Skip to content

Commit 356e8f3

Browse files
update allow-list.xml
1 parent dadcfaa commit 356e8f3

File tree

1 file changed

+79
-109
lines changed

1 file changed

+79
-109
lines changed

allow-list.xml

Lines changed: 79 additions & 109 deletions
Original file line numberDiff line numberDiff line change
@@ -1,112 +1,82 @@
11
<?xml version="1.0" encoding="UTF-8"?>
2-
<suppressions xmlns="https://jeremylong.github.io/DependencyCheck/dependency-suppression.1.3.xsd">
3-
<suppress>
4-
<notes><![CDATA[
5-
Testing false positives by suppressing a CVE
6-
]]></notes>
7-
<filePath regex="true">.*\bsample-project-0\.0\.1\.jar/META-INF/maven/commons-fileupload/commons-fileupload/pom\.xml</filePath>
8-
<cve>CVE-2023-24998</cve>
9-
<cve>CVE-2016-3092</cve>
10-
<cve>CVE-2016-1000031</cve>
11-
<cve>CVE-2014-0050</cve>
12-
<cve>CVE-2013-2186</cve>
13-
</suppress>
14-
15-
<suppress>
16-
<notes><![CDATA[
17-
Testing false positives by suppressing a CVE
18-
]]></notes>
19-
<filePath regex="true">.*\bsample-project-0\.0\.1\.jar/META-INF/maven/commons-io/commons-io/pom\.xml</filePath>
20-
<cve>CVE-2021-29425</cve>
21-
</suppress>
22-
23-
<suppress>
24-
<notes><![CDATA[
25-
Testing false positives by suppressing a CVE
26-
]]></notes>
27-
<filePath regex="true">.*\bsample-project-0\.0\.1\.jar/META-INF/maven/org\.apache\.struts\.xwork/xwork-core/pom\.xml</filePath>
28-
<cve>CVE-2013-1966</cve>
29-
<cve>CVE-2016-4461</cve>
30-
<cve>CVE-2013-1965</cve>
31-
<cve>CVE-2016-2162</cve>
32-
<cve>CVE-2013-2115</cve>
33-
<cve>CVE-2014-0112</cve>
34-
<cve>CVE-2019-0233</cve>
35-
<cve>CVE-2017-9787</cve>
36-
</suppress>
37-
38-
<suppress>
39-
<notes><![CDATA[
40-
Testing false positives by suppressing a CVE
41-
]]></notes>
42-
<filePath regex="true">.*\bsample-project-0\.0\.1\.jar/META-INF/maven/ognl/ognl/pom\.xml</filePath>
43-
<cve>CVE-2016-3093</cve>
44-
</suppress>
2+
<!--
3+
~ Copyright 2024 REGnosys
4+
~
5+
~ Licensed under the Apache License, Version 2.0 (the "License");
6+
~ you may not use this file except in compliance with the License.
7+
~ You may obtain a copy of the License at
8+
~
9+
~ http://www.apache.org/licenses/LICENSE-2.0
10+
~
11+
~ Unless required by applicable law or agreed to in writing, software
12+
~ distributed under the License is distributed on an "AS IS" BASIS,
13+
~ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14+
~ See the License for the specific language governing permissions and
15+
~ limitations under the License.
16+
-->
4517

46-
<suppress>
47-
<notes><![CDATA[
48-
Testing false positives by suppressing a CVE
49-
]]></notes>
50-
<filePath regex="true">.*\bsample-project-0.0.1.jar/META-INF/maven/org.apache.struts/struts2-core/pom.xml</filePath>
51-
<cve>CVE-2016-4461</cve>
52-
<cve>CVE-2015-5209</cve>
53-
<cve>CVE-2016-2162</cve>
54-
<cve>CVE-2018-1327</cve>
55-
<cve>CVE-2012-0394</cve>
56-
<cve>CVE-2015-2992</cve>
57-
<cve>CVE-2016-3093</cve>
58-
<cve>CVE-2023-34396</cve>
59-
<cve>CVE-2016-0785</cve>
60-
<cve>CVE-2016-4003</cve>
61-
<cve>CVE-2013-2248</cve>
62-
<cve>CVE-2017-5638</cve>
63-
<cve>CVE-2015-5169</cve>
64-
<cve>CVE-2017-9793</cve>
65-
<cve>CVE-2016-4430</cve>
66-
<cve>CVE-2017-9791</cve>
67-
<cve>CVE-2016-3081</cve>
68-
<cve>CVE-2016-3082</cve>
69-
<cve>CVE-2023-34149</cve>
70-
<cve>CVE-2019-0230</cve>
71-
<cve>CVE-2013-2134</cve>
72-
<cve>CVE-2016-4436</cve>
73-
<cve>CVE-2019-0233</cve>
74-
<cve>CVE-2021-31805</cve>
75-
<cve>CVE-2014-7809</cve>
76-
<cve>CVE-2013-2135</cve>
77-
<cve>CVE-2014-0116</cve>
78-
<cve>CVE-2013-2251</cve>
79-
<cve>CVE-2013-4310</cve>
80-
<cve>CVE-2013-1966</cve>
81-
<cve>CVE-2017-9804</cve>
82-
<cve>CVE-2013-1965</cve>
83-
<cve>CVE-2017-9805</cve>
84-
<cve>CVE-2017-12611</cve>
85-
<cve>CVE-2013-2115</cve>
86-
<cve>CVE-2014-0113</cve>
87-
<cve>CVE-2013-4316</cve>
88-
<cve>CVE-2014-0112</cve>
89-
<cve>CVE-2018-11776</cve>
90-
<cve>CVE-2016-3090</cve>
91-
<cve>CVE-2017-9787</cve>
92-
<cve>CVE-2014-0094</cve>
93-
<cve>CVE-2020-17530</cve>
94-
</suppress>
95-
96-
<suppress>
97-
<notes><![CDATA[
98-
file name: sample-project-0.0.1.jar (shaded: commons-fileupload:commons-fileupload:1.2.2)
99-
]]></notes>
100-
<packageUrl regex="true">^pkg:maven/commons\-fileupload/commons\-fileupload@.*$</packageUrl>
101-
<cve>CVE-2013-0248</cve>
102-
</suppress>
103-
104-
<suppress>
105-
<notes><![CDATA[
106-
file name: sample-project-0.0.1.jar (shaded: org.apache.struts:struts2-core:2.3.8)
107-
]]></notes>
108-
<packageUrl regex="true">^pkg:maven/org\.apache\.struts/struts2\-core@.*$</packageUrl>
109-
<cve>CVE-2023-50164</cve>
110-
<cve>CVE-2023-41835</cve>
111-
</suppress>
18+
<suppressions xmlns="https://jeremylong.github.io/DependencyCheck/dependency-suppression.1.3.xsd">
19+
<suppress>
20+
<notes><![CDATA[
21+
This CVE only affects projects fetching p2 repo's over HTTP, but we use HTTPS.
22+
]]></notes>
23+
<cve>CVE-2021-41033</cve>
24+
</suppress>
25+
<suppress>
26+
<notes><![CDATA[
27+
We are using Reload4j, which is a secure drop-in replacement for log4j.
28+
]]></notes>
29+
<cve>CVE-2020-9493</cve>
30+
</suppress>
31+
<suppress>
32+
<notes><![CDATA[
33+
We are using Reload4j, which is a secure drop-in replacement for log4j.
34+
]]></notes>
35+
<cve>CVE-2022-23307</cve>
36+
</suppress>
37+
<suppress>
38+
<notes><![CDATA[
39+
This CVE is not about org.junit.platform.commons. It seems the check is
40+
too loose.
41+
]]></notes>
42+
<cve>CVE-2020-27225</cve>
43+
</suppress>
44+
<suppress>
45+
<notes><![CDATA[
46+
This CVE only affects projects using Xtext prior to 2.18.0.
47+
]]></notes>
48+
<cve>CVE-2019-10249</cve>
49+
</suppress>
50+
<suppress>
51+
<notes><![CDATA[
52+
Calling the method `com.google.common.io.Files.createTempDir` is a vulnerability,
53+
but we do not call it.
54+
]]></notes>
55+
<cve>CVE-2020-8908</cve>
56+
</suppress>
57+
<suppress>
58+
<notes><![CDATA[
59+
We are not creating SVG's with Batik of Apache XML Graphics.
60+
]]></notes>
61+
<cve>CVE-2022-41704</cve>
62+
</suppress>
63+
<suppress>
64+
<notes><![CDATA[
65+
We are not creating SVG's with Batik of Apache XML Graphics.
66+
]]></notes>
67+
<cve>CVE-2022-42890</cve>
68+
</suppress>
69+
<suppress>
70+
<notes><![CDATA[
71+
This CVE is not about org.eclipse.e4.emf.xpath. It seems the check is
72+
too loose.
73+
]]></notes>
74+
<cve>CVE-2022-41852</cve>
75+
</suppress>
76+
<suppress>
77+
<notes><![CDATA[
78+
This only affects milestone and RC versions, but we use a stable release.
79+
]]></notes>
80+
<cve>CVE-2020-15824</cve>
81+
</suppress>
11282
</suppressions>

0 commit comments

Comments
 (0)