| <?xml version="1.0" encoding="UTF-8"?> |
| <suppressions xmlns="https://jeremylong.github.io/DependencyCheck/dependency-suppression.1.3.xsd" |
| xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" |
| xsi:schemaLocation="https://jeremylong.github.io/DependencyCheck/dependency-suppression.1.3.xsd https://jeremylong.github.io/DependencyCheck/dependency-suppression.1.3.xsd"> |
| <suppress> |
| <notes><![CDATA[ file name: jdom2-2.0.6.jar ]]></notes> |
| <packageUrl regex="true">^pkg:maven/org\.jdom/jdom2@.*$</packageUrl> |
| <cve>CVE-2021-33813</cve> |
| </suppress> |
| <suppress> |
| <notes><![CDATA[ file name: path-parse:1.0.6 ]]></notes> |
| <packageUrl regex="true">^pkg:npm/path\-parse@.*$</packageUrl> |
| <cve>CVE-2021-23343</cve> |
| </suppress> |
| <suppress> |
| <notes><![CDATA[ file name: glob-parent:6.0.0 ]]></notes> |
| <packageUrl regex="true">^pkg:npm/glob\-parent@.*$</packageUrl> |
| <vulnerabilityName>1751</vulnerabilityName> |
| </suppress> |
| <suppress> |
| <notes><![CDATA[ file name: trim-newlines:4.0.1 ]]></notes> |
| <packageUrl regex="true">^pkg:npm/trim\-newlines@.*$</packageUrl> |
| <vulnerabilityName>1753</vulnerabilityName> |
| </suppress> |
| <suppress> |
| <notes><![CDATA[ file name: trim-newlines:1.0.0 ]]></notes> |
| <packageUrl regex="true">^pkg:npm/trim\-newlines@.*$</packageUrl> |
| <cpe>cpe:/a:trim-newlines_project:trim-newlines</cpe> |
| </suppress> |
| <suppress> |
| <notes><![CDATA[ file name: jakarta.el-api-3.0.3.jar ]]></notes> |
| <packageUrl regex="true">^pkg:maven/jakarta\.el/jakarta\.el-api@.*$</packageUrl> |
| <cve>CVE-2021-28170</cve> |
| </suppress> |
| <suppress> |
| <notes><![CDATA[ file name: lodash:4.17.21 ]]></notes> |
| <packageUrl regex="true">^pkg:npm/lodash@.*$</packageUrl> |
| <cpe>cpe:/a:lodash:lodash</cpe> |
| </suppress> |
| <suppress> |
| <notes><![CDATA[ file name: lodash:4.17.21 ]]></notes> |
| <packageUrl regex="true">^pkg:npm/lodash@.*$</packageUrl> |
| <vulnerabilityName>1002373</vulnerabilityName> |
| </suppress> <suppress> |
| <notes><![CDATA[ file name: set-value:2.0.1 ]]></notes> |
| <packageUrl regex="true">^pkg:npm/set\-value@.*$</packageUrl> |
| <cpe>cpe:/a:set-value_project:set-value</cpe> |
| </suppress> |
| <suppress> |
| <notes><![CDATA[ file name: set-value:3.0.2 ]]></notes> |
| <packageUrl regex="true">^pkg:npm/set\-value@.*$</packageUrl> |
| <cpe>cpe:/a:set-value_project:set-value</cpe> |
| </suppress> |
| <suppress> |
| <notes><![CDATA[ file name: set-value:2.0.1 ]]></notes> |
| <packageUrl regex="true">^pkg:npm/set\-value@.*$</packageUrl> |
| <vulnerabilityName>1002475</vulnerabilityName> |
| </suppress> |
| <suppress> |
| <notes><![CDATA[ file name: spring-aop-5.3.20.jar ]]></notes> |
| <sha1>c82f17997ab18ecafa8d08ce34a7c7aa4a04ef9e</sha1> |
| <cve>CVE-2016-1000027</cve> |
| </suppress> |
| <suppress> |
| <notes><![CDATA[ file name: spring-core-5.3.20.jar ]]></notes> |
| <sha1>4b88aa3c401ede3d6c8ac78ea0c646cf326ec24b</sha1> |
| <cve>CVE-2016-1000027</cve> |
| </suppress> |
| <suppress> |
| <notes><![CDATA[ file name: spring-jcl-5.3.20.jar ]]></notes> |
| <sha1>35119231d09863699567ce579c21512ddcbc5407</sha1> |
| <cve>CVE-2016-1000027</cve> |
| </suppress> |
| <suppress> |
| <notes><![CDATA[ file name: spring-web-5.3.20.jar ]]></notes> |
| <sha1>3c2fe9363760d62d5b7c9f087bb4255e3377a0b2</sha1> |
| <cve>CVE-2016-1000027</cve> |
| </suppress> |
| <suppress> |
| <notes><![CDATA[ file name: spring-beans-5.3.20.jar ]]></notes> |
| <sha1>0ab88bd9e3a8307f5c0516c15d295c88ec318659</sha1> |
| <cve>CVE-2016-1000027</cve> |
| </suppress> |
| <suppress> |
| <notes><![CDATA[ file name: spring-webmvc-5.3.20.jar ]]></notes> |
| <sha1>8ac1b72a1f5c41fdc2cb3340cd94f795af260301</sha1> |
| <cve>CVE-2016-1000027</cve> |
| </suppress> |
| <suppress> |
| <notes><![CDATA[ file name: spring-context-5.3.20.jar ]]></notes> |
| <sha1>517a42165221ea944c8b794154c10b69c0128281</sha1> |
| <cve>CVE-2016-1000027</cve> |
| </suppress> |
| <suppress> |
| <notes><![CDATA[ file name: spring-expression-5.3.20.jar ]]></notes> |
| <sha1>20e179f0dfabf0a46428f22c2150c9c4850fd15d</sha1> |
| <cve>CVE-2016-1000027</cve> |
| </suppress> |
| <suppress> |
| <!-- CVE is for linux watchman --> |
| <notes><![CDATA[ file name: fb-watchman:2.0.1 ]]></notes> |
| <packageUrl regex="true">^pkg:npm/fb\-watchman@.*$</packageUrl> |
| <vulnerabilityName>CVE-2022-21944</vulnerabilityName> |
| </suppress> |
| <suppress> |
| <!-- CVE was solved in 2.8.9 --> |
| <notes><![CDATA[ file name: hosted-git-info:2.8.9 ]]></notes> |
| <sha1>f58142bf71363f8925fecf8e1bce7f6a4e84af35</sha1> |
| <vulnerabilityName>CVE-2021-23362</vulnerabilityName> |
| </suppress> |
| </suppressions> |