blob: b45f68dd83a14524d072c0db9d789f792f18f88f [file] [log] [blame]
<?xml version="1.0" encoding="UTF-8"?>
<suppressions xmlns="https://jeremylong.github.io/DependencyCheck/dependency-suppression.1.3.xsd"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="https://jeremylong.github.io/DependencyCheck/dependency-suppression.1.3.xsd https://jeremylong.github.io/DependencyCheck/dependency-suppression.1.3.xsd">
<suppress>
<notes><![CDATA[ file name: jdom2-2.0.6.jar ]]></notes>
<packageUrl regex="true">^pkg:maven/org\.jdom/jdom2@.*$</packageUrl>
<cve>CVE-2021-33813</cve>
</suppress>
<suppress>
<notes><![CDATA[ file name: path-parse:1.0.6 ]]></notes>
<packageUrl regex="true">^pkg:npm/path\-parse@.*$</packageUrl>
<cve>CVE-2021-23343</cve>
</suppress>
<suppress>
<notes><![CDATA[ file name: glob-parent:6.0.0 ]]></notes>
<packageUrl regex="true">^pkg:npm/glob\-parent@.*$</packageUrl>
<vulnerabilityName>1751</vulnerabilityName>
</suppress>
<suppress>
<notes><![CDATA[ file name: trim-newlines:4.0.1 ]]></notes>
<packageUrl regex="true">^pkg:npm/trim\-newlines@.*$</packageUrl>
<vulnerabilityName>1753</vulnerabilityName>
</suppress>
<suppress>
<notes><![CDATA[ file name: trim-newlines:1.0.0 ]]></notes>
<packageUrl regex="true">^pkg:npm/trim\-newlines@.*$</packageUrl>
<cpe>cpe:/a:trim-newlines_project:trim-newlines</cpe>
</suppress>
<suppress>
<notes><![CDATA[ file name: jakarta.el-api-3.0.3.jar ]]></notes>
<packageUrl regex="true">^pkg:maven/jakarta\.el/jakarta\.el-api@.*$</packageUrl>
<cve>CVE-2021-28170</cve>
</suppress>
<suppress>
<notes><![CDATA[ file name: lodash:4.17.21 ]]></notes>
<packageUrl regex="true">^pkg:npm/lodash@.*$</packageUrl>
<cpe>cpe:/a:lodash:lodash</cpe>
</suppress>
<suppress>
<notes><![CDATA[ file name: lodash:4.17.21 ]]></notes>
<packageUrl regex="true">^pkg:npm/lodash@.*$</packageUrl>
<vulnerabilityName>1002373</vulnerabilityName>
</suppress> <suppress>
<notes><![CDATA[ file name: set-value:2.0.1 ]]></notes>
<packageUrl regex="true">^pkg:npm/set\-value@.*$</packageUrl>
<cpe>cpe:/a:set-value_project:set-value</cpe>
</suppress>
<suppress>
<notes><![CDATA[ file name: set-value:3.0.2 ]]></notes>
<packageUrl regex="true">^pkg:npm/set\-value@.*$</packageUrl>
<cpe>cpe:/a:set-value_project:set-value</cpe>
</suppress>
<suppress>
<notes><![CDATA[ file name: set-value:2.0.1 ]]></notes>
<packageUrl regex="true">^pkg:npm/set\-value@.*$</packageUrl>
<vulnerabilityName>1002475</vulnerabilityName>
</suppress>
<suppress>
<notes><![CDATA[ file name: spring-aop-5.3.20.jar ]]></notes>
<sha1>c82f17997ab18ecafa8d08ce34a7c7aa4a04ef9e</sha1>
<cve>CVE-2016-1000027</cve>
</suppress>
<suppress>
<notes><![CDATA[ file name: spring-core-5.3.20.jar ]]></notes>
<sha1>4b88aa3c401ede3d6c8ac78ea0c646cf326ec24b</sha1>
<cve>CVE-2016-1000027</cve>
</suppress>
<suppress>
<notes><![CDATA[ file name: spring-jcl-5.3.20.jar ]]></notes>
<sha1>35119231d09863699567ce579c21512ddcbc5407</sha1>
<cve>CVE-2016-1000027</cve>
</suppress>
<suppress>
<notes><![CDATA[ file name: spring-web-5.3.20.jar ]]></notes>
<sha1>3c2fe9363760d62d5b7c9f087bb4255e3377a0b2</sha1>
<cve>CVE-2016-1000027</cve>
</suppress>
<suppress>
<notes><![CDATA[ file name: spring-beans-5.3.20.jar ]]></notes>
<sha1>0ab88bd9e3a8307f5c0516c15d295c88ec318659</sha1>
<cve>CVE-2016-1000027</cve>
</suppress>
<suppress>
<notes><![CDATA[ file name: spring-webmvc-5.3.20.jar ]]></notes>
<sha1>8ac1b72a1f5c41fdc2cb3340cd94f795af260301</sha1>
<cve>CVE-2016-1000027</cve>
</suppress>
<suppress>
<notes><![CDATA[ file name: spring-context-5.3.20.jar ]]></notes>
<sha1>517a42165221ea944c8b794154c10b69c0128281</sha1>
<cve>CVE-2016-1000027</cve>
</suppress>
<suppress>
<notes><![CDATA[ file name: spring-expression-5.3.20.jar ]]></notes>
<sha1>20e179f0dfabf0a46428f22c2150c9c4850fd15d</sha1>
<cve>CVE-2016-1000027</cve>
</suppress>
<suppress>
<!-- CVE is for linux watchman -->
<notes><![CDATA[ file name: fb-watchman:2.0.1 ]]></notes>
<packageUrl regex="true">^pkg:npm/fb\-watchman@.*$</packageUrl>
<vulnerabilityName>CVE-2022-21944</vulnerabilityName>
</suppress>
<suppress>
<!-- CVE was solved in 2.8.9 -->
<notes><![CDATA[ file name: hosted-git-info:2.8.9 ]]></notes>
<sha1>f58142bf71363f8925fecf8e1bce7f6a4e84af35</sha1>
<vulnerabilityName>CVE-2021-23362</vulnerabilityName>
</suppress>
</suppressions>