-
-
Notifications
You must be signed in to change notification settings - Fork 7
/
Copy pathowasp-suppression.xml
34 lines (34 loc) · 1.16 KB
/
owasp-suppression.xml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
<?xml version="1.0" encoding="UTF-8"?>
<suppressions xmlns="https://jeremylong.github.io/DependencyCheck/dependency-suppression.1.3.xsd">
<suppress>
<cve>CVE-2019-9658</cve>
<cve>CVE-2019-10782</cve>
<cpe>cpe:2.3:a:checkstyle:checkstyle:6.19</cpe>
</suppress>
<suppress>
<cve>CVE-2019-10086</cve>
<cpe>cpe:2.3:a:apache:commons_beanutils:1.9.2</cpe>
</suppress>
<suppress>
<cve>CVE-2018-10237</cve>
<cve>CVE-2020-8908</cve>
<cpe>cpe:2.3:a:google:guava:19.0</cpe>
</suppress>
<suppress>
<vulnerabilityName>Directory traversal in org.codehaus.plexus.util.Expand</vulnerabilityName>
<vulnerabilityName>Possible XML Injection</vulnerabilityName>
<cpe>cpe:2.3:a:plexus-utils_project:plexus-utils:3.0.20</cpe>
</suppress>
<suppress>
<cve>CVE-2019-7722</cve>
<cpe>cpe:2.3:a:pmd_project:pmd:5.8.1</cpe>
</suppress>
<suppress>
<cve>CVE-2020-10683</cve>
<cpe>cpe:/a:dom4j_project:dom4j</cpe>
</suppress>
<suppress>
<cve>CVE-2020-15250</cve>
<cpe>cpe:2.3:a:junit:junit:4.13.1</cpe>
</suppress>
</suppressions>