This is an automated email from the ASF dual-hosted git repository. lukaszlenart pushed a commit to branch master in repository https://gitbox.apache.org/repos/asf/struts-examples.git
commit 86d3d9b950f1b80b5f61d0f5917ee04f431640c9 Author: Lukasz Lenart <lukaszlen...@apache.org> AuthorDate: Mon Jun 8 08:54:26 2020 +0200 Suppresses outdated dependencies --- src/etc/project-suppression.xml | 45 +++++++++++++++++++++++++++++++++++++++++ 1 file changed, 45 insertions(+) diff --git a/src/etc/project-suppression.xml b/src/etc/project-suppression.xml index c3016de..6190d0e 100644 --- a/src/etc/project-suppression.xml +++ b/src/etc/project-suppression.xml @@ -148,4 +148,49 @@ <packageUrl regex="true">^pkg:maven/org\.codehaus\.plexus/plexus\-utils@.*$</packageUrl> <vulnerabilityName>Possible XML Injection</vulnerabilityName> </suppress> + <suppress> + <notes><![CDATA[file name: dwr-1.1.1.jar]]></notes> + <packageUrl regex="true">^pkg:maven/uk\.ltd\.getahead/dwr@.*$</packageUrl> + <cpe>cpe:/a:getahead:direct_web_remoting</cpe> + </suppress> + <suppress> + <notes><![CDATA[file name: commons-collections-3.2.1.jar]]></notes> + <packageUrl regex="true">^pkg:maven/commons\-collections/commons\-collections@.*$</packageUrl> + <cpe>cpe:/a:apache:commons_collections</cpe> + </suppress> + <suppress> + <notes><![CDATA[file name: commons-collections-3.2.1.jar]]></notes> + <packageUrl regex="true">^pkg:maven/commons\-collections/commons\-collections@.*$</packageUrl> + <vulnerabilityName>CVE-2015-6420</vulnerabilityName> + </suppress> + <suppress> + <notes><![CDATA[file name: commons-collections-3.2.1.jar]]></notes> + <packageUrl regex="true">^pkg:maven/commons\-collections/commons\-collections@.*$</packageUrl> + <vulnerabilityName>CVE-2017-15708</vulnerabilityName> + </suppress> + <suppress> + <notes><![CDATA[file name: commons-collections-3.2.1.jar]]></notes> + <packageUrl regex="true">^pkg:maven/commons\-collections/commons\-collections@.*$</packageUrl> + <vulnerabilityName>Remote code execution</vulnerabilityName> + </suppress> + <suppress> + <notes><![CDATA[file name: commons-beanutils-1.7.0.jar]]></notes> + <packageUrl regex="true">^pkg:maven/commons\-beanutils/commons\-beanutils@.*$</packageUrl> + <cpe>cpe:/a:apache:commons_beanutils</cpe> + </suppress> + <suppress> + <notes><![CDATA[file name: commons-beanutils-1.7.0.jar]]></notes> + <packageUrl regex="true">^pkg:maven/commons\-beanutils/commons\-beanutils@.*$</packageUrl> + <vulnerabilityName>CVE-2014-0114</vulnerabilityName> + </suppress> + <suppress> + <notes><![CDATA[file name: commons-beanutils-1.7.0.jar]]></notes> + <packageUrl regex="true">^pkg:maven/commons\-beanutils/commons\-beanutils@.*$</packageUrl> + <vulnerabilityName>CVE-2019-10086</vulnerabilityName> + </suppress> + <suppress> + <notes><![CDATA[file name: dom4j-1.1.jar]]></notes> + <packageUrl regex="true">^pkg:maven/dom4j/dom4j@.*$</packageUrl> + <cpe>cpe:/a:dom4j_project:dom4j</cpe> + </suppress> </suppressions> \ No newline at end of file