-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathdependency-check-supressions.xml
78 lines (78 loc) · 3.05 KB
/
dependency-check-supressions.xml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
<?xml version="1.0" encoding="UTF-8"?>
<suppressions xmlns="https://jeremylong.github.io/DependencyCheck/dependency-suppression.1.3.xsd">
<suppress>
<notes><![CDATA[False positive the issue is with Liquibase prior to v4.8.0, liquibase-slf4j is independent]]></notes>
<gav regex="false">com.mattbertolini:liquibase-slf4j:4.1.0</gav>
<cve>CVE-2022-0839</cve>
</suppress>
<suppress>
<notes><![CDATA[
CVE relates to pki-core, it's just picking up zipkin as a false positive.
]]></notes>
<packageUrl regex="true">^pkg:maven/io.zipkin..*/.*$</packageUrl>
<vulnerabilityName>CVE-2022-2393</vulnerabilityName>
</suppress>
<suppress>
<notes><![CDATA[
The CVE relates to SnakeYamls construction of Java objects, our use of Snakeyaml is always through Jackson, which only uses it for parsing the yaml.
]]></notes>
<packageUrl regex="true">^pkg:maven/org.yaml/snakeyaml.*$</packageUrl>
<vulnerabilityName>CVE-2022-1471</vulnerabilityName>
</suppress>
<suppress>
<notes><![CDATA[
The CVE relates to ICU4C.
]]></notes>
<packageUrl regex="true">^pkg:maven/org.graalvm.shadowed/icu4j.*</packageUrl>
<vulnerabilityName>CVE-2016-6293</vulnerabilityName>
</suppress>
<suppress>
<notes><![CDATA[
The CVE relates to ICU4C.
]]></notes>
<packageUrl regex="true">^pkg:maven/org.graalvm.shadowed/icu4j.*</packageUrl>
<vulnerabilityName>CVE-2016-7415</vulnerabilityName>
</suppress>
<suppress>
<notes><![CDATA[
The CVE relates to ICU4C.
]]></notes>
<packageUrl regex="true">^pkg:maven/org.graalvm.shadowed/icu4j.*</packageUrl>
<vulnerabilityName>CVE-2017-17484</vulnerabilityName>
</suppress>
<suppress>
<notes><![CDATA[
The CVE relates to ICU4C.
]]></notes>
<packageUrl regex="true">^pkg:maven/org.graalvm.shadowed/icu4j.*</packageUrl>
<vulnerabilityName>CVE-2014-9911</vulnerabilityName>
</suppress>
<suppress>
<notes><![CDATA[
The CVE relates to ICU4C.
]]></notes>
<packageUrl regex="true">^pkg:maven/org.graalvm.shadowed/icu4j.*</packageUrl>
<vulnerabilityName>CVE-2020-10531</vulnerabilityName>
</suppress>
<suppress>
<notes><![CDATA[
The CVE relates to ICU4C.
]]></notes>
<packageUrl regex="true">^pkg:maven/org.graalvm.shadowed/icu4j.*</packageUrl>
<vulnerabilityName>CVE-2014-9654</vulnerabilityName>
</suppress>
<suppress>
<notes><![CDATA[
The CVE relates to ICU4C.
]]></notes>
<packageUrl regex="true">^pkg:maven/org.graalvm.shadowed/icu4j.*</packageUrl>
<vulnerabilityName>CVE-2017-14952</vulnerabilityName>
</suppress>
<suppress>
<notes><![CDATA[
The CVE relates to ICU4C.
]]></notes>
<packageUrl regex="true">^pkg:maven/org.graalvm.shadowed/icu4j.*</packageUrl>
<vulnerabilityName>CVE-2015-5922</vulnerabilityName>
</suppress>
</suppressions>