forked from mokdaddy/threat-dragon
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy path.trivyignore
25 lines (21 loc) · 865 Bytes
/
.trivyignore
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
# ignoring these vulnerabilities in zlib,
# there are no updates to zlib and so these are unlikely to be fixed
CVE-2018-25032
CVE-2022-37434
# https://avd.aquasec.com/nvd/cve-2022-25881
# http-cache-semantics prior to 4.1.1
# vulnerable to Regular Expression Denial of Service
# by inspection, this vunerability is not exploitable here
CVE-2022-25881
# https://avd.aquasec.com/nvd/cve-2022-25883
# semver prior to version 7.5.2 vulnerable to Regular Expression DoS
# not applicable to Threat Dragon
CVE-2022-25883
# https://avd.aquasec.com/nvd/cve-2023-28155
# request version prior to 2.88.2
# this vulnerability is for the build system, not run time, so ignore
CVE-2023-28155
# https://avd.aquasec.com/nvd/2023/cve-2023-42282
# NPM IP Package v2.0.0 and <= v.1.1.8 allows execute arbitrary code via isPublic
# not in td.vue or td.server
CVE-2023-42282