-
Notifications
You must be signed in to change notification settings - Fork 1
/
Copy path.trivyignore
44 lines (35 loc) · 1.98 KB
/
.trivyignore
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
# Suppression for
# com.fasterxml.jackson.core:jackson-databind | CVE-2020-36518 | HIGH | 2.11.1 | 2.12.6.1, 2.13.2.1 | jackson-databind: denial of service |
# doesn't appear in the jar file, but re-bundled instead in eh-cache so not a denial of service vulnerability for us
CVE-2020-36518
CVE-2021-46877
# Suppression for
# org.eclipse.jetty:jetty-server (app.jar) │ CVE-2022-2191 │ HIGH │ 9.4.39.v20210325 │ 11.0.10, 10.0.10 │ SslConnection does not release pooled ByteBuffers in case of │
# doesn't appear in the jar file, but re-bundled instead in eh-cache so not a denial of service vulnerability for us
CVE-2022-2191
# Suppression for snakeyaml 1.30 vulnerability as bundled with application insights so can't be upgraded easily
# Can be suppressed as we we don't parse untrusted yaml
CVE-2022-25857
CVE-2022-38751
# Suppression for snakeyaml 1.31 vulnerability as not fixed yet
# Can be suppressed as we we don't parse untrusted yaml
CVE-2022-38752
# Suppression for snakeyaml 1.33 vulnerability as not fixed yet
# Can be suppressed as we we don't parse untrusted yaml
CVE-2022-41854
CVE-2022-1471
# Suppression for jackson databind 2.13.4 as no release for it yet
# Can be suppressed as UNWRAP_SINGLE_VALUE_ARRAYS is not enabled
CVE-2022-42003
# Suppression for jackson databind 2.13.3 as bundled with application insights
# Can be suppressed as don't parse untrusted json in application insights
CVE-2022-42004
# Suppression for apache common-text 1.9 as bundled with application insights
# can be suppressed for the time being as it will be fixed in next version of application insights
CVE-2022-42889
# Suppression for spring-web 5.3.24 as bundled with spring boot
# can be suppressed as we are not using java serialization and deserialization explicitly
CVE-2016-1000027
# Suppression for logback-classic and logback-core as we don't let third parties control our appenders.
# See https://logback.qos.ch/news.html#1.3.12 for further information.
CVE-2023-6378