You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/site/markdown/general/suppression.md
+9-5Lines changed: 9 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,19 +23,20 @@ The above XML file will suppress the cpe:/a:apache:struts:2.0.0 from any file wi
23
23
24
24
The following shows some other ways to suppress individual findings. Note the ways to select files using either
25
25
26
-
- their sha1 hash (via element `<sha1>),
27
-
- their package URL (via element `<packageUrl>`),
26
+
- their sha1 hash (via element `<sha1>`),
27
+
- their [package URL (PURL)][purl] (via element `<packageUrl>`),
28
28
- their Maven like coordinates (groupId/namespace, artifactId/name and version via element `<gav>`), or
29
29
- their file path (via element `<filePath>`).
30
30
31
31
The latter three can optionally be given as regular expression. The `<packageUrl>` value is matched against the dependency
32
32
specific software identifiers (can be looked up from the report) and `<gav>` against these identifiers after they have been mapped
33
-
to coordinates via `PurlIdentifier.toGav()`. The latter is not always available while the former is mandatory.
33
+
to coordinates via `PurlIdentifier.toGav()`.
34
34
The `<filePath>` value is matched against the OS-specific absolute file path of the according dependency
35
35
(for example a path inside the local Maven repository).
36
36
37
-
Additionally, there are several ways to suppress vulnerabilities: individual CPEs, individual CVEs, or all vulnerabilities below a specified CVSS score. The most common
38
-
would be suppressing CPEs based on the identified Package URL (PURL) - these suppression entries can be generated using the
37
+
Additionally, there are several ways to suppress vulnerabilities: individual CPEs, individual CVEs, or all vulnerabilities below a specified CVSS score.
38
+
39
+
The most common would be suppressing CPEs based on the identified [Package URL (PURL)][purl] - these suppression entries can be generated using the
39
40
HTML version of the report. The other common scenario would be to ignore all CVEs below a certain CVSS threshold.
40
41
41
42
```xml
@@ -177,3 +178,6 @@ Please see the appropriate configuration option in each interfaces configuration
0 commit comments