-
Notifications
You must be signed in to change notification settings - Fork 6
/
Copy pathowasp-suppressions.xml
45 lines (43 loc) · 1.83 KB
/
owasp-suppressions.xml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
<?xml version="1.0" encoding="UTF-8"?>
<suppressions xmlns="https://jeremylong.github.io/DependencyCheck/dependency-suppression.1.3.xsd">
<suppress>
<notes><![CDATA[
file name: avro-1.9.2.jar
According to https://nvd.nist.gov/vuln/detail/cve-2021-43045 , CVE only impacts .NET SDK
]]></notes>
<packageUrl regex="true">^pkg:maven/org\.apache\.avro/avro@.*$</packageUrl>
<cve>CVE-2021-43045</cve>
</suppress>
<suppress>
<notes><![CDATA[
Any hypertrace core dep
]]></notes>
<packageUrl regex="true">^pkg:maven/org\.hypertrace\.core\..*@.*$</packageUrl>
<cpe>cpe:/a:grpc:grpc</cpe>
</suppress>
<suppress>
<notes><![CDATA[
file name: wire-runtime-jvm-4.4.3.jar
According to https://nvd.nist.gov/vuln/detail/CVE-2018-8909 , it is applicable for Wire application for Android
]]></notes>
<packageUrl regex="true">^pkg:maven/com\.squareup\.wire/wire\-runtime\-jvm@.*$</packageUrl>
<cpe>cpe:/a:wire:wire</cpe>
</suppress>
<suppress>
<notes><![CDATA[
file name: wire-schema-jvm-4.4.3.jar
According to https://nvd.nist.gov/vuln/detail/CVE-2018-8909 , it is applicable for Wire application for Android
]]></notes>
<packageUrl regex="true">^pkg:maven/com\.squareup\.wire/wire\-schema\-jvm@.*$</packageUrl>
<cpe>cpe:/a:wire:wire</cpe>
</suppress>
<suppress until="2024-03-31Z">
<notes><![CDATA[
This CVE (rapid RST) is already mitigated as our servers aren't directly exposed, but it's also
addressed in 1.59.1, which the CVE doesn't reflect (not all grpc impls versions are exactly aligned).
Ref: https://github.com/grpc/grpc-java/pull/10675
]]></notes>
<packageUrl regex="true">^pkg:maven/io\.grpc/grpc\-.*@.*$</packageUrl>
<cve>CVE-2023-44487</cve>
</suppress>
</suppressions>