{
  "$schema": "http://cyclonedx.org/schema/bom-1.6.schema.json",
  "bomFormat": "CycloneDX",
  "specVersion": "1.6",
  "serialNumber": "urn:uuid:5eac30e3-2c90-5c6e-b5d5-bc48ba61dddc",
  "version": 1,
  "metadata": {
    "tools": [
      {
        "name": "tuxcare-vex-generator",
        "version": "1.0.0"
      }
    ]
  },
  "components": [
    {
      "bom-ref": "certify@2021.10.08.post1+tuxcare",
      "name": "certify",
      "type": "library",
      "version": "2021.10.08.post1+tuxcare"
    },
    {
      "bom-ref": "certify@2021.10.08.post2+tuxcare",
      "name": "certify",
      "type": "library",
      "version": "2021.10.08.post2+tuxcare"
    },
    {
      "bom-ref": "certify@2022.12.07.post1+tuxcare",
      "name": "certify",
      "type": "library",
      "version": "2022.12.07.post1+tuxcare"
    },
    {
      "bom-ref": "certify@2022.12.07.post2+tuxcare",
      "name": "certify",
      "type": "library",
      "version": "2022.12.07.post2+tuxcare"
    },
    {
      "bom-ref": "certify@2023.07.22.post1+tuxcare",
      "name": "certify",
      "type": "library",
      "version": "2023.07.22.post1+tuxcare"
    },
    {
      "bom-ref": "cryptography@42.0.8.post1+tuxcare",
      "name": "cryptography",
      "type": "library",
      "version": "42.0.8.post1+tuxcare"
    },
    {
      "bom-ref": "cryptography@43.0.3.post1+tuxcare",
      "name": "cryptography",
      "type": "library",
      "version": "43.0.3.post1+tuxcare"
    },
    {
      "bom-ref": "waitress@2.1.2.post1+tuxcare",
      "name": "waitress",
      "type": "library",
      "version": "2.1.2.post1+tuxcare"
    },
    {
      "bom-ref": "waitress@2.1.2.post2+tuxcare",
      "name": "waitress",
      "type": "library",
      "version": "2.1.2.post2+tuxcare"
    },
    {
      "bom-ref": "flask@1.1.2.post1+tuxcare",
      "name": "flask",
      "type": "library",
      "version": "1.1.2.post1+tuxcare"
    },
    {
      "bom-ref": "jinja2@2.11.3.post1+tuxcare",
      "name": "jinja2",
      "type": "library",
      "version": "2.11.3.post1+tuxcare"
    },
    {
      "bom-ref": "pillow@9.4.0.post1+tuxcare",
      "name": "pillow",
      "type": "library",
      "version": "9.4.0.post1+tuxcare"
    },
    {
      "bom-ref": "werkzeug@1.0.1.post1+tuxcare",
      "name": "werkzeug",
      "type": "library",
      "version": "1.0.1.post1+tuxcare"
    },
    {
      "bom-ref": "gunicorn@21.2.0.post2+tuxcare",
      "name": "gunicorn",
      "type": "library",
      "version": "21.2.0.post2+tuxcare"
    },
    {
      "bom-ref": "setuptools@65.5.1.post1+tuxcare",
      "name": "setuptools",
      "type": "library",
      "version": "65.5.1.post1+tuxcare"
    },
    {
      "bom-ref": "werkzeug@2.2.3.post1+tuxcare",
      "name": "werkzeug",
      "type": "library",
      "version": "2.2.3.post1+tuxcare"
    },
    {
      "bom-ref": "pymongo@3.13.0.post1+tuxcare",
      "name": "pymongo",
      "type": "library",
      "version": "3.13.0.post1+tuxcare"
    },
    {
      "bom-ref": "werkzeug@1.0.1.post2+tuxcare",
      "name": "werkzeug",
      "type": "library",
      "version": "1.0.1.post2+tuxcare"
    },
    {
      "bom-ref": "anyio@3.7.1.post1+tuxcare",
      "name": "anyio",
      "type": "library",
      "version": "3.7.1.post1+tuxcare"
    },
    {
      "bom-ref": "werkzeug@1.0.1.post3+tuxcare",
      "name": "werkzeug",
      "type": "library",
      "version": "1.0.1.post3+tuxcare"
    },
    {
      "bom-ref": "idna@2.1.post1+tuxcare",
      "name": "idna",
      "type": "library",
      "version": "2.1.post1+tuxcare"
    },
    {
      "bom-ref": "idna@2.8.post1+tuxcare",
      "name": "idna",
      "type": "library",
      "version": "2.8.post1+tuxcare"
    },
    {
      "bom-ref": "cryptography@43.0.1.post1+tuxcare",
      "name": "cryptography",
      "type": "library",
      "version": "43.0.1.post1+tuxcare"
    },
    {
      "bom-ref": "gunicorn@20.1.0.post1+tuxcare",
      "name": "gunicorn",
      "type": "library",
      "version": "20.1.0.post1+tuxcare"
    },
    {
      "bom-ref": "pillow@9.4.0.post2+tuxcare",
      "name": "pillow",
      "type": "library",
      "version": "9.4.0.post2+tuxcare"
    },
    {
      "bom-ref": "gunicorn@22.0.0.post1+tuxcare",
      "name": "gunicorn",
      "type": "library",
      "version": "22.0.0.post1+tuxcare"
    },
    {
      "bom-ref": "pillow@9.4.0.post3+tuxcare",
      "name": "pillow",
      "type": "library",
      "version": "9.4.0.post3+tuxcare"
    },
    {
      "bom-ref": "setuptools@75.8.0.post1+tuxcare",
      "name": "setuptools",
      "type": "library",
      "version": "75.8.0.post1+tuxcare"
    },
    {
      "bom-ref": "pillow@9.5.0.post1+tuxcare",
      "name": "pillow",
      "type": "library",
      "version": "9.5.0.post1+tuxcare"
    },
    {
      "bom-ref": "statsmodels@0.14.4.post1+tuxcare",
      "name": "statsmodels",
      "type": "library",
      "version": "0.14.4.post1+tuxcare"
    },
    {
      "bom-ref": "requests@2.30.0.post1+tuxcare",
      "name": "requests",
      "type": "library",
      "version": "2.30.0.post1+tuxcare"
    },
    {
      "bom-ref": "requests@2.32.3.post1+tuxcare",
      "name": "requests",
      "type": "library",
      "version": "2.32.3.post1+tuxcare"
    },
    {
      "bom-ref": "requests@2.31.0.post1+tuxcare",
      "name": "requests",
      "type": "library",
      "version": "2.31.0.post1+tuxcare"
    },
    {
      "bom-ref": "numpy@1.16.0.post1+tuxcare",
      "name": "numpy",
      "type": "library",
      "version": "1.16.0.post1+tuxcare"
    },
    {
      "bom-ref": "django@5.0.1.post1+tuxcare",
      "name": "django",
      "type": "library",
      "version": "5.0.1.post1+tuxcare"
    },
    {
      "bom-ref": "django@5.1.4.post1+tuxcare",
      "name": "django",
      "type": "library",
      "version": "5.1.4.post1+tuxcare"
    },
    {
      "bom-ref": "django@5.0.2.post1+tuxcare",
      "name": "django",
      "type": "library",
      "version": "5.0.2.post1+tuxcare"
    },
    {
      "bom-ref": "django@5.1.9.post1+tuxcare",
      "name": "django",
      "type": "library",
      "version": "5.1.9.post1+tuxcare"
    },
    {
      "bom-ref": "aiohttp@3.8.5.post1+tuxcare",
      "name": "aiohttp",
      "type": "library",
      "version": "3.8.5.post1+tuxcare"
    },
    {
      "bom-ref": "aiohttp@3.8.5.post2+tuxcare",
      "name": "aiohttp",
      "type": "library",
      "version": "3.8.5.post2+tuxcare"
    },
    {
      "bom-ref": "aiohttp@3.8.4.post1+tuxcare",
      "name": "aiohttp",
      "type": "library",
      "version": "3.8.4.post1+tuxcare"
    },
    {
      "bom-ref": "httpx@0.22.0.post1+tuxcare",
      "name": "httpx",
      "type": "library",
      "version": "0.22.0.post1+tuxcare"
    },
    {
      "bom-ref": "jinja2@2.11.3.post2+tuxcare",
      "name": "jinja2",
      "type": "library",
      "version": "2.11.3.post2+tuxcare"
    },
    {
      "bom-ref": "fastapi@0.63.0.post1+tuxcare",
      "name": "fastapi",
      "type": "library",
      "version": "0.63.0.post1+tuxcare"
    },
    {
      "bom-ref": "fastapi@0.63.0.post2+tuxcare",
      "name": "fastapi",
      "type": "library",
      "version": "0.63.0.post2+tuxcare"
    },
    {
      "bom-ref": "requests@2.25.1.post1+tuxcare",
      "name": "requests",
      "type": "library",
      "version": "2.25.1.post1+tuxcare"
    },
    {
      "bom-ref": "future@1.0.0.post1+tuxcare",
      "name": "future",
      "type": "library",
      "version": "1.0.0.post1+tuxcare"
    },
    {
      "bom-ref": "flask@2.2.1.post1+tuxcare",
      "name": "flask",
      "type": "library",
      "version": "2.2.1.post1+tuxcare"
    },
    {
      "bom-ref": "django@4.0.post1+tuxcare",
      "name": "django",
      "type": "library",
      "version": "4.0.post1+tuxcare"
    },
    {
      "bom-ref": "gunicorn@20.1.0.post2+tuxcare",
      "name": "gunicorn",
      "type": "library",
      "version": "20.1.0.post2+tuxcare"
    },
    {
      "bom-ref": "fastapi@0.104.1.post1+tuxcare",
      "name": "fastapi",
      "type": "library",
      "version": "0.104.1.post1+tuxcare"
    },
    {
      "bom-ref": "uvicorn@0.11.6.post1+tuxcare",
      "name": "uvicorn",
      "type": "library",
      "version": "0.11.6.post1+tuxcare"
    },
    {
      "bom-ref": "numpy@1.15.4.post1+tuxcare",
      "name": "numpy",
      "type": "library",
      "version": "1.15.4.post1+tuxcare"
    },
    {
      "bom-ref": "pandas@2.2.2.post1+tuxcare",
      "name": "pandas",
      "type": "library",
      "version": "2.2.2.post1+tuxcare"
    },
    {
      "bom-ref": "aiohttp@3.8.1.post1+tuxcare",
      "name": "aiohttp",
      "type": "library",
      "version": "3.8.1.post1+tuxcare"
    },
    {
      "bom-ref": "cryptography@3.4.8.post1+tuxcare",
      "name": "cryptography",
      "type": "library",
      "version": "3.4.8.post1+tuxcare"
    },
    {
      "bom-ref": "django@4.0.post2+tuxcare",
      "name": "django",
      "type": "library",
      "version": "4.0.post2+tuxcare"
    },
    {
      "bom-ref": "django@5.0.1.post2+tuxcare",
      "name": "django",
      "type": "library",
      "version": "5.0.1.post2+tuxcare"
    },
    {
      "bom-ref": "jinja2@3.0.3.post1+tuxcare",
      "name": "jinja2",
      "type": "library",
      "version": "3.0.3.post1+tuxcare"
    },
    {
      "bom-ref": "pyjwt@2.3.0.post1+tuxcare",
      "name": "pyjwt",
      "type": "library",
      "version": "2.3.0.post1+tuxcare"
    },
    {
      "bom-ref": "pyjwt@2.8.0.post1+tuxcare",
      "name": "pyjwt",
      "type": "library",
      "version": "2.8.0.post1+tuxcare"
    },
    {
      "bom-ref": "django@5.0.1.post3+tuxcare",
      "name": "django",
      "type": "library",
      "version": "5.0.1.post3+tuxcare"
    },
    {
      "bom-ref": "celery@v5.1.2.post1+tuxcare",
      "name": "celery",
      "type": "library",
      "version": "v5.1.2.post1+tuxcare"
    },
    {
      "bom-ref": "django@5.1.post1+tuxcare",
      "name": "django",
      "type": "library",
      "version": "5.1.post1+tuxcare"
    },
    {
      "bom-ref": "django@4.0.post3+tuxcare",
      "name": "django",
      "type": "library",
      "version": "4.0.post3+tuxcare"
    },
    {
      "bom-ref": "django@5.0.post1+tuxcare",
      "name": "django",
      "type": "library",
      "version": "5.0.post1+tuxcare"
    },
    {
      "bom-ref": "starlette@0.27.0.post1+tuxcare",
      "name": "starlette",
      "type": "library",
      "version": "0.27.0.post1+tuxcare"
    },
    {
      "bom-ref": "django@5.0.post2+tuxcare",
      "name": "django",
      "type": "library",
      "version": "5.0.post2+tuxcare"
    },
    {
      "bom-ref": "pyjwt@2.10.1.post1+tuxcare",
      "name": "pyjwt",
      "type": "library",
      "version": "2.10.1.post1+tuxcare"
    },
    {
      "bom-ref": "django@5.0.post3+tuxcare",
      "name": "django",
      "type": "library",
      "version": "5.0.post3+tuxcare"
    },
    {
      "bom-ref": "django@5.0.post4+tuxcare",
      "name": "django",
      "type": "library",
      "version": "5.0.post4+tuxcare"
    },
    {
      "bom-ref": "werkzeug@2.2.3.post3+tuxcare",
      "name": "werkzeug",
      "type": "library",
      "version": "2.2.3.post3+tuxcare"
    },
    {
      "bom-ref": "gunicorn@20.0.4.post1+tuxcare",
      "name": "gunicorn",
      "type": "library",
      "version": "20.0.4.post1+tuxcare"
    },
    {
      "bom-ref": "pandas@2.2.0.post1+tuxcare",
      "name": "pandas",
      "type": "library",
      "version": "2.2.0.post1+tuxcare"
    },
    {
      "bom-ref": "gunicorn@21.2.0.post3+tuxcare",
      "name": "gunicorn",
      "type": "library",
      "version": "21.2.0.post3+tuxcare"
    },
    {
      "bom-ref": "django@4.0.post4+tuxcare",
      "name": "django",
      "type": "library",
      "version": "4.0.post4+tuxcare"
    },
    {
      "bom-ref": "pydantic@v1.10.5.post1+tuxcare",
      "name": "pydantic",
      "type": "library",
      "version": "v1.10.5.post1+tuxcare"
    },
    {
      "bom-ref": "dnspython@2.3.0.post1+tuxcare",
      "name": "dnspython",
      "type": "library",
      "version": "2.3.0.post1+tuxcare"
    },
    {
      "bom-ref": "paramiko@3.0.0.post1+tuxcare",
      "name": "paramiko",
      "type": "library",
      "version": "3.0.0.post1+tuxcare"
    },
    {
      "bom-ref": "pdfkit@0.6.1.post1+tuxcare",
      "name": "pdfkit",
      "type": "library",
      "version": "0.6.1.post1+tuxcare"
    },
    {
      "bom-ref": "Piexif@1.1.3.post1+tuxcare",
      "name": "Piexif",
      "type": "library",
      "version": "1.1.3.post1+tuxcare"
    },
    {
      "bom-ref": "orjson@3.8.5.post1+tuxcare",
      "name": "orjson",
      "type": "library",
      "version": "3.8.5.post1+tuxcare"
    },
    {
      "bom-ref": "tqdm@4.66.1.post1+tuxcare",
      "name": "tqdm",
      "type": "library",
      "version": "4.66.1.post1+tuxcare"
    },
    {
      "bom-ref": "setuptools@68.0.0.post1+tuxcare",
      "name": "setuptools",
      "type": "library",
      "version": "68.0.0.post1+tuxcare"
    },
    {
      "bom-ref": "deepdiff@6.2.3.post1+tuxcare",
      "name": "deepdiff",
      "type": "library",
      "version": "6.2.3.post1+tuxcare"
    },
    {
      "bom-ref": "redis-py@4.5.1.post1+tuxcare",
      "name": "redis-py",
      "type": "library",
      "version": "4.5.1.post1+tuxcare"
    },
    {
      "bom-ref": "pillow@11.2.1post1+tuxcare",
      "name": "pillow",
      "type": "library",
      "version": "11.2.1post1+tuxcare"
    },
    {
      "bom-ref": "python-multipart@0.0.6.post1+tuxcare",
      "name": "python-multipart",
      "type": "library",
      "version": "0.0.6.post1+tuxcare"
    },
    {
      "bom-ref": "idna@3.6.post1+tuxcare",
      "name": "idna",
      "type": "library",
      "version": "3.6.post1+tuxcare"
    },
    {
      "bom-ref": "python-jose@3.3.0.post1+tuxcare",
      "name": "python-jose",
      "type": "library",
      "version": "3.3.0.post1+tuxcare"
    },
    {
      "bom-ref": "gitpython@3.1.31.post1+tuxcare",
      "name": "gitpython",
      "type": "library",
      "version": "3.1.31.post1+tuxcare"
    },
    {
      "bom-ref": "cryptography@42.0.0.post1+tuxcare",
      "name": "cryptography",
      "type": "library",
      "version": "42.0.0.post1+tuxcare"
    },
    {
      "bom-ref": "cryptography@3.4.8.post2+tuxcare",
      "name": "cryptography",
      "type": "library",
      "version": "3.4.8.post2+tuxcare"
    },
    {
      "bom-ref": "django@5.0.post5+tuxcare",
      "name": "django",
      "type": "library",
      "version": "5.0.post5+tuxcare"
    },
    {
      "bom-ref": "cryptography@41.0.7.post1+tuxcare",
      "name": "cryptography",
      "type": "library",
      "version": "41.0.7.post1+tuxcare"
    },
    {
      "bom-ref": "urllib3@1.26.20.post1+tuxcare",
      "name": "urllib3",
      "type": "library",
      "version": "1.26.20.post1+tuxcare"
    },
    {
      "bom-ref": "django@3.2.25.post1+tuxcare",
      "name": "django",
      "type": "library",
      "version": "3.2.25.post1+tuxcare"
    },
    {
      "bom-ref": "flask-cors@4.0.2.post1+tuxcare",
      "name": "flask-cors",
      "type": "library",
      "version": "4.0.2.post1+tuxcare"
    },
    {
      "bom-ref": "pypdf@5.9.0.post1+tuxcare",
      "name": "pypdf",
      "type": "library",
      "version": "5.9.0.post1+tuxcare"
    },
    {
      "bom-ref": "setuptools@75.0.0.post1+tuxcare",
      "name": "setuptools",
      "type": "library",
      "version": "75.0.0.post1+tuxcare"
    },
    {
      "bom-ref": "setuptools@70.3.0.post1+tuxcare",
      "name": "setuptools",
      "type": "library",
      "version": "70.3.0.post1+tuxcare"
    },
    {
      "bom-ref": "protobuf@4.24.3.post1+tuxcare",
      "name": "protobuf",
      "type": "library",
      "version": "4.24.3.post1+tuxcare"
    },
    {
      "bom-ref": "django@4.0.post5+tuxcare",
      "name": "django",
      "type": "library",
      "version": "4.0.post5+tuxcare"
    },
    {
      "bom-ref": "cryptography@3.4.8.post3+tuxcare",
      "name": "cryptography",
      "type": "library",
      "version": "3.4.8.post3+tuxcare"
    },
    {
      "bom-ref": "torch@1.13.1.post1+tuxcare",
      "name": "torch",
      "type": "library",
      "version": "1.13.1.post1+tuxcare"
    },
    {
      "bom-ref": "urllib3@1.26.4.post1+tuxcare",
      "name": "urllib3",
      "type": "library",
      "version": "1.26.4.post1+tuxcare"
    },
    {
      "bom-ref": "urllib3@1.25.11.post2+tuxcare",
      "name": "urllib3",
      "type": "library",
      "version": "1.25.11.post2+tuxcare"
    },
    {
      "bom-ref": "django@5.1.post2+tuxcare",
      "name": "django",
      "type": "library",
      "version": "5.1.post2+tuxcare"
    },
    {
      "bom-ref": "numpy@1.15.4.post2+tuxcare",
      "name": "numpy",
      "type": "library",
      "version": "1.15.4.post2+tuxcare"
    },
    {
      "bom-ref": "django@4.0.post6+tuxcare",
      "name": "django",
      "type": "library",
      "version": "4.0.post6+tuxcare"
    },
    {
      "bom-ref": "django@4.2.post1+tuxcare",
      "name": "django",
      "type": "library",
      "version": "4.2.post1+tuxcare"
    },
    {
      "bom-ref": "django@5.1.post3+tuxcare",
      "name": "django",
      "type": "library",
      "version": "5.1.post3+tuxcare"
    },
    {
      "bom-ref": "twisted@20.3.0.post4+tuxcare",
      "name": "twisted",
      "type": "library",
      "version": "20.3.0.post4+tuxcare"
    },
    {
      "bom-ref": "pyyaml@5.3.1.post1+tuxcare",
      "name": "pyyaml",
      "type": "library",
      "version": "5.3.1.post1+tuxcare"
    },
    {
      "bom-ref": "flask@1.1.4.post1+tuxcare",
      "name": "flask",
      "type": "library",
      "version": "1.1.4.post1+tuxcare"
    },
    {
      "bom-ref": "torch@1.13.1.post2+tuxcare",
      "name": "torch",
      "type": "library",
      "version": "1.13.1.post2+tuxcare"
    },
    {
      "bom-ref": "pillow@9.5.0.post2+tuxcare",
      "name": "pillow",
      "type": "library",
      "version": "9.5.0.post2+tuxcare"
    },
    {
      "bom-ref": "pillow@8.4.0.post1+tuxcare",
      "name": "pillow",
      "type": "library",
      "version": "8.4.0.post1+tuxcare"
    },
    {
      "bom-ref": "flask@0.12.5.post1+tuxcare",
      "name": "flask",
      "type": "library",
      "version": "0.12.5.post1+tuxcare"
    },
    {
      "bom-ref": "cryptography@3.4.8.post4+tuxcare",
      "name": "cryptography",
      "type": "library",
      "version": "3.4.8.post4+tuxcare"
    },
    {
      "bom-ref": "statsmodels@0.14.5.post1+tuxcare",
      "name": "statsmodels",
      "type": "library",
      "version": "0.14.5.post1+tuxcare"
    },
    {
      "bom-ref": "websockets@8.1.post1+tuxcare",
      "name": "websockets",
      "type": "library",
      "version": "8.1.post1+tuxcare"
    },
    {
      "bom-ref": "idna@2.10.post1+tuxcare",
      "name": "idna",
      "type": "library",
      "version": "2.10.post1+tuxcare"
    },
    {
      "bom-ref": "starlette@0.27.0.post2+tuxcare",
      "name": "starlette",
      "type": "library",
      "version": "0.27.0.post2+tuxcare"
    },
    {
      "bom-ref": "urllib3@1.26.4.post2+tuxcare",
      "name": "urllib3",
      "type": "library",
      "version": "1.26.4.post2+tuxcare"
    },
    {
      "bom-ref": "starlette@0.13.6.post1+tuxcare",
      "name": "starlette",
      "type": "library",
      "version": "0.13.6.post1+tuxcare"
    },
    {
      "bom-ref": "pypdf@5.9.0.post2+tuxcare",
      "name": "pypdf",
      "type": "library",
      "version": "5.9.0.post2+tuxcare"
    },
    {
      "bom-ref": "mysql-connector-python@8.4.0.post1+tuxcare",
      "name": "mysql-connector-python",
      "type": "library",
      "version": "8.4.0.post1+tuxcare"
    },
    {
      "bom-ref": "pyyaml@3.13.post1+tuxcare",
      "name": "pyyaml",
      "type": "library",
      "version": "3.13.post1+tuxcare"
    },
    {
      "bom-ref": "sentence-transformers@2.7.0.post1+tuxcare",
      "name": "sentence-transformers",
      "type": "library",
      "version": "2.7.0.post1+tuxcare"
    },
    {
      "bom-ref": "pypdf@5.9.0.post3+tuxcare",
      "name": "pypdf",
      "type": "library",
      "version": "5.9.0.post3+tuxcare"
    },
    {
      "bom-ref": "pyjwt@1.7.1.post1+tuxcare",
      "name": "pyjwt",
      "type": "library",
      "version": "1.7.1.post1+tuxcare"
    },
    {
      "bom-ref": "mlflow@2.22.4.post1+tuxcare",
      "name": "mlflow",
      "type": "library",
      "version": "2.22.4.post1+tuxcare"
    },
    {
      "bom-ref": "numpy@1.16.0.post2+tuxcare",
      "name": "numpy",
      "type": "library",
      "version": "1.16.0.post2+tuxcare"
    },
    {
      "bom-ref": "h11@0.9.0.post1+tuxcare",
      "name": "h11",
      "type": "library",
      "version": "0.9.0.post1+tuxcare"
    },
    {
      "bom-ref": "aiohttp@3.8.5.post3+tuxcare",
      "name": "aiohttp",
      "type": "library",
      "version": "3.8.5.post3+tuxcare"
    },
    {
      "bom-ref": "urllib3@2.0.7.post1+tuxcare",
      "name": "urllib3",
      "type": "library",
      "version": "2.0.7.post1+tuxcare"
    },
    {
      "bom-ref": "urllib3@1.26.20.post2+tuxcare",
      "name": "urllib3",
      "type": "library",
      "version": "1.26.20.post2+tuxcare"
    },
    {
      "bom-ref": "scikit-learn@1.0.2.post1+tuxcare",
      "name": "scikit-learn",
      "type": "library",
      "version": "1.0.2.post1+tuxcare"
    },
    {
      "bom-ref": "werkzeug@2.3.8.post1+tuxcare",
      "name": "werkzeug",
      "type": "library",
      "version": "2.3.8.post1+tuxcare"
    },
    {
      "bom-ref": "aiohttp@3.8.1.post2+tuxcare",
      "name": "aiohttp",
      "type": "library",
      "version": "3.8.1.post2+tuxcare"
    },
    {
      "bom-ref": "urllib3@1.25.11.post3+tuxcare",
      "name": "urllib3",
      "type": "library",
      "version": "1.25.11.post3+tuxcare"
    },
    {
      "bom-ref": "django@3.2.25.post2+tuxcare",
      "name": "django",
      "type": "library",
      "version": "3.2.25.post2+tuxcare"
    },
    {
      "bom-ref": "urllib3@1.26.4.post3+tuxcare",
      "name": "urllib3",
      "type": "library",
      "version": "1.26.4.post3+tuxcare"
    },
    {
      "bom-ref": "aiohttp@3.8.1.post3+tuxcare",
      "name": "aiohttp",
      "type": "library",
      "version": "3.8.1.post3+tuxcare"
    },
    {
      "bom-ref": "pymysql@0.10.1.post1+tuxcare",
      "name": "pymysql",
      "type": "library",
      "version": "0.10.1.post1+tuxcare"
    },
    {
      "bom-ref": "starlette@0.13.6.post2+tuxcare",
      "name": "starlette",
      "type": "library",
      "version": "0.13.6.post2+tuxcare"
    },
    {
      "bom-ref": "gunicorn@20.0.4.post2+tuxcare",
      "name": "gunicorn",
      "type": "library",
      "version": "20.0.4.post2+tuxcare"
    },
    {
      "bom-ref": "urllib3@1.26.4.post4+tuxcare",
      "name": "urllib3",
      "type": "library",
      "version": "1.26.4.post4+tuxcare"
    },
    {
      "bom-ref": "aiohttp@3.8.5.post4+tuxcare",
      "name": "aiohttp",
      "type": "library",
      "version": "3.8.5.post4+tuxcare"
    },
    {
      "bom-ref": "urllib3@1.25.11.post4+tuxcare",
      "name": "urllib3",
      "type": "library",
      "version": "1.25.11.post4+tuxcare"
    },
    {
      "bom-ref": "python-jose@3.3.0.post2+tuxcare",
      "name": "python-jose",
      "type": "library",
      "version": "3.3.0.post2+tuxcare"
    },
    {
      "bom-ref": "python-multipart@0.0.6.post2+tuxcare",
      "name": "python-multipart",
      "type": "library",
      "version": "0.0.6.post2+tuxcare"
    },
    {
      "bom-ref": "protobuf@3.17.0.post1+tuxcare",
      "name": "protobuf",
      "type": "library",
      "version": "3.17.0.post1+tuxcare"
    },
    {
      "bom-ref": "aiohttp@3.8.6.post1+tuxcare",
      "name": "aiohttp",
      "type": "library",
      "version": "3.8.6.post1+tuxcare"
    },
    {
      "bom-ref": "aiohttp@3.8.1.post4+tuxcare",
      "name": "aiohttp",
      "type": "library",
      "version": "3.8.1.post4+tuxcare"
    },
    {
      "bom-ref": "celery@4.4.7.post1+tuxcare",
      "name": "celery",
      "type": "library",
      "version": "4.4.7.post1+tuxcare"
    },
    {
      "bom-ref": "protobuf@4.25.8.post1+tuxcare",
      "name": "protobuf",
      "type": "library",
      "version": "4.25.8.post1+tuxcare"
    },
    {
      "bom-ref": "urllib3@1.26.20.post3+tuxcare",
      "name": "urllib3",
      "type": "library",
      "version": "1.26.20.post3+tuxcare"
    },
    {
      "bom-ref": "jaraco-context@5.3.0.post1+tuxcare",
      "name": "jaraco-context",
      "type": "library",
      "version": "5.3.0.post1+tuxcare"
    },
    {
      "bom-ref": "aiohttp@3.8.6.post2+tuxcare",
      "name": "aiohttp",
      "type": "library",
      "version": "3.8.6.post2+tuxcare"
    },
    {
      "bom-ref": "protobuf@3.20.3.post1+tuxcare",
      "name": "protobuf",
      "type": "library",
      "version": "3.20.3.post1+tuxcare"
    },
    {
      "bom-ref": "tornado@6.1.0.post1+tuxcare",
      "name": "tornado",
      "type": "library",
      "version": "6.1.0.post1+tuxcare"
    },
    {
      "bom-ref": "aiohttp@3.8.1.post5+tuxcare",
      "name": "aiohttp",
      "type": "library",
      "version": "3.8.1.post5+tuxcare"
    },
    {
      "bom-ref": "pip@9.0.post1+tuxcare",
      "name": "pip",
      "type": "library",
      "version": "9.0.post1+tuxcare"
    },
    {
      "bom-ref": "werkzeug@1.0.1.post4+tuxcare",
      "name": "werkzeug",
      "type": "library",
      "version": "1.0.1.post4+tuxcare"
    },
    {
      "bom-ref": "werkzeug@2.2.3.post4+tuxcare",
      "name": "werkzeug",
      "type": "library",
      "version": "2.2.3.post4+tuxcare"
    },
    {
      "bom-ref": "aiohttp@3.8.1.post6+tuxcare",
      "name": "aiohttp",
      "type": "library",
      "version": "3.8.1.post6+tuxcare"
    },
    {
      "bom-ref": "aiohttp@3.8.1.post7+tuxcare",
      "name": "aiohttp",
      "type": "library",
      "version": "3.8.1.post7+tuxcare"
    },
    {
      "bom-ref": "cryptography@42.0.8.post2+tuxcare",
      "name": "cryptography",
      "type": "library",
      "version": "42.0.8.post2+tuxcare"
    },
    {
      "bom-ref": "cryptography@45.0.7.post1+tuxcare",
      "name": "cryptography",
      "type": "library",
      "version": "45.0.7.post1+tuxcare"
    },
    {
      "bom-ref": "cryptography@44.0.3.post1+tuxcare",
      "name": "cryptography",
      "type": "library",
      "version": "44.0.3.post1+tuxcare"
    },
    {
      "bom-ref": "cryptography@43.0.3.post2+tuxcare",
      "name": "cryptography",
      "type": "library",
      "version": "43.0.3.post2+tuxcare"
    },
    {
      "bom-ref": "cryptography@41.0.7.post2+tuxcare",
      "name": "cryptography",
      "type": "library",
      "version": "41.0.7.post2+tuxcare"
    },
    {
      "bom-ref": "mlflow@2.9.1.post1+tuxcare",
      "name": "mlflow",
      "type": "library",
      "version": "2.9.1.post1+tuxcare"
    },
    {
      "bom-ref": "lightgbm@3.3.5.post1+tuxcare",
      "name": "lightgbm",
      "type": "library",
      "version": "3.3.5.post1+tuxcare"
    },
    {
      "bom-ref": "pillow@10.4.0.post1+tuxcare",
      "name": "pillow",
      "type": "library",
      "version": "10.4.0.post1+tuxcare"
    },
    {
      "bom-ref": "pillow@11.3.0.post1+tuxcare",
      "name": "pillow",
      "type": "library",
      "version": "11.3.0.post1+tuxcare"
    },
    {
      "bom-ref": "tornado@5.1.1.post1+tuxcare",
      "name": "tornado",
      "type": "library",
      "version": "5.1.1.post1+tuxcare"
    },
    {
      "bom-ref": "setuptools@59.8.0.post1+tuxcare",
      "name": "setuptools",
      "type": "library",
      "version": "59.8.0.post1+tuxcare"
    },
    {
      "bom-ref": "pyjwt@1.7.1.post2+tuxcare",
      "name": "pyjwt",
      "type": "library",
      "version": "1.7.1.post2+tuxcare"
    },
    {
      "bom-ref": "mlflow@2.22.4.post2+tuxcare",
      "name": "mlflow",
      "type": "library",
      "version": "2.22.4.post2+tuxcare"
    },
    {
      "bom-ref": "pyopenssl@25.3.0.post1+tuxcare",
      "name": "pyopenssl",
      "type": "library",
      "version": "25.3.0.post1+tuxcare"
    },
    {
      "bom-ref": "pyopenssl@23.3.0.post1+tuxcare",
      "name": "pyopenssl",
      "type": "library",
      "version": "23.3.0.post1+tuxcare"
    },
    {
      "bom-ref": "pyopenssl@24.3.0.post1+tuxcare",
      "name": "pyopenssl",
      "type": "library",
      "version": "24.3.0.post1+tuxcare"
    },
    {
      "bom-ref": "fastmcp@2.14.5.post1+tuxcare",
      "name": "fastmcp",
      "type": "library",
      "version": "2.14.5.post1+tuxcare"
    },
    {
      "bom-ref": "mlflow@2.9.1.post2+tuxcare",
      "name": "mlflow",
      "type": "library",
      "version": "2.9.1.post2+tuxcare"
    },
    {
      "bom-ref": "langchain-core@0.3.83.post1+tuxcare",
      "name": "langchain-core",
      "type": "library",
      "version": "0.3.83.post1+tuxcare"
    },
    {
      "bom-ref": "google-cloud-storage@2.19.0.post2+tuxcare",
      "name": "google-cloud-storage",
      "type": "library",
      "version": "2.19.0.post2+tuxcare"
    },
    {
      "bom-ref": "tornado@6.1.0.post2+tuxcare",
      "name": "tornado",
      "type": "library",
      "version": "6.1.0.post2+tuxcare"
    }
  ],
  "vulnerabilities": [
    {
      "bom-ref": "urn:uuid:25bb46d1-0a53-5d96-8414-3493a77a88e7",
      "id": "CVE-2023-37920",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2023-37920 is fixed in version 2021.10.08.post1+tuxcare of certify."
      },
      "affects": [
        {
          "ref": "certify@2021.10.08.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:af0b59d3-412c-5008-b86b-2de75c1ee480",
      "id": "CVE-2023-37920",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2023-37920 is fixed in version 2021.10.08.post2+tuxcare of certify."
      },
      "affects": [
        {
          "ref": "certify@2021.10.08.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:cc4ef478-773c-5b62-a2ac-31af27663979",
      "id": "CVE-2022-23491",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2022-23491 is fixed in version 2021.10.08.post2+tuxcare of certify."
      },
      "affects": [
        {
          "ref": "certify@2021.10.08.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:0d61e7d2-1f61-5492-a566-a2dc2f10cb81",
      "id": "CVE-2023-37920",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2023-37920 is fixed in version 2022.12.07.post1+tuxcare of certify."
      },
      "affects": [
        {
          "ref": "certify@2022.12.07.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:7c37061c-b45f-5335-899b-d666b696272d",
      "id": "CVE-2023-37920",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2023-37920 is fixed in version 2022.12.07.post2+tuxcare of certify."
      },
      "affects": [
        {
          "ref": "certify@2022.12.07.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:bcd3c90a-e07b-5374-9353-facbd2bbe530",
      "id": "CVE-2024-39689",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-39689 is fixed in version 2022.12.07.post2+tuxcare of certify."
      },
      "affects": [
        {
          "ref": "certify@2022.12.07.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:59895bff-4080-55c2-b69e-8cc3bb825ff9",
      "id": "CVE-2024-39689",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-39689 is fixed in version 2023.07.22.post1+tuxcare of certify."
      },
      "affects": [
        {
          "ref": "certify@2023.07.22.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:3b930b2a-e22c-56a6-8dd8-5a64474320a1",
      "id": "GHSA-h4gh-qq45-vh27",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability GHSA-h4gh-qq45-vh27 is fixed in version 42.0.8.post1+tuxcare of cryptography."
      },
      "affects": [
        {
          "ref": "cryptography@42.0.8.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:aa5efb07-db4b-5a27-adeb-131a12b07ca0",
      "id": "CVE-2024-12797",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-12797 is fixed in version 42.0.8.post1+tuxcare of cryptography."
      },
      "affects": [
        {
          "ref": "cryptography@42.0.8.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:929153db-0593-52eb-8731-1b91b30787d1",
      "id": "CVE-2024-12797",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-12797 is fixed in version 43.0.3.post1+tuxcare of cryptography."
      },
      "affects": [
        {
          "ref": "cryptography@43.0.3.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:d54f0245-202a-5eb6-b23b-dc52d5b52ba5",
      "id": "CVE-2024-49768",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-49768 is fixed in version 2.1.2.post1+tuxcare of waitress."
      },
      "affects": [
        {
          "ref": "waitress@2.1.2.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:2713d226-8ee2-53be-94ea-e1be753c84ce",
      "id": "CVE-2024-49768",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-49768 is fixed in version 2.1.2.post2+tuxcare of waitress."
      },
      "affects": [
        {
          "ref": "waitress@2.1.2.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:755bb67a-4487-581a-99b6-54c48155c151",
      "id": "CVE-2024-49769",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-49769 is fixed in version 2.1.2.post2+tuxcare of waitress."
      },
      "affects": [
        {
          "ref": "waitress@2.1.2.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:6378b740-ecfe-556c-abfa-9dd8254243ef",
      "id": "CVE-2023-30861",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2023-30861 is fixed in version 1.1.2.post1+tuxcare of flask."
      },
      "affects": [
        {
          "ref": "flask@1.1.2.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:1b33a52a-8c0f-54a9-b7c2-065eb0212695",
      "id": "AIKIDO-2024-10560",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability AIKIDO-2024-10560 is fixed in version 2.11.3.post1+tuxcare of jinja2."
      },
      "affects": [
        {
          "ref": "jinja2@2.11.3.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:70108596-23cd-5e1a-988e-7671ff2b540b",
      "id": "AIKIDO-2024-10086",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability AIKIDO-2024-10086 is fixed in version 2.11.3.post1+tuxcare of jinja2."
      },
      "affects": [
        {
          "ref": "jinja2@2.11.3.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:b76aabea-103b-547a-a572-78f2c24dbc6f",
      "id": "CVE-2024-22195",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-22195 is fixed in version 2.11.3.post1+tuxcare of jinja2."
      },
      "affects": [
        {
          "ref": "jinja2@2.11.3.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:3ab98edd-953f-5ff9-812a-a7d0791e880e",
      "id": "CVE-2024-34064",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-34064 is fixed in version 2.11.3.post1+tuxcare of jinja2."
      },
      "affects": [
        {
          "ref": "jinja2@2.11.3.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:d7e37b1b-822b-5228-a577-912544f261a0",
      "id": "CVE-2023-44271",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2023-44271 is fixed in version 9.4.0.post1+tuxcare of pillow."
      },
      "affects": [
        {
          "ref": "pillow@9.4.0.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:1e1acc8b-56f6-5154-a3ed-bc8a400868ea",
      "id": "CVE-2024-49767",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-49767 is fixed in version 1.0.1.post1+tuxcare of werkzeug."
      },
      "affects": [
        {
          "ref": "werkzeug@1.0.1.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:0080538a-21f2-5135-825c-cd04d826ec7f",
      "id": "CVE-2023-25577",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2023-25577 is fixed in version 1.0.1.post1+tuxcare of werkzeug."
      },
      "affects": [
        {
          "ref": "werkzeug@1.0.1.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:aac7e537-3a95-55cc-97ba-ab9d35dff5a4",
      "id": "CVE-2024-49766",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-49766 is fixed in version 1.0.1.post1+tuxcare of werkzeug."
      },
      "affects": [
        {
          "ref": "werkzeug@1.0.1.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:50238ec9-c616-523e-8d90-d79a4b1de467",
      "id": "CVE-2024-6827",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-6827 is fixed in version 21.2.0.post2+tuxcare of gunicorn."
      },
      "affects": [
        {
          "ref": "gunicorn@21.2.0.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:0f18560b-d619-5c8b-b7b4-2bf4581673ed",
      "id": "AIKIDO-2024-10216",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability AIKIDO-2024-10216 is fixed in version 21.2.0.post2+tuxcare of gunicorn."
      },
      "affects": [
        {
          "ref": "gunicorn@21.2.0.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:93c51af1-31f7-5c70-bf79-fe1b2ece4de2",
      "id": "CVE-2024-1135",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-1135 is fixed in version 21.2.0.post2+tuxcare of gunicorn."
      },
      "affects": [
        {
          "ref": "gunicorn@21.2.0.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:96998917-b8c8-5092-81c2-e33e9250b575",
      "id": "CVE-2024-6345",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-6345 is fixed in version 65.5.1.post1+tuxcare of setuptools."
      },
      "affects": [
        {
          "ref": "setuptools@65.5.1.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:01e937c5-cbe8-5c5a-9940-930cd474ea9a",
      "id": "AIKIDO-2024-10085",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability AIKIDO-2024-10085 is fixed in version 2.2.3.post1+tuxcare of werkzeug."
      },
      "affects": [
        {
          "ref": "werkzeug@2.2.3.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:1d3ec192-ff35-546f-b27a-9b6ff4f7917e",
      "id": "AIKIDO-2024-10410",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability AIKIDO-2024-10410 is fixed in version 2.2.3.post1+tuxcare of werkzeug."
      },
      "affects": [
        {
          "ref": "werkzeug@2.2.3.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:5cf9b3b3-78a6-5037-a491-93c0061c69b7",
      "id": "CVE-2024-5629",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-5629 is fixed in version 3.13.0.post1+tuxcare of pymongo."
      },
      "affects": [
        {
          "ref": "pymongo@3.13.0.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:68286e4b-4769-5c24-bfc3-8ba8453996ee",
      "id": "AIKIDO-2024-10085",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability AIKIDO-2024-10085 is fixed in version 1.0.1.post2+tuxcare of werkzeug."
      },
      "affects": [
        {
          "ref": "werkzeug@1.0.1.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:f5bbed26-7dfd-5e30-8705-cb676c848a50",
      "id": "CVE-2024-34069",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-34069 is fixed in version 1.0.1.post2+tuxcare of werkzeug."
      },
      "affects": [
        {
          "ref": "werkzeug@1.0.1.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:95e7367d-68f9-5183-9f6d-702f4f617075",
      "id": "CVE-2024-49767",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-49767 is fixed in version 1.0.1.post2+tuxcare of werkzeug."
      },
      "affects": [
        {
          "ref": "werkzeug@1.0.1.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:35475322-9623-511a-8846-a5b2575564fb",
      "id": "CVE-2023-25577",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2023-25577 is fixed in version 1.0.1.post2+tuxcare of werkzeug."
      },
      "affects": [
        {
          "ref": "werkzeug@1.0.1.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:ca26b465-a870-5f5f-99f5-7e9c646c38cf",
      "id": "CVE-2024-49766",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-49766 is fixed in version 1.0.1.post2+tuxcare of werkzeug."
      },
      "affects": [
        {
          "ref": "werkzeug@1.0.1.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:bc5a54fe-b19a-5c0c-ab91-f1cd480047e3",
      "id": "AIKIDO-2025-10170",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability AIKIDO-2025-10170 is fixed in version 3.7.1.post1+tuxcare of anyio."
      },
      "affects": [
        {
          "ref": "anyio@3.7.1.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:8a5b00cd-009a-5bfe-b597-8b9dd677fda9",
      "id": "AIKIDO-2024-10410",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability AIKIDO-2024-10410 is fixed in version 1.0.1.post3+tuxcare of werkzeug."
      },
      "affects": [
        {
          "ref": "werkzeug@1.0.1.post3+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:2d26f59a-0894-5274-ba54-8a36edce868e",
      "id": "CVE-2023-23934",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2023-23934 is fixed in version 1.0.1.post3+tuxcare of werkzeug."
      },
      "affects": [
        {
          "ref": "werkzeug@1.0.1.post3+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:fc199e66-31dd-5f15-b1a0-fbc14f1a2cbe",
      "id": "AIKIDO-2024-10085",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability AIKIDO-2024-10085 is fixed in version 1.0.1.post3+tuxcare of werkzeug."
      },
      "affects": [
        {
          "ref": "werkzeug@1.0.1.post3+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:0134aaa0-48c1-5fe2-a001-094f5743b517",
      "id": "CVE-2024-34069",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-34069 is fixed in version 1.0.1.post3+tuxcare of werkzeug."
      },
      "affects": [
        {
          "ref": "werkzeug@1.0.1.post3+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:680f8203-e564-5677-8c8d-69fc84fcf252",
      "id": "CVE-2024-49767",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-49767 is fixed in version 1.0.1.post3+tuxcare of werkzeug."
      },
      "affects": [
        {
          "ref": "werkzeug@1.0.1.post3+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:04eace66-61e7-5d37-be4b-41848f1c5c30",
      "id": "CVE-2023-25577",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2023-25577 is fixed in version 1.0.1.post3+tuxcare of werkzeug."
      },
      "affects": [
        {
          "ref": "werkzeug@1.0.1.post3+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:f9f1e590-6a2b-50b1-9173-f9b7b91a38db",
      "id": "CVE-2024-49766",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-49766 is fixed in version 1.0.1.post3+tuxcare of werkzeug."
      },
      "affects": [
        {
          "ref": "werkzeug@1.0.1.post3+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:c2b6e1f2-1f43-52c1-a61d-b910e7ba72af",
      "id": "CVE-2024-3651",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-3651 is fixed in version 2.1.post1+tuxcare of idna."
      },
      "affects": [
        {
          "ref": "idna@2.1.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:7ee6d0f0-dccd-530d-9192-3309cf25ae88",
      "id": "CVE-2024-3651",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-3651 is fixed in version 2.8.post1+tuxcare of idna."
      },
      "affects": [
        {
          "ref": "idna@2.8.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:e76d4596-4778-5e6b-8fe6-ee37a80c6296",
      "id": "CVE-2024-12797",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-12797 is fixed in version 43.0.1.post1+tuxcare of cryptography."
      },
      "affects": [
        {
          "ref": "cryptography@43.0.1.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:057e1d74-cd26-58de-a3c5-e93308874678",
      "id": "CVE-2024-6827",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-6827 is fixed in version 20.1.0.post1+tuxcare of gunicorn."
      },
      "affects": [
        {
          "ref": "gunicorn@20.1.0.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:07870df2-f3a5-55de-8f9a-6453a444ff11",
      "id": "AIKIDO-2024-10216",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability AIKIDO-2024-10216 is fixed in version 20.1.0.post1+tuxcare of gunicorn."
      },
      "affects": [
        {
          "ref": "gunicorn@20.1.0.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:b9d3b60f-6e80-58b2-8447-f99c34d278a0",
      "id": "CVE-2024-1135",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-1135 is fixed in version 20.1.0.post1+tuxcare of gunicorn."
      },
      "affects": [
        {
          "ref": "gunicorn@20.1.0.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:f0e849d1-15bc-5e67-8029-578e6a2013cf",
      "id": "CVE-2023-50447",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2023-50447 is fixed in version 9.4.0.post2+tuxcare of pillow."
      },
      "affects": [
        {
          "ref": "pillow@9.4.0.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:6c92fbb8-1bc2-58fd-aa88-9908e7f9e13f",
      "id": "GHSA-56pw-mpj4-fxww",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability GHSA-56pw-mpj4-fxww is fixed in version 9.4.0.post2+tuxcare of pillow."
      },
      "affects": [
        {
          "ref": "pillow@9.4.0.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:ecf598c7-1212-527a-885e-4239580cf3f8",
      "id": "CVE-2023-4863",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2023-4863 is fixed in version 9.4.0.post2+tuxcare of pillow."
      },
      "affects": [
        {
          "ref": "pillow@9.4.0.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:7f184662-c624-5491-86b7-abf4dfa10cf1",
      "id": "CVE-2024-6827",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-6827 is fixed in version 22.0.0.post1+tuxcare of gunicorn."
      },
      "affects": [
        {
          "ref": "gunicorn@22.0.0.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:7108adb1-22c7-5b2a-bd9e-080d91624692",
      "id": "AIKIDO-2024-10216",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability AIKIDO-2024-10216 is fixed in version 22.0.0.post1+tuxcare of gunicorn."
      },
      "affects": [
        {
          "ref": "gunicorn@22.0.0.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:b225f8d5-724a-55f7-87e5-1c04f9eb3ae5",
      "id": "CVE-2024-28219",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-28219 is fixed in version 9.4.0.post3+tuxcare of pillow."
      },
      "affects": [
        {
          "ref": "pillow@9.4.0.post3+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:32623cd2-1aaa-5e37-a1f1-16eaef8f0bed",
      "id": "CVE-2025-47273",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2025-47273 is fixed in version 75.8.0.post1+tuxcare of setuptools."
      },
      "affects": [
        {
          "ref": "setuptools@75.8.0.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:80d17a70-f02b-5ef0-96c8-8c6e02d43d22",
      "id": "CVE-2023-4863",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2023-4863 is fixed in version 9.5.0.post1+tuxcare of pillow."
      },
      "affects": [
        {
          "ref": "pillow@9.5.0.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:f8f6056f-fe59-5611-8ab1-bd54493f3312",
      "id": "CVE-2023-50447",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2023-50447 is fixed in version 9.5.0.post1+tuxcare of pillow."
      },
      "affects": [
        {
          "ref": "pillow@9.5.0.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:a500e541-0e99-5f7c-8574-dee216679326",
      "id": "AIKIDO-2024-10275",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability AIKIDO-2024-10275 is fixed in version 0.14.4.post1+tuxcare of statsmodels."
      },
      "affects": [
        {
          "ref": "statsmodels@0.14.4.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:a218c5fb-eef9-5891-a57f-c794560cae8a",
      "id": "CVE-2023-32681",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2023-32681 is fixed in version 2.30.0.post1+tuxcare of requests."
      },
      "affects": [
        {
          "ref": "requests@2.30.0.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:78965b10-c28f-5c43-8311-9a565183234f",
      "id": "CVE-2024-47081",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-47081 is fixed in version 2.32.3.post1+tuxcare of requests."
      },
      "affects": [
        {
          "ref": "requests@2.32.3.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:8c4b915e-4899-5f07-aa52-43eb06ee05ec",
      "id": "CVE-2024-35195",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-35195 is fixed in version 2.31.0.post1+tuxcare of requests."
      },
      "affects": [
        {
          "ref": "requests@2.31.0.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:38a4674f-6563-5edb-abec-e301a035ee8d",
      "id": "CVE-2019-6446",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2019-6446 is fixed in version 1.16.0.post1+tuxcare of numpy."
      },
      "affects": [
        {
          "ref": "numpy@1.16.0.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:af1ef6f0-0481-5009-9510-f8f6ad928e28",
      "id": "CVE-2024-24680",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-24680 is fixed in version 5.0.1.post1+tuxcare of django."
      },
      "affects": [
        {
          "ref": "django@5.0.1.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:91a01b84-2dd0-5969-abe2-d6a619d2d962",
      "id": "CVE-2024-56374",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-56374 is fixed in version 5.1.4.post1+tuxcare of django."
      },
      "affects": [
        {
          "ref": "django@5.1.4.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:e710f760-fe10-59d6-87f6-dbca35c59a96",
      "id": "CVE-2024-27351",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-27351 is fixed in version 5.0.2.post1+tuxcare of django."
      },
      "affects": [
        {
          "ref": "django@5.0.2.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:7849ed15-5ffb-50bb-9965-4789c9943912",
      "id": "CVE-2025-48432",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2025-48432 is fixed in version 5.1.9.post1+tuxcare of django."
      },
      "affects": [
        {
          "ref": "django@5.1.9.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:8a54988b-554c-5fd9-9c6c-71958a6968b4",
      "id": "CVE-2023-47627",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2023-47627 is fixed in version 3.8.5.post1+tuxcare of aiohttp."
      },
      "affects": [
        {
          "ref": "aiohttp@3.8.5.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:8e29bacd-ff7c-5f35-a1b1-56a36d2f97e1",
      "id": "CVE-2023-49082",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2023-49082 is fixed in version 3.8.5.post1+tuxcare of aiohttp."
      },
      "affects": [
        {
          "ref": "aiohttp@3.8.5.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:2a8c670e-cf53-51b4-9bcc-6bc4816cdd46",
      "id": "CVE-2024-52304",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-52304 is fixed in version 3.8.5.post2+tuxcare of aiohttp."
      },
      "affects": [
        {
          "ref": "aiohttp@3.8.5.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:b99990dc-1e7a-5f82-9d83-364c09591a3e",
      "id": "CVE-2023-37276",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2023-37276 is fixed in version 3.8.4.post1+tuxcare of aiohttp."
      },
      "affects": [
        {
          "ref": "aiohttp@3.8.4.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:3bcc0bb3-0f24-5978-9697-db5859ec80ce",
      "id": "CVE-2021-41945",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2021-41945 is fixed in version 0.22.0.post1+tuxcare of httpx."
      },
      "affects": [
        {
          "ref": "httpx@0.22.0.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:3b840f92-e13e-594c-bd4a-dfdb54328ede",
      "id": "AIKIDO-2024-10560",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability AIKIDO-2024-10560 is fixed in version 2.11.3.post2+tuxcare of jinja2."
      },
      "affects": [
        {
          "ref": "jinja2@2.11.3.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:f59cc397-3d90-511c-9ea8-176b50ffd11a",
      "id": "AIKIDO-2024-10086",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability AIKIDO-2024-10086 is fixed in version 2.11.3.post2+tuxcare of jinja2."
      },
      "affects": [
        {
          "ref": "jinja2@2.11.3.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:53817028-08f8-5a1e-a78b-ba2602b8f3da",
      "id": "CVE-2024-22195",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-22195 is fixed in version 2.11.3.post2+tuxcare of jinja2."
      },
      "affects": [
        {
          "ref": "jinja2@2.11.3.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:91a7d021-bf3b-50b2-bb38-e115a61c9f20",
      "id": "CVE-2024-34064",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-34064 is fixed in version 2.11.3.post2+tuxcare of jinja2."
      },
      "affects": [
        {
          "ref": "jinja2@2.11.3.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:de88e0d7-4415-54b0-a190-bb3fa9da4281",
      "id": "CVE-2024-56326",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-56326 is fixed in version 2.11.3.post2+tuxcare of jinja2."
      },
      "affects": [
        {
          "ref": "jinja2@2.11.3.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:eeeb0a7e-f02b-5afe-8fef-328fe2007fd4",
      "id": "CVE-2025-27516",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2025-27516 is fixed in version 2.11.3.post2+tuxcare of jinja2."
      },
      "affects": [
        {
          "ref": "jinja2@2.11.3.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:d048c392-83f5-5d08-9288-ec0d0b702ab6",
      "id": "CVE-2021-32677",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2021-32677 is fixed in version 0.63.0.post1+tuxcare of fastapi."
      },
      "affects": [
        {
          "ref": "fastapi@0.63.0.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:078a2342-c753-5c61-8fc3-ba1779770e60",
      "id": "CVE-2024-24762",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-24762 is fixed in version 0.63.0.post2+tuxcare of fastapi."
      },
      "affects": [
        {
          "ref": "fastapi@0.63.0.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:eca3d09d-f118-5a2d-97e3-815d57cd1aee",
      "id": "CVE-2023-32681",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2023-32681 is fixed in version 2.25.1.post1+tuxcare of requests."
      },
      "affects": [
        {
          "ref": "requests@2.25.1.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:84559b6e-12ba-5955-b526-90a55d7ce6cd",
      "id": "CVE-2025-50817",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2025-50817 is fixed in version 1.0.0.post1+tuxcare of future."
      },
      "affects": [
        {
          "ref": "future@1.0.0.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:ab440a88-8a98-5160-b99d-6a833f631767",
      "id": "CVE-2023-30861",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2023-30861 is fixed in version 2.2.1.post1+tuxcare of flask."
      },
      "affects": [
        {
          "ref": "flask@2.2.1.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:4ee62e08-9786-53cd-83cc-37fba03c5363",
      "id": "CVE-2023-23969",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2023-23969 is fixed in version 4.0.post1+tuxcare of django."
      },
      "affects": [
        {
          "ref": "django@4.0.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:97576752-4aa3-57ff-b405-25015c63cee7",
      "id": "CVE-2023-24580",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2023-24580 is fixed in version 4.0.post1+tuxcare of django."
      },
      "affects": [
        {
          "ref": "django@4.0.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:842b7822-1898-5c1b-b569-845c682a26f4",
      "id": "CVE-2024-7923",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-7923 is fixed in version 20.1.0.post2+tuxcare of gunicorn."
      },
      "affects": [
        {
          "ref": "gunicorn@20.1.0.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:f9f28a16-466f-5aa7-b023-be73f689cbbe",
      "id": "CVE-2024-24762",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-24762 is fixed in version 0.104.1.post1+tuxcare of fastapi."
      },
      "affects": [
        {
          "ref": "fastapi@0.104.1.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:3b0cac2e-23cd-5841-8ea5-942cff4693f0",
      "id": "CVE-2020-7694",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2020-7694 is fixed in version 0.11.6.post1+tuxcare of uvicorn."
      },
      "affects": [
        {
          "ref": "uvicorn@0.11.6.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:d3801b59-6394-5553-b735-647403b5b19f",
      "id": "CVE-2020-7695",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2020-7695 is fixed in version 0.11.6.post1+tuxcare of uvicorn."
      },
      "affects": [
        {
          "ref": "uvicorn@0.11.6.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:b1ec56dd-f938-5f4b-bbf8-c9036b61bd0d",
      "id": "CVE-2019-6446",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2019-6446 is fixed in version 1.15.4.post1+tuxcare of numpy."
      },
      "affects": [
        {
          "ref": "numpy@1.15.4.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:bfd48891-798e-5a5d-9f44-9f04ff3fa5fb",
      "id": "CVE-2024-9880",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-9880 is fixed in version 2.2.2.post1+tuxcare of pandas."
      },
      "affects": [
        {
          "ref": "pandas@2.2.2.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:6bfa63fb-ae6d-5e43-b969-b347fb2e3445",
      "id": "CVE-2023-47627",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2023-47627 is fixed in version 3.8.1.post1+tuxcare of aiohttp."
      },
      "affects": [
        {
          "ref": "aiohttp@3.8.1.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:6866f152-19fb-5257-8f23-f17c7fe6b646",
      "id": "CVE-2023-23931",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2023-23931 is fixed in version 3.4.8.post1+tuxcare of cryptography."
      },
      "affects": [
        {
          "ref": "cryptography@3.4.8.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:7f7d1acb-6f7b-5ab2-b4fe-13d1518a897a",
      "id": "CVE-2023-50782",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2023-50782 is fixed in version 3.4.8.post1+tuxcare of cryptography."
      },
      "affects": [
        {
          "ref": "cryptography@3.4.8.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:81842d32-81cd-541f-884b-f41a953102b3",
      "id": "CVE-2021-45116",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2021-45116 is fixed in version 4.0.post2+tuxcare of django."
      },
      "affects": [
        {
          "ref": "django@4.0.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:8b6248b0-00c6-5b2d-b277-d80d88fb7f83",
      "id": "CVE-2022-41323",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2022-41323 is fixed in version 4.0.post2+tuxcare of django."
      },
      "affects": [
        {
          "ref": "django@4.0.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:957093d7-0f76-5ff9-90ec-90f5c7adc826",
      "id": "CVE-2024-39329",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-39329 is fixed in version 5.0.1.post2+tuxcare of django."
      },
      "affects": [
        {
          "ref": "django@5.0.1.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:8088a104-0fc5-5693-af00-7c0a728cce92",
      "id": "CVE-2024-41991",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-41991 is fixed in version 5.0.1.post2+tuxcare of django."
      },
      "affects": [
        {
          "ref": "django@5.0.1.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:a60ddd73-14de-574c-a94b-bd235d850c42",
      "id": "CVE-2024-56201",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-56201 is fixed in version 3.0.3.post1+tuxcare of jinja2."
      },
      "affects": [
        {
          "ref": "jinja2@3.0.3.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:6ddf6a65-70b4-5f89-b567-af5f3f61ff13",
      "id": "CVE-2024-22195",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-22195 is fixed in version 3.0.3.post1+tuxcare of jinja2."
      },
      "affects": [
        {
          "ref": "jinja2@3.0.3.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:84026d1f-543d-5ee8-a145-13dc6b4249ba",
      "id": "CVE-2024-56326",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-56326 is fixed in version 3.0.3.post1+tuxcare of jinja2."
      },
      "affects": [
        {
          "ref": "jinja2@3.0.3.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:12f6a93c-4808-5cdd-ab62-8984f008dbf0",
      "id": "CVE-2022-29217",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2022-29217 is fixed in version 2.3.0.post1+tuxcare of pyjwt."
      },
      "affects": [
        {
          "ref": "pyjwt@2.3.0.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:dedc591c-27fa-59e9-9f9b-a8d2853e2d57",
      "id": "CVE-2025-45768",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2025-45768 is fixed in version 2.8.0.post1+tuxcare of pyjwt."
      },
      "affects": [
        {
          "ref": "pyjwt@2.8.0.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:71c90f3b-c154-5a22-8499-af5b82b245fc",
      "id": "CVE-2024-41989",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-41989 is fixed in version 5.0.1.post3+tuxcare of django."
      },
      "affects": [
        {
          "ref": "django@5.0.1.post3+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:2cd98a19-28cc-5b9b-a523-7cf763ff816c",
      "id": "CVE-2021-23727",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2021-23727 is fixed in version v5.1.2.post1+tuxcare of celery."
      },
      "affects": [
        {
          "ref": "celery@v5.1.2.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:6236119f-e7e9-5440-b1aa-e1838658f8c1",
      "id": "CVE-2022-41323",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2022-41323 is fixed in version 5.1.post1+tuxcare of django."
      },
      "affects": [
        {
          "ref": "django@5.1.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:b2a05004-d767-5b19-9de8-4dd7aef3a7ee",
      "id": "CVE-2022-36359",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2022-36359 is fixed in version 4.0.post3+tuxcare of django."
      },
      "affects": [
        {
          "ref": "django@4.0.post3+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:e60fec72-3dd4-5d90-ba63-e6d33d47f516",
      "id": "CVE-2022-34265",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2022-34265 is fixed in version 4.0.post3+tuxcare of django."
      },
      "affects": [
        {
          "ref": "django@4.0.post3+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:9e2f8213-56bc-53de-955d-5c8eae5d4dd4",
      "id": "CVE-2022-28347",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2022-28347 is fixed in version 4.0.post3+tuxcare of django."
      },
      "affects": [
        {
          "ref": "django@4.0.post3+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:39904a4a-f701-52d7-bacf-f128699da43e",
      "id": "CVE-2024-24680",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-24680 is fixed in version 5.0.post1+tuxcare of django."
      },
      "affects": [
        {
          "ref": "django@5.0.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:417413a3-8522-582e-9619-589ac16fb9a3",
      "id": "CVE-2024-47874",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-47874 is fixed in version 0.27.0.post1+tuxcare of starlette."
      },
      "affects": [
        {
          "ref": "starlette@0.27.0.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:13129641-fb50-5752-99f1-3a711fe48bd3",
      "id": "CVE-2024-39614",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-39614 is fixed in version 5.0.post2+tuxcare of django."
      },
      "affects": [
        {
          "ref": "django@5.0.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:dee4d57e-8566-5775-9d93-a91ab19b457f",
      "id": "CVE\u20112025\u201145768",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE\u20112025\u201145768 is fixed in version 2.10.1.post1+tuxcare of pyjwt."
      },
      "affects": [
        {
          "ref": "pyjwt@2.10.1.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:db4b32b1-bc8a-5a4c-a958-2caac6f61426",
      "id": "CVE-2024-38875",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-38875 is fixed in version 5.0.post3+tuxcare of django."
      },
      "affects": [
        {
          "ref": "django@5.0.post3+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:b0d5ba32-5c79-5c5d-912c-63bf9eb9b16f",
      "id": "CVE-2024-39330",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-39330 is fixed in version 5.0.post4+tuxcare of django."
      },
      "affects": [
        {
          "ref": "django@5.0.post4+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:84935c74-99ad-5276-af7f-b128d9638c14",
      "id": "CVE-2024-49767",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-49767 is fixed in version 2.2.3.post3+tuxcare of werkzeug."
      },
      "affects": [
        {
          "ref": "werkzeug@2.2.3.post3+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:b491c6ae-80f3-5187-a409-29e5dc851676",
      "id": "CVE-2024-1135",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-1135 is fixed in version 20.0.4.post1+tuxcare of gunicorn."
      },
      "affects": [
        {
          "ref": "gunicorn@20.0.4.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:0f7879f3-6d7e-5272-bf75-73ed5534fd35",
      "id": "CVE-2024-9880",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-9880 is fixed in version 2.2.0.post1+tuxcare of pandas."
      },
      "affects": [
        {
          "ref": "pandas@2.2.0.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:f1248504-bad2-5d29-82ef-e19ec65d6576",
      "id": "CVE-2024-7923",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-7923 is fixed in version 21.2.0.post3+tuxcare of gunicorn."
      },
      "affects": [
        {
          "ref": "gunicorn@21.2.0.post3+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:43ad6262-69aa-576e-8c86-0b5c992efa85",
      "id": "CVE-2022-28346",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2022-28346 is fixed in version 4.0.post4+tuxcare of django."
      },
      "affects": [
        {
          "ref": "django@4.0.post4+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:ad4b5f95-0ce4-5173-8912-9c2db09fbfef",
      "id": "CVE-2021-45452",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2021-45452 is fixed in version 4.0.post4+tuxcare of django."
      },
      "affects": [
        {
          "ref": "django@4.0.post4+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:95d85011-5b73-5e60-a0fa-35402f1882fa",
      "id": "CVE-2021-45115",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2021-45115 is fixed in version 4.0.post4+tuxcare of django."
      },
      "affects": [
        {
          "ref": "django@4.0.post4+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:28673cd7-027c-54aa-b19d-55924e4a8013",
      "id": "CVE-2024-3772",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-3772 is fixed in version v1.10.5.post1+tuxcare of pydantic."
      },
      "affects": [
        {
          "ref": "pydantic@v1.10.5.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:a4111063-a0ab-5fd6-8007-d1d3b2b2f721",
      "id": "CVE-2023-29483",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2023-29483 is fixed in version 2.3.0.post1+tuxcare of dnspython."
      },
      "affects": [
        {
          "ref": "dnspython@2.3.0.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:754b2fc7-d640-56d1-9f93-95a76bd0a61b",
      "id": "CVE-2023-48795",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2023-48795 is fixed in version 3.0.0.post1+tuxcare of paramiko."
      },
      "affects": [
        {
          "ref": "paramiko@3.0.0.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:4f2fec6b-bc59-52af-a932-35cbd24f6bf8",
      "id": "CVE-2025-26240",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2025-26240 is fixed in version 0.6.1.post1+tuxcare of pdfkit."
      },
      "affects": [
        {
          "ref": "pdfkit@0.6.1.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:55062a65-8ec2-5f70-a23c-287bad8abaf0",
      "id": "SNYK-PYTHON-PIEXIF-2312874",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability SNYK-PYTHON-PIEXIF-2312874 is fixed in version 1.1.3.post1+tuxcare of Piexif."
      },
      "affects": [
        {
          "ref": "Piexif@1.1.3.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:95814ee0-4f36-5bee-9524-a0515ddba3e0",
      "id": "CVE-2024-27454",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-27454 is fixed in version 3.8.5.post1+tuxcare of orjson."
      },
      "affects": [
        {
          "ref": "orjson@3.8.5.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:79699d73-cfe7-5332-834b-81d1a40a6ec3",
      "id": "CVE-2024-34062",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-34062 is fixed in version 4.66.1.post1+tuxcare of tqdm."
      },
      "affects": [
        {
          "ref": "tqdm@4.66.1.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:1a73a577-d48b-55f5-b48c-7eb1983f36a6",
      "id": "CVE-2025-47273",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2025-47273 is fixed in version 68.0.0.post1+tuxcare of setuptools."
      },
      "affects": [
        {
          "ref": "setuptools@68.0.0.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:66f07254-f784-5c3c-a1a2-3005e37c3350",
      "id": "CVE-2024-6345",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-6345 is fixed in version 68.0.0.post1+tuxcare of setuptools."
      },
      "affects": [
        {
          "ref": "setuptools@68.0.0.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:aaba1cfb-3b92-5180-81a1-0f155134f0ea",
      "id": "CVE-2025-58367",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2025-58367 is fixed in version 6.2.3.post1+tuxcare of deepdiff."
      },
      "affects": [
        {
          "ref": "deepdiff@6.2.3.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:2f6255fe-cc15-517d-a0b7-91ac07f9e6d8",
      "id": "CVE-2023-28858",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2023-28858 is fixed in version 4.5.1.post1+tuxcare of redis-py."
      },
      "affects": [
        {
          "ref": "redis-py@4.5.1.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:aa01f41e-e69e-58bb-ae66-df9dc3fe67b8",
      "id": "CVE-2023-28859",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2023-28859 is fixed in version 4.5.1.post1+tuxcare of redis-py."
      },
      "affects": [
        {
          "ref": "redis-py@4.5.1.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:cb84cec6-0ec5-5231-8e49-8fb5fe49d344",
      "id": "CVE-2025-48379",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2025-48379 is fixed in version 11.2.1post1+tuxcare of pillow."
      },
      "affects": [
        {
          "ref": "pillow@11.2.1post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:f4d08abf-9886-56b2-8340-03746ba0d535",
      "id": "CVE-2024-24762",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-24762 is fixed in version 0.0.6.post1+tuxcare of python-multipart."
      },
      "affects": [
        {
          "ref": "python-multipart@0.0.6.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:fc991a4a-fe3e-5336-b0e4-6d48e477a316",
      "id": "CVE-2024-3651",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-3651 is fixed in version 3.6.post1+tuxcare of idna."
      },
      "affects": [
        {
          "ref": "idna@3.6.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:c3488d76-8c38-5d41-ba09-9a4791251e13",
      "id": "CVE-2024-33664",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-33664 is fixed in version 3.3.0.post1+tuxcare of python-jose."
      },
      "affects": [
        {
          "ref": "python-jose@3.3.0.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:6fba6898-b655-5568-98c6-c1fc5fa5806b",
      "id": "CVE-2023-40590",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2023-40590 is fixed in version 3.1.31.post1+tuxcare of gitpython."
      },
      "affects": [
        {
          "ref": "gitpython@3.1.31.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:002d8465-2794-5390-b193-c1c2df2994f9",
      "id": "CVE-2024-22190",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-22190 is fixed in version 3.1.31.post1+tuxcare of gitpython."
      },
      "affects": [
        {
          "ref": "gitpython@3.1.31.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:ee996551-0f9a-5d9f-a752-eef14de1f744",
      "id": "CVE-2023-41040",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2023-41040 is fixed in version 3.1.31.post1+tuxcare of gitpython."
      },
      "affects": [
        {
          "ref": "gitpython@3.1.31.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:8ba1dedb-a653-5edd-b02d-f164a67700ed",
      "id": "CVE-2024-12797",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-12797 is fixed in version 42.0.0.post1+tuxcare of cryptography."
      },
      "affects": [
        {
          "ref": "cryptography@42.0.0.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:eda2b516-ebea-580f-aca1-248eb7e50eed",
      "id": "CVE-2024-26130",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-26130 is fixed in version 42.0.0.post1+tuxcare of cryptography."
      },
      "affects": [
        {
          "ref": "cryptography@42.0.0.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:d9698562-e0fe-575a-871f-5e57ac473a85",
      "id": "CVE-2023-3446",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2023-3446 is fixed in version 3.4.8.post2+tuxcare of cryptography."
      },
      "affects": [
        {
          "ref": "cryptography@3.4.8.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:c8ebe8e3-95b7-58e2-aac0-fa8c8dff8bec",
      "id": "CVE-2024-41990",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-41990 is fixed in version 5.0.post5+tuxcare of django."
      },
      "affects": [
        {
          "ref": "django@5.0.post5+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:37c9ba00-8b05-5fd9-a63f-c31ea0ddbe4a",
      "id": "CVE-2024-42005",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-42005 is fixed in version 5.0.post5+tuxcare of django."
      },
      "affects": [
        {
          "ref": "django@5.0.post5+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:4b417db7-505c-57a2-b8b0-43929b50e9f7",
      "id": "CVE-2023-50782",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2023-50782 is fixed in version 41.0.7.post1+tuxcare of cryptography."
      },
      "affects": [
        {
          "ref": "cryptography@41.0.7.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:7efd6efb-1b3a-5379-adf0-76fd61e5f9e1",
      "id": "CVE-2024-26130",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-26130 is fixed in version 41.0.7.post1+tuxcare of cryptography."
      },
      "affects": [
        {
          "ref": "cryptography@41.0.7.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:c712ab07-a5fb-5cf7-8661-f672ad9176a5",
      "id": "CVE-2025-50181",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2025-50181 is fixed in version 1.26.20.post1+tuxcare of urllib3."
      },
      "affects": [
        {
          "ref": "urllib3@1.26.20.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:8714e418-ae7c-5e4e-b5dc-7a564ded34f9",
      "id": "CVE-2025-57833",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2025-57833 is fixed in version 3.2.25.post1+tuxcare of django."
      },
      "affects": [
        {
          "ref": "django@3.2.25.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:0bbec346-aa2a-5759-a148-28f3c9312c2f",
      "id": "CVE-2024-6866",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-6866 is fixed in version 4.0.2.post1+tuxcare of flask-cors."
      },
      "affects": [
        {
          "ref": "flask-cors@4.0.2.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:ccb30bcf-41e8-5e19-a10c-68201f112731",
      "id": "CVE-2025-55197",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2025-55197 is fixed in version 5.9.0.post1+tuxcare of pypdf."
      },
      "affects": [
        {
          "ref": "pypdf@5.9.0.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:2d871269-91e1-5f3d-8beb-501df9625a25",
      "id": "CVE-2025-47273",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2025-47273 is fixed in version 75.0.0.post1+tuxcare of setuptools."
      },
      "affects": [
        {
          "ref": "setuptools@75.0.0.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:55cb86aa-1924-5319-9b94-075a0b23206b",
      "id": "CVE-2025-47273",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2025-47273 is fixed in version 70.3.0.post1+tuxcare of setuptools."
      },
      "affects": [
        {
          "ref": "setuptools@70.3.0.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:e3fc76c0-bcfb-5f72-9a5d-78543dbf9fc4",
      "id": "CVE-2025-4565",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2025-4565 is fixed in version 4.24.3.post1+tuxcare of protobuf."
      },
      "affects": [
        {
          "ref": "protobuf@4.24.3.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:07c27d72-85cb-5ad5-a924-78dcbc582f30",
      "id": "CVE-2022-22818",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2022-22818 is fixed in version 4.0.post5+tuxcare of django."
      },
      "affects": [
        {
          "ref": "django@4.0.post5+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:e31d57d0-d3a6-5ed6-8671-0cf26b93ecad",
      "id": "CVE-2024-12797",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-12797 is fixed in version 3.4.8.post3+tuxcare of cryptography."
      },
      "affects": [
        {
          "ref": "cryptography@3.4.8.post3+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:031d24a8-535e-5b7c-8e55-ac3cea30b141",
      "id": "CVE-2025-32434",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2025-32434 is fixed in version 1.13.1.post1+tuxcare of torch."
      },
      "affects": [
        {
          "ref": "torch@1.13.1.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:8c2e3a8b-5bc7-5542-92d9-812adabdd303",
      "id": "CVE-2023-45803",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2023-45803 is fixed in version 1.26.4.post1+tuxcare of urllib3."
      },
      "affects": [
        {
          "ref": "urllib3@1.26.4.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:435685c8-abfb-524d-9eb3-3a541777d04f",
      "id": "CVE-2023-45803",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2023-45803 is fixed in version 1.25.11.post2+tuxcare of urllib3."
      },
      "affects": [
        {
          "ref": "urllib3@1.25.11.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:8c58a4fd-4d29-5a93-a5e2-ae2c3df31322",
      "id": "CVE-2021-33503",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2021-33503 is fixed in version 1.25.11.post2+tuxcare of urllib3."
      },
      "affects": [
        {
          "ref": "urllib3@1.25.11.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:d44355e6-ce2a-546c-93cc-31663b4bdb10",
      "id": "CVE-2024-45231",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-45231 is fixed in version 5.1.post2+tuxcare of django."
      },
      "affects": [
        {
          "ref": "django@5.1.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:f5bf1d44-4827-5f45-94bb-5f395f611257",
      "id": "CVE-2025-27556",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2025-27556 is fixed in version 5.1.post2+tuxcare of django."
      },
      "affects": [
        {
          "ref": "django@5.1.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:8b9f5e16-ae22-5728-b5d7-acfcffe2e9bb",
      "id": "CVE-2021-34141",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2021-34141 is fixed in version 1.15.4.post2+tuxcare of numpy."
      },
      "affects": [
        {
          "ref": "numpy@1.15.4.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:1c7d2af9-9114-56ff-93cf-bc7717c9b91e",
      "id": "CVE-2022-23833",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2022-23833 is fixed in version 4.0.post6+tuxcare of django."
      },
      "affects": [
        {
          "ref": "django@4.0.post6+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:3f55afcc-33ba-5c6a-8d4a-bdba7a5a0660",
      "id": "CVE-2025-48432",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2025-48432 is fixed in version 4.2.post1+tuxcare of django."
      },
      "affects": [
        {
          "ref": "django@4.2.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:141f983b-de31-5622-8521-f8c4f37b232c",
      "id": "CVE-2024-53908",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-53908 is fixed in version 5.1.post3+tuxcare of django."
      },
      "affects": [
        {
          "ref": "django@5.1.post3+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:8f146a30-11a6-5e55-bf50-dd9957590599",
      "id": "CVE-2024-53907",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-53907 is fixed in version 5.1.post3+tuxcare of django."
      },
      "affects": [
        {
          "ref": "django@5.1.post3+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:708907ab-b063-5e5f-918d-40af775c4e3e",
      "id": "CVE-2024-45230",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-45230 is fixed in version 5.1.post3+tuxcare of django."
      },
      "affects": [
        {
          "ref": "django@5.1.post3+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:e62628aa-8253-50ee-9338-aab97664515d",
      "id": "CVE-2024-41810",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-41810 is fixed in version 20.3.0.post4+tuxcare of twisted."
      },
      "affects": [
        {
          "ref": "twisted@20.3.0.post4+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:f2ea46cd-454d-5446-9c5d-adf779bdddc6",
      "id": "CVE-2023-46137",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2023-46137 is fixed in version 20.3.0.post4+tuxcare of twisted."
      },
      "affects": [
        {
          "ref": "twisted@20.3.0.post4+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:b3529e9d-2c01-587a-9064-7b3441f9db14",
      "id": "CVE-2024-41671",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-41671 is fixed in version 20.3.0.post4+tuxcare of twisted."
      },
      "affects": [
        {
          "ref": "twisted@20.3.0.post4+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:e91ff9c6-cc22-5f6f-b4de-63fedf7f73bd",
      "id": "CVE-2022-21712",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2022-21712 is fixed in version 20.3.0.post4+tuxcare of twisted."
      },
      "affects": [
        {
          "ref": "twisted@20.3.0.post4+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:564596cb-d241-5c35-8e1d-a9f4a573ab89",
      "id": "CVE-2020-14343",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2020-14343 is fixed in version 5.3.1.post1+tuxcare of pyyaml."
      },
      "affects": [
        {
          "ref": "pyyaml@5.3.1.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:8661a002-ecff-5f68-8565-65e781683283",
      "id": "CVE-2023-30861",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2023-30861 is fixed in version 1.1.4.post1+tuxcare of flask."
      },
      "affects": [
        {
          "ref": "flask@1.1.4.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:bc19a7d4-9a9c-57d4-a67a-64ca78fec9eb",
      "id": "CVE-2024-31583",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-31583 is fixed in version 1.13.1.post2+tuxcare of torch."
      },
      "affects": [
        {
          "ref": "torch@1.13.1.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:0d6a7458-addb-54fd-95b8-748064a29bbb",
      "id": "AIKIDO-2025-10060",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability AIKIDO-2025-10060 is fixed in version 1.13.1.post2+tuxcare of torch."
      },
      "affects": [
        {
          "ref": "torch@1.13.1.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:ae2d0a3c-3528-5450-a683-494fbe87d06a",
      "id": "CVE-2024-31580",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-31580 is fixed in version 1.13.1.post2+tuxcare of torch."
      },
      "affects": [
        {
          "ref": "torch@1.13.1.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:967aa292-7b29-5f37-a8cf-cbe9d394bbc6",
      "id": "CVE-2024-28219",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-28219 is fixed in version 9.5.0.post2+tuxcare of pillow."
      },
      "affects": [
        {
          "ref": "pillow@9.5.0.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:63642180-24a0-5656-814b-ac9fae1f0686",
      "id": "CVE-2023-44271",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2023-44271 is fixed in version 9.5.0.post2+tuxcare of pillow."
      },
      "affects": [
        {
          "ref": "pillow@9.5.0.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:cdf65440-c694-5225-99f2-65646bd7e205",
      "id": "CVE-2023-50447",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2023-50447 is fixed in version 8.4.0.post1+tuxcare of pillow."
      },
      "affects": [
        {
          "ref": "pillow@8.4.0.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:ee4a3f77-10bf-5be0-b542-879d80daa570",
      "id": "CVE-2022-45198",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2022-45198 is fixed in version 8.4.0.post1+tuxcare of pillow."
      },
      "affects": [
        {
          "ref": "pillow@8.4.0.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:21115616-526d-56b4-a160-fbd2e8848a52",
      "id": "CVE-2022-22817",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2022-22817 is fixed in version 8.4.0.post1+tuxcare of pillow."
      },
      "affects": [
        {
          "ref": "pillow@8.4.0.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:0404d56d-51fa-5345-aa67-dcf1fac2f795",
      "id": "CVE-2022-24303",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2022-24303 is fixed in version 8.4.0.post1+tuxcare of pillow."
      },
      "affects": [
        {
          "ref": "pillow@8.4.0.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:c769a991-0561-5cdd-9f38-f7328edd17de",
      "id": "CVE-2019-1010083",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2019-1010083 is fixed in version 0.12.5.post1+tuxcare of flask."
      },
      "affects": [
        {
          "ref": "flask@0.12.5.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:79e86518-69dd-5d82-acc6-03d145e77fab",
      "id": "CVE-2023-49083",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2023-49083 is fixed in version 3.4.8.post4+tuxcare of cryptography."
      },
      "affects": [
        {
          "ref": "cryptography@3.4.8.post4+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:3922bc87-9e32-5332-a7f2-c89a04b66eb0",
      "id": "AIKIDO-2024-10275",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability AIKIDO-2024-10275 is fixed in version 0.14.5.post1+tuxcare of statsmodels."
      },
      "affects": [
        {
          "ref": "statsmodels@0.14.5.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:007a3c1b-ce37-5cb1-a107-bc13d9406a52",
      "id": "CVE-2021-33880",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2021-33880 is fixed in version 8.1.post1+tuxcare of websockets."
      },
      "affects": [
        {
          "ref": "websockets@8.1.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:7184a75a-c9c8-5d12-988b-e64c6fc3eae8",
      "id": "CVE-2024-3651",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-3651 is fixed in version 2.10.post1+tuxcare of idna."
      },
      "affects": [
        {
          "ref": "idna@2.10.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:ef57d9ba-4e34-5be6-988a-a3d7c03c0fd4",
      "id": "CVE-2025-54121",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2025-54121 is fixed in version 0.27.0.post2+tuxcare of starlette."
      },
      "affects": [
        {
          "ref": "starlette@0.27.0.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:49ff84de-c533-588f-b3e8-575f07a0490a",
      "id": "CVE-2024-37891",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-37891 is fixed in version 1.26.4.post2+tuxcare of urllib3."
      },
      "affects": [
        {
          "ref": "urllib3@1.26.4.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:c2ad89ec-effc-5c5b-8c48-9f35d1a4900f",
      "id": "CVE-2025-54121",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2025-54121 is fixed in version 0.13.6.post1+tuxcare of starlette."
      },
      "affects": [
        {
          "ref": "starlette@0.13.6.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:3648466a-3a3e-5ab4-bc12-0c65222a6da0",
      "id": "CVE-2025-62707",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2025-62707 is fixed in version 5.9.0.post2+tuxcare of pypdf."
      },
      "affects": [
        {
          "ref": "pypdf@5.9.0.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:fe05761a-5769-537f-87ab-22f2c974cf2a",
      "id": "CVE-2024-21272",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-21272 is fixed in version 8.4.0.post1+tuxcare of mysql-connector-python."
      },
      "affects": [
        {
          "ref": "mysql-connector-python@8.4.0.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:00155347-440f-5a18-a78d-67f05cb0e3ee",
      "id": "CVE-2020-14343",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2020-14343 is fixed in version 3.13.post1+tuxcare of pyyaml."
      },
      "affects": [
        {
          "ref": "pyyaml@3.13.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:12aebd1d-28a6-511e-84cb-d94ea3523f7d",
      "id": "CVE-2017-18342",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2017-18342 is fixed in version 3.13.post1+tuxcare of pyyaml."
      },
      "affects": [
        {
          "ref": "pyyaml@3.13.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:18326138-60cf-5199-89e6-8676a3159c55",
      "id": "AIKIDO-2024-10370",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability AIKIDO-2024-10370 is fixed in version 2.7.0.post1+tuxcare of sentence-transformers."
      },
      "affects": [
        {
          "ref": "sentence-transformers@2.7.0.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:d8d92da5-b7c8-5dcb-8b82-9ccb112c780d",
      "id": "CVE-2025-62708",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2025-62708 is fixed in version 5.9.0.post3+tuxcare of pypdf."
      },
      "affects": [
        {
          "ref": "pypdf@5.9.0.post3+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:9445ad04-81fb-5605-aede-fad41c183e9a",
      "id": "CVE-2022-29217",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2022-29217 is fixed in version 1.7.1.post1+tuxcare of pyjwt."
      },
      "affects": [
        {
          "ref": "pyjwt@1.7.1.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:36633eec-f567-5c48-bfb3-fa61a5c28213",
      "id": "CVE-2024-6838",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-6838 is fixed in version 2.22.4.post1+tuxcare of mlflow."
      },
      "affects": [
        {
          "ref": "mlflow@2.22.4.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:7dc704b7-4992-5ddd-86f8-6cebd9065839",
      "id": "CVE-2024-156",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-156 is fixed in version 2.22.4.post1+tuxcare of mlflow."
      },
      "affects": [
        {
          "ref": "mlflow@2.22.4.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:a4b1173c-69ab-5df1-ba24-84210efa2951",
      "id": "CVE-2025-10279",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2025-10279 is fixed in version 2.22.4.post1+tuxcare of mlflow."
      },
      "affects": [
        {
          "ref": "mlflow@2.22.4.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:87e9df0e-fe8c-5ac2-8121-d07df94484bf",
      "id": "AIKIDO-2025-11008",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability AIKIDO-2025-11008 is fixed in version 2.22.4.post1+tuxcare of mlflow."
      },
      "affects": [
        {
          "ref": "mlflow@2.22.4.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:1edd8922-18cc-585e-a579-5ec6d7c7fca9",
      "id": "CVE-2025-14279",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2025-14279 is fixed in version 2.22.4.post1+tuxcare of mlflow."
      },
      "affects": [
        {
          "ref": "mlflow@2.22.4.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:0a86b6aa-1677-545d-8fa6-d3e3934a8f8e",
      "id": "CVE-2025-0453",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2025-0453 is fixed in version 2.22.4.post1+tuxcare of mlflow."
      },
      "affects": [
        {
          "ref": "mlflow@2.22.4.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:9acd7dfe-3aca-5588-879a-9e4887a4db12",
      "id": "CVE-2021-41496",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2021-41496 is fixed in version 1.16.0.post2+tuxcare of numpy."
      },
      "affects": [
        {
          "ref": "numpy@1.16.0.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:e115f6e1-adc5-5625-b6d1-5cbb1c45c680",
      "id": "CVE-2025-43859",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2025-43859 is fixed in version 0.9.0.post1+tuxcare of h11."
      },
      "affects": [
        {
          "ref": "h11@0.9.0.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:8bdf0057-0df5-5c06-8e40-624e65d4acfa",
      "id": "CVE-2024-23334",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-23334 is fixed in version 3.8.5.post3+tuxcare of aiohttp."
      },
      "affects": [
        {
          "ref": "aiohttp@3.8.5.post3+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:dedcc8db-a9e3-5781-ae71-26329b4f5907",
      "id": "CVE-2024-23829",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-23829 is fixed in version 3.8.5.post3+tuxcare of aiohttp."
      },
      "affects": [
        {
          "ref": "aiohttp@3.8.5.post3+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:b29735fe-b3e6-5a2a-aeb3-e55c41423a2a",
      "id": "CVE-2025-50181",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2025-50181 is fixed in version 2.0.7.post1+tuxcare of urllib3."
      },
      "affects": [
        {
          "ref": "urllib3@2.0.7.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:41ee245c-49fb-5202-8ddf-e0754dbf9abf",
      "id": "CVE-2025-50181",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2025-50181 is fixed in version 1.26.20.post2+tuxcare of urllib3."
      },
      "affects": [
        {
          "ref": "urllib3@1.26.20.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:d298991a-e7cf-5668-b48f-6d09de3425fc",
      "id": "CVE-2025-66471",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2025-66471 is fixed in version 1.26.20.post2+tuxcare of urllib3."
      },
      "affects": [
        {
          "ref": "urllib3@1.26.20.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:82d20693-254e-5338-ab63-88b9f16ff019",
      "id": "CVE-2025-66418",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2025-66418 is fixed in version 1.26.20.post2+tuxcare of urllib3."
      },
      "affects": [
        {
          "ref": "urllib3@1.26.20.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:fb95ea7f-b64a-5a43-be49-622ebf18104f",
      "id": "CVE-2024-5206",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-5206 is fixed in version 1.0.2.post1+tuxcare of scikit-learn."
      },
      "affects": [
        {
          "ref": "scikit-learn@1.0.2.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:95425362-9649-5deb-b9cf-edcf4b3c4768",
      "id": "CVE-2025-66221",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2025-66221 is fixed in version 2.3.8.post1+tuxcare of werkzeug."
      },
      "affects": [
        {
          "ref": "werkzeug@2.3.8.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:97ecc9bf-f67b-5e19-b42a-80edde5ad553",
      "id": "CVE-2023-49081",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2023-49081 is fixed in version 3.8.1.post2+tuxcare of aiohttp."
      },
      "affects": [
        {
          "ref": "aiohttp@3.8.1.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:38c01937-b769-523b-ba83-05cbce086dd7",
      "id": "CVE-2025-50181",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2025-50181 is fixed in version 1.25.11.post3+tuxcare of urllib3."
      },
      "affects": [
        {
          "ref": "urllib3@1.25.11.post3+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:3bdb9b86-367e-59f9-98f5-e415d5639910",
      "id": "CVE-2025-66418",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2025-66418 is fixed in version 1.25.11.post3+tuxcare of urllib3."
      },
      "affects": [
        {
          "ref": "urllib3@1.25.11.post3+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:86cb9668-d4e2-5ab8-8bf3-9fbd583bc537",
      "id": "CVE-2025-66471",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2025-66471 is fixed in version 1.25.11.post3+tuxcare of urllib3."
      },
      "affects": [
        {
          "ref": "urllib3@1.25.11.post3+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:0e78c319-46fa-5f77-ab00-60bbc3cdd13e",
      "id": "CVE-2025-64458",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2025-64458 is fixed in version 3.2.25.post2+tuxcare of django."
      },
      "affects": [
        {
          "ref": "django@3.2.25.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:9fc55090-1b44-50b7-87b6-610e809d73b0",
      "id": "CVE-2025-64459",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2025-64459 is fixed in version 3.2.25.post2+tuxcare of django."
      },
      "affects": [
        {
          "ref": "django@3.2.25.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:5d697334-e942-50ce-9ea5-5dd4407cb212",
      "id": "CVE-2025-66418",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2025-66418 is fixed in version 1.26.4.post3+tuxcare of urllib3."
      },
      "affects": [
        {
          "ref": "urllib3@1.26.4.post3+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:fb7762ae-36f4-5e94-9ace-5442a78f8fcf",
      "id": "CVE-2025-66471",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2025-66471 is fixed in version 1.26.4.post3+tuxcare of urllib3."
      },
      "affects": [
        {
          "ref": "urllib3@1.26.4.post3+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:23496731-bf34-5635-9544-a522f0762d96",
      "id": "CVE-2024-23829",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-23829 is fixed in version 3.8.1.post3+tuxcare of aiohttp."
      },
      "affects": [
        {
          "ref": "aiohttp@3.8.1.post3+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:26ebef55-57ac-5242-96bb-4dcf6959bf59",
      "id": "CVE-2024-36039",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-36039 is fixed in version 0.10.1.post1+tuxcare of pymysql."
      },
      "affects": [
        {
          "ref": "pymysql@0.10.1.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:9ca1475b-5be9-540a-a686-4dc5b7001409",
      "id": "CVE-2024-49766",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-49766 is fixed in version 2.2.3.post3+tuxcare of werkzeug."
      },
      "affects": [
        {
          "ref": "werkzeug@2.2.3.post3+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:ce74b508-e145-5844-bb59-2dc577380323",
      "id": "CVE-2023-29159",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2023-29159 is fixed in version 0.13.6.post2+tuxcare of starlette."
      },
      "affects": [
        {
          "ref": "starlette@0.13.6.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:3432c2b9-7f9e-5741-bdd6-b664cb4dcbf2",
      "id": "CVE-2023-30798",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2023-30798 is fixed in version 0.13.6.post2+tuxcare of starlette."
      },
      "affects": [
        {
          "ref": "starlette@0.13.6.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:a224fb64-235e-5d8b-a9cf-f79cab7e75a8",
      "id": "CVE-2024-47874",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-47874 is fixed in version 0.13.6.post2+tuxcare of starlette."
      },
      "affects": [
        {
          "ref": "starlette@0.13.6.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:5561b8ab-238c-5701-8c89-99ca2bc06f1c",
      "id": "CVE-2024-6827",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-6827 is fixed in version 20.0.4.post2+tuxcare of gunicorn."
      },
      "affects": [
        {
          "ref": "gunicorn@20.0.4.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:f827076a-61f4-50aa-8c8c-6b9c74fc0125",
      "id": "CVE-2021-33503",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2021-33503 is fixed in version 1.26.4.post4+tuxcare of urllib3."
      },
      "affects": [
        {
          "ref": "urllib3@1.26.4.post4+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:e2050b74-c71e-51d2-9e06-8f39deb2bb5f",
      "id": "CVE-2025-50181",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2025-50181 is fixed in version 1.26.4.post4+tuxcare of urllib3."
      },
      "affects": [
        {
          "ref": "urllib3@1.26.4.post4+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:2b621f07-a3ad-58d8-ab5d-b515f5510eb0",
      "id": "CVE-2023-49081",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2023-49081 is fixed in version 3.8.5.post4+tuxcare of aiohttp."
      },
      "affects": [
        {
          "ref": "aiohttp@3.8.5.post4+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:c022e450-189c-583e-9c1f-1bff1331af01",
      "id": "CVE-2023-43804",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2023-43804 is fixed in version 1.25.11.post4+tuxcare of urllib3."
      },
      "affects": [
        {
          "ref": "urllib3@1.25.11.post4+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:b34fc953-2f89-5311-8322-a7c9f9c96168",
      "id": "CVE-2024-33663",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-33663 is fixed in version 3.3.0.post2+tuxcare of python-jose."
      },
      "affects": [
        {
          "ref": "python-jose@3.3.0.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:037f231e-20a3-54ae-a47d-434ca03c1a89",
      "id": "CVE-2024-53981",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-53981 is fixed in version 0.0.6.post2+tuxcare of python-multipart."
      },
      "affects": [
        {
          "ref": "python-multipart@0.0.6.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:dcdeb7ee-c87e-5dfa-829e-f08a08f07286",
      "id": "CVE-2022-1941",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2022-1941 is fixed in version 3.17.0.post1+tuxcare of protobuf."
      },
      "affects": [
        {
          "ref": "protobuf@3.17.0.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:6133e730-d7f3-5c51-9fb1-00f625659ecb",
      "id": "CVE-2024-30251",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-30251 is fixed in version 3.8.6.post1+tuxcare of aiohttp."
      },
      "affects": [
        {
          "ref": "aiohttp@3.8.6.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:a7a998b9-8cde-567e-a68c-8a798e039209",
      "id": "CVE-2024-30251",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-30251 is fixed in version 3.8.1.post4+tuxcare of aiohttp."
      },
      "affects": [
        {
          "ref": "aiohttp@3.8.1.post4+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:e0cbba07-7349-5d85-a7ae-f32f27fbfbf2",
      "id": "CVE-2021-23727",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2021-23727 is fixed in version 4.4.7.post1+tuxcare of celery."
      },
      "affects": [
        {
          "ref": "celery@4.4.7.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:0f371ce2-d59b-5e63-a104-aaa0663935b4",
      "id": "CVE-2026-0994",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2026-0994 is fixed in version 4.25.8.post1+tuxcare of protobuf."
      },
      "affects": [
        {
          "ref": "protobuf@4.25.8.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:6e021acf-8746-527f-8834-054be7532cf3",
      "id": "CVE-2026-21441",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2026-21441 is fixed in version 1.26.20.post3+tuxcare of urllib3."
      },
      "affects": [
        {
          "ref": "urllib3@1.26.20.post3+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:f65d293c-766b-565f-b1d2-5133ef90d1d6",
      "id": "CVE-2026-23949",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2026-23949 is fixed in version 5.3.0.post1+tuxcare of jaraco-context."
      },
      "affects": [
        {
          "ref": "jaraco-context@5.3.0.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:53f184d9-6cbf-5886-907b-ca8c6ebe82ab",
      "id": "CVE-2023-49082",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2023-49082 is fixed in version 3.8.6.post2+tuxcare of aiohttp."
      },
      "affects": [
        {
          "ref": "aiohttp@3.8.6.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:b132e4ea-feff-5ac3-8ad1-62c395ad7c18",
      "id": "CVE-2025-4565",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2025-4565 is fixed in version 3.20.3.post1+tuxcare of protobuf."
      },
      "affects": [
        {
          "ref": "protobuf@3.20.3.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:c7cf3d58-2622-5150-ac64-63ebb14e0058",
      "id": "CVE-2026-0994",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2026-0994 is fixed in version 3.20.3.post1+tuxcare of protobuf."
      },
      "affects": [
        {
          "ref": "protobuf@3.20.3.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:f241ce34-61c1-52b5-a1d0-f5e7ce355b21",
      "id": "CVE-2024-52804",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-52804 is fixed in version 6.1.0.post1+tuxcare of tornado."
      },
      "affects": [
        {
          "ref": "tornado@6.1.0.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:adaef196-2915-5e61-81ed-046130902698",
      "id": "CVE-2025-47287",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2025-47287 is fixed in version 6.1.0.post1+tuxcare of tornado."
      },
      "affects": [
        {
          "ref": "tornado@6.1.0.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:0e5a3531-c2ed-5fa0-bd01-45ce0e1fb714",
      "id": "CVE-2025-53643",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2025-53643 is fixed in version 3.8.1.post5+tuxcare of aiohttp."
      },
      "affects": [
        {
          "ref": "aiohttp@3.8.1.post5+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:1bfe9466-5c04-5408-b648-a618fdc09006",
      "id": "CVE-2023-37276",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2023-37276 is fixed in version 3.8.1.post5+tuxcare of aiohttp."
      },
      "affects": [
        {
          "ref": "aiohttp@3.8.1.post5+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:8eadb297-968e-5c1a-8b39-2659c2347e95",
      "id": "CVE-2019-20916",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2019-20916 is fixed in version 9.0.post1+tuxcare of pip."
      },
      "affects": [
        {
          "ref": "pip@9.0.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:59035096-cbe0-5089-92fa-ba1db949d4e0",
      "id": "CVE-2023-46136",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2023-46136 is fixed in version 1.0.1.post4+tuxcare of werkzeug."
      },
      "affects": [
        {
          "ref": "werkzeug@1.0.1.post4+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:f2824080-bac4-5f97-9bc8-08be980dcb99",
      "id": "CVE-2023-46136",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2023-46136 is fixed in version 2.2.3.post4+tuxcare of werkzeug."
      },
      "affects": [
        {
          "ref": "werkzeug@2.2.3.post4+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:bb5ebb9e-4af7-5404-bffc-47c4f67a47e7",
      "id": "CVE-2023-49082",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2023-49082 is fixed in version 3.8.1.post6+tuxcare of aiohttp."
      },
      "affects": [
        {
          "ref": "aiohttp@3.8.1.post6+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:7e779f3c-acbb-55f3-b4cc-18befd74c525",
      "id": "CVE-2024-27306",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-27306 is fixed in version 3.8.1.post6+tuxcare of aiohttp."
      },
      "affects": [
        {
          "ref": "aiohttp@3.8.1.post6+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:4ca78dd2-8922-5510-b969-d98de692efd2",
      "id": "GHSA-pjjw-qhg8-p2p9",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability GHSA-pjjw-qhg8-p2p9 is fixed in version 3.8.1.post7+tuxcare of aiohttp."
      },
      "affects": [
        {
          "ref": "aiohttp@3.8.1.post7+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:6aa6233c-f182-595b-8159-ad972ed3dbfd",
      "id": "CVE-2024-52304",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-52304 is fixed in version 3.8.1.post7+tuxcare of aiohttp."
      },
      "affects": [
        {
          "ref": "aiohttp@3.8.1.post7+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:b28dd222-5f3e-5c08-810e-35ea645b9c08",
      "id": "CVE-2024-23334",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-23334 is fixed in version 3.8.1.post7+tuxcare of aiohttp."
      },
      "affects": [
        {
          "ref": "aiohttp@3.8.1.post7+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:a9c579a3-59bc-532d-bece-f10f7ffeef83",
      "id": "CVE-2026-26007",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2026-26007 is fixed in version 42.0.8.post2+tuxcare of cryptography."
      },
      "affects": [
        {
          "ref": "cryptography@42.0.8.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:6b851a49-b95f-53b3-9a06-3dddf576f72d",
      "id": "CVE-2026-26007",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2026-26007 is fixed in version 45.0.7.post1+tuxcare of cryptography."
      },
      "affects": [
        {
          "ref": "cryptography@45.0.7.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:6905c58b-91f8-5366-8494-6e11664ed121",
      "id": "CVE-2026-26007",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2026-26007 is fixed in version 44.0.3.post1+tuxcare of cryptography."
      },
      "affects": [
        {
          "ref": "cryptography@44.0.3.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:31a1b12d-b1d9-5f81-9593-335a249c47e2",
      "id": "CVE-2026-26007",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2026-26007 is fixed in version 43.0.3.post2+tuxcare of cryptography."
      },
      "affects": [
        {
          "ref": "cryptography@43.0.3.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:09a2e40f-c343-546c-96ce-4f8656cb77ed",
      "id": "CVE-2026-26007",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2026-26007 is fixed in version 41.0.7.post2+tuxcare of cryptography."
      },
      "affects": [
        {
          "ref": "cryptography@41.0.7.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:1e7fe1ec-7338-540f-8970-5dd76b255a76",
      "id": "CVE-2024-0727",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-0727 is fixed in version 41.0.7.post2+tuxcare of cryptography."
      },
      "affects": [
        {
          "ref": "cryptography@41.0.7.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:378820f1-22b8-52e9-b466-41d11bda6c13",
      "id": "CVE-2025-10279",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2025-10279 is fixed in version 2.9.1.post1+tuxcare of mlflow."
      },
      "affects": [
        {
          "ref": "mlflow@2.9.1.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:dd444579-77b7-52ee-9163-7936e108bbd9",
      "id": "CVE-2025-14279",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2025-14279 is fixed in version 2.9.1.post1+tuxcare of mlflow."
      },
      "affects": [
        {
          "ref": "mlflow@2.9.1.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:7dfe29fe-f407-5b9a-841c-fec9ea82f310",
      "id": "CVE-2025-14287",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2025-14287 is fixed in version 2.9.1.post1+tuxcare of mlflow."
      },
      "affects": [
        {
          "ref": "mlflow@2.9.1.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:56596345-9734-5d25-ba2f-09cd2a7f5fd4",
      "id": "CVE-2026-2033",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2026-2033 is fixed in version 2.9.1.post1+tuxcare of mlflow."
      },
      "affects": [
        {
          "ref": "mlflow@2.9.1.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:bff6a225-7b5f-5e73-9a8c-93c040b78f72",
      "id": "CVE-2026-2635",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2026-2635 is fixed in version 2.9.1.post1+tuxcare of mlflow."
      },
      "affects": [
        {
          "ref": "mlflow@2.9.1.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:320786e0-8b6a-554b-9aef-37986212df8d",
      "id": "CVE-2024-43598",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-43598 is fixed in version 3.3.5.post1+tuxcare of lightgbm."
      },
      "affects": [
        {
          "ref": "lightgbm@3.3.5.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:e204c4af-fab9-5b07-9a7e-fe14d131a549",
      "id": "CVE-2026-25990",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2026-25990 is fixed in version 10.4.0.post1+tuxcare of pillow."
      },
      "affects": [
        {
          "ref": "pillow@10.4.0.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:bcbf6502-570c-5356-8e07-95d02bb93b95",
      "id": "CVE-2026-25990",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2026-25990 is fixed in version 11.3.0.post1+tuxcare of pillow."
      },
      "affects": [
        {
          "ref": "pillow@11.3.0.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:ad1ec335-6414-5712-8102-4316104a9506",
      "id": "CVE-2024-52804",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-52804 is fixed in version 5.1.1.post1+tuxcare of tornado."
      },
      "affects": [
        {
          "ref": "tornado@5.1.1.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:e6868c8b-d7a6-5471-9f43-ee22c2405238",
      "id": "CVE-2025-47287",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2025-47287 is fixed in version 5.1.1.post1+tuxcare of tornado."
      },
      "affects": [
        {
          "ref": "tornado@5.1.1.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:542219d7-6976-51b2-9310-ab7e5d741aff",
      "id": "CVE-2022-40897",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2022-40897 is fixed in version 59.8.0.post1+tuxcare of setuptools."
      },
      "affects": [
        {
          "ref": "setuptools@59.8.0.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:40058948-a655-5093-9c12-a507156d1f9c",
      "id": "CVE-2026-32597",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2026-32597 is fixed in version 1.7.1.post2+tuxcare of pyjwt."
      },
      "affects": [
        {
          "ref": "pyjwt@1.7.1.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:0bc369b4-550d-57ec-add3-35b80f597ff8",
      "id": "CVE-2026-2033",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2026-2033 is fixed in version 2.22.4.post2+tuxcare of mlflow."
      },
      "affects": [
        {
          "ref": "mlflow@2.22.4.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:f08371d4-4bdd-5f3c-b4b0-1c59443022c1",
      "id": "CVE-2025-14287",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2025-14287 is fixed in version 2.22.4.post2+tuxcare of mlflow."
      },
      "affects": [
        {
          "ref": "mlflow@2.22.4.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:33497d4c-5fd7-5c63-be8e-c6469622df73",
      "id": "CVE-2026-2635",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2026-2635 is fixed in version 2.22.4.post2+tuxcare of mlflow."
      },
      "affects": [
        {
          "ref": "mlflow@2.22.4.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:5ec9a005-78d8-5c9b-a64e-7f2afa1f24d6",
      "id": "CVE-2025-15031",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2025-15031 is fixed in version 2.22.4.post2+tuxcare of mlflow."
      },
      "affects": [
        {
          "ref": "mlflow@2.22.4.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:3716dc80-e58b-5887-96c4-214b71cabf23",
      "id": "CVE-2026-27459",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2026-27459 is fixed in version 25.3.0.post1+tuxcare of pyopenssl."
      },
      "affects": [
        {
          "ref": "pyopenssl@25.3.0.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:bd4db090-3aad-5944-9e99-a32c9aedf8b0",
      "id": "CVE-2026-27448",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2026-27448 is fixed in version 25.3.0.post1+tuxcare of pyopenssl."
      },
      "affects": [
        {
          "ref": "pyopenssl@25.3.0.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:e84dae40-1bc3-5f8b-8cfe-6c1ad58c1ee9",
      "id": "CVE-2026-27459",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2026-27459 is fixed in version 23.3.0.post1+tuxcare of pyopenssl."
      },
      "affects": [
        {
          "ref": "pyopenssl@23.3.0.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:b37343e0-52fa-59e8-abeb-574eb77ee1f5",
      "id": "CVE-2026-27448",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2026-27448 is fixed in version 23.3.0.post1+tuxcare of pyopenssl."
      },
      "affects": [
        {
          "ref": "pyopenssl@23.3.0.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:d691cae9-d804-5190-8ffe-a9672d04ea36",
      "id": "CVE-2026-27459",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2026-27459 is fixed in version 24.3.0.post1+tuxcare of pyopenssl."
      },
      "affects": [
        {
          "ref": "pyopenssl@24.3.0.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:fb86458a-705d-5abb-9268-1fdc503ffab0",
      "id": "CVE-2026-27448",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2026-27448 is fixed in version 24.3.0.post1+tuxcare of pyopenssl."
      },
      "affects": [
        {
          "ref": "pyopenssl@24.3.0.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:abc9c35f-18bc-50e7-8f55-7eaa9670031a",
      "id": "AIKIDO-2026-10318",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability AIKIDO-2026-10318 is fixed in version 2.14.5.post1+tuxcare of fastmcp."
      },
      "affects": [
        {
          "ref": "fastmcp@2.14.5.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:2b546bc7-e0ab-5dd1-a0bc-cd9ee756508d",
      "id": "CVE-2023-6709",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2023-6709 is fixed in version 2.9.1.post2+tuxcare of mlflow."
      },
      "affects": [
        {
          "ref": "mlflow@2.9.1.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:fac5199a-1141-5a2e-baae-71cbd0ff079c",
      "id": "CVE-2023-6753",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2023-6753 is fixed in version 2.9.1.post2+tuxcare of mlflow."
      },
      "affects": [
        {
          "ref": "mlflow@2.9.1.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:0242ed33-bb3a-5bc8-9b9b-b7ad5f524ed4",
      "id": "CVE-2023-6909",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2023-6909 is fixed in version 2.9.1.post2+tuxcare of mlflow."
      },
      "affects": [
        {
          "ref": "mlflow@2.9.1.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:61435ca0-f4b8-5e7f-8f09-08c140b67630",
      "id": "CVE-2023-6974",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2023-6974 is fixed in version 2.9.1.post2+tuxcare of mlflow."
      },
      "affects": [
        {
          "ref": "mlflow@2.9.1.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:37040aef-4dd7-5537-9f4f-3626ad7fb162",
      "id": "CVE-2023-6975",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2023-6975 is fixed in version 2.9.1.post2+tuxcare of mlflow."
      },
      "affects": [
        {
          "ref": "mlflow@2.9.1.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:41921045-9643-5aba-a170-c7b7f4a65c05",
      "id": "CVE-2024-1593",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-1593 is fixed in version 2.9.1.post2+tuxcare of mlflow."
      },
      "affects": [
        {
          "ref": "mlflow@2.9.1.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:e117027f-0c4e-508c-8c8c-316ca6b11ad2",
      "id": "CVE-2024-2928",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-2928 is fixed in version 2.9.1.post2+tuxcare of mlflow."
      },
      "affects": [
        {
          "ref": "mlflow@2.9.1.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:ee3a6fff-0c43-53a5-b00e-092474b51e4d",
      "id": "CVE-2024-3573",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-3573 is fixed in version 2.9.1.post2+tuxcare of mlflow."
      },
      "affects": [
        {
          "ref": "mlflow@2.9.1.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:087750a1-b7c8-5833-beaf-9e054ee4a827",
      "id": "CVE-2024-27132",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-27132 is fixed in version 2.9.1.post2+tuxcare of mlflow."
      },
      "affects": [
        {
          "ref": "mlflow@2.9.1.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:36e737bb-f092-5e78-9654-47ea957c18d5",
      "id": "CVE-2024-27133",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-27133 is fixed in version 2.9.1.post2+tuxcare of mlflow."
      },
      "affects": [
        {
          "ref": "mlflow@2.9.1.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:b964b05d-6342-5020-8775-e94d6ef3c931",
      "id": "CVE-2024-27134",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-27134 is fixed in version 2.9.1.post2+tuxcare of mlflow."
      },
      "affects": [
        {
          "ref": "mlflow@2.9.1.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:b53e44bc-264e-520f-a072-774d3dec5f34",
      "id": "CVE-2024-37056",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2024-37056 is fixed in version 2.9.1.post2+tuxcare of mlflow."
      },
      "affects": [
        {
          "ref": "mlflow@2.9.1.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:283e8b97-3a8d-5189-8559-f91c1f2d6eee",
      "id": "CVE-2025-52967",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2025-52967 is fixed in version 2.9.1.post2+tuxcare of mlflow."
      },
      "affects": [
        {
          "ref": "mlflow@2.9.1.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:2b0cce45-6ba2-5480-bc51-d8bd4f4b6455",
      "id": "CVE-2026-34070",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2026-34070 is fixed in version 0.3.83.post1+tuxcare of langchain-core."
      },
      "affects": [
        {
          "ref": "langchain-core@0.3.83.post1+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:d41beb2d-86ad-5a25-8e4c-d95c4d2db26b",
      "id": "AIKIDO-2026-10425",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability AIKIDO-2026-10425 is fixed in version 2.19.0.post2+tuxcare of google-cloud-storage."
      },
      "affects": [
        {
          "ref": "google-cloud-storage@2.19.0.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:4138c404-1b34-5119-bb42-f7668bb375ae",
      "id": "GHSA-qppv-j76h-2rpx",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability GHSA-qppv-j76h-2rpx is fixed in version 6.1.0.post2+tuxcare of tornado."
      },
      "affects": [
        {
          "ref": "tornado@6.1.0.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:dc55aec4-8314-51fb-b303-b6ed9c95edb9",
      "id": "CVE-2023-28370",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2023-28370 is fixed in version 6.1.0.post2+tuxcare of tornado."
      },
      "affects": [
        {
          "ref": "tornado@6.1.0.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:daa2f900-c4b8-5108-90d2-a92a24157db6",
      "id": "GHSA-w235-7p84-xx57",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability GHSA-w235-7p84-xx57 is fixed in version 6.1.0.post2+tuxcare of tornado."
      },
      "affects": [
        {
          "ref": "tornado@6.1.0.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:04c2eb78-edf6-5aa3-9b2f-43e1e7b9724f",
      "id": "GHSA-753j-mpmx-qq6g",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability GHSA-753j-mpmx-qq6g is fixed in version 6.1.0.post2+tuxcare of tornado."
      },
      "affects": [
        {
          "ref": "tornado@6.1.0.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:57faae5c-9de5-51b5-99d6-366e7c97624d",
      "id": "GHSA-78cv-mqj4-43f7",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability GHSA-78cv-mqj4-43f7 is fixed in version 6.1.0.post2+tuxcare of tornado."
      },
      "affects": [
        {
          "ref": "tornado@6.1.0.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:b6ed5018-6087-50fb-93a3-08e06a85b6e4",
      "id": "CVE-2026-31958",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2026-31958 is fixed in version 6.1.0.post2+tuxcare of tornado."
      },
      "affects": [
        {
          "ref": "tornado@6.1.0.post2+tuxcare"
        }
      ]
    },
    {
      "bom-ref": "urn:uuid:bb3fff98-d272-54a0-bc0a-a5677066f5fc",
      "id": "CVE-2026-35536",
      "analysis": {
        "state": "resolved",
        "detail": "Vulnerability CVE-2026-35536 is fixed in version 6.1.0.post2+tuxcare of tornado."
      },
      "affects": [
        {
          "ref": "tornado@6.1.0.post2+tuxcare"
        }
      ]
    }
  ],
  "dependencies": [
    {
      "ref": "certify@2021.10.08.post1+tuxcare"
    },
    {
      "ref": "certify@2021.10.08.post2+tuxcare"
    },
    {
      "ref": "certify@2022.12.07.post1+tuxcare"
    },
    {
      "ref": "certify@2022.12.07.post2+tuxcare"
    },
    {
      "ref": "certify@2023.07.22.post1+tuxcare"
    },
    {
      "ref": "cryptography@42.0.8.post1+tuxcare"
    },
    {
      "ref": "cryptography@43.0.3.post1+tuxcare"
    },
    {
      "ref": "waitress@2.1.2.post1+tuxcare"
    },
    {
      "ref": "waitress@2.1.2.post2+tuxcare"
    },
    {
      "ref": "flask@1.1.2.post1+tuxcare"
    },
    {
      "ref": "jinja2@2.11.3.post1+tuxcare"
    },
    {
      "ref": "pillow@9.4.0.post1+tuxcare"
    },
    {
      "ref": "werkzeug@1.0.1.post1+tuxcare"
    },
    {
      "ref": "gunicorn@21.2.0.post2+tuxcare"
    },
    {
      "ref": "setuptools@65.5.1.post1+tuxcare"
    },
    {
      "ref": "werkzeug@2.2.3.post1+tuxcare"
    },
    {
      "ref": "pymongo@3.13.0.post1+tuxcare"
    },
    {
      "ref": "werkzeug@1.0.1.post2+tuxcare"
    },
    {
      "ref": "anyio@3.7.1.post1+tuxcare"
    },
    {
      "ref": "werkzeug@1.0.1.post3+tuxcare"
    },
    {
      "ref": "idna@2.1.post1+tuxcare"
    },
    {
      "ref": "idna@2.8.post1+tuxcare"
    },
    {
      "ref": "cryptography@43.0.1.post1+tuxcare"
    },
    {
      "ref": "gunicorn@20.1.0.post1+tuxcare"
    },
    {
      "ref": "pillow@9.4.0.post2+tuxcare"
    },
    {
      "ref": "gunicorn@22.0.0.post1+tuxcare"
    },
    {
      "ref": "pillow@9.4.0.post3+tuxcare"
    },
    {
      "ref": "setuptools@75.8.0.post1+tuxcare"
    },
    {
      "ref": "pillow@9.5.0.post1+tuxcare"
    },
    {
      "ref": "statsmodels@0.14.4.post1+tuxcare"
    },
    {
      "ref": "requests@2.30.0.post1+tuxcare"
    },
    {
      "ref": "requests@2.32.3.post1+tuxcare"
    },
    {
      "ref": "requests@2.31.0.post1+tuxcare"
    },
    {
      "ref": "numpy@1.16.0.post1+tuxcare"
    },
    {
      "ref": "django@5.0.1.post1+tuxcare"
    },
    {
      "ref": "django@5.1.4.post1+tuxcare"
    },
    {
      "ref": "django@5.0.2.post1+tuxcare"
    },
    {
      "ref": "django@5.1.9.post1+tuxcare"
    },
    {
      "ref": "aiohttp@3.8.5.post1+tuxcare"
    },
    {
      "ref": "aiohttp@3.8.5.post2+tuxcare"
    },
    {
      "ref": "aiohttp@3.8.4.post1+tuxcare"
    },
    {
      "ref": "httpx@0.22.0.post1+tuxcare"
    },
    {
      "ref": "jinja2@2.11.3.post2+tuxcare"
    },
    {
      "ref": "fastapi@0.63.0.post1+tuxcare"
    },
    {
      "ref": "fastapi@0.63.0.post2+tuxcare"
    },
    {
      "ref": "requests@2.25.1.post1+tuxcare"
    },
    {
      "ref": "future@1.0.0.post1+tuxcare"
    },
    {
      "ref": "flask@2.2.1.post1+tuxcare"
    },
    {
      "ref": "django@4.0.post1+tuxcare"
    },
    {
      "ref": "gunicorn@20.1.0.post2+tuxcare"
    },
    {
      "ref": "fastapi@0.104.1.post1+tuxcare"
    },
    {
      "ref": "uvicorn@0.11.6.post1+tuxcare"
    },
    {
      "ref": "numpy@1.15.4.post1+tuxcare"
    },
    {
      "ref": "pandas@2.2.2.post1+tuxcare"
    },
    {
      "ref": "aiohttp@3.8.1.post1+tuxcare"
    },
    {
      "ref": "cryptography@3.4.8.post1+tuxcare"
    },
    {
      "ref": "django@4.0.post2+tuxcare"
    },
    {
      "ref": "django@5.0.1.post2+tuxcare"
    },
    {
      "ref": "jinja2@3.0.3.post1+tuxcare"
    },
    {
      "ref": "pyjwt@2.3.0.post1+tuxcare"
    },
    {
      "ref": "pyjwt@2.8.0.post1+tuxcare"
    },
    {
      "ref": "django@5.0.1.post3+tuxcare"
    },
    {
      "ref": "celery@v5.1.2.post1+tuxcare"
    },
    {
      "ref": "django@5.1.post1+tuxcare"
    },
    {
      "ref": "django@4.0.post3+tuxcare"
    },
    {
      "ref": "django@5.0.post1+tuxcare"
    },
    {
      "ref": "starlette@0.27.0.post1+tuxcare"
    },
    {
      "ref": "django@5.0.post2+tuxcare"
    },
    {
      "ref": "pyjwt@2.10.1.post1+tuxcare"
    },
    {
      "ref": "django@5.0.post3+tuxcare"
    },
    {
      "ref": "django@5.0.post4+tuxcare"
    },
    {
      "ref": "werkzeug@2.2.3.post3+tuxcare"
    },
    {
      "ref": "gunicorn@20.0.4.post1+tuxcare"
    },
    {
      "ref": "pandas@2.2.0.post1+tuxcare"
    },
    {
      "ref": "gunicorn@21.2.0.post3+tuxcare"
    },
    {
      "ref": "django@4.0.post4+tuxcare"
    },
    {
      "ref": "pydantic@v1.10.5.post1+tuxcare"
    },
    {
      "ref": "dnspython@2.3.0.post1+tuxcare"
    },
    {
      "ref": "paramiko@3.0.0.post1+tuxcare"
    },
    {
      "ref": "pdfkit@0.6.1.post1+tuxcare"
    },
    {
      "ref": "Piexif@1.1.3.post1+tuxcare"
    },
    {
      "ref": "orjson@3.8.5.post1+tuxcare"
    },
    {
      "ref": "tqdm@4.66.1.post1+tuxcare"
    },
    {
      "ref": "setuptools@68.0.0.post1+tuxcare"
    },
    {
      "ref": "deepdiff@6.2.3.post1+tuxcare"
    },
    {
      "ref": "redis-py@4.5.1.post1+tuxcare"
    },
    {
      "ref": "pillow@11.2.1post1+tuxcare"
    },
    {
      "ref": "python-multipart@0.0.6.post1+tuxcare"
    },
    {
      "ref": "idna@3.6.post1+tuxcare"
    },
    {
      "ref": "python-jose@3.3.0.post1+tuxcare"
    },
    {
      "ref": "gitpython@3.1.31.post1+tuxcare"
    },
    {
      "ref": "cryptography@42.0.0.post1+tuxcare"
    },
    {
      "ref": "cryptography@3.4.8.post2+tuxcare"
    },
    {
      "ref": "django@5.0.post5+tuxcare"
    },
    {
      "ref": "cryptography@41.0.7.post1+tuxcare"
    },
    {
      "ref": "urllib3@1.26.20.post1+tuxcare"
    },
    {
      "ref": "django@3.2.25.post1+tuxcare"
    },
    {
      "ref": "flask-cors@4.0.2.post1+tuxcare"
    },
    {
      "ref": "pypdf@5.9.0.post1+tuxcare"
    },
    {
      "ref": "setuptools@75.0.0.post1+tuxcare"
    },
    {
      "ref": "setuptools@70.3.0.post1+tuxcare"
    },
    {
      "ref": "protobuf@4.24.3.post1+tuxcare"
    },
    {
      "ref": "django@4.0.post5+tuxcare"
    },
    {
      "ref": "cryptography@3.4.8.post3+tuxcare"
    },
    {
      "ref": "torch@1.13.1.post1+tuxcare"
    },
    {
      "ref": "urllib3@1.26.4.post1+tuxcare"
    },
    {
      "ref": "urllib3@1.25.11.post2+tuxcare"
    },
    {
      "ref": "django@5.1.post2+tuxcare"
    },
    {
      "ref": "numpy@1.15.4.post2+tuxcare"
    },
    {
      "ref": "django@4.0.post6+tuxcare"
    },
    {
      "ref": "django@4.2.post1+tuxcare"
    },
    {
      "ref": "django@5.1.post3+tuxcare"
    },
    {
      "ref": "twisted@20.3.0.post4+tuxcare"
    },
    {
      "ref": "pyyaml@5.3.1.post1+tuxcare"
    },
    {
      "ref": "flask@1.1.4.post1+tuxcare"
    },
    {
      "ref": "torch@1.13.1.post2+tuxcare"
    },
    {
      "ref": "pillow@9.5.0.post2+tuxcare"
    },
    {
      "ref": "pillow@8.4.0.post1+tuxcare"
    },
    {
      "ref": "flask@0.12.5.post1+tuxcare"
    },
    {
      "ref": "cryptography@3.4.8.post4+tuxcare"
    },
    {
      "ref": "statsmodels@0.14.5.post1+tuxcare"
    },
    {
      "ref": "websockets@8.1.post1+tuxcare"
    },
    {
      "ref": "idna@2.10.post1+tuxcare"
    },
    {
      "ref": "starlette@0.27.0.post2+tuxcare"
    },
    {
      "ref": "urllib3@1.26.4.post2+tuxcare"
    },
    {
      "ref": "starlette@0.13.6.post1+tuxcare"
    },
    {
      "ref": "pypdf@5.9.0.post2+tuxcare"
    },
    {
      "ref": "mysql-connector-python@8.4.0.post1+tuxcare"
    },
    {
      "ref": "pyyaml@3.13.post1+tuxcare"
    },
    {
      "ref": "sentence-transformers@2.7.0.post1+tuxcare"
    },
    {
      "ref": "pypdf@5.9.0.post3+tuxcare"
    },
    {
      "ref": "pyjwt@1.7.1.post1+tuxcare"
    },
    {
      "ref": "mlflow@2.22.4.post1+tuxcare"
    },
    {
      "ref": "numpy@1.16.0.post2+tuxcare"
    },
    {
      "ref": "h11@0.9.0.post1+tuxcare"
    },
    {
      "ref": "aiohttp@3.8.5.post3+tuxcare"
    },
    {
      "ref": "urllib3@2.0.7.post1+tuxcare"
    },
    {
      "ref": "urllib3@1.26.20.post2+tuxcare"
    },
    {
      "ref": "scikit-learn@1.0.2.post1+tuxcare"
    },
    {
      "ref": "werkzeug@2.3.8.post1+tuxcare"
    },
    {
      "ref": "aiohttp@3.8.1.post2+tuxcare"
    },
    {
      "ref": "urllib3@1.25.11.post3+tuxcare"
    },
    {
      "ref": "django@3.2.25.post2+tuxcare"
    },
    {
      "ref": "urllib3@1.26.4.post3+tuxcare"
    },
    {
      "ref": "aiohttp@3.8.1.post3+tuxcare"
    },
    {
      "ref": "pymysql@0.10.1.post1+tuxcare"
    },
    {
      "ref": "starlette@0.13.6.post2+tuxcare"
    },
    {
      "ref": "gunicorn@20.0.4.post2+tuxcare"
    },
    {
      "ref": "urllib3@1.26.4.post4+tuxcare"
    },
    {
      "ref": "aiohttp@3.8.5.post4+tuxcare"
    },
    {
      "ref": "urllib3@1.25.11.post4+tuxcare"
    },
    {
      "ref": "python-jose@3.3.0.post2+tuxcare"
    },
    {
      "ref": "python-multipart@0.0.6.post2+tuxcare"
    },
    {
      "ref": "protobuf@3.17.0.post1+tuxcare"
    },
    {
      "ref": "aiohttp@3.8.6.post1+tuxcare"
    },
    {
      "ref": "aiohttp@3.8.1.post4+tuxcare"
    },
    {
      "ref": "celery@4.4.7.post1+tuxcare"
    },
    {
      "ref": "protobuf@4.25.8.post1+tuxcare"
    },
    {
      "ref": "urllib3@1.26.20.post3+tuxcare"
    },
    {
      "ref": "jaraco-context@5.3.0.post1+tuxcare"
    },
    {
      "ref": "aiohttp@3.8.6.post2+tuxcare"
    },
    {
      "ref": "protobuf@3.20.3.post1+tuxcare"
    },
    {
      "ref": "tornado@6.1.0.post1+tuxcare"
    },
    {
      "ref": "aiohttp@3.8.1.post5+tuxcare"
    },
    {
      "ref": "pip@9.0.post1+tuxcare"
    },
    {
      "ref": "werkzeug@1.0.1.post4+tuxcare"
    },
    {
      "ref": "werkzeug@2.2.3.post4+tuxcare"
    },
    {
      "ref": "aiohttp@3.8.1.post6+tuxcare"
    },
    {
      "ref": "aiohttp@3.8.1.post7+tuxcare"
    },
    {
      "ref": "cryptography@42.0.8.post2+tuxcare"
    },
    {
      "ref": "cryptography@45.0.7.post1+tuxcare"
    },
    {
      "ref": "cryptography@44.0.3.post1+tuxcare"
    },
    {
      "ref": "cryptography@43.0.3.post2+tuxcare"
    },
    {
      "ref": "cryptography@41.0.7.post2+tuxcare"
    },
    {
      "ref": "mlflow@2.9.1.post1+tuxcare"
    },
    {
      "ref": "lightgbm@3.3.5.post1+tuxcare"
    },
    {
      "ref": "pillow@10.4.0.post1+tuxcare"
    },
    {
      "ref": "pillow@11.3.0.post1+tuxcare"
    },
    {
      "ref": "tornado@5.1.1.post1+tuxcare"
    },
    {
      "ref": "setuptools@59.8.0.post1+tuxcare"
    },
    {
      "ref": "pyjwt@1.7.1.post2+tuxcare"
    },
    {
      "ref": "mlflow@2.22.4.post2+tuxcare"
    },
    {
      "ref": "pyopenssl@25.3.0.post1+tuxcare"
    },
    {
      "ref": "pyopenssl@23.3.0.post1+tuxcare"
    },
    {
      "ref": "pyopenssl@24.3.0.post1+tuxcare"
    },
    {
      "ref": "fastmcp@2.14.5.post1+tuxcare"
    },
    {
      "ref": "mlflow@2.9.1.post2+tuxcare"
    },
    {
      "ref": "langchain-core@0.3.83.post1+tuxcare"
    },
    {
      "ref": "google-cloud-storage@2.19.0.post2+tuxcare"
    },
    {
      "ref": "tornado@6.1.0.post2+tuxcare"
    }
  ]
}