<!--
  ~ Licensed to the Apache Software Foundation (ASF) under one
  ~ or more contributor license agreements.  See the NOTICE file
  ~ distributed with this work for additional information
  ~ regarding copyright ownership.  The ASF licenses this file
  ~ to you under the Apache License, Version 2.0 (the
  ~ "License"); you may not use this file except in compliance
  ~ with the License.  You may obtain a copy of the License at
  ~
  ~     http://www.apache.org/licenses/LICENSE-2.0
  ~
  ~ Unless required by applicable law or agreed to in writing, software
  ~ distributed under the License is distributed on an "AS IS" BASIS,
  ~ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  ~ See the License for the specific language governing permissions and
  ~ limitations under the License.
  -->
<!--
  copy suppressions / false positives here if there are any, how to do it is explained in
  https://jeremylong.github.io/DependencyCheck/general/suppression.html
-->
<suppressions xmlns="https://jeremylong.github.io/DependencyCheck/dependency-suppression.1.3.xsd">
    <suppress>
        <!--  https://issues.apache.org/jira/browse/CASSANDRA-17907 -->
        <packageUrl regex="true">^pkg:maven/org\.yaml/snakeyaml@.*$</packageUrl>
        <cve>CVE-2022-1471</cve>
        <cve>CVE-2022-25857</cve>
        <cve>CVE-2022-38749</cve>
        <cve>CVE-2022-38750</cve>
        <cve>CVE-2022-38751</cve>
        <cve>CVE-2022-38752</cve>
        <cve>CVE-2022-41854</cve>
    </suppress>
    <suppress>
        <!-- not applicable https://nvd.nist.gov/vuln/detail/CVE-2020-8908 -->
        <packageUrl regex="true">^pkg:maven/com\.google\.guava/guava@.*$</packageUrl>
        <cve>CVE-2020-8908</cve>
        <cve>CVE-2023-2976</cve>
    </suppress>
    <!-- netty's http stuff is not applicable here -->
    <suppress>
        <packageUrl regex="true">^pkg:maven/io\.netty/netty\-.*@.*$</packageUrl>
        <cve>CVE-2021-21290</cve>
        <cve>CVE-2021-21295</cve>
        <cve>CVE-2021-21409</cve>
        <cve>CVE-2022-24823</cve>
        <cve>CVE-2025-24970</cve>
        <cve>CVE-2025-25193</cve>
        <cve>CVE-2024-29025</cve>
        <cve>CVE-2023-34462</cve>
        <cve>CVE-2021-37136</cve>
        <cve>CVE-2021-37137</cve>
        <cve>CVE-2022-41881</cve>
        <cve>CVE-2021-43797</cve>
        <cve>CVE-2023-44487</cve>
        <cve>CVE-2024-47535</cve>
        <cve>CVE-2025-55163</cve>
        <cve>CVE-2025-58056</cve>
        <cve>CVE-2025-58057</cve>
    </suppress>

    <!-- https://issues.apache.org/jira/browse/CASSANDRA-19142 -->
    <!-- https://issues.apache.org/jira/browse/CASSANDRA-20412 -->
    <suppress>
        <packageUrl regex="true">^pkg:maven/ch\.qos\.logback/logback\-core@.*$</packageUrl>
        <cve>CVE-2023-6378</cve>
        <cve>CVE-2024-12798</cve>
        <cve>CVE-2024-12801</cve>
    </suppress>
    <suppress>
        <packageUrl regex="true">^pkg:maven/ch\.qos\.logback/logback\-classic@.*$</packageUrl>
        <cve>CVE-2023-6378</cve>
        <cve>CVE-2024-12798</cve>
        <cve>CVE-2024-12801</cve>
    </suppress>
</suppressions>
