<?xml version="1.0" encoding="UTF-8"?>
<suppressions xmlns="https://jeremylong.github.io/DependencyCheck/dependency-suppression.1.3.xsd">
    <suppress>
        <notes><![CDATA[
        This suppresses all CVE entries that have a score below CVSS 7.
        ]]></notes>
        <cvssBelow>7</cvssBelow>
    </suppress>
    <suppress>
        <notes><![CDATA[
        file name: spring-tx-5.3.21.jar
        ]]></notes>
        <sha1>13f4f564024d2f85502c151942307c3ca851a4f7</sha1>
        <cve>CVE-2016-1000027</cve>
     </suppress>
     <suppress>
        <notes><![CDATA[
        file name: spring-core-5.3.21.jar
        ]]></notes>
        <packageUrl regex="true">^pkg:maven/org\.springframework/spring\-core@.*$</packageUrl>
        <cve>CVE-2016-1000027</cve>
     </suppress>
     <suppress>
        <notes><![CDATA[
        file name: spring-aop-5.3.21.jar
        ]]></notes>
        <packageUrl regex="true">^pkg:maven/org\.springframework/spring\-aop@.*$</packageUrl>
        <cve>CVE-2016-1000027</cve>
     </suppress>
     <suppress>
        <notes><![CDATA[
        file name: spring-boot-starter-security-2.7.1.jar
        ]]></notes>
        <packageUrl regex="true">^pkg:maven/org\.springframework\.boot/spring\-boot\-starter\-security@.*$</packageUrl>
        <cve>CVE-2022-22978</cve>
     </suppress>
     <suppress>
        <notes><![CDATA[
        file name: jruby-stdlib-9.2.20.1.jar: jopenssl.jar (shaded: rubygems:jruby-openssl:0.11.0)
        ]]></notes>
        <packageUrl regex="true">^pkg:maven/rubygems/jruby\-openssl@.*$</packageUrl>
        <cpe>cpe:/a:jruby:jruby</cpe>
        <cpe>cpe:/a:openssl:openssl</cpe>
     </suppress>
    <suppress>
        <notes><![CDATA[
        file name: xstream-1.4.5.jar
        ]]></notes>
        <packageUrl regex="true">^pkg:maven/com\.thoughtworks\.xstream/xstream@.*$</packageUrl>
        <cpe>cpe:/a:xstream_project:xstream</cpe>
        <vulnerabilityName>CVE-2013-7285</vulnerabilityName>
        <vulnerabilityName>CVE-2016-3674</vulnerabilityName>
        <vulnerabilityName>CVE-2017-7957</vulnerabilityName>
        <vulnerabilityName>CVE-2020-26217</vulnerabilityName>
        <vulnerabilityName>CVE-2020-26258</vulnerabilityName>
        <vulnerabilityName>CVE-2020-26259</vulnerabilityName>
        <vulnerabilityName>CVE-2021-21341</vulnerabilityName>
        <vulnerabilityName>CVE-2021-21342</vulnerabilityName>
        <vulnerabilityName>CVE-2021-21343</vulnerabilityName>
        <vulnerabilityName>CVE-2021-21344</vulnerabilityName>
        <vulnerabilityName>CVE-2021-21345</vulnerabilityName>
        <vulnerabilityName>CVE-2021-21346</vulnerabilityName>
        <vulnerabilityName>CVE-2021-21347</vulnerabilityName>
        <vulnerabilityName>CVE-2021-21348</vulnerabilityName>
        <vulnerabilityName>CVE-2021-21349</vulnerabilityName>
        <vulnerabilityName>CVE-2021-21350</vulnerabilityName>
        <vulnerabilityName>CVE-2021-21351</vulnerabilityName>
        <vulnerabilityName>CVE-2021-43859</vulnerabilityName>
     </suppress>
     <suppress>
        <notes><![CDATA[
        file name: spring-jcl-5.3.21.jar
        ]]></notes>
        <packageUrl regex="true">^pkg:maven/org\.springframework/spring\-.*@.*$</packageUrl>
        <cve>CVE-2016-1000027</cve>
     </suppress>
</suppressions>