This commit is contained in:
Armin Schrenk
2025-12-30 12:31:45 +01:00
parent ceed70c314
commit 8105dbc236
2 changed files with 13 additions and 4 deletions

View File

@@ -36,8 +36,8 @@
<cryptomator.cryptofs.version>2.10.0-beta2</cryptomator.cryptofs.version>
<cryptomator.integrations.version>1.8.0-beta1</cryptomator.integrations.version>
<cryptomator.integrations.win.version>1.5.1</cryptomator.integrations.win.version>
<cryptomator.integrations.mac.version>1.5.0-beta1</cryptomator.integrations.mac.version>
<cryptomator.integrations.linux.version>1.7.0-beta1</cryptomator.integrations.linux.version>
<cryptomator.integrations.mac.version>1.5.0-beta3</cryptomator.integrations.mac.version>
<cryptomator.integrations.linux.version>1.7.0-beta3</cryptomator.integrations.linux.version>
<cryptomator.fuse.version>5.1.0</cryptomator.fuse.version>
<cryptomator.webdav.version>3.0.0</cryptomator.webdav.version>

View File

@@ -82,13 +82,22 @@
<!-- Vulnerable, but unused class in jetty -->
<suppress>
<notes><![CDATA[
<notes><![CDATA[
The project does not use the HttpURI class at all, so no decoded user data is passed to it.
See also https://github.com/jetty/jetty.project/security/advisories/GHSA-qh8g-58pp-2wxh.
]]></notes>
<packageUrl regex="true">^pkg:maven/org\.eclipse\.jetty/jetty-.*$</packageUrl>
<vulnerabilityName>CVE-2024-6763</vulnerabilityName>
<vulnerabilityName>CVE-2024-6763</vulnerabilityName>
<cve>CVE-2024-6763</cve>
</suppress>
<!-- False positives of the flatpak sandbox -->
<suppress>
<notes><![CDATA[
file name: flatpak-update-portal-1.1.0.jar
]]></notes>
<packageUrl regex="true">^pkg:maven/org\.purejava/flatpak-update-portal@.*$</packageUrl>
<cpe>cpe:/a:flatpak:flatpak</cpe>
</suppress>
</suppressions>