| 123456789101112131415161718192021222324252627282930313233343536373839404142434445 |
- <?xml version="1.0" encoding="UTF-8"?>
- <suppressions xmlns="https://jeremylong.github.io/DependencyCheck/dependency-suppression.1.3.xsd">
- <suppress>
- <notes><![CDATA[
- file name: index.js
- ]]></notes>
- <packageUrl regex="true">^pkg:javascript/vue@.*$</packageUrl>
- <vulnerabilityName>Bump vue-server-renderer's dependency of serialize-javascript to 2.1.2</vulnerabilityName>
- </suppress>
- <suppress>
- <notes><![CDATA[
- file name: index.js
- ]]></notes>
- <packageUrl regex="true">^pkg:javascript/vue@.*$</packageUrl>
- <vulnerabilityName>possible xss vector</vulnerabilityName>
- </suppress>
- <suppress>
- <notes><![CDATA[
- file name: index.js
- ]]></notes>
- <packageUrl regex="true">^pkg:javascript/vue@.*$</packageUrl>
- <vulnerabilityName>potential xss in ssr when using v-bind</vulnerabilityName>
- </suppress>
- <suppress>
- <notes><![CDATA[
- file name: index.umd.js
- ]]></notes>
- <packageUrl regex="true">^pkg:javascript/vue@.*$</packageUrl>
- <vulnerabilityName>Bump vue-server-renderer's dependency of serialize-javascript to 2.1.2</vulnerabilityName>
- </suppress>
- <suppress>
- <notes><![CDATA[
- file name: index.umd.js
- ]]></notes>
- <packageUrl regex="true">^pkg:javascript/vue@.*$</packageUrl>
- <vulnerabilityName>possible xss vector</vulnerabilityName>
- </suppress>
- <suppress>
- <notes><![CDATA[
- file name: index.umd.js
- ]]></notes>
- <packageUrl regex="true">^pkg:javascript/vue@.*$</packageUrl>
- <vulnerabilityName>potential xss in ssr when using v-bind</vulnerabilityName>
- </suppress>
- </suppressions>
|