|
10 | 10 | </suppress> |
11 | 11 |
|
12 | 12 | <!-- Suppressed vulnerabilities. These need monthly review. --> |
13 | | - <suppress until="2024-03-01Z"> |
14 | | - <notes><![CDATA[ |
15 | | - This vulnerability appears when both Spring MVC AND Spring Security 6.2.1+ appear on the classpath. The JCL only uses Spring Security. |
16 | | - ]]></notes> |
17 | | - <packageUrl regex="true">^pkg:maven/org\.springframework/spring-.*@.*$</packageUrl> |
18 | | - <vulnerabilityName>CVE-2024-22233</vulnerabilityName> |
19 | | - </suppress> |
20 | | - <suppress until="2024-02-01Z"> |
21 | | - <notes><![CDATA[ |
22 | | - This vulnerability appears via wiremock and is used only during test execution. As such, the |
23 | | - parse vulnerability is not relevant. |
24 | | - ]]></notes> |
25 | | - <packageUrl regex="true">^pkg:maven/com\.jayway\.jsonpath/json\-path@.*$</packageUrl> |
26 | | - <vulnerabilityName>CVE-2023-51074</vulnerabilityName> |
27 | | - </suppress> |
28 | | - <suppress until="2023-12-12Z"> |
29 | | - <notes><![CDATA[ |
30 | | - This vulnerability appears via wiremock and is used only during test execution. As such, the |
31 | | - rapid reset DoS vector is not relevant. |
32 | | - ]]></notes> |
33 | | - <packageUrl regex="true">^pkg:maven/org\.eclipse\.jetty\.http2/http2\-.*@.*$</packageUrl> |
34 | | - <vulnerabilityName>CVE-2023-44487</vulnerabilityName> |
35 | | - </suppress> |
36 | | - <suppress until="2023-12-12Z"> |
37 | | - <notes><![CDATA[ |
38 | | - This vulnerability appears via wiremock and is used only during test execution. As such, the |
39 | | - rapid reset DoS vector is not relevant. |
40 | | - ]]></notes> |
41 | | - <packageUrl regex="true">^pkg:maven/org\.eclipse\.jetty/jetty\-.*@.*$</packageUrl> |
42 | | - <vulnerabilityName>CVE-2023-44487</vulnerabilityName> |
43 | | - </suppress> |
44 | 13 | <suppress until="2024-06-12Z"> |
45 | 14 | <notes><![CDATA[ |
46 | 15 | This vulnerability impacts the `UriComponentsBuilder` class, which we are not using. |
|
0 commit comments