1+ <?xml version =" 1.0" encoding =" UTF-8" ?>
2+ <suppressions xmlns =" https://jeremylong.github.io/DependencyCheck/dependency-suppression.1.3.xsd" >
3+ <suppress >
4+ <notes ><![CDATA[
5+ file name: xwork-2.0.4.jar
6+ This is only used for API interfaces to provide com.microsoft.applicationinsights.web.struts.RequestNameInterceptor.
7+ No OGNL parsing; independent of XSS vector.
8+ ]]> </notes >
9+ <packageUrl regex =" true" >^pkg:maven/com\.opensymphony/xwork@.*$</packageUrl >
10+ <cve >CVE-2007-4556</cve >
11+ <cve >CVE-2008-6504</cve >
12+ <cve >CVE-2011-1772</cve >
13+ </suppress >
14+ <suppress >
15+ <notes ><![CDATA[
16+ file name: ognl-2.6.11.jar
17+ This is only included because it's a dependency of xwork-*.jar.
18+ No OGNL parsing used.
19+ ]]> </notes >
20+ <packageUrl regex =" true" >^pkg:maven/opensymphony/ognl@.*$</packageUrl >
21+ <cve >CVE-2016-3093</cve >
22+ </suppress >
23+ <suppress >
24+ <notes ><![CDATA[
25+ file name: spring-webmvc-3.1.0.RELEASE.jar
26+ Required for interfaces to implement com.microsoft.applicationinsights.web.spring.RequestNameHandlerInterceptorAdapter.
27+ XSS does not apply. Not related to directory traversal.
28+ ]]> </notes >
29+ <packageUrl regex =" true" >^pkg:maven/org\.springframework/spring\-webmvc@.*$</packageUrl >
30+ <vulnerabilityName >CVE-2014-1904</vulnerabilityName >
31+ <vulnerabilityName >CVE-2016-9878</vulnerabilityName >
32+ </suppress >
33+ <suppress >
34+ <notes ><![CDATA[
35+ file name: spring-web-3.1.0.RELEASE.jar
36+ Dependency of spring-webmvc
37+ Usage is independent of springs XML parsing.
38+ ]]> </notes >
39+ <packageUrl regex =" true" >^pkg:maven/org\.springframework/spring\-web@.*$</packageUrl >
40+ <vulnerabilityName >CVE-2013-4152</vulnerabilityName >
41+ <vulnerabilityName >CVE-2014-0054</vulnerabilityName >
42+ <vulnerabilityName >CVE-2014-0225</vulnerabilityName >
43+ </suppress >
44+ <suppress >
45+ <notes ><![CDATA[
46+ file name: spring-core-3.1.0.RELEASE.jar
47+ Dependency of spring-webmvc.
48+ Classes from this jar are not used.
49+ ]]> </notes >
50+ <packageUrl regex =" true" >^pkg:maven/org\.springframework/spring\-core@.*$</packageUrl >
51+ <cve >CVE-2013-4152</cve >
52+ <cve >CVE-2013-6429</cve >
53+ <cve >CVE-2013-7315</cve >
54+ <cve >CVE-2014-0054</cve >
55+ <cve >CVE-2014-0225</cve >
56+ <cve >CVE-2014-1904</cve >
57+ <vulnerabilityName >CVE-2014-3578</vulnerabilityName >
58+ <cve >CVE-2014-3625</cve >
59+ <cve >CVE-2016-9878</cve >
60+ <cve >CVE-2018-1270</cve >
61+ <cve >CVE-2018-1271</cve >
62+ <cve >CVE-2018-1272</cve >
63+ </suppress >
64+ <suppress >
65+ <notes ><![CDATA[
66+ file name: cdi-api-1.1.jar
67+ This CVE is JBoss specific. Not explicitly used by our code.
68+ ]]> </notes >
69+ <packageUrl regex =" true" >^pkg:maven/javax\.enterprise/cdi\-api@.*$</packageUrl >
70+ <cve >CVE-2014-8122</cve >
71+ </suppress >
72+ </suppressions >
0 commit comments