TimeBase-CE
TimeBase-CE copied to clipboard
High performance time series database
## CVE-2021-24122 - Medium Severity Vulnerability Vulnerable Library - tomcat-embed-core-8.0.53.jar Core Tomcat implementation Library home page: https://tomcat.apache.org/ Path to dependency file: TimeBase/java/quantserver/web/build.gradle Path to vulnerable library: canner/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-core/8.0.53/9bfd668c63434597ac1d561c9434c166d93fff21/tomcat-embed-core-8.0.53.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-core/8.0.53/9bfd668c63434597ac1d561c9434c166d93fff21/tomcat-embed-core-8.0.53.jar Dependency Hierarchy: -...
## CVE-2020-11979 - High Severity Vulnerability Vulnerable Library - ant-1.9.9.jar master POM Path to dependency file: TimeBase/java/installer/build.gradle Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.ant/ant/1.9.9/9dc55233d8c0809e57b2ec7f78376da3f32872bd/ant-1.9.9.jar Dependency Hierarchy: - izpack-compiler-5.1.3.jar (Root Library) - izpack-panel-5.1.3.jar...
## CVE-2016-5388 - High Severity Vulnerability Vulnerable Library - tomcat-embed-core-8.0.53.jar Core Tomcat implementation Library home page: https://tomcat.apache.org/ Path to dependency file: TimeBase/java/quantserver/web/build.gradle Path to vulnerable library: canner/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-core/8.0.53/9bfd668c63434597ac1d561c9434c166d93fff21/tomcat-embed-core-8.0.53.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-core/8.0.53/9bfd668c63434597ac1d561c9434c166d93fff21/tomcat-embed-core-8.0.53.jar Dependency Hierarchy: -...
I can see we have feature to delete records from TB stream entirely based on list of symbols. But I cant see any feature which removes data from specific **space**...
Same path traversal fix but for branch 6.2
Fix from LLM to mitigate XXE, was modified to cover getInputStream()
Adding canonical path validation to prevent path traversal
Disable resolution of XML external entities in document-type-definition (DTD) https://cheatsheetseries.owasp.org/cheatsheets/XML_External_Entity_Prevention_Cheat_Sheet.html#jaxb-unmarshaller