dependency-check-suppression.xml 1.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445
  1. <?xml version="1.0" encoding="UTF-8"?>
  2. <suppressions xmlns="https://jeremylong.github.io/DependencyCheck/dependency-suppression.1.3.xsd">
  3. <suppress>
  4. <notes><![CDATA[
  5. file name: index.js
  6. ]]></notes>
  7. <packageUrl regex="true">^pkg:javascript/vue@.*$</packageUrl>
  8. <vulnerabilityName>Bump vue-server-renderer's dependency of serialize-javascript to 2.1.2</vulnerabilityName>
  9. </suppress>
  10. <suppress>
  11. <notes><![CDATA[
  12. file name: index.js
  13. ]]></notes>
  14. <packageUrl regex="true">^pkg:javascript/vue@.*$</packageUrl>
  15. <vulnerabilityName>possible xss vector</vulnerabilityName>
  16. </suppress>
  17. <suppress>
  18. <notes><![CDATA[
  19. file name: index.js
  20. ]]></notes>
  21. <packageUrl regex="true">^pkg:javascript/vue@.*$</packageUrl>
  22. <vulnerabilityName>potential xss in ssr when using v-bind</vulnerabilityName>
  23. </suppress>
  24. <suppress>
  25. <notes><![CDATA[
  26. file name: index.umd.js
  27. ]]></notes>
  28. <packageUrl regex="true">^pkg:javascript/vue@.*$</packageUrl>
  29. <vulnerabilityName>Bump vue-server-renderer's dependency of serialize-javascript to 2.1.2</vulnerabilityName>
  30. </suppress>
  31. <suppress>
  32. <notes><![CDATA[
  33. file name: index.umd.js
  34. ]]></notes>
  35. <packageUrl regex="true">^pkg:javascript/vue@.*$</packageUrl>
  36. <vulnerabilityName>possible xss vector</vulnerabilityName>
  37. </suppress>
  38. <suppress>
  39. <notes><![CDATA[
  40. file name: index.umd.js
  41. ]]></notes>
  42. <packageUrl regex="true">^pkg:javascript/vue@.*$</packageUrl>
  43. <vulnerabilityName>potential xss in ssr when using v-bind</vulnerabilityName>
  44. </suppress>
  45. </suppressions>