|
19 | 19 | <cve>CVE-2021-39491</cve> |
20 | 20 | </suppress> |
21 | 21 |
|
22 | | - <!-- |
23 | | - GWT uses Protobuf internally but doesn't expose it, meaning the handful of CVEs in 2.5.0 are not a concern. |
24 | | - https://github.com/gwtproject/gwt/issues/9778 |
25 | | - --> |
26 | | - <suppress> |
27 | | - <notes><![CDATA[ |
28 | | - file name: gwt-servlet-2.11.0.jar (shaded: com.google.protobuf:protobuf-java:2.5.0) |
29 | | - ]]></notes> |
30 | | - <packageUrl regex="true">^pkg:maven/com\.google\.protobuf/protobuf\-java@.*$</packageUrl> |
31 | | - <cpe>cpe:/a:google:protobuf-java</cpe> |
32 | | - <vulnerabilityName>CVE-2022-3509</vulnerabilityName> |
33 | | - <vulnerabilityName>CVE-2021-22569</vulnerabilityName> |
34 | | - </suppress> |
35 | | - |
36 | | - <suppress> |
37 | | - <notes><![CDATA[ |
38 | | - file name: gwt-servlet-jakarta-2.11.0.jar (shaded: com.google.protobuf:protobuf-java:2.5.0) |
39 | | - ]]></notes> |
40 | | - <packageUrl regex="true">^pkg:maven/com\.google\.protobuf/protobuf\-java@.*$</packageUrl> |
41 | | - <cpe>cpe:/a:google:protobuf-java</cpe> |
42 | | - <vulnerabilityName>CVE-2024-7254</vulnerabilityName> |
43 | | - </suppress> |
44 | | - |
45 | 22 | <!-- Tangled CVEs. See https://github.com/jeremylong/DependencyCheck/issues/4614 and https://github.com/OSSIndex/vulns/issues/316 --> |
46 | 23 | <suppress> |
47 | 24 | <notes><![CDATA[ |
|
111 | 88 | <!-- |
112 | 89 | This is a dependency of Java-FPDF, used by the WNPRC billing module for PDF generation, which hasn't been updated |
113 | 90 | to reference the now-renamed Commons Imaging library instead of the old Sanselan incubator. The CVE is related |
114 | | - to file parsing, not generation so we're not vulnerable |
| 91 | + to file parsing, not generation, so we're not vulnerable |
115 | 92 | --> |
116 | 93 | <suppress> |
117 | 94 | <notes><![CDATA[ |
|
121 | 98 | <vulnerabilityName>CVE-2018-17201</vulnerabilityName> |
122 | 99 | </suppress> |
123 | 100 |
|
124 | | - <!-- |
125 | | - The Tomcat jaspic-api and jsp-api jars are false positives, for some reason matching against Tomcat 3.0. See |
126 | | - https://github.com/jeremylong/DependencyCheck/issues/5659, which has been raised, but no response. |
127 | | - --> |
128 | | - <suppress> |
129 | | - <notes><![CDATA[ |
130 | | - file name: tomcat-jaspic-api-10.1.34.jar |
131 | | - ]]></notes> |
132 | | - <packageUrl regex="true">^pkg:maven/org\.apache\.tomcat/tomcat\-jaspic\-api@.*$</packageUrl> |
133 | | - <cpe>cpe:/a:apache:tomcat</cpe> |
134 | | - </suppress> |
135 | | - |
136 | | - <suppress> |
137 | | - <notes><![CDATA[ |
138 | | - file name: tomcat-jsp-api-10.1.34.jar |
139 | | - ]]></notes> |
140 | | - <packageUrl regex="true">^pkg:maven/org\.apache\.tomcat/tomcat\-jsp\-api@.*$</packageUrl> |
141 | | - <cpe>cpe:/a:apache:tomcat</cpe> |
142 | | - </suppress> |
143 | | - |
144 | 101 | <!-- |
145 | 102 | suppress CVE-2023-52070 for jfreechart, may become moot after subsequent upgrades |
146 | 103 | --> |
|
152 | 109 | <vulnerabilityName>CVE-2023-52070</vulnerabilityName> |
153 | 110 | </suppress> |
154 | 111 |
|
155 | | - <!-- We don't use the sun.io.useCanonCaches setting referenced by this CVE. --> |
156 | | - <suppress> |
157 | | - <notes><![CDATA[ |
158 | | - file name: tomcat-catalina-10.1.34.jar |
159 | | - ]]></notes> |
160 | | - <packageUrl regex="true">^pkg:maven/org\.apache\.tomcat/tomcat-catalina@.*$</packageUrl> |
161 | | - <vulnerabilityName>CVE-2024-56337</vulnerabilityName> |
162 | | - </suppress> |
163 | | - |
164 | | - <!-- |
165 | | - False positives: labkey-api-client.jar is getting tagged as an old version of LabKey Server |
166 | | - --> |
167 | | - <suppress> |
168 | | - <notes><![CDATA[ |
169 | | - file name: labkey-client-api-6.2.0.jar |
170 | | - ]]></notes> |
171 | | - <packageUrl regex="true">^pkg:maven/org\.labkey\.api/labkey-client-api@.*$</packageUrl> |
172 | | - <cve>CVE-2019-3911</cve> |
173 | | - </suppress> |
174 | | - <suppress> |
175 | | - <notes><![CDATA[ |
176 | | - file name: labkey-client-api-6.2.0.jar |
177 | | - ]]></notes> |
178 | | - <packageUrl regex="true">^pkg:maven/org\.labkey\.api/labkey-client-api@.*$</packageUrl> |
179 | | - <cve>CVE-2019-3912</cve> |
180 | | - </suppress> |
181 | | - <suppress> |
182 | | - <notes><![CDATA[ |
183 | | - file name: labkey-client-api-6.2.0.jar |
184 | | - ]]></notes> |
185 | | - <packageUrl regex="true">^pkg:maven/org\.labkey\.api/labkey-client-api@.*$</packageUrl> |
186 | | - <cve>CVE-2019-3913</cve> |
187 | | - </suppress> |
188 | | - |
189 | | - <!-- False positive - mxparser is not XStream --> |
190 | | - <suppress> |
191 | | - <notes><![CDATA[ |
192 | | - file name: mxparser-1.2.2.jar |
193 | | - ]]></notes> |
194 | | - <packageUrl regex="true">^pkg:maven/io\.github\.x-stream/mxparser@.*$</packageUrl> |
195 | | - <cpe>cpe:/a:xstream:xstream</cpe> |
196 | | - </suppress> |
197 | | - |
198 | | - <!-- False positives - bzip2 from a different source --> |
199 | | - <suppress> |
200 | | - <notes><![CDATA[ |
201 | | - file name: bzip2-0.9.1.jar |
202 | | - ]]></notes> |
203 | | - <packageUrl regex="true">^pkg:maven/org\.itadaki/bzip2@.*$</packageUrl> |
204 | | - <cve>CVE-2019-12900</cve> |
205 | | - </suppress> |
206 | | - <suppress> |
207 | | - <notes><![CDATA[ |
208 | | - file name: bzip2-0.9.1.jar |
209 | | - ]]></notes> |
210 | | - <packageUrl regex="true">^pkg:maven/org\.itadaki/bzip2@.*$</packageUrl> |
211 | | - <cve>CVE-2010-0405</cve> |
212 | | - </suppress> |
213 | | - <suppress> |
214 | | - <notes><![CDATA[ |
215 | | - file name: bzip2-0.9.1.jar |
216 | | - ]]></notes> |
217 | | - <packageUrl regex="true">^pkg:maven/org\.itadaki/bzip2@.*$</packageUrl> |
218 | | - <cve>CVE-2005-1260</cve> |
219 | | - </suppress> |
220 | | - |
221 | 112 | <!-- Related to the setting of channel binding as required, which is not relevant to us. --> |
222 | 113 | <suppress> |
223 | 114 | <notes><![CDATA[ |
|
235 | 126 | <packageUrl regex="true">^pkg:maven/commons-lang/commons-lang@.*$</packageUrl> |
236 | 127 | <vulnerabilityName>CVE-2025-48924</vulnerabilityName> |
237 | 128 | </suppress> |
238 | | - |
| 129 | + |
239 | 130 | <!-- |
240 | | - GSON is getting flagged for "Connect2id Nimbus JOSE + JWT before 10.0.2 allows a remote attacker |
| 131 | + GSON is getting flagged for "Connect2id Nimbus JOSE + JWT before 10.0.2 allows a remote attacker |
241 | 132 | to cause a denial of service via a deeply nested JSON object supplied in a JWT claim set, because of |
242 | 133 | uncontrolled recursion." Seems like a case of mistaken identity, so suppress it. |
243 | 134 | --> |
|
0 commit comments