File tree Expand file tree Collapse file tree
Expand file tree Collapse file tree Original file line number Diff line number Diff line change 194194 <packageUrl regex =" true" >^pkg:maven/org\.mozilla/rhino@.*$</packageUrl >
195195 <vulnerabilityName >CVE-2025-66453</vulnerabilityName >
196196 </suppress >
197+
198+ <!--
199+ Some PDFBox example code (ExtractEmbeddedFiles) contains a path traversal vulnerability. The example code isn't
200+ packaged in any jars and we already have checks in place to prevent path traversal vulnerabilities.
201+ -->
202+ <suppress >
203+ <notes ><![CDATA[
204+ file name: pdfbox-3.0.4.jar
205+ ]]> </notes >
206+ <packageUrl regex =" true" >^pkg:maven/org\.apache\.pdfbox/pdfbox@.*$</packageUrl >
207+ <cve >CVE-2026-23907</cve >
208+ </suppress >
209+ <suppress >
210+ <notes ><![CDATA[
211+ file name: pdfbox-debugger-3.0.4.jar
212+ ]]> </notes >
213+ <packageUrl regex =" true" >^pkg:maven/org\.apache\.pdfbox/pdfbox-debugger@.*$</packageUrl >
214+ <cve >CVE-2026-23907</cve >
215+ </suppress >
216+ <suppress >
217+ <notes ><![CDATA[
218+ file name: pdfbox-io-3.0.4.jar
219+ ]]> </notes >
220+ <packageUrl regex =" true" >^pkg:maven/org\.apache\.pdfbox/pdfbox-io@.*$</packageUrl >
221+ <cve >CVE-2026-23907</cve >
222+ </suppress >
223+ <suppress >
224+ <notes ><![CDATA[
225+ file name: pdfbox-tools-3.0.4.jar
226+ ]]> </notes >
227+ <packageUrl regex =" true" >^pkg:maven/org\.apache\.pdfbox/pdfbox-tools@.*$</packageUrl >
228+ <cve >CVE-2026-23907</cve >
229+ </suppress >
197230</suppressions >
You can’t perform that action at this time.
0 commit comments