TimeBase-CE icon indicating copy to clipboard operation
TimeBase-CE copied to clipboard

High performance time series database

Results 19 TimeBase-CE issues
Sort by recently updated
recently updated
newest added

## CVE-2021-24122 - Medium Severity Vulnerability Vulnerable Library - tomcat-embed-core-8.0.53.jar Core Tomcat implementation Library home page: https://tomcat.apache.org/ Path to dependency file: TimeBase/java/quantserver/web/build.gradle Path to vulnerable library: canner/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-core/8.0.53/9bfd668c63434597ac1d561c9434c166d93fff21/tomcat-embed-core-8.0.53.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-core/8.0.53/9bfd668c63434597ac1d561c9434c166d93fff21/tomcat-embed-core-8.0.53.jar Dependency Hierarchy: -...

security vulnerability

## CVE-2020-11979 - High Severity Vulnerability Vulnerable Library - ant-1.9.9.jar master POM Path to dependency file: TimeBase/java/installer/build.gradle Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.ant/ant/1.9.9/9dc55233d8c0809e57b2ec7f78376da3f32872bd/ant-1.9.9.jar Dependency Hierarchy: - izpack-compiler-5.1.3.jar (Root Library) - izpack-panel-5.1.3.jar...

security vulnerability

## CVE-2016-5388 - High Severity Vulnerability Vulnerable Library - tomcat-embed-core-8.0.53.jar Core Tomcat implementation Library home page: https://tomcat.apache.org/ Path to dependency file: TimeBase/java/quantserver/web/build.gradle Path to vulnerable library: canner/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-core/8.0.53/9bfd668c63434597ac1d561c9434c166d93fff21/tomcat-embed-core-8.0.53.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-core/8.0.53/9bfd668c63434597ac1d561c9434c166d93fff21/tomcat-embed-core-8.0.53.jar Dependency Hierarchy: -...

security vulnerability

I can see we have feature to delete records from TB stream entirely based on list of symbols. But I cant see any feature which removes data from specific **space**...

enhancement

Same path traversal fix but for branch 6.2

Fix from LLM to mitigate XXE, was modified to cover getInputStream()

Adding canonical path validation to prevent path traversal

Disable resolution of XML external entities in document-type-definition (DTD) https://cheatsheetseries.owasp.org/cheatsheets/XML_External_Entity_Prevention_Cheat_Sheet.html#jaxb-unmarshaller