Skip to content

Commit ee0f491

Browse files
authored
1 parent 2547395 commit ee0f491

1 file changed

Lines changed: 33 additions & 0 deletions

File tree

dependencyCheckSuppression.xml

Lines changed: 33 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -194,4 +194,37 @@
194194
<packageUrl regex="true">^pkg:maven/org\.mozilla/rhino@.*$</packageUrl>
195195
<vulnerabilityName>CVE-2025-66453</vulnerabilityName>
196196
</suppress>
197+
198+
<!--
199+
Some PDFBox example code (ExtractEmbeddedFiles) contains a path traversal vulnerability. The example code isn't
200+
packaged in any jars and we already have checks in place to prevent path traversal vulnerabilities.
201+
-->
202+
<suppress>
203+
<notes><![CDATA[
204+
file name: pdfbox-3.0.4.jar
205+
]]></notes>
206+
<packageUrl regex="true">^pkg:maven/org\.apache\.pdfbox/pdfbox@.*$</packageUrl>
207+
<cve>CVE-2026-23907</cve>
208+
</suppress>
209+
<suppress>
210+
<notes><![CDATA[
211+
file name: pdfbox-debugger-3.0.4.jar
212+
]]></notes>
213+
<packageUrl regex="true">^pkg:maven/org\.apache\.pdfbox/pdfbox-debugger@.*$</packageUrl>
214+
<cve>CVE-2026-23907</cve>
215+
</suppress>
216+
<suppress>
217+
<notes><![CDATA[
218+
file name: pdfbox-io-3.0.4.jar
219+
]]></notes>
220+
<packageUrl regex="true">^pkg:maven/org\.apache\.pdfbox/pdfbox-io@.*$</packageUrl>
221+
<cve>CVE-2026-23907</cve>
222+
</suppress>
223+
<suppress>
224+
<notes><![CDATA[
225+
file name: pdfbox-tools-3.0.4.jar
226+
]]></notes>
227+
<packageUrl regex="true">^pkg:maven/org\.apache\.pdfbox/pdfbox-tools@.*$</packageUrl>
228+
<cve>CVE-2026-23907</cve>
229+
</suppress>
197230
</suppressions>

0 commit comments

Comments
 (0)