Skip to content

Commit 2ea0db2

Browse files
update allow list for cve scanning
1 parent 0daaaab commit 2ea0db2

File tree

1 file changed

+4
-111
lines changed

1 file changed

+4
-111
lines changed

allow-list.xml

Lines changed: 4 additions & 111 deletions
Original file line numberDiff line numberDiff line change
@@ -16,23 +16,11 @@
1616
-->
1717

1818
<suppressions xmlns="https://jeremylong.github.io/DependencyCheck/dependency-suppression.1.3.xsd">
19-
<suppress>
20-
<notes><![CDATA[
21-
This CVE only affects projects fetching p2 repo's over HTTP, but we use HTTPS.
22-
]]></notes>
23-
<cve>CVE-2021-41033</cve>
24-
</suppress>
25-
<suppress>
26-
<notes><![CDATA[
27-
We are using Reload4j, which is a secure drop-in replacement for log4j.
28-
]]></notes>
29-
<cve>CVE-2020-9493</cve>
30-
</suppress>
3119
<suppress>
32-
<notes><![CDATA[
33-
We are using Reload4j, which is a secure drop-in replacement for log4j.
34-
]]></notes>
35-
<cve>CVE-2022-23307</cve>
20+
<notes><![CDATA[
21+
This CVE only affects projects fetching p2 repo's over HTTP, but we use HTTPS.
22+
]]></notes>
23+
<cve>CVE-2021-41033</cve>
3624
</suppress>
3725
<suppress>
3826
<notes><![CDATA[
@@ -47,99 +35,4 @@
4735
]]></notes>
4836
<cve>CVE-2019-10249</cve>
4937
</suppress>
50-
<suppress>
51-
<notes><![CDATA[
52-
Calling the method `com.google.common.io.Files.createTempDir` is a vulnerability,
53-
but we do not call it.
54-
]]></notes>
55-
<cve>CVE-2020-8908</cve>
56-
</suppress>
57-
<suppress>
58-
<notes><![CDATA[
59-
We are not creating SVG's with Batik of Apache XML Graphics.
60-
]]></notes>
61-
<cve>CVE-2022-41704</cve>
62-
</suppress>
63-
<suppress>
64-
<notes><![CDATA[
65-
We are not creating SVG's with Batik of Apache XML Graphics.
66-
]]></notes>
67-
<cve>CVE-2022-42890</cve>
68-
</suppress>
69-
<suppress>
70-
<notes><![CDATA[
71-
This CVE is not about org.eclipse.e4.emf.xpath. It seems the check is
72-
too loose.
73-
]]></notes>
74-
<cve>CVE-2022-41852</cve>
75-
</suppress>
76-
<suppress>
77-
<notes><![CDATA[
78-
This only affects milestone and RC versions, but we use a stable release.
79-
]]></notes>
80-
<cve>CVE-2020-15824</cve>
81-
</suppress>
82-
<suppress>
83-
<notes><![CDATA[
84-
This CVE only affects projects fetching p2 repo's over HTTP, but we use HTTPS.
85-
]]></notes>
86-
<cve>CVE-2021-41033</cve>
87-
</suppress>
88-
<suppress>
89-
<notes><![CDATA[
90-
We are using Reload4j, which is a secure drop-in replacement for log4j.
91-
]]></notes>
92-
<cve>CVE-2020-9493</cve>
93-
</suppress>
94-
<suppress>
95-
<notes><![CDATA[
96-
We are using Reload4j, which is a secure drop-in replacement for log4j.
97-
]]></notes>
98-
<cve>CVE-2022-23307</cve>
99-
</suppress>
100-
<suppress>
101-
<notes><![CDATA[
102-
This CVE is not about org.junit.platform.commons. It seems the check is
103-
too loose.
104-
]]></notes>
105-
<cve>CVE-2020-27225</cve>
106-
</suppress>
107-
<suppress>
108-
<notes><![CDATA[
109-
This CVE only affects projects using Xtext prior to 2.18.0.
110-
]]></notes>
111-
<cve>CVE-2019-10249</cve>
112-
</suppress>
113-
<suppress>
114-
<notes><![CDATA[
115-
Calling the method `com.google.common.io.Files.createTempDir` is a vulnerability,
116-
but we do not call it.
117-
]]></notes>
118-
<cve>CVE-2020-8908</cve>
119-
</suppress>
120-
<suppress>
121-
<notes><![CDATA[
122-
We are not creating SVG's with Batik of Apache XML Graphics.
123-
]]></notes>
124-
<cve>CVE-2022-41704</cve>
125-
</suppress>
126-
<suppress>
127-
<notes><![CDATA[
128-
We are not creating SVG's with Batik of Apache XML Graphics.
129-
]]></notes>
130-
<cve>CVE-2022-42890</cve>
131-
</suppress>
132-
<suppress>
133-
<notes><![CDATA[
134-
This CVE is not about org.eclipse.e4.emf.xpath. It seems the check is
135-
too loose.
136-
]]></notes>
137-
<cve>CVE-2022-41852</cve>
138-
</suppress>
139-
<suppress>
140-
<notes><![CDATA[
141-
This only affects milestone and RC versions, but we use a stable release.
142-
]]></notes>
143-
<cve>CVE-2020-15824</cve>
144-
</suppress>
14538
</suppressions>

0 commit comments

Comments
 (0)