3.0.14 ⬅ CVE-2024-4741                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── openssl@3.0.14 ⬅ CVE-2024-4603                                                                                                                 ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── openssl@3.0.14 ⬅ CVE-2024-2511                                                                                                                 ║
-╟──────────────────────────────────────────────────────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                5.36.0-7+deb12u1   MEDIUM      5.0 ║
-║ └── perl@5.36.0 ⬅ CVE-2024-56406                                                                                                                   ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── perl@5.36.0 ⬅ CVE-2023-47038                                                                                                                   ║
-╟──────────────────────────────────────────────────────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                15.11-0+deb12u1    MEDIUM      5.0 ║
-║ └── postgresql-15@15.8 ⬅ DSA-5812-2                                                                                                                ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── postgresql-15@15.8 ⬅ CVE-2025-1094                                                                                                             ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── postgresql-15@15.8 ⬅ CVE-2024-7348                                                                                                             ║
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                                   MEDIUM      5.0 ║
-║ └── postgresql-15@15.8 ⬅ CVE-2024-10976                                                                                                            ║
-╟──────────────────────────────────────────────────────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                3.40.1-2+deb12u1   MEDIUM      5.0 ║
-║ └── sqlite3@3.40.1 ⬅ CVE-2023-7104                                                                                                                 ║
-╟──────────────────────────────────────────────────────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                2.38.1-5+deb12u1   MEDIUM      5.0 ║
-║ └── util-linux@2.38.1 ⬅ CVE-2024-28085                                                                                                             ║
-╟───────────────────────────────────────────────��──────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
-║ dejacode@sha256:c45aa8fc109625389b3650795c79e8cbda63e1ba39a4a1c14dd31e45827749a1                                5.4.1-1            MEDIUM      5.0 ║
-║ └── xz-utils@5.4.1 ⬅ CVE-2025-31115                                                                                                                ║
-╟──────────────────────────────────────────────────────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
-║ jquery@1.12.4 ⬅ CVE-2020-11023                                                    📦 Deployed dependency        3.5.0              MEDIUM      6.9 ║
-║                                                                                   ❗ Reachable and Exploitable                                     ║
-║ jquery@1.12.4 ⬅ CVE-2020-11022                                                    ❗ Reachable and Exploitable                     MEDIUM      6.9 ║
-║ jquery@1.12.4 ⬅ CVE-2019-11358                                                    ❗ Reachable and Exploitable                     MEDIUM      6.1 ║
-╟──────────────────────────────────────────────────────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
-║ certifi@2024.2.2 ⬅ CVE-2024-39689                                                 📦 Deployed dependency        2022.12.07         LOW         2.0 ║
-║ certifi@2024.2.2 ⬅ CVE-2023-37920                                                │                              │                   │ HIGH     │   7.5 ║
-║ requests@2.31.0                                                                                                                    MEDIUM      5.9 ║
-║ └── certifi@2025.1.31 ⬅ CVE-2022-23491                                                                                                             ║
-╟──────────────────────────────────────────────────────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
-║ django@5.0.9 ⬅ CVE-2025-27556                                                     📦 Deployed dependency        5.1.8              MEDIUM      5.8 ║
-║ django@5.0.9 ⬅ CVE-2025-27556                                                                                                      MEDIUM      5.8 ║
-║ django@5.0.9 ⬅ CVE-2025-26699                                                                                                      MEDIUM      5.0 ║
-║ django@5.0.9 ⬅ CVE-2025-26699                                                                                                      MEDIUM      5.0 ║
-║ django@5.1.2 ⬅ CVE-2024-56374                                                                                                      MEDIUM      5.8 ║
-║ django@5.0.9 ⬅ CVE-2024-53908                                                    │                              │                   │ HIGH     │   7.2 ║
-║ django@5.0.9 ⬅ CVE-2024-53908                                                    │                              │                   │ HIGH     │   7.2 ║
-║ django@5.1.2 ⬅ CVE-2024-53907                                                                                                      MEDIUM      6.6 ║
-║ django@5.0.9 ⬅ CVE-2024-45231                                                                                                      MEDIUM      6.3 ║
-║ django@5.0.9 ⬅ CVE-2024-45230                                                                                                      MEDIUM      6.9 ║
-╟──────────────────────────────────────────────────────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
-║ djangorestframework@3.15.0 ⬅ CVE-2024-21520                                       📦 Deployed dependency        3.15.2             LOW         2.1 ║
-╟──────────────────────────────────────────────────────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
-║ gunicorn@22.0.0 ⬅ CVE-2024-6827                                                  │ 📦 Deployed dependency       │ 23.0.0            │ HIGH     │   7.5 ║
-╟──────────────────────────────────────────────────────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
-║ jinja2@3.1.4 ⬅ CVE-2025-27516                                                     📦 Deployed dependency        3.1.6              MEDIUM      5.4 ║
-║ jinja2@3.1.4 ⬅ CVE-2024-56326                                                                                                      MEDIUM      5.4 ║
-║ jinja2@3.1.4 ⬅ CVE-2024-56201                                                                                                      MEDIUM      5.4 ║
-╟──────────────────────────────────────────────────────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
-║ pyjwt@2.4.0 ⬅ CVE-2024-53861                                                      📦 Deployed dependency        2.10.1             LOW         2.1 ║
-╟──────────────────────────────────────────────────────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
-║ urllib3@2.2.1 ⬅ CVE-2024-37891                                                    📦 Deployed dependency        2.2.2              MEDIUM      4.4 ║
-╟──────────────────────────────────────────────────────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
-║ zipp@3.8.0 ⬅ CVE-2024-5569                                                        📦 Deployed dependency        3.19.1             MEDIUM      6.9 ║
-╚══════════════════════════════════════════════════════════════════════════════════╧══════════════════════════════╧═══════════════════╧══════════╧═══════╝
-                                                                Vulnerabilities count: 746                                                                
-
-
-                                                                                                          Service Endpoints                                                                                                           
-
-The following endpoints and code hotspots were identified by depscan. Verify that proper authentication and authorization mechanisms are in place to secure them.                                                                     
+                                                                                                      Proactive Measures                                                                                                      
+
+Below are the top reachable packages identified by depscan. Set up alerts and notifications to actively monitor them for new vulnerabilities and exploits.                                                                    
+
+         💥 Top Endpoint-Reachable Packages         
+╔════════════════════════════════╤═════════════════╗
+║ Package                         Reachable Flows ║
+╟────────────────────────────────┼─────────────────╢
+║ pkg:pypi/django@5.2            │ 3088            ║
+╟────────────────────────────────┼────────���────────╢
+║ pkg:pypi/django@5.1.8          │ 1799            ║
+╟────────────────────────────────┼─────────────────╢
+║ pkg:pypi/django-guardian@2.4.0 │ 143             ║
+╚════════════════════════════════╧═════════════════╝
+
+
+                                                                                               Vulnerability Disclosure Report                                                                                                
+
+The table below lists all vulnerabilities identified in this project. Use this information for your records, as not all vulnerabilities require immediate remediation.                                                        
+
+                                                                 Dependency Scan Results (BOM)                                                                 
+╔═══════════════════════════════════════════════════════════════════════════════════════╤══════════════════════════════╤═══════════════════╤══════════╤═══════╗
+║ Dependency Tree                                                                        Insights                      Fix Version        Severity  Score ║
+╟───────────────────────────────────────────────────────────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6                                7.88.1-10+deb12u7  MEDIUM      5.0 ║
+║ └── curl@7.88.1 ⬅ DSA-5460-1                                                                                                                            ║
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6                                                   MEDIUM      5.0 ║
+║ └── curl@7.88.1 ⬅ CVE-2025-0167                                                                                                                         ║
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6                                                   MEDIUM      5.0 ║
+║ └── curl@7.88.1 ⬅ CVE-2024-9681                                                                                                                         ║
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6                                                   MEDIUM      5.0 ║
+║ └── curl@7.88.1 ⬅ CVE-2024-8096                                                                                                                         ║
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6                                                   MEDIUM      5.0 ║
+║ └── curl@7.88.1 ⬅ CVE-2024-7264                                                                                                                         ║
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6                                                   MEDIUM      5.0 ║
+║ └── curl@7.88.1 ⬅ CVE-2024-2398                                                                                                                         ║
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6                                                   MEDIUM      5.0 ║
+║ └── curl@7.88.1 ⬅ CVE-2024-2004                                                                                                                         ║
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6                                                   MEDIUM      5.0 ║
+║ └── curl@7.88.1 ⬅ CVE-2024-11053                                                                                                                        ║
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6                                                   MEDIUM      5.0 ║
+║ └── curl@7.88.1 ⬅ CVE-2023-46219                                                                                                                        ║
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6                                                   MEDIUM      5.0 ║
+║ └── curl@7.88.1 ⬅ CVE-2023-46218                                                                                                                        ║
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6                                                   MEDIUM      5.0 ║
+║ └── curl@7.88.1 ⬅ CVE-2023-38545                                                                                                                        ║
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6                                                   MEDIUM      5.0 ║
+║ └── curl@7.88.1 ⬅ CVE-2023-38039                                                                                                                        ║
+╟───────────────────────────────────────────────────────────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6                                2.5.0-1+deb12u1    MEDIUM      5.0 ║
+║ └── expat@2.5.0 ⬅ CVE-2024-45490                                                                                                                        ║
+╟───────────────────────────────────────────────────────────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6                                2.39.5-0+deb12u2   MEDIUM      5.0 ║
+║ └── git@2.39.5 ⬅ CVE-2024-50349                                                                                                                         ║
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6                                                   MEDIUM      5.0 ║
+║ └── git@2.39.5 ⬅ CVE-2023-25652                                                                                                                         ║
+╟───────────────────────────────────────────────────────────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6                                2.36-9+deb12u3     MEDIUM      5.0 ║
+║ └── glibc@2.36 ⬅ CVE-2025-0395                                                                                                                          ║
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6                                                   MEDIUM      5.0 ║
+║ └── glibc@2.36 ⬅ CVE-2024-33599                                                                                                                         ║
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6                                                   MEDIUM      5.0 ║
+║ └── glibc@2.36 ⬅ CVE-2024-2961                                                                                                                          ║
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6                                                   MEDIUM      5.0 ║
+║ └── glibc@2.36 ⬅ CVE-2023-6246                                                                                                                          ║
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6                                                   MEDIUM      5.0 ║
+║ └── glibc@2.36 ⬅ CVE-2023-4911                                                                                                                          ║
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6                                                   MEDIUM      5.0 ║
+║ └── glibc@2.36 ⬅ CVE-2023-4806                                                                                                                          ║
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6                                                   MEDIUM      5.0 ║
+║ └── glibc@2.36 ⬅ CVE-2023-4527                                                                                                                          ║
+╟───────────────────────────────────────────────────────────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6                                3.7.9-2+deb12u2    MEDIUM      5.0 ║
+║ └── gnutls28@3.7.9 ⬅ CVE-2024-28835                                                                                                                     ║
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6                                                   MEDIUM      5.0 ║
+║ └── gnutls28@3.7.9 ⬅ CVE-2024-28834                                                                                                                     ║
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6                                                   MEDIUM      5.0 ║
+║ └── gnutls28@3.7.9 ⬅ CVE-2024-12243                                                                                                                     ║
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6                                                   MEDIUM      5.0 ║
+║ └── gnutls28@3.7.9 ⬅ CVE-2024-0567                                                                                                                      ║
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6                                                   MEDIUM      5.0 ║
+║ └── gnutls28@3.7.9 ⬅ CVE-2024-0553                                                                                                                      ║
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6                                                   MEDIUM      5.0 ║
+║ └── gnutls28@3.7.9 ⬅ CVE-2023-5981                                                                                                                      ║
+╟───────────────────────────────────────────────────────────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6                                1.20.1-2+deb12u1   MEDIUM      5.0 ║
+║ └── krb5@1.20.1 ⬅ CVE-2024-37370                                                                                                                        ║
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6                                                   MEDIUM      5.0 ║
+║ └── krb5@1.20.1 ⬅ CVE-2023-36054                                                                                                                        ║
+╟───────────────────────────────────────────────────────────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6                                6.1.135-1          MEDIUM      5.0 ║
+║ └── linux@6.1.135 ⬅ CVE-2023-53034                                                                                                                      ║
+╟───────────────────────────────────────────────────────────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6                                1.52.0-1+deb12u2   MEDIUM      5.0 ║
+║ └── nghttp2@1.52.0 ⬅ CVE-2024-28182                                                                                                                     ║
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6                                                   MEDIUM      5.0 ║
+║ └── nghttp2@1.52.0 ⬅ CVE-2023-44487                                                                                                                     ║
+╟───────────────────────────────────────────────────────────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6                                3.0.15-1~deb12u1   MEDIUM      5.0 ║
+║ └── openssl@3.0.15 ⬅ CVE-2024-9143                                                                                                                      ║
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6                                                   MEDIUM      5.0 ║
+║ └── openssl@3.0.15 ⬅ CVE-2024-5535                                                                                                                      ║
+╟───────────────────────────────────────────────────────────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6                                5.36.0-7+deb12u1   MEDIUM      5.0 ║
+║ └── perl@5.36.0 ⬅ CVE-2024-56406                                                                                                                        ║
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6                                                   MEDIUM      5.0 ║
+║ └── perl@5.36.0 ⬅ CVE-2023-47038                                                                                                                        ║
+╟───────────────────────────────────────────────────────────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6                                3.40.1-2+deb12u1   MEDIUM      5.0 ║
+║ └── sqlite3@3.40.1 ⬅ CVE-2023-7104                                                                                                                      ║
+╟───────────────────────────────────────────────────────────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6                                2.38.1-5+deb12u1   MEDIUM      5.0 ║
+║ └─�� util-linux@2.38.1 ⬅ CVE-2024-28085                                                                                                                  ║
+╟───────────────────────────────────────────────────────────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
+║ dejacode-base@sha256:734007bbfc72033d889648fa28e694f5e3290c1db5f8b7cba790710bb6571ab6                                5.4.1-1            MEDIUM      5.0 ║
+║ └── xz-utils@5.4.1 ⬅ CVE-2025-31115                                                                                                                     ║
+╟───────────────────────────────────────────────────────────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
+║ jquery@1.12.4 ⬅ CVE-2020-11023                                                         ❗ Reachable and Exploitable  3.5.0              MEDIUM      6.9 ║
+║                                                                                        📦 Deployed dependency                                           ║
+║ jquery@1.12.4 ⬅ CVE-2020-11022                                                         ❗ Reachable and Exploitable                     MEDIUM      6.9 ║
+║ jquery@1.12.4 ⬅ CVE-2019-11358                                                         ❗ Reachable and Exploitable                     MEDIUM      6.1 ║
+╟───────────────────────────────────────────────────────────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
+║ coreapi@2.3.3                                                                          📦 Deployed dependency        2022.12.07         MEDIUM      5.9 ║
+║ └── requests@2.32.3                                                                                                                                     ║
+║     └── certifi@2025.1.31 ⬅ CVE-2022-23491                                                                                                              ║
+╟───────────────────────────���───────────────────────────────────────────────────────────┼──────────────────────────────┼───────────────────┼──────────┼───────╢
+║ gunicorn@22.0.0 ⬅ CVE-2024-6827                                                       │ 📦 Deployed dependency       │ 23.0.0            │ HIGH     │   7.5 ║
+╚═══════════════════════════════════════════════════════════════════════════════════════╧══════════════════════════════╧═══════════════════╧══════════╧═══════╝
+                                                                   Vulnerabilities count: 45                                                                   
+
+
+                                                                                                      Service Endpoints                                                                                                       
+
+The following endpoints and code hotspots were identified by depscan. Verify that proper authentication and authorization mechanisms are in place to secure them.                                                             
 
                                                      Endpoints                                                      
 ╔══════════════════════════════════════════════════════════════════╤══════════════╤════════════════════════════════╗
@@ -1892,464 +501,498 @@ The following endpoints and code hotspots were identified by depscan. Verify tha
                                              Identified Endpoints: 102                                              
 
 
-                                                                                                           Reachable Flows                                                                                                            
+                                                                                                       Reachable Flows                                                                                                        
 
-Below are some reachable flows, including those accessible via endpoints, identified by depscan. Use the generated OpenAPI specification to evaluate these endpoints for vulnerabilities and risk.                                    
+Below are some reachable flows, including those accessible via endpoints, identified by depscan. Use the generated OpenAPI specification to evaluate these endpoints for vulnerabilities and risk.                            
 
-#1 argument request ⭕  to the function edit_productrelation_ajax_view can be used to reach 2 packages from certain endpoints.                        
+#1 argument filename ⭕  to the function send_scan_data_as_file_view can be used to reach 2 packages from certain endpoints.                          
 ╔════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╗
-║ product_portfolio/views.py#1350    edit_productrelation_ajax_view(request) ↩                                                                       ║
+║ component_catalog/views.py#1557    send_scan_data_as_file_view(filename) ↩                                                                         ║
 ║ Tags: framework-input                                                                                                                              ║
 ���                                                                                                                                                    ║
-║ ├── product_portfolio/views.py#1351    request.user                                                                                                ║
-║ ├── product_portfolio/views.py#1371    user.dataspace                                                                                              ║
-║ ├── product_portfolio/views.py#1372    get_object_or_404(qs, uuid = relation_uuid)                                                                 ║
-║ Tags: pkg:pypi/django@5.2, framework                                                                                                           ║
-║                                                                                                                                                ║
-║ ├── product_portfolio/views.py#1373    relation_instance.product                                                                                   ║
-║ ├── product_portfolio/views.py#1377    product.can_be_changed_by(user)                                                                             ║
-║ ├── product_portfolio/views.py#1378    user.has_perm(f"product_portfolio.change_{relationship_model_name}")                                        ║
-║ ├── product_portfolio/views.py#1385    user.has_perm(f"product_portfolio.delete_{relationship_model_name}")                                        ║
-║ ├── product_portfolio/views.py#1388    History.log_deletion(user, relation_instance)                                                               ║
-║ ├── dje/models.py#1957    log_deletion(user) ↩                                                                                                     ║
-║ ├── dje/models.py#1966    tmp177.log_action(user, obj, cls.DELETION, serialized_data = serialized_data)                                            ║
-║ Tags: pkg:pypi/django@5.1.8, pkg:pypi/django@5.2, framework, web                                                                               ║
-║                                                                                                                                                ║
-║ ├──                                                                                                                                                ║
-║ ├── product_portfolio/views.py#1391    History.log_change(user, product, message = message)                                                        ║
-║ ├── dje/models.py#1952    log_change(cls) ↩                                                                                                        ║
-║ ├── dje/models.py#1954    cls.objects                                                                                                              ║
-║ ├── product_portfolio/views.py#1393    product.save()                                                                                              ║
-║ └── product_portfolio/views.py#1400    product.get_absolute_url()                                                                                  ║
+║ ├── component_catalog/views.py#1570    {filename}                                                                                                  ║
+║ ├── component_catalog/views.py#1575    f'attachment; filename="{filename}_scan.zip"'                                                               ║
+║ └── component_catalog/views.py#1576    return response                                                                                             ║
 ╚════════════���═══════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╝
-                                                                 Reachable Packages:                                                                  
+                                                                 Reachable Packages:                                                                  
                                                                  pkg:pypi/django@5.2                                                                  
                                                                 pkg:pypi/django@5.1.8                                                                 
 
-#2 argument request ⭕  to the function check_package_version_ajax_view can be used to reach 2 packages from certain endpoints.                       
+#2 argument args ⭕  to the function get<metaClassAdapter> can be used to reach 2 packages from certain endpoints.                                    
 ╔════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╗
-║ product_portfolio/views.py#2303    check_package_version_ajax_view(request) ↩                                                                      ║
+║ dje/views.py#1890    get<metaClassAdapter>(args) ↩                                                                                                 ║
 ║ Tags: framework-input                                                                                                                              ║
 ║                                                                                                                                                    ║
-║ ├── product_portfolio/views.py#2338    tmp358.get(current_uuid)                                                                                    ║
-║ ├── product_portfolio/views.py#2342    {current_uuid}                                                                                              ║
-║ ├── dejacode_toolkit/purldb.py#53    get_package(uuid) ↩                                                                                           ║
-║ ├── dejacode_toolkit/purldb.py#55    {uuid}                                                                                                        ║
-║ ├── product_portfolio/views.py#2342    purldb.get_package(f"{current_uuid}/latest_version")                                                        ║
-║ ├── product_portfolio/views.py#2345    return latest_version_entry                                                                                 ║
-║ ├── product_portfolio/views.py#2351    get_latest_version_entry(current_uuid)                                                                      ║
-║ ├── product_portfolio/views.py#2352    latest_version_entry.get("version")                                                                         ║
-║ ├── product_portfolio/views.py#2353    current_version != latest_version                                                                           ║
-║ ├── product_portfolio/views.py#2354    purldb_entry["latest_version"] = latest_version                                                             ║
-║ ├── product_portfolio/views.py#2349    purldb_entry.get("uuid")                                                                                    ║
-║ ├── product_portfolio/views.py#2350    purldb_entry.get("version")                                                                                 ║
-║ ├── product_portfolio/views.py#2356    upgrade_available.append(purldb_entry)                                                                      ║
-║ └── product_portfolio/views.py#2358    tmp360["upgrade_available"] = upgrade_available                                                             ║
+║ └── dje/views.py#1892    *args                                                                                                                     ║
 ╚════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╝
-                                                                 Reachable Packages:                                                                  
+                                                                 Reachable Packages:                                                                  
                                                                  pkg:pypi/django@5.2                                                                  
                                                                 pkg:pypi/django@5.1.8                                                                 
 
-#3 argument args ⭕  to the function dispatch can be used to reach 2 packages from certain endpoints.                                                 
+#3 argument request_uuid ⭕  to the function request_details_view can be used to reach 2 packages from certain endpoints.                             
 ╔════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╗
-║ dje/views.py#205    dispatch(args) ↩                                                                                                               ║
+║ build/lib/workflow/views.py#233    request_details_view(request_uuid) ↩                                                                            ║
 ║ Tags: framework-input                                                                                                                              ║
 ║                                                                                                                                                    ║
-║ └── dje/views.py#208    *args                                                                                                                      ║
+║ ├── build/lib/workflow/views.py#240    get_object_or_404(qs, uuid = request_uuid, dataspace = request.user.dataspace)                              ║
+║ Tags: pkg:pypi/django@5.2, framework                                                                                                           ║
+║                                                                                                                                                ║
+║ ├── build/lib/workflow/views.py#242    request_instance.has_details_permission(request.user)                                                       ║
+║ ├── build/lib/workflow/views.py#246    request_instance.has_close_permission(request.user)                                                         ║
+║ ├── build/lib/workflow/views.py#274    request_instance.comments                                                                                   ║
+║ ├── build/lib/workflow/views.py#277    request_instance.dataspace                                                                                  ║
+║ ├── build/lib/workflow/views.py#280    {request_instance}                                                                                          ║
+║ └── build/lib/workflow/views.py#281    redirect(request_instance)                                                                                  ║
+║     Tags: pkg:pypi/django@5.2, framework                                                                                                           ║
+║                                                                                                                                                    ║
 ╚════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╝
-                                                                 Reachable Packages:                                                                  
+                                                                 Reachable Packages:                                                                  
                                                                  pkg:pypi/django@5.2                                                                  
                                                                 pkg:pypi/django@5.1.8                                                                 
 
-#4 argument name ⭕  to the function improve_packages_from_purldb_view can be used to reach 3 packages from certain endpoints.                        
+#4 argument request ⭕  to the function license_summary_view can be used to reach 4 packages from certain endpoints.                                  
 ╔════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╗
-║ product_portfolio/views.py#2503    improve_packages_from_purldb_view(name) ↩                                                                       ║
+║ product_portfolio/views.py#2233    license_summary_view(request) ↩                                                                                 ║
 ║ Tags: framework-input                                                                                                                              ║
 ║                                                                                                                                                    ║
-║ ├── product_portfolio/views.py#2506    unquote_plus(name)                                                                                          ║
-║ Tags: pkg:pypi/django@5.2, framework                                                                                                           ║
-║                                                                                                                                                ║
-║ ├── product_portfolio/views.py#2508    guardian_get_perms(user, product)                                                                           ║
-║ Tags: pkg:pypi/guardian@0.2.3                                                                                                                  ║
-║                                                                                                                                                ║
-║ └── product_portfolio/views.py#2539    product.get_absolute_url()                                                                                  ║
+║ ├── product_portfolio/views.py#2234    request.user                                                                                                ║
+║ ├── product_portfolio/views.py#2236    tmp331.get_queryset(user)                                                                                   ║
+║ ├── product_portfolio/models.py#144    get_queryset(user) ↩                                                                                        ║
+║ ├── product_portfolio/models.py#158    not user                                                                                                    ║
+║ ├── product_portfolio/models.py#162    tmp5.get_objects_for_user(user, perms, klass = queryset_class, accept_global_perms = False)                 ║
+║ Tags: pkg:pypi/django-guardian@2.4.0, pkg:pypi/guardian@0.2.3                                                                                  ║
+║                                                                                                                                                ║
+║ ├── product_portfolio/models.py#161    tmp4.scope(user.dataspace)                                                                                  ║
+║ ├── product_portfolio/models.py#168    queryset.filter(is_active = True)                                                                           ║
+║ Tags: pkg:pypi/django-guardian@2.4.0, pkg:pypi/guardian@0.2.3                                                                                  ║
+║                                                                                                                                                ║
+║ ├── product_portfolio/views.py#2237    get_object_or_404(guarded_qs, name = unquote_plus(name), version = unquote_plus(version))                   ║
+║ Tags: pkg:pypi/django@5.2, framework                                                                                                           ║
+║                                                                                                                                                ║
+║ ├── product_portfolio/views.py#2245    product.components                                                                                          ║
+║ ├── product_portfolio/views.py#2248    set(product_components)                                                                                     ║
+║ ├── product_portfolio/views.py#2249    product_components.__iter__()                                                                               ║
+║ ├── product_portfolio/views.py#2250    component.get_descendants(set_direct_parent = True)                                                         ║
+║ ├── product_portfolio/views.py#2253    components_hierarchy.__iter__()                                                                             ║
+║ ├── product_portfolio/views.py#2255    component.packages                                                                                          ║
+║ ├── product_portfolio/views.py#2257    component_packages.append(package)                                                                          ║
+║ ├── product_portfolio/views.py#2258    packages_hierarchy.update(component_packages)                                                               ║
+║ ├── product_portfolio/views.py#2263    list(packages_hierarchy)                                                                                    ║
+║ ├── product_portfolio/views.py#2264    item.licenses                                                                                               ║
+║ ├── product_portfolio/views.py#2265    all_licenses.update(licenses)                                                                               ║
+║ ├── product_portfolio/views.py#2266    licenses.__iter__()                                                                                         ║
+║ ├── product_portfolio/views.py#2267    license in filterset.qs                                                                                     ║
+║ ├── product_portfolio/views.py#2297    tmp351["filterset"] = filterset                                                                             ║
+║ ├── product_portfolio/views.py#2294    tmp351["filterset"]                                                                                         ║
+║ ├── product_portfolio/views.py#2292    render(request, "product_portfolio/license_summary.html", tmp351 = {}                                       ║
+║ Tags: pkg:pypi/django@5.2, framework                                                                                                           ║
+║                                                                                                                                                ║
+║ └── product_portfolio/views.py#2291    ♦ return render()                                                                                           ║
 ╚════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╝
-                                                                 Reachable Packages:                                                                  
+                                                                 Reachable Packages:                                                                  
                                                                  pkg:pypi/django@5.2                                                                  
                                                                pkg:pypi/guardian@0.2.3                                                                
                                                                 pkg:pypi/django@5.1.8                                                                 
+                                                            pkg:pypi/django-guardian@2.4.0                                                            
 
-#5 argument version ⭕  to the function improve_packages_from_purldb_view can be used to reach 3 packages from certain endpoints.                     
+#5 argument request ⭕  to the function vulnerability_analysis_form_view can be used to reach 5 packages from certain endpoints.                                                                                              
+╔════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╗
+║ product_portfolio/views.py#2543    vulnerability_analysis_form_view(request) ↩                                                                                                                                             ║
+║ Tags: framework-input                                                                                                                                                                                                      ║
+║                                                                                                                                                                                                                            ║
+║ ├── product_portfolio/views.py#2544    request.user                                                                                                                                                                        ║
+║ ├── product_portfolio/views.py#2549    tmp388.get_queryset(user, perms = perms)                                                                                                                                            ║
+║ ├── product_portfolio/models.py#144    get_queryset(user) ↩                                                                                                                                                                ║
+║ ├── product_portfolio/models.py#158    not user                                                                                                                                                                            ║
+║ ├── product_portfolio/models.py#162    tmp5.get_objects_for_user(user, perms, klass = queryset_class, accept_global_perms = False)                                                                                         ║
+║ Tags: pkg:pypi/django-guardian@2.4.0, pkg:pypi/guardian@0.2.3                                                                                                                                                          ║
+║                                                                                                                                                                                                                        ║
+║ ├── product_portfolio/models.py#161    tmp4.scope(user.dataspace)                                                                                                                                                          ║
+║ ├── product_portfolio/models.py#168    queryset.filter(is_active = True)                                                                                                                                                   ║
+║ Tags: pkg:pypi/django-guardian@2.4.0, pkg:pypi/guardian@0.2.3                                                                                                                                                          ║
+║                                                                                                                                                                                                                        ║
+║ ├── product_portfolio/views.py#2564    product_qs.exclude(pk = product_package.product.pk)                                                                                                                                 ║
+║ ├── product_portfolio/views.py#2566    product_package.package_id                                                                                                                                                          ║
+║ ├── product_portfolio/views.py#2564    tmp393.filter(packages__id = product_package.package_id, packages__affected_by_vulnerabilities = vulnerability)                                                                     ║
+║ ├── product_portfolio/views.py#2572    Subquery(product_analysis.values("responses")[Slice(None,Some(Constant(IntConstant(1),2572,79,2572,79)),None,2572,78,2572,79)])                                                     ║
+║ ├── product_portfolio/views.py#2564    tmp392.annotate(analysis_state = Subquery(product_analysis.values("state")[Slice(None,Some(Constant(IntConstant(1),2570,71,2570,71)),None,2570,70,2570,71)]),                       ║
+║ analysis_justification = Subquery(product_analysis.values("justification")[Slice(None,Some(Constant(IntConstant(1),2571,87,2571,87)),None,2571,86,2571,87)]), analysis_responses =                                     ║
+║ Subquery(product_analysis.values("responses")[Slice(None,Some(Constant(IntConstant(1),2572,79,2572,79)),None,2572,78,2572,79)]), analysis_detail =                                                                     ║
+║ Subquery(product_analysis.values("detail")[Slice(None,Some(Constant(IntConstant(1),2573,73,2573,73)),None,2573,72,2573,73)]))                                                                                          ║
+║ ├── product_portfolio/views.py#2563    affected_products = tmp392 = tmp393 = product_qs.exclude(pk = product_package.product.pk)                                                                                           ║
+║ ├── product_portfolio/views.py#2586    form_class(user, instance = vulnerability_analysis, data = request.POST, affected_products = affected_products)                                                                     ║
+║ ├── product_portfolio/views.py#2585    request.POST                                                                                                                                                                        ║
+║ ├── product_portfolio/views.py#2588    form.is_valid()                                                                                                                                                                     ║
+║ ├── product_portfolio/views.py#2601    render_crispy_form(form, context = csrf(request))                                                                                                                                   ║
+║ Tags: pkg:pypi/django-crispy-forms@2.4                                                                                                                                                                                 ║
+║                                                                                                                                                                                                                        ║
+║ └── product_portfolio/views.py#2603    HttpResponse(rendered_form)                                                                                                                                                         ║
+║     Tags: pkg:pypi/django@5.2, framework                                                                                                                                                                                   ║
+║                                                                                                                                                                                                                            ║
+╚════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════���═══════════════════════════════════════════════════════════════════════════╝
+                                                                                                     Reachable Packages:                                                                                                      
+                                                                                                pkg:pypi/django-guardian@2.4.0                                                                                                
+                                                                                                     pkg:pypi/django@5.2                                                                                                      
+                                                                                                    pkg:pypi/django@5.1.8                                                                                                     
+                                                                                                   pkg:pypi/guardian@0.2.3                                                                                                    
+                                                                                               pkg:pypi/django-crispy-forms@2.4                                                                                               
+
+#6 argument version ⭕  to the function add_customcomponent_ajax_view can be used to reach 3 packages from certain endpoints.                         
 ╔════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╗
-║ product_portfolio/views.py#2503    improve_packages_from_purldb_view(version) ↩                                                                    ║
+║ build/lib/product_portfolio/views.py#1325    add_customcomponent_ajax_view(version) ↩                                                              ║
 ║ Tags: framework-input                                                                                                                              ║
 ║                                                                                                                                                    ║
-║ ├── product_portfolio/views.py#2506    unquote_plus(version)                                                                                       ║
-║ Tags: pkg:pypi/django@5.2, framework                                                                                                           ║
-║                                                                                                                                                ║
-║ ├── product_portfolio/views.py#2508    guardian_get_perms(user, product)                                                                           ║
-║ Tags: pkg:pypi/guardian@0.2.3                                                                                                                  ║
-║                                                                                                                                                ║
-║ └── product_portfolio/views.py#2539    product.get_absolute_url()                                                                                  ║
+║ ├── build/lib/product_portfolio/views.py#1330    unquote_plus(version)                                                                             ║
+║ Tags: pkg:pypi/django@5.2, framework                                                                                                           ║
+║                                                                                                                                                ║
+║ ├── build/lib/product_portfolio/views.py#1342    tmp193["product"] = product                                                                       ║
+║ ├── build/lib/product_portfolio/views.py#1344    render_crispy_form(form)                                                                          ║
+║ Tags: pkg:pypi/django-crispy-forms@2.4                                                                                                         ║
+║                                                                                                                                                ║
+║ └── build/lib/product_portfolio/views.py#1346    HttpResponse(rendered_form)                                                                       ║
+║     Tags: pkg:pypi/django@5.2, framework                                                                                                           ║
+║                                                                                                                                                    ║
 ╚════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╝
-                                                                 Reachable Packages:                                                                  
+                                                                 Reachable Packages:                                                                  
+                                                           pkg:pypi/django-crispy-forms@2.4                                                           
                                                                  pkg:pypi/django@5.2                                                                  
-                                                               pkg:pypi/guardian@0.2.3                                                                
                                                                 pkg:pypi/django@5.1.8                                                                 
 
-#6 argument version ⭕  to the function add_customcomponent_ajax_view can be used to reach 3 packages from certain endpoints.                         
+#7 argument name ⭕  to the function add_customcomponent_ajax_view can be used to reach 3 packages from certain endpoints.                            
 ╔════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╗
-║ product_portfolio/views.py#1325    add_customcomponent_ajax_view(version) ↩                                                                        ║
+║ build/lib/product_portfolio/views.py#1325    add_customcomponent_ajax_view(name) ↩                                                                 ║
 ║ Tags: framework-input                                                                                                                              ║
 ║                                                                                                                                                    ║
-║ ├── product_portfolio/views.py#1330    unquote_plus(version)                                                                                       ║
-║ Tags: pkg:pypi/django@5.2, framework                                                                                                           ║
-║                                                                                                                                                ║
-║ ├── product_portfolio/views.py#1342    tmp193["product"] = product                                                                                 ║
-║ ├── product_portfolio/views.py#1344    render_crispy_form(form)                                                                                    ║
-║ Tags: pkg:pypi/django-crispy-forms@2.4                                                                                                         ║
-║                                                                                                                                                ║
-║ └── product_portfolio/views.py#1346    HttpResponse(rendered_form)                                                                                 ║
-║     Tags: pkg:pypi/django@5.2, framework                                                                                                           ║
-║                                                                                                                                                    ║
+║ ├── build/lib/product_portfolio/views.py#1330    unquote_plus(name)                                                                                ║
+║ Tags: pkg:pypi/django@5.2, framework                                                                                                           ║
+║                                                                                                                                                ║
+║ ├── build/lib/product_portfolio/views.py#1342    tmp193["product"] = product                                                                       ║
+║ ├── build/lib/product_portfolio/views.py#1344    render_crispy_form(form)                                                                          ║
+║ Tags: pkg:pypi/django-crispy-forms@2.4                                                                                                         ║
+║                                                                                                                                                ║
+║ └── build/lib/product_portfolio/views.py#1346    HttpResponse(rendered_form)                                                                       ║
+║     Tags: pkg:pypi/django@5.2, framework                                                                                                           ║
+║                                                                                                                                                    ║
 ╚════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╝
-                                                                 Reachable Packages:                                                                  
+                                                                 Reachable Packages:                                                                  
                                                            pkg:pypi/django-crispy-forms@2.4                                                           
                                                                  pkg:pypi/django@5.2                                                                  
                                                                 pkg:pypi/django@5.1.8                                                                 
 
-#7 argument name ⭕  to the function add_customcomponent_ajax_view can be used to reach 3 packages from certain endpoints.                            
+#8 argument relation_uuid ⭕  to the function edit_productrelation_ajax_view can be used to reach 3 packages from certain endpoints.                  
 ╔════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╗
-║ product_portfolio/views.py#1325    add_customcomponent_ajax_view(name) ↩                                                                           ║
+║ build/lib/product_portfolio/views.py#1350    edit_productrelation_ajax_view(relation_uuid) ↩                                                       ║
 ║ Tags: framework-input                                                                                                                              ║
 ║                                                                                                                                                    ║
-║ ├── product_portfolio/views.py#1330    unquote_plus(name)                                                                                          ║
-║ Tags: pkg:pypi/django@5.2, framework                                                                                                           ║
-║                                                                                                                                                ║
-║ ├── product_portfolio/views.py#1342    tmp193["product"] = product                                                                                 ║
-║ ├── product_portfolio/views.py#1344    render_crispy_form(form)                                                                                    ║
-║ Tags: pkg:pypi/django-crispy-forms@2.4                                                                                                         ║
-║                                                                                                                                                ║
-║ └── product_portfolio/views.py#1346    HttpResponse(rendered_form)                                                                                 ║
-║     Tags: pkg:pypi/django@5.2, framework                                                                                                           ║
-║                                                                                                                                                    ║
+║ ├── build/lib/product_portfolio/views.py#1372    get_object_or_404(qs, uuid = relation_uuid)                                                       ║
+║ Tags: pkg:pypi/django@5.2, framework                                                                                                           ║
+║                                                                                                                                                ║
+║ ├── build/lib/product_portfolio/views.py#1373    relation_instance.product                                                                         ║
+║ ├── build/lib/product_portfolio/views.py#1377    product.can_be_changed_by(user)                                                                   ║
+║ ├── build/lib/product_portfolio/views.py#1378    user.has_perm(f"product_portfolio.change_{relationship_model_name}")                              ║
+║ ├── build/lib/product_portfolio/views.py#1385    user.has_perm(f"product_portfolio.delete_{relationship_model_name}")                              ║
+║ ├── build/lib/product_portfolio/views.py#1403    form_class(user, instance = relation_instance, data = request.POST)                               ║
+║ ├── build/lib/product_portfolio/views.py#1404    form.is_valid()                                                                                   ║
+║ ├── build/lib/product_portfolio/views.py#1413    render_crispy_form(form)                                                                          ║
+║ Tags: pkg:pypi/django-crispy-forms@2.4                                                                                                         ║
+║                                                                                                                                                ║
+║ ├── build/lib/product_portfolio/views.py#1426    relationship_field + rendered_form                                                                ║
+║ └── build/lib/product_portfolio/views.py#1428    HttpResponse(rendered_form)                                                                       ║
+║     Tags: pkg:pypi/django@5.2, framework                                                                                                           ║
+║                                                                                                                                                    ║
 ╚════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╝
-                                                                 Reachable Packages:                                                                  
+                                                                 Reachable Packages:                                                                  
                                                            pkg:pypi/django-crispy-forms@2.4                                                           
                                                                  pkg:pypi/django@5.2                                                                  
                                                                 pkg:pypi/django@5.1.8                                                                 
 
-#8 argument vulnerability_id ⭕  to the function vulnerability_analysis_form_view can be used to reach 3 packages from certain endpoints.                 
-╔════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╗
-║ product_portfolio/views.py#2543    vulnerability_analysis_form_view(vulnerability_id) ↩                                                                ║
-║ Tags: framework-input                                                                                                                                  ║
-║                                                                                                                                                        ║
-║ ├── product_portfolio/views.py#2555    get_object_or_404(vulnerability_qs, vulnerability_id = vulnerability_id)                                        ║
-║ Tags: pkg:pypi/django@5.2, framework                                                                                                               ║
-║                                                                                                                                                    ║
-║ ├── product_portfolio/views.py#2567    tmp393.filter(packages__id = product_package.package_id, packages__affected_by_vulnerabilities = vulnerability) ║
-║ ├── product_portfolio/views.py#2566    product_package.package_id                                                                                      ║
-║ ├── product_portfolio/views.py#2563    affected_products = tmp392 = tmp393 = product_qs.exclude(pk = product_package.product.pk)                       ║
-║ ├── product_portfolio/views.py#2586    form_class(user, instance = vulnerability_analysis, data = request.POST, affected_products = affected_products) ║
-║ ├── product_portfolio/views.py#2585    request.POST                                                                                                    ║
-║ ├── product_portfolio/views.py#2588    form.is_valid()                                                                                                 ║
-║ ├── product_portfolio/views.py#2601    render_crispy_form(form, context = csrf(request))                                                               ║
-║ Tags: pkg:pypi/django-crispy-forms@2.4                                                                                                             ║
-║                                                                                                                                                    ║
-║ └── product_portfolio/views.py#2603    HttpResponse(rendered_form)                                                                                     ║
-║     Tags: pkg:pypi/django@5.2, framework                                                                                                               ║
-║                                                                                                                                                        ║
-╚════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╝
-                                                                   Reachable Packages:                                                                    
-                                                             pkg:pypi/django-crispy-forms@2.4                                                             
-                                                                   pkg:pypi/django@5.2                                                                    
-                                                                  pkg:pypi/django@5.1.8                                                                   
+#9 argument name ⭕  to the function improve_packages_from_purldb_view can be used to reach 3 packages from certain endpoints.                        
+╔════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╗
+║ build/lib/product_portfolio/views.py#2503    improve_packages_from_purldb_view(name) ↩                                                             ║
+║ Tags: framework-input                                                                                                                              ║
+║                                                                                                                                                    ║
+║ ├── build/lib/product_portfolio/views.py#2506    unquote_plus(name)                                                                                ║
+║ Tags: pkg:pypi/django@5.2, framework                                                                                                           ║
+║                                                                                                                                                ║
+║ ├── build/lib/product_portfolio/views.py#2508    guardian_get_perms(user, product)                                                                 ║
+║ Tags: pkg:pypi/guardian@0.2.3                                                                                                                  ║
+║                                                                                                                                                ║
+║ └── build/lib/product_portfolio/views.py#2539    product.get_absolute_url()                                                                        ║
+╚════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╝
+                                                                 Reachable Packages:                                                                  
+                                                                 pkg:pypi/django@5.2                                                                  
+                                                               pkg:pypi/guardian@0.2.3                                                                
+                                                                pkg:pypi/django@5.1.8                                                                 
 
-#9 argument self ⭕  to the function get_success_url<metaClassAdapter> can be used to reach this package from certain endpoints.                      
+#10 argument version ⭕  to the function improve_packages_from_purldb_view can be used to reach 3 packages from certain endpoints.                    
 ╔════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╗
-║ component_catalog/views.py#837    get_success_url<metaClassAdapter>(self) ↩                                                                        ║
+║ product_portfolio/views.py#2503    improve_packages_from_purldb_view(version) ↩                                                                    ║
 ║ Tags: framework-input                                                                                                                              ║
 ║                                                                                                                                                    ║
-║ ├── component_catalog/views.py#840    self.request                                                                                                 ║
-║ ├── dje/utils.py#345    get_preserved_filters(request) ↩                                                                                           ║
-║ ├── dje/utils.py#357    request.GET                                                                                                                ║
-║ └── dje/utils.py#362    tmp58 = preserved_filters                                                                                                  ║
+║ ├── product_portfolio/views.py#2506    unquote_plus(version)                                                                                       ║
+║ Tags: pkg:pypi/django@5.2, framework                                                                                                           ║
+║                                                                                                                                                ║
+║ ├── product_portfolio/views.py#2508    guardian_get_perms(user, product)                                                                           ║
+║ Tags: pkg:pypi/guardian@0.2.3                                                                                                                  ║
+║                                                                                                                                                ║
+║ └── product_portfolio/views.py#2539    product.get_absolute_url()                                                                                  ║
 ╚════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╝
-                                                                 Reachable Packages:                                                                  
+                                                                 Reachable Packages:                                                                  
                                                                  pkg:pypi/django@5.2                                                                  
+                                                               pkg:pypi/guardian@0.2.3                                                                
+                                                                pkg:pypi/django@5.1.8                                                                 
 
-#10 argument x ⭕  to the function <lambda> can be used to reach this package from certain endpoints.                                                 
+#11 argument purldb_entry ⭕  to the function sort_data_by_fields can be used to reach this package from certain endpoints.                           
 ╔════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╗
-║ workflow/views.py#329    <lambda>(x) ↩                                                                                                             ║
+║ build/lib/purldb/views.py#58    sort_data_by_fields(purldb_entry) ↩                                                                                ║
 ║ Tags: framework-input                                                                                                                              ║
 ║                                                                                                                                                    ║
-║ ├── workflow/views.py#334    tmp54["comments_and_events"] = comments_and_events                                                                    ║
-║ ├── workflow/views.py#331    tmp54["comments_and_events"]                                                                                          ║
-║ └── workflow/views.py#355    render(request, "workflow/request_details.html", context)                                                             ║
-║     Tags: pkg:pypi/django@5.2, framework                                                                                                           ║
-║                                                                                                                                                    ║
+║ ├── build/lib/purldb/views.py#59    purldb_entry.copy()                                                                                            ║
+║ ├── build/lib/purldb/views.py#63    initial_data.pop(field_name, None)                                                                             ║
+║ ├── build/lib/purldb/views.py#65    sorted_data = value                                                                                            ║
+║ ├── build/lib/purldb/views.py#67    sorted_data.update(initial_data)                                                                               ║
+║ ├── build/lib/purldb/views.py#68    return sorted_data                                                                                             ║
+║ ├── build/lib/purldb/views.py#75    sort_data_by_fields(purldb_entry, tab_essentials_fields)                                                       ║
+║ ├── build/lib/purldb/views.py#81    sorted_data.get("purl")                                                                                        ║
+║ ├── build/lib/purldb/views.py#85    sorted_data.items()                                                                                            ║
+║ ├── build/lib/purldb/views.py#86    not value                                                                                                      ║
+║ └── build/lib/purldb/views.py#101    {value}                                                                                                       ║
 ╚════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╝
-                                                                 Reachable Packages:                                                                  
+                                                                 Reachable Packages:                                                                  
                                                                  pkg:pypi/django@5.2                                                                  
 
-#11 argument self ⭕  to the function post_add_to_component<metaClassAdapter> can be used to reach this package from certain endpoints.               
+#12 argument self ⭕  to the function get_deletion_status<metaClassAdapter> can be used to reach this package from certain endpoints.                 
 ╔════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╗
-║ component_catalog/views.py#1028    post_add_to_component<metaClassAdapter>(self) ↩                                                                 ║
+║ dje/views.py#535    get_deletion_status<metaClassAdapter>(self) ↩                                                                                  ║
 ║ Tags: framework-input                                                                                                                              ║
 ║                                                                                                                                                    ║
-║ ├── component_catalog/views.py#1029    self.request                                                                                                ║
-║ ├── component_catalog/views.py#1033    request.POST                                                                                                ║
-║ ├── component_catalog/views.py#1032    form_class(request = request, data = request.POST)                                                          ║
-║ ├── component_catalog/views.py#1036    form.is_valid()                                                                                             ║
-║ ├── component_catalog/views.py#1051    form.errors                                                                                                 ║
-║ └── component_catalog/views.py#1052    format_html(error_msg)                                                                                      ║
-║     Tags: pkg:pypi/django@5.2, framework                                                                                                           ║
-║                                                                                                                                                    ║
+║ ├── dje/views.py#538    self.object                                                                                                                ║
+║ └── dje/views.py#539    get_deleted_objects(objs, self.request, dejacode_site)                                                                     ║
+║     Tags: pkg:pypi/django@5.2, framework                                                                                                           ║
+║                                                                                                                                                    ║
 ╚════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╝
-                                                                 Reachable Packages:                                                                  
+                                                                 Reachable Packages:                                                                  
                                                                  pkg:pypi/django@5.2                                                                  
 
-#12 argument purldb_entry ⭕  to the function get_purldb_tab_fields can be used to reach 2 packages from certain endpoints.                                           
-╔════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╗
-║ purldb/views.py#71    get_purldb_tab_fields(purldb_entry) ↩                                                                                                        ║
-║ Tags: framework-input                                                                                                                                              ║
-║                                                                                                                                                                    ║
-║ ├── purldb/views.py#75    sort_data_by_fields(purldb_entry, tab_essentials_fields)                                                                                 ║
-║ ├── purldb/views.py#58    sort_data_by_fields(purldb_entry) ↩                                                                                                      ║
-║ Tags: framework-input                                                                                                                                          ║
-║                                                                                                                                                                ║
-║ ├── purldb/views.py#59    purldb_entry.copy()                                                                                                                      ║
-║ ├── purldb/views.py#63    initial_data.pop(field_name, None)                                                                                                       ║
-║ ├── purldb/views.py#65    sorted_data = value                                                                                                                      ║
-║ ├── purldb/views.py#67    sorted_data.update(initial_data)                                                                                                         ║
-║ ├── purldb/views.py#68    return sorted_data                                                                                                                       ║
-║ ├── purldb/views.py#81    sorted_data.get("purl")                                                                                                                  ║
-║ ├── purldb/views.py#85    sorted_data.items()                                                                                                                      ║
-║ ├── purldb/views.py#86    not value                                                                                                                                ║
-║ ├── purldb/views.py#97    get_formatted_expression(licensing, value, show_policy)                                                                                  ║
-║ Tags: pkg:pypi/django@5.2, framework                                                                                                                           ║
-║                                                                                                                                                                ║
-║ ├── component_catalog/license_expression_dje.py#421    get_formatted_expression(license_expression) ↩                                                              ║
-║ ├── component_catalog/license_expression_dje.py#423    parse_expression(license_expression, licenses = licensing, validate_known = False, validate_strict = False) ║
-║ ├── component_catalog/license_expression_dje.py#75    parse_expression(expression) ↩                                                                               ║
-║ ├── component_catalog/license_expression_dje.py#95    licensing.parse(expression, validate = validate_known, strict = validate_strict, simple = simple)            ║
-║ Tags: pkg:pypi/license-expression@30.4.1                                                                                                                       ║
-║                                                                                                                                                                ║
-║ ├── component_catalog/license_expression_dje.py#94    ♦ return licensing.parse()                                                                                   ║
-║ ├── component_catalog/license_expression_dje.py#425    normalized.render_as_readable(as_link = True, show_policy = show_policy, show_category = show_category)     ║
-║ └── purldb/views.py#97    get_formatted_expression(licensing, value, show_policy)                                                                                  ║
-╚════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╝
-                                                                         Reachable Packages:                                                                          
-                                                                         pkg:pypi/django@5.2                                                                          
-                                                                  pkg:pypi/license-expression@30.4.1                                                                  
+#13 argument self ⭕  to the function get_formset can be used to reach this package from certain endpoints.                                           
+╔════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╗
+║ build/lib/product_portfolio/views.py#2114    get_formset(self) ↩                                                                                   ║
+║ Tags: framework-input                                                                                                                              ║
+║                                                                                                                                                    ║
+║ ├── build/lib/product_portfolio/views.py#2117    self.can_delete_permission                                                                        ║
+║ └── build/lib/product_portfolio/views.py#2123    self.get_fields()                                                                                 ║
+║     Tags: pkg:pypi/django@5.2, framework                                                                                                           ║
+║                                                                                                                                                    ║
+╚════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╝
+                                                                 Reachable Packages:                                                                  
+                                                                 pkg:pypi/django@5.2                                                                  
+
+#14 argument key_files_packages ⭕  to the function scan_detected_package_fields can be used to reach 2 packages from certain endpoints.                
+╔══════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╗
+║ build/lib/component_catalog/views.py#2167    scan_detected_package_fields(key_files_packages) ↩                                                      ║
+║ Tags: framework-input                                                                                                                                ║
+║                                                                                                                                                      ║
+║ ├── build/lib/component_catalog/views.py#2172    key_files_packages[Slice(None,Some(Constant(IntConstant(1),2172,53,2172,53)),None,2172,52,2172,53)] ║
+║ ├── build/lib/component_catalog/views.py#2174    field[1] in detected_package                                                                        ║
+║ ├── build/lib/component_catalog/views.py#2198    ScanCodeIO.map_detected_package_data(detected_package)                                              ║
+║ ├── dejacode_toolkit/scancodeio.py#379    map_detected_package_data(detected_package) ↩                                                              ║
+║ ├── dejacode_toolkit/scancodeio.py#387    detected_package.get(scan_data_field)                                                                      ║
+║ ├── dejacode_toolkit/scancodeio.py#388    not value                                                                                                  ║
+║ ├── dejacode_toolkit/scancodeio.py#392    json.dumps(value, indent = 2)                                                                              ║
+║ ├── dejacode_toolkit/scancodeio.py#399    tmp21.dedup(value)                                                                                         ║
+║ Tags: pkg:pypi/license-expression@30.4.1                                                                                                         ║
+║                                                                                                                                                  ║
+║ ├── dejacode_toolkit/scancodeio.py#403    package_data_for_model = value                                                                             ║
+║ ├── dejacode_toolkit/scancodeio.py#405    return package_data_for_model                                                                              ║
+║ ├── build/lib/component_catalog/views.py#2202    tmp320.get(scan_field)                                                                              ║
+║ ├── build/lib/component_catalog/views.py#2203    isinstance(value, list)                                                                             ║
+║ └── build/lib/component_catalog/views.py#2206    escape(value)                                                                                       ║
+║     Tags: pkg:pypi/django@5.2, framework                                                                                                             ║
+║                                                                                                                                                      ║
+╚══════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╝
+                                                                  Reachable Packages:                                                                   
+                                                                  pkg:pypi/django@5.2                                                                   
+                                                           pkg:pypi/license-expression@30.4.1                                                           
+
+#15 argument app_configs ⭕  to the function check_for_license_expression_choice_inconsistencies can be used to reach 2 packages from certain endpoints.             
+╔═══════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╗
+║ dje/management/commands/checks.py#342    check_for_license_expression_choice_inconsistencies(app_configs) ↩                                                       ║
+║ Tags: cli-source                                                                                                                                                  ║
+║                                                                                                                                                                   ║
+║ ├── dje/management/commands/checks.py#350    app_configs.get("dataspace")                                                                                         ║
+║ ├── dje/management/commands/checks.py#356    qs.scope(dataspace)                                                                                                  ║
+║ ├── dje/management/commands/checks.py#358    qs.__iter__()                                                                                                        ║
+║ ├── dje/management/commands/checks.py#359    obj.component if model_class is ProductComponent else obj.child                                                      ║
+║ ├── dje/management/commands/checks.py#360    not component                                                                                                        ║
+║ ├── dje/management/commands/checks.py#364    component.licenses                                                                                                   ║
+║ ├── dje/management/commands/checks.py#366    normalize_and_validate_expression(obj.license_expression, licenses, validate_known = True, include_available = True) ║
+║ ├── component_catalog/license_expression_dje.py#124    normalize_and_validate_expression(licenses) ↩                                                              ║
+║ Tags: validation                                                                                                                                              ║
+║                                                                                                                                                               ║
+║ ├── component_catalog/license_expression_dje.py#141    build_licensing(licenses)                                                                                  ║
+║ ├── component_catalog/license_expression_dje.py#31    build_licensing(licenses) ↩                                                                                 ║
+║ ├── component_catalog/license_expression_dje.py#36    isinstance(licenses, Licensing)                                                                             ║
+║ ├── component_catalog/license_expression_dje.py#38    Licensing(licenses)                                                                                         ║
+║ Tags: pkg:pypi/license-expression@30.4.1                                                                                                                      ║
+║                                                                                                                                                               ║
+║ ├── component_catalog/license_expression_dje.py#145    parse_expression(expression, licensing, validate_known, validate_strict, simple = simple)                  ║
+║ Tags: pkg:pypi/license-expression@30.4.1                                                                                                                      ║
+║                                                                                                                                                               ║
+║ ├── component_catalog/license_expression_dje.py#75    parse_expression(licenses) ↩                                                                                ║
+║ ├── component_catalog/license_expression_dje.py#151    available_licenses_message(licensing)                                                                      ║
+║ Tags: pkg:pypi/license-expression@30.4.1                                                                                                                      ║
+║                                                                                                                                                               ║
+║ ├── component_catalog/license_expression_dje.py#210    available_licenses_message(licenses) ↩                                                                     ║
+║ ├── component_catalog/license_expression_dje.py#38    Licensing(licenses)                                                                                         ║
+║ ├── component_catalog/license_expression_dje.py#223    licensing.known_symbols                                                                                    ║
+║ ├── component_catalog/license_expression_dje.py#224    {sorted_keys}                                                                                              ║
+║ ├── component_catalog/license_expression_dje.py#151    available_licenses_message(licensing)                                                                      ║
+║ └── component_catalog/license_expression_dje.py#152    format_html(msg)                                                                                           ║
+║     Tags: pkg:pypi/django@5.2, framework                                                                                                                          ║
+║                                                                                                                                                                   ║
+╚═══════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╝
+                            ◽ Verify that the mitigation(s) used in this flow are valid and appropriate for your security requirements.                             
+                                                                         Reachable Packages:                                                                         
+                                                                         pkg:pypi/django@5.2                                                                         
+                                                                 pkg:pypi/license-expression@30.4.1                                                                  
 
-#13 argument key ⭕  to the function import_packages_from_scancodeio_view can be used to reach 4 packages from certain endpoints.                     
+#16 argument key ⭕  to the function import_packages_from_scancodeio_view can be used to reach 4 packages from certain endpoints.                     
 ╔════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╗
-║ product_portfolio/views.py#2432    import_packages_from_scancodeio_view(key) ↩                                                                     ║
+║ product_portfolio/views.py#2432    import_packages_from_scancodeio_view(key) ↩                                                                     ║
 ║ Tags: framework-input                                                                                                                              ║
 ║                                                                                                                                                    ║
-║ ├── product_portfolio/views.py#2437    signing.loads(key)                                                                                          ║
-║ Tags: pkg:pypi/django@5.2, framework                                                                                                           ║
-║                                                                                                                                                ║
-║ ├── product_portfolio/views.py#2438    is_uuid4(user_uuid)                                                                                         ║
-║ ├── dje/utils.py#525    is_uuid4(value) ↩                                                                                                          ║
-║ Tags: validation                                                                                                                               ║
-║                                                                                                                                                ║
-║ ├── dje/utils.py#528    str(value)                                                                                                                 ║
-║ ├──                                                                                                                                                ║
-║ ├── product_portfolio/views.py#2446    get_object_or_404(DejacodeUser, uuid = user_uuid)                                                           ║
-║ Tags: pkg:pypi/django@5.2, framework                                                                                                           ║
-║                                                                                                                                                ║
-║ ├── product_portfolio/views.py#2451    tmp369.get_queryset(user, perms = "change_product")                                                         ║
-║ ├── product_portfolio/models.py#144    get_queryset(user) ↩                                                                                        ║
-║ ├── product_portfolio/models.py#158    not user                                                                                                    ║
-║ ├── product_portfolio/models.py#162    tmp5.get_objects_for_user(user, perms, klass = queryset_class, accept_global_perms = False)                 ║
-║ Tags: pkg:pypi/django-guardian@2.4.0, pkg:pypi/guardian@0.2.3                                                                                  ║
-║                                                                                                                                                ║
-║ ├── product_portfolio/models.py#161    tmp4.scope(user.dataspace)                                                                                  ║
-║ ├── product_portfolio/models.py#168    queryset.filter(is_active = True)                                                                           ║
-║ Tags: pkg:pypi/django-guardian@2.4.0, pkg:pypi/guardian@0.2.3                                                                                  ║
-║                                                                                                                                                ║
-║ └── product_portfolio/views.py#2452    get_object_or_404(product_qs, id = scancode_project.product_id)                                             ║
-║     Tags: pkg:pypi/django@5.2, framework                                                                                                           ║
-║                                                                                                                                                    ║
+║ ├── product_portfolio/views.py#2437    signing.loads(key)                                                                                          ║
+║ Tags: pkg:pypi/django@5.2, framework                                                                                                           ║
+║                                                                                                                                                ║
+║ ├── product_portfolio/views.py#2438    is_uuid4(user_uuid)                                                                                         ║
+║ ├── dje/utils.py#525    is_uuid4(value) ↩                                                                                                          ║
+║ Tags: validation                                                                                                                               ║
+║                                                                                                                                                ║
+║ ├── dje/utils.py#528    str(value)                                                                                                                 ║
+║ ├──                                                                                                                                                ║
+║ ├── product_portfolio/views.py#2446    get_object_or_404(DejacodeUser, uuid = user_uuid)                                                           ║
+║ Tags: pkg:pypi/django@5.2, framework                                                                                                           ║
+║                                                                                                                                                ║
+║ ├── product_portfolio/views.py#2451    tmp369.get_queryset(user, perms = "change_product")                                                         ║
+║ ├── product_portfolio/models.py#144    get_queryset(user) ↩                                                                                        ║
+║ ├── product_portfolio/models.py#158    not user                                                                                                    ║
+║ ├── product_portfolio/models.py#162    tmp5.get_objects_for_user(user, perms, klass = queryset_class, accept_global_perms = False)                 ║
+║ Tags: pkg:pypi/django-guardian@2.4.0, pkg:pypi/guardian@0.2.3                                                                                  ║
+║                                                                                                                                                ║
+║ ├── product_portfolio/models.py#161    tmp4.scope(user.dataspace)                                                                                  ║
+║ ├── product_portfolio/models.py#168    queryset.filter(is_active = True)                                                                           ║
+║ Tags: pkg:pypi/django-guardian@2.4.0, pkg:pypi/guardian@0.2.3                                                                                  ║
+║                                                                                                                                                ║
+║ └── product_portfolio/views.py#2452    get_object_or_404(product_qs, id = scancode_project.product_id)                                             ║
+║     Tags: pkg:pypi/django@5.2, framework                                                                                                           ║
+║                                                                                                                                                    ║
 ╚════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╝
                      ◽ Verify that the mitigation(s) used in this flow are valid and appropriate for your security requirements.                     
-                                                                 Reachable Packages:                                                                  
+                                                                 Reachable Packages:                                                                  
                                                                  pkg:pypi/django@5.2                                                                  
                                                                pkg:pypi/guardian@0.2.3                                                                
                                                                 pkg:pypi/django@5.1.8                                                                 
                                                             pkg:pypi/django-guardian@2.4.0                                                            
 
-#14 argument object_list ⭕  to the function inject_license_expression_formatted can be used to reach 2 packages from certain endpoints.                              
+#17 argument object_list ⭕  to the function inject_license_expression_formatted can be used to reach 2 packages from certain endpoints.                              
 ╔════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╗
-║ purldb/views.py#126    inject_license_expression_formatted(object_list) ↩                                                                                          ║
+║ build/lib/purldb/views.py#126    inject_license_expression_formatted(object_list) ↩                                                                                ║
 ║ Tags: framework-input                                                                                                                                              ║
 ║                                                                                                                                                                    ║
-║ ├── purldb/views.py#130    object_list.__iter__()                                                                                                                  ║
-║ ├── purldb/views.py#137    tmp10.__next__()                                                                                                                        ║
-║ ├── purldb/views.py#138    obj.get("declared_license_expression")                                                                                                  ║
-║ ├── purldb/views.py#140    get_formatted_expression(licensing, expression, show_policy)                                                                            ║
-║ ├── component_catalog/license_expression_dje.py#421    get_formatted_expression(license_expression) ↩                                                              ║
-║ ├── component_catalog/license_expression_dje.py#423    parse_expression(license_expression, licenses = licensing, validate_known = False, validate_strict = False) ║
-║ ├── component_catalog/license_expression_dje.py#75    parse_expression(expression) ↩                                                                               ║
-║ ├── component_catalog/license_expression_dje.py#95    licensing.parse(expression, validate = validate_known, strict = validate_strict, simple = simple)            ║
-║ Tags: pkg:pypi/license-expression@30.4.1                                                                                                                       ║
-║                                                                                                                                                                ║
-║ ├── component_catalog/license_expression_dje.py#94    ♦ return licensing.parse()                                                                                   ║
-║ ├── component_catalog/license_expression_dje.py#425    normalized.render_as_readable(as_link = True, show_policy = show_policy, show_category = show_category)     ║
-║ └── purldb/views.py#141    format_html(formatted_expression)                                                                                                       ║
-║     Tags: pkg:pypi/django@5.2, framework                                                                                                                           ║
-║                                                                                                                                                                    ║
+║ ├── build/lib/purldb/views.py#130    object_list.__iter__()                                                                                                        ║
+║ ├── build/lib/purldb/views.py#137    tmp10.__next__()                                                                                                              ║
+║ ├── build/lib/purldb/views.py#138    obj.get("declared_license_expression")                                                                                        ║
+║ ├── build/lib/purldb/views.py#140    get_formatted_expression(licensing, expression, show_policy)                                                                  ║
+║ ├── component_catalog/license_expression_dje.py#421    get_formatted_expression(license_expression) ↩                                                              ║
+║ ├── component_catalog/license_expression_dje.py#423    parse_expression(license_expression, licenses = licensing, validate_known = False, validate_strict = False) ║
+║ ├── component_catalog/license_expression_dje.py#75    parse_expression(expression) ↩                                                                               ║
+║ ├── component_catalog/license_expression_dje.py#95    licensing.parse(expression, validate = validate_known, strict = validate_strict, simple = simple)            ║
+║ Tags: pkg:pypi/license-expression@30.4.1                                                                                                                       ║
+║                                                                                                                                                                ║
+║ ├── component_catalog/license_expression_dje.py#94    ♦ return licensing.parse()                                                                                   ║
+║ ├── component_catalog/license_expression_dje.py#425    normalized.render_as_readable(as_link = True, show_policy = show_policy, show_category = show_category)     ║
+║ └── build/lib/purldb/views.py#141    format_html(formatted_expression)                                                                                             ║
+║     Tags: pkg:pypi/django@5.2, framework                                                                                                                           ║
+║                                                                                                                                                                    ║
 ╚════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╝
-                                                                         Reachable Packages:                                                                          
+                                                                         Reachable Packages:                                                                          
                                                                          pkg:pypi/django@5.2                                                                          
                                                                   pkg:pypi/license-expression@30.4.1                                                                  
 
-#15 argument dataspace ⭕  to the function get_purldb_tab_fields can be used to reach 2 packages from certain endpoints.                              
-╔════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╗
-║ purldb/views.py#71    get_purldb_tab_fields(dataspace) ↩                                                                                           ║
-║ Tags: framework-input                                                                                                                              ║
-║                                                                                                                                                    ║
-║ ├── purldb/views.py#96    get_dataspace_licensing(dataspace)                                                                                       ║
-║ ├── component_catalog/license_expression_dje.py#52    get_dataspace_licensing(dataspace) ↩                                                         ║
-║ ├── component_catalog/license_expression_dje.py#60    fetch_licensing_for_dataspace(dataspace, license_keys)                                       ║
-║ ├── component_catalog/license_expression_dje.py#41    fetch_licensing_for_dataspace(dataspace) ↩                                                   ║
-║ ├── component_catalog/license_expression_dje.py#47    tmp1.scope(dataspace)                                                                        ║
-║ ├── component_catalog/license_expression_dje.py#48    build_licensing(license_qs)                                                                  ║
-║ ├── component_catalog/license_expression_dje.py#31    build_licensing(licenses) ↩                                                                  ║
-║ ├── component_catalog/license_expression_dje.py#36    isinstance(licenses, Licensing)                                                              ║
-║ ├── component_catalog/license_expression_dje.py#38    Licensing(licenses)                                                                          ║
-║ Tags: pkg:pypi/license-expression@30.4.1                                                                                                       ║
-║                                                                                                                                                ║
-║ ├── component_catalog/license_expression_dje.py#49    return licensing                                                                             ║
-║ └── purldb/views.py#97    get_formatted_expression(licensing, value, show_policy)                                                                  ║
-║     Tags: pkg:pypi/django@5.2, framework                                                                                                           ║
-║                                                                                                                                                    ║
-╚════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╝
-                                                                 Reachable Packages:                                                                  
-                                                                 pkg:pypi/django@5.2                                                                  
-                                                          pkg:pypi/license-expression@30.4.1                                                          
-
-#16 argument vulnerability ⭕  to the function get_fixed_packages_html<metaClassAdapter> can be used to reach 2 packages from certain endpoints.      
+#18 argument key_files_packages ⭕  to the function scan_detected_package_fields can be used to reach 3 packages from certain endpoints.                
+╔══════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╗
+║ build/lib/component_catalog/views.py#2167    scan_detected_package_fields(key_files_packages) ↩                                                      ║
+║ Tags: framework-input                                                                                                                                ║
+║                                                                                                                                                      ║
+║ ├── build/lib/component_catalog/views.py#2172    key_files_packages[Slice(None,Some(Constant(IntConstant(1),2172,53,2172,53)),None,2172,52,2172,53)] ║
+║ ├── build/lib/component_catalog/views.py#2174    field[1] in detected_package                                                                        ║
+║ ├── build/lib/component_catalog/views.py#2198    ScanCodeIO.map_detected_package_data(detected_package)                                              ║
+║ ├── dejacode_toolkit/scancodeio.py#379    map_detected_package_data(detected_package) ↩                                                              ║
+║ ├── dejacode_toolkit/scancodeio.py#387    detected_package.get(scan_data_field)                                                                      ║
+║ ├── dejacode_toolkit/scancodeio.py#388    not value                                                                                                  ║
+║ ├── dejacode_toolkit/scancodeio.py#392    json.dumps(value, indent = 2)                                                                              ║
+║ ├── dejacode_toolkit/scancodeio.py#399    tmp21.dedup(value)                                                                                         ║
+║ Tags: pkg:pypi/license-expression@30.4.1                                                                                                         ║
+║                                                                                                                                                  ║
+║ ���── dejacode_toolkit/scancodeio.py#403    package_data_for_model = value                                                                             ║
+║ ├── dejacode_toolkit/scancodeio.py#405    return package_data_for_model                                                                              ║
+║ ├── build/lib/component_catalog/views.py#2202    tmp320.get(scan_field)                                                                              ║
+║ ├── build/lib/component_catalog/views.py#2203    isinstance(value, list)                                                                             ║
+║ └── build/lib/component_catalog/views.py#2204    value.__iter__()                                                                                    ║
+╚══════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╝
+                                                                  Reachable Packages:                                                                   
+                                                                  pkg:pypi/django@5.2                                                                   
+                                                                 pkg:pypi/django@5.1.8                                                                  
+                                                           pkg:pypi/license-expression@30.4.1                                                           
+
+#19 argument vulnerability ⭕  to the function get_fixed_packages_html<metaClassAdapter> can be used to reach 2 packages from certain endpoints.      
 ╔════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╗
-║ component_catalog/views.py#277    get_fixed_packages_html<metaClassAdapter>(vulnerability) ↩                                                       ║
+║ component_catalog/views.py#277    get_fixed_packages_html<metaClassAdapter>(vulnerability) ↩                                                       ║
 ║ Tags: framework-input                                                                                                                              ║
 ║                                                                                                                                                    ║
-║ ├── component_catalog/views.py#278    vulnerability.fixed_packages                                                                                 ║
-║ ├── component_catalog/views.py#281    natsorted(vulnerability.fixed_packages, key = itemgetter("purl"))                                            ║
-║ ├── component_catalog/views.py#299    fixed_packages_sorted.__iter__()                                                                             ║
-║ ├── component_catalog/views.py#300    fixed_package.get("purl")                                                                                    ║
-║ ├── component_catalog/views.py#302    tmp22.for_package_url(purl)                                                                                  ║
-║ ├── component_catalog/views.py#304    package_instances.__iter__()                                                                                 ║
-║ ├── component_catalog/views.py#305    package.get_absolute_url()                                                                                   ║
-║ ├── component_catalog/views.py#306    package.get_html_link(href = absolute_url)                                                                   ║
-║ ├── component_catalog/views.py#309    {absolute_url}                                                                                               ║
-║ ├── component_catalog/views.py#308    package.get_html_link(href = f"{absolute_url}#vulnerabilities", value = format_html(vulnerability_icon))     ║
-║ ├── component_catalog/views.py#314    fixed_packages_values.append(display_value)                                                                  ║
-║ └── component_catalog/views.py#335    tmp26.join(fixed_packages_values)                                                                            ║
+║ ├── component_catalog/views.py#278    vulnerability.fixed_packages                                                                                 ║
+║ ├── component_catalog/views.py#281    natsorted(vulnerability.fixed_packages, key = itemgetter("purl"))                                            ║
+║ ├── component_catalog/views.py#299    fixed_packages_sorted.__iter__()                                                                             ║
+║ ├── component_catalog/views.py#300    fixed_package.get("purl")                                                                                    ║
+║ ├── component_catalog/views.py#302    tmp22.for_package_url(purl)                                                                                  ║
+║ ├── component_catalog/views.py#304    package_instances.__iter__()                                                                                 ║
+║ ├── component_catalog/views.py#305    package.get_absolute_url()                                                                                   ║
+║ ├── component_catalog/views.py#306    package.get_html_link(href = absolute_url)                                                                   ║
+║ ├── component_catalog/views.py#309    {absolute_url}                                                                                               ║
+║ ├── component_catalog/views.py#308    package.get_html_link(href = f"{absolute_url}#vulnerabilities", value = format_html(vulnerability_icon))     ║
+║ ├── component_catalog/views.py#314    fixed_packages_values.append(display_value)                                                                  ║
+║ └── component_catalog/views.py#335    tmp26.join(fixed_packages_values)                                                                            ║
 ╚════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╝
-                                                                 Reachable Packages:                                                                  
+                                                                 Reachable Packages:                                                                  
                                                                  pkg:pypi/django@5.2                                                                  
                                                                 pkg:pypi/natsort@8.4.0                                                                
 
-#17 argument vulnerability ⭕  to the function get_fixed_packages_html can be used to reach 2 packages from certain endpoints.                        
+#20 argument vulnerability ⭕  to the function get_fixed_packages_html can be used to reach 2 packages from certain endpoints.                        
 ╔════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╗
-║ component_catalog/views.py#277    get_fixed_packages_html(vulnerability) ↩                                                                         ║
+║ component_catalog/views.py#277    get_fixed_packages_html(vulnerability) ↩                                                                         ║
 ║ Tags: framework-input                                                                                                                              ║
 ║                                                                                                                                                    ║
-║ ├── component_catalog/views.py#278    vulnerability.fixed_packages                                                                                 ║
-║ ├── component_catalog/views.py#281    natsorted(vulnerability.fixed_packages, key = itemgetter("purl"))                                            ║
-║ ├── component_catalog/views.py#299    fixed_packages_sorted.__iter__()                                                                             ║
-║ ├── component_catalog/views.py#300    fixed_package.get("purl")                                                                                    ║
-║ ├── component_catalog/views.py#302    tmp22.for_package_url(purl)                                                                                  ║
-║ ├── component_catalog/views.py#304    package_instances.__iter__()                                                                                 ║
-║ ├── component_catalog/views.py#305    package.get_absolute_url()                                                                                   ║
-║ ├── component_catalog/views.py#306    package.get_html_link(href = absolute_url)                                                                   ║
-║ ├── component_catalog/views.py#309    {absolute_url}                                                                                               ║
-║ ├── component_catalog/views.py#308    package.get_html_link(href = f"{absolute_url}#vulnerabilities", value = format_html(vulnerability_icon))     ║
-║ ├── component_catalog/views.py#314    fixed_packages_values.append(display_value)                                                                  ║
-║ └── component_catalog/views.py#335    tmp26.join(fixed_packages_values)                                                                            ║
+║ ├── component_catalog/views.py#278    vulnerability.fixed_packages                                                                                 ║
+║ ├── component_catalog/views.py#281    natsorted(vulnerability.fixed_packages, key = itemgetter("purl"))                                            ║
+║ ├── component_catalog/views.py#299    fixed_packages_sorted.__iter__()                                                                             ║
+║ ├── component_catalog/views.py#300    fixed_package.get("purl")                                                                                    ║
+║ ├── component_catalog/views.py#302    tmp22.for_package_url(purl)                                                                                  ║
+║ ├── component_catalog/views.py#304    package_instances.__iter__()                                                                                 ║
+║ ├── component_catalog/views.py#305    package.get_absolute_url()                                                                                   ║
+║ ├── component_catalog/views.py#306    package.get_html_link(href = absolute_url)                                                                   ║
+║ ├── component_catalog/views.py#309    {absolute_url}                                                                                               ║
+║ ├── component_catalog/views.py#308    package.get_html_link(href = f"{absolute_url}#vulnerabilities", value = format_html(vulnerability_icon))     ║
+║ ├── component_catalog/views.py#314    fixed_packages_values.append(display_value)                                                                  ║
+║ └── component_catalog/views.py#335    tmp26.join(fixed_packages_values)                                                                            ║
 ╚════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╝
-                                                                 Reachable Packages:                                                                  
+                                                                 Reachable Packages:                                                                  
                                                                  pkg:pypi/django@5.2                                                                  
                                                                 pkg:pypi/natsort@8.4.0                                                                
 
-#18 Reachable data-flow.                                                                                                                                   
-╔═════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╗
-║ dje/management/commands/checks.py#342    check_for_license_expression_choice_inconsistencies(app_configs) ↩                                             ║
-║ Tags: cli-source                                                                                                                                        ║
-║                                                                                                                                                         ║
-║ ├── dje/management/commands/checks.py#350    app_configs.get("dataspace")                                                                               ║
-║ ├── dje/management/commands/checks.py#356    qs.scope(dataspace)                                                                                        ║
-║ ├── dje/management/commands/checks.py#358    qs.__iter__()                                                                                              ║
-║ ├── dje/management/commands/checks.py#366    obj.license_expression                                                                                     ║
-║ ├── component_catalog/license_expression_dje.py#123    normalize_and_validate_expression(expression) ↩                                                  ║
-║ Tags: validation                                                                                                                                    ║
-║                                                                                                                                                     ║
-║ ├── component_catalog/license_expression_dje.py#145    parse_expression(expression, licensing, validate_known, validate_strict, simple = simple)        ║
-║ ├── component_catalog/license_expression_dje.py#75    parse_expression(expression) ↩                                                                    ║
-║ └── component_catalog/license_expression_dje.py#95    licensing.parse(expression, validate = validate_known, strict = validate_strict, simple = simple) ║
-║     Tags: pkg:pypi/license-expression@30.4.1                                                                                                            ║
-║                                                                                                                                                         ║
-╚═════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╝
-                       ◽ Verify that the mitigation(s) used in this flow are valid and appropriate for your security requirements.                        
-                                                                    Reachable Packages:                                                                    
-                                                            pkg:pypi/license-expression@30.4.1                                                             
-
-#19 Reachable data-flow.                                                                                                                                             
-╔═══════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╗
-║ dje/management/commands/checks.py#342    check_for_license_expression_choice_inconsistencies(app_configs) ↩                                                       ║
-║ Tags: cli-source                                                                                                                                                  ║
-║                                                                                                                                                                   ║
-║ ├── dje/management/commands/checks.py#350    app_configs.get("dataspace")                                                                                         ║
-║ ├── dje/management/commands/checks.py#356    qs.scope(dataspace)                                                                                                  ║
-║ ├── dje/management/commands/checks.py#358    qs.__iter__()                                                                                                        ║
-║ ├── dje/management/commands/checks.py#359    obj.component if model_class is ProductComponent else obj.child                                                      ║
-║ ├── dje/management/commands/checks.py#360    not component                                                                                                        ║
-║ ├── dje/management/commands/checks.py#364    component.licenses                                                                                                   ║
-║ ├── dje/management/commands/checks.py#366    normalize_and_validate_expression(obj.license_expression, licenses, validate_known = True, include_available = True) ║
-║ ├── component_catalog/license_expression_dje.py#124    normalize_and_validate_expression(licenses) ↩                                                              ║
-║ Tags: validation                                                                                                                                              ║
-║                                                                                                                                                               ║
-║ ├── component_catalog/license_expression_dje.py#141    build_licensing(licenses)                                                                                  ║
-║ ├── component_catalog/license_expression_dje.py#31    build_licensing(licenses) ↩                                                                                 ║
-║ ├── component_catalog/license_expression_dje.py#36    isinstance(licenses, Licensing)                                                                             ║
-║ ├── component_catalog/license_expression_dje.py#38    Licensing(licenses)                                                                                         ║
-║ Tags: pkg:pypi/license-expression@30.4.1                                                                                                                      ║
-║                                                                                                                                                               ║
-║ ├── component_catalog/license_expression_dje.py#145    parse_expression(expression, licensing, validate_known, validate_strict, simple = simple)                  ║
-║ Tags: pkg:pypi/license-expression@30.4.1                                                                                                                      ║
-║                                                                                                                                                               ║
-║ ├── component_catalog/license_expression_dje.py#75    parse_expression(licenses) ↩                                                                                ║
-║ ├── component_catalog/license_expression_dje.py#151    available_licenses_message(licensing)                                                                      ║
-║ Tags: pkg:pypi/license-expression@30.4.1                                                                                                                      ║
-║                                                                                                                                                               ║
-║ └── component_catalog/license_expression_dje.py#210    available_licenses_message(licenses) ↩                                                                     ║
-╚═══════════════════════════════════════════════════════════════════════════════════════════════════��═══════════════════════════════════════════════════════════════╝
-                            ◽ Verify that the mitigation(s) used in this flow are valid and appropriate for your security requirements.                             
-                                                                         Reachable Packages:                                                                         
-                                                                 pkg:pypi/license-expression@30.4.1                                                                  
-
-#20 Reachable data-flow.                                                                                                                              
-╔════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╗
-║ component_catalog/management/commands/collectcpes.py#40    handle(options) ↩                                                                       ║
-║ Tags: cli-source                                                                                                                                   ║
-║                                                                                                                                                    ║
-║ ├── component_catalog/management/commands/collectcpes.py#43    options["cpe_dictionary_location"]                                                  ║
-║ ├── component_catalog/management/commands/collectcpes.py#45    cpe_dictionary_location.startswith("http")                                          ║
-║ ├── component_catalog/management/commands/collectcpes.py#47    self.load_cpe_from_url(url = cpe_dictionary_location)                               ║
-║ └── component_catalog/management/commands/collectcpes.py#53    ElementTree.fromstring(xml_content)                                                 ║
-║     Tags: pkg:pypi/defusedxml@0.7.1                                                                                                                ║
-║                                                                                                                                                    ║
-╚════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╝
-                                                                 Reachable Packages:                                                                  
-                                                              pkg:pypi/defusedxml@0.7.1                                                               
-
-                                                                                                          Secure Design Tips                                                                                                          
+                                                                                                      Secure Design Tips                                                                                                      
 
-Review the validation and sanitization methods used in the application.                                                                                                                                                            
-To enhance the security posture, implement a common validation middleware.                                                                                                                                                         
+Review the validation and sanitization methods used in the application.                                                                                                                                                    
+To enhance the security posture, implement a common validation middleware.