Unnamed: 0
int64
0
832k
id
float64
2.49B
32.1B
type
stringclasses
1 value
created_at
stringlengths
19
19
repo
stringlengths
5
112
repo_url
stringlengths
34
141
action
stringclasses
3 values
title
stringlengths
1
757
labels
stringlengths
4
664
body
stringlengths
3
261k
index
stringclasses
10 values
text_combine
stringlengths
96
261k
label
stringclasses
2 values
text
stringlengths
96
232k
binary_label
int64
0
1
744,352
25,939,823,323
IssuesEvent
2022-12-16 17:14:55
brave/brave-browser
https://api.github.com/repos/brave/brave-browser
closed
[Android] Rewards settings `brave://rewards` page blank (v1.39.x and higher)
bug feature/rewards priority/P2 intermittent-issue regression OS/Android
## Description https://community.brave.com/t/blank-page-in-brave-rewards/406301/3 This was fixed in the past here: https://github.com/brave/brave-browser/issues/21649 But it looks like the issue may be back.
1.0
[Android] Rewards settings `brave://rewards` page blank (v1.39.x and higher) - ## Description https://community.brave.com/t/blank-page-in-brave-rewards/406301/3 This was fixed in the past here: https://github.com/brave/brave-browser/issues/21649 But it looks like the issue may be back.
non_defect
rewards settings brave rewards page blank x and higher description this was fixed in the past here but it looks like the issue may be back
0
278,465
21,081,600,761
IssuesEvent
2022-04-03 01:06:01
tonyketcham/p5-svelte
https://api.github.com/repos/tonyketcham/p5-svelte
closed
Docs site shows incorrect import statement in examples
bug documentation
**Describe the bug** In doc site examples (see [Vectors](https://p5-svelte.netlify.app/examples/vectors), etc.) the P5 component import statement is the relative path to where `P5.svelte` lives inside the repo rather than the user-facing import path of `p5-svelte`. **Currently** ```ts import P5 from "$lib/P5.svelte"; ``` **Should change to** ```ts import P5 from "p5-svelte"; ```
1.0
Docs site shows incorrect import statement in examples - **Describe the bug** In doc site examples (see [Vectors](https://p5-svelte.netlify.app/examples/vectors), etc.) the P5 component import statement is the relative path to where `P5.svelte` lives inside the repo rather than the user-facing import path of `p5-svelte`. **Currently** ```ts import P5 from "$lib/P5.svelte"; ``` **Should change to** ```ts import P5 from "p5-svelte"; ```
non_defect
docs site shows incorrect import statement in examples describe the bug in doc site examples see etc the component import statement is the relative path to where svelte lives inside the repo rather than the user facing import path of svelte currently ts import from lib svelte should change to ts import from svelte
0
94,067
8,468,428,348
IssuesEvent
2018-10-23 19:43:12
ktraunmueller/Compositor
https://api.github.com/repos/ktraunmueller/Compositor
closed
Deleting line in \author command may leave line break
automated test bug
_Note: the following steps require that issue #301 is already fixed; the issue will not be reproducible in this way with e.g. 1.5.3._ Select a line in the author scope: <img width="281" alt="screen shot 2018-10-22 at 23 12 44" src="https://user-images.githubusercontent.com/650763/47319853-1605b280-d650-11e8-8fe6-614f32c6d023.png"> Hit delete (backwards): <img width="251" alt="screen shot 2018-10-22 at 23 14 10" src="https://user-images.githubusercontent.com/650763/47319938-49484180-d650-11e8-88d0-2ebf6e38a826.png"> This will leave a trailing line break in the `\author` command <img width="212" alt="screen shot 2018-10-22 at 23 14 32" src="https://user-images.githubusercontent.com/650763/47319971-61b85c00-d650-11e8-8d57-75c8764358c1.png"> After unfocusing and focusing the author scope, the end-of-paragraph marker will no longer be shown: <img width="273" alt="screen shot 2018-10-22 at 23 17 24" src="https://user-images.githubusercontent.com/650763/47320069-ab08ab80-d650-11e8-840a-f5d3922cedfd.png">
1.0
Deleting line in \author command may leave line break - _Note: the following steps require that issue #301 is already fixed; the issue will not be reproducible in this way with e.g. 1.5.3._ Select a line in the author scope: <img width="281" alt="screen shot 2018-10-22 at 23 12 44" src="https://user-images.githubusercontent.com/650763/47319853-1605b280-d650-11e8-8fe6-614f32c6d023.png"> Hit delete (backwards): <img width="251" alt="screen shot 2018-10-22 at 23 14 10" src="https://user-images.githubusercontent.com/650763/47319938-49484180-d650-11e8-88d0-2ebf6e38a826.png"> This will leave a trailing line break in the `\author` command <img width="212" alt="screen shot 2018-10-22 at 23 14 32" src="https://user-images.githubusercontent.com/650763/47319971-61b85c00-d650-11e8-8d57-75c8764358c1.png"> After unfocusing and focusing the author scope, the end-of-paragraph marker will no longer be shown: <img width="273" alt="screen shot 2018-10-22 at 23 17 24" src="https://user-images.githubusercontent.com/650763/47320069-ab08ab80-d650-11e8-840a-f5d3922cedfd.png">
non_defect
deleting line in author command may leave line break note the following steps require that issue is already fixed the issue will not be reproducible in this way with e g select a line in the author scope img width alt screen shot at src hit delete backwards img width alt screen shot at src this will leave a trailing line break in the author command img width alt screen shot at src after unfocusing and focusing the author scope the end of paragraph marker will no longer be shown img width alt screen shot at src
0
7,379
2,610,365,876
IssuesEvent
2015-02-26 19:58:12
chrsmith/scribefire-chrome
https://api.github.com/repos/chrsmith/scribefire-chrome
closed
Can't add blog
auto-migrated Priority-Medium Type-Defect
``` What's the problem? I am unable to add my blog to Scribefire. I had it installed on an older MacBook Pro and when I migrated to this one, the Scribefire came across but not the blog. I add the blog via the form and it reports success but the blog isn't added. What browser are you using? Google Chrome. What version of ScribeFire are you running? 4.1. Just downloaded it from Google. ``` ----- Original issue reported on code.google.com by `dlpeters...@gmail.com` on 15 Feb 2013 at 5:30
1.0
Can't add blog - ``` What's the problem? I am unable to add my blog to Scribefire. I had it installed on an older MacBook Pro and when I migrated to this one, the Scribefire came across but not the blog. I add the blog via the form and it reports success but the blog isn't added. What browser are you using? Google Chrome. What version of ScribeFire are you running? 4.1. Just downloaded it from Google. ``` ----- Original issue reported on code.google.com by `dlpeters...@gmail.com` on 15 Feb 2013 at 5:30
defect
can t add blog what s the problem i am unable to add my blog to scribefire i had it installed on an older macbook pro and when i migrated to this one the scribefire came across but not the blog i add the blog via the form and it reports success but the blog isn t added what browser are you using google chrome what version of scribefire are you running just downloaded it from google original issue reported on code google com by dlpeters gmail com on feb at
1
11,164
13,957,694,143
IssuesEvent
2020-10-24 08:11:10
alexanderkotsev/geoportal
https://api.github.com/repos/alexanderkotsev/geoportal
opened
DK: Missing resources in Geoportal
DK - Denmark Geoportal Harvesting process
Collected from the Geoportal Workshop online survey answers: A harvesting was done from our national catalogue Friday 10th of Dec. First, we were surprised to see that the number of downloadable data set had decreased. However, after a closer look at our data set atom feed we noticed that there was no value in &quot;length&quot; in each entry in the data set feeds. The Geoportal Browser reported that data has no &quot;DATA_DOWNLOAD_LINK_IS_AVAILABLE&quot;. We have so far concluded that this single information &quot;length&quot; in the data set atom feed has a vital meaning in the Geoportal. Can you confirm that our conclusion is correct? In addition, if that is correct we think the chances for a successful harvesting is depending too much on a single tag/information deep down in data set atom feed.
1.0
DK: Missing resources in Geoportal - Collected from the Geoportal Workshop online survey answers: A harvesting was done from our national catalogue Friday 10th of Dec. First, we were surprised to see that the number of downloadable data set had decreased. However, after a closer look at our data set atom feed we noticed that there was no value in &quot;length&quot; in each entry in the data set feeds. The Geoportal Browser reported that data has no &quot;DATA_DOWNLOAD_LINK_IS_AVAILABLE&quot;. We have so far concluded that this single information &quot;length&quot; in the data set atom feed has a vital meaning in the Geoportal. Can you confirm that our conclusion is correct? In addition, if that is correct we think the chances for a successful harvesting is depending too much on a single tag/information deep down in data set atom feed.
non_defect
dk missing resources in geoportal collected from the geoportal workshop online survey answers a harvesting was done from our national catalogue friday of dec first we were surprised to see that the number of downloadable data set had decreased however after a closer look at our data set atom feed we noticed that there was no value in quot length quot in each entry in the data set feeds the geoportal browser reported that data has no quot data download link is available quot we have so far concluded that this single information quot length quot in the data set atom feed has a vital meaning in the geoportal can you confirm that our conclusion is correct in addition if that is correct we think the chances for a successful harvesting is depending too much on a single tag information deep down in data set atom feed
0
1,592
6,420,520,914
IssuesEvent
2017-08-09 00:29:17
City-Bureau/documenters-aggregator
https://api.github.com/repos/City-Bureau/documenters-aggregator
opened
how to handle events that require registration?
architecture: spiders priority: high (must have) support: conversation
@mwgalloway raised this issue. @diaholliday might have some thoughts about how to structure this as the open civic data specification doesn't account for it
1.0
how to handle events that require registration? - @mwgalloway raised this issue. @diaholliday might have some thoughts about how to structure this as the open civic data specification doesn't account for it
non_defect
how to handle events that require registration mwgalloway raised this issue diaholliday might have some thoughts about how to structure this as the open civic data specification doesn t account for it
0
288,189
21,689,849,562
IssuesEvent
2022-05-09 14:29:27
Cavonstavant/PLAZAAAAAAAAAAAAAAAAAAAAAAA
https://api.github.com/repos/Cavonstavant/PLAZAAAAAAAAAAAAAAAAAAAAAAA
opened
Core - Create a "Fridge"
documentation enhancement
Create a Class / Enum / ... something where you can check the number of the ingredients left
1.0
Core - Create a "Fridge" - Create a Class / Enum / ... something where you can check the number of the ingredients left
non_defect
core create a fridge create a class enum something where you can check the number of the ingredients left
0
51,515
13,207,506,395
IssuesEvent
2020-08-14 23:22:10
icecube-trac/tix4
https://api.github.com/repos/icecube-trac/tix4
opened
icetray parameter tests failing on python 2.3.4 (Trac #560)
IceTray Incomplete Migration Migrated from Trac defect
<details> <summary><em>Migrated from <a href="https://code.icecube.wisc.edu/projects/icecube/ticket/560">https://code.icecube.wisc.edu/projects/icecube/ticket/560</a>, reported by blaufussand owned by troy</em></summary> <p> ```json { "status": "closed", "changetime": "2014-11-23T03:37:56", "_ts": "1416713876862109", "description": "This maybe intentional/unavoidable:\n\nicetray/scripts/parameter_abuse.py\nfailing on el4 machines:\n\n[slave@akuma build_debug]$ ./icetray/resources/scripts/parameter_abuse.py \nLogging configured from file ./log4cplus.conf\n/build/slave_build/manual/offline-software/src/icetray/public/icetray/I3Module.h:330: ERROR: Error in AllParametersModule module 'apm2', getting parameter 'intvec_param'\nOK, threw as expected\nTraceback (most recent call last):\n File \"./icetray/resources/scripts/parameter_abuse.py\", line 34, in ?\n exit(0)\nTypeError: 'str' object is not callable\n", "reporter": "blaufuss", "cc": "", "resolution": "fixed", "time": "2009-06-12T20:37:59", "component": "IceTray", "summary": "icetray parameter tests failing on python 2.3.4", "priority": "normal", "keywords": "", "milestone": "", "owner": "troy", "type": "defect" } ``` </p> </details>
1.0
icetray parameter tests failing on python 2.3.4 (Trac #560) - <details> <summary><em>Migrated from <a href="https://code.icecube.wisc.edu/projects/icecube/ticket/560">https://code.icecube.wisc.edu/projects/icecube/ticket/560</a>, reported by blaufussand owned by troy</em></summary> <p> ```json { "status": "closed", "changetime": "2014-11-23T03:37:56", "_ts": "1416713876862109", "description": "This maybe intentional/unavoidable:\n\nicetray/scripts/parameter_abuse.py\nfailing on el4 machines:\n\n[slave@akuma build_debug]$ ./icetray/resources/scripts/parameter_abuse.py \nLogging configured from file ./log4cplus.conf\n/build/slave_build/manual/offline-software/src/icetray/public/icetray/I3Module.h:330: ERROR: Error in AllParametersModule module 'apm2', getting parameter 'intvec_param'\nOK, threw as expected\nTraceback (most recent call last):\n File \"./icetray/resources/scripts/parameter_abuse.py\", line 34, in ?\n exit(0)\nTypeError: 'str' object is not callable\n", "reporter": "blaufuss", "cc": "", "resolution": "fixed", "time": "2009-06-12T20:37:59", "component": "IceTray", "summary": "icetray parameter tests failing on python 2.3.4", "priority": "normal", "keywords": "", "milestone": "", "owner": "troy", "type": "defect" } ``` </p> </details>
defect
icetray parameter tests failing on python trac migrated from json status closed changetime ts description this maybe intentional unavoidable n nicetray scripts parameter abuse py nfailing on machines n n icetray resources scripts parameter abuse py nlogging configured from file conf n build slave build manual offline software src icetray public icetray h error error in allparametersmodule module getting parameter intvec param nok threw as expected ntraceback most recent call last n file icetray resources scripts parameter abuse py line in n exit ntypeerror str object is not callable n reporter blaufuss cc resolution fixed time component icetray summary icetray parameter tests failing on python priority normal keywords milestone owner troy type defect
1
76,639
26,526,248,152
IssuesEvent
2023-01-19 08:59:06
zed-industries/feedback
https://api.github.com/repos/zed-industries/feedback
opened
lsp installation shouldn't respect local npm config
defect triage
### Check for existing issues - [X] Completed ### Describe the bug / provide steps to reproduce it So, I'm on latest Zed version, but typescript/json LSP doesn't work. Check around and I find out that my LSP version is `typescript-4.9.4/server-2.2.0` while the latest is `typescript-4.9.4/server-3.0.2` (figured out from another issue). I tried delete this directory and Zed keeps downloading the old version. Turned out because of my local npm config has `prefer-offline=true` and Zed doesn't check for an update. ### Environment ``` Zed: 0.69.2 (stable) OS: macOS 13.2.0 Memory: 32 GiB Architecture: aarch64 ``` ### If applicable, add mockups / screenshots to help explain present your vision of the feature _No response_ ### If applicable, attach your `~/Library/Logs/Zed/Zed.log` file to this issue. If you only need the most recent lines, you can run the `zed: open log` command palette action to see the last 1000. ``` 08:36:35 [INFO] ========== starting zed ========== 08:36:35 [INFO] set environment variables from shell:/opt/homebrew/bin/fish, path:/Users/t/.bun/bin:/Users/t/.local/share/nvm/v18.13.0/bin:/Users/t/.cargo/bin:/Users/t/.local/share/pnpm-global/bin:/opt/homebrew/bin:/opt/homebrew/sbin:/usr/local/bin:/usr/bin:/bin:/usr/sbin:/sbin:/Library/Apple/usr/bin 08:36:35 [INFO] Opening main db 08:36:35 [INFO] Opening main db 08:36:35 [INFO] open paths ["/Users/t/Desktop/playground"] 08:36:35 [INFO] Opening main db 08:36:37 [ERROR] Os { code: 20, kind: NotADirectory, message: "Not a directory" } 08:36:37 [ERROR] No such file or directory (os error 2) ```
1.0
lsp installation shouldn't respect local npm config - ### Check for existing issues - [X] Completed ### Describe the bug / provide steps to reproduce it So, I'm on latest Zed version, but typescript/json LSP doesn't work. Check around and I find out that my LSP version is `typescript-4.9.4/server-2.2.0` while the latest is `typescript-4.9.4/server-3.0.2` (figured out from another issue). I tried delete this directory and Zed keeps downloading the old version. Turned out because of my local npm config has `prefer-offline=true` and Zed doesn't check for an update. ### Environment ``` Zed: 0.69.2 (stable) OS: macOS 13.2.0 Memory: 32 GiB Architecture: aarch64 ``` ### If applicable, add mockups / screenshots to help explain present your vision of the feature _No response_ ### If applicable, attach your `~/Library/Logs/Zed/Zed.log` file to this issue. If you only need the most recent lines, you can run the `zed: open log` command palette action to see the last 1000. ``` 08:36:35 [INFO] ========== starting zed ========== 08:36:35 [INFO] set environment variables from shell:/opt/homebrew/bin/fish, path:/Users/t/.bun/bin:/Users/t/.local/share/nvm/v18.13.0/bin:/Users/t/.cargo/bin:/Users/t/.local/share/pnpm-global/bin:/opt/homebrew/bin:/opt/homebrew/sbin:/usr/local/bin:/usr/bin:/bin:/usr/sbin:/sbin:/Library/Apple/usr/bin 08:36:35 [INFO] Opening main db 08:36:35 [INFO] Opening main db 08:36:35 [INFO] open paths ["/Users/t/Desktop/playground"] 08:36:35 [INFO] Opening main db 08:36:37 [ERROR] Os { code: 20, kind: NotADirectory, message: "Not a directory" } 08:36:37 [ERROR] No such file or directory (os error 2) ```
defect
lsp installation shouldn t respect local npm config check for existing issues completed describe the bug provide steps to reproduce it so i m on latest zed version but typescript json lsp doesn t work check around and i find out that my lsp version is typescript server while the latest is typescript server figured out from another issue i tried delete this directory and zed keeps downloading the old version turned out because of my local npm config has prefer offline true and zed doesn t check for an update environment zed stable os macos memory gib architecture if applicable add mockups screenshots to help explain present your vision of the feature no response if applicable attach your library logs zed zed log file to this issue if you only need the most recent lines you can run the zed open log command palette action to see the last starting zed set environment variables from shell opt homebrew bin fish path users t bun bin users t local share nvm bin users t cargo bin users t local share pnpm global bin opt homebrew bin opt homebrew sbin usr local bin usr bin bin usr sbin sbin library apple usr bin opening main db opening main db open paths opening main db os code kind notadirectory message not a directory no such file or directory os error
1
68,174
21,529,026,736
IssuesEvent
2022-04-28 21:44:14
vector-im/element-web
https://api.github.com/repos/vector-im/element-web
closed
status.im mxids for Matthew & Amandine are higher in the matrix.org user dir results than for matrix.org
T-Defect P1 S-Major Z-Synapse
This seems very strange; surely the matrix.org MXIDs should be weighted higher as we are in 100x times more rooms with them than with our status.im IDs...
1.0
status.im mxids for Matthew & Amandine are higher in the matrix.org user dir results than for matrix.org - This seems very strange; surely the matrix.org MXIDs should be weighted higher as we are in 100x times more rooms with them than with our status.im IDs...
defect
status im mxids for matthew amandine are higher in the matrix org user dir results than for matrix org this seems very strange surely the matrix org mxids should be weighted higher as we are in times more rooms with them than with our status im ids
1
214,106
7,266,773,032
IssuesEvent
2018-02-20 00:10:54
MattyAyOh/NimbusPOS
https://api.github.com/repos/MattyAyOh/NimbusPOS
closed
Make the time control more touch-friendly
frontend high priority
Currently the control is not possible to set a time with a touch-screen, as it must be typed You can press the "Start" "Stop" buttons to set the current time in, but sometimes they will need to manually input a time ![sdfdsfsd](https://user-images.githubusercontent.com/5342037/35427142-ad46072a-0235-11e8-801c-9f1bfccc028b.PNG)
1.0
Make the time control more touch-friendly - Currently the control is not possible to set a time with a touch-screen, as it must be typed You can press the "Start" "Stop" buttons to set the current time in, but sometimes they will need to manually input a time ![sdfdsfsd](https://user-images.githubusercontent.com/5342037/35427142-ad46072a-0235-11e8-801c-9f1bfccc028b.PNG)
non_defect
make the time control more touch friendly currently the control is not possible to set a time with a touch screen as it must be typed you can press the start stop buttons to set the current time in but sometimes they will need to manually input a time
0
15,565
5,145,321,811
IssuesEvent
2017-01-12 21:14:22
ihmcrobotics/ihmc-open-robotics-software
https://api.github.com/repos/ihmcrobotics/ihmc-open-robotics-software
closed
SDFLoader project is cleaned up
code-cleanup Epic user-story
We should create another project (e.g. IHMCRobotModels) that contains all of the non-SDF stuff such as the various FullRobotModel implementations, so that the SDFLoader doesn't have to do a bunch of kinematics/screw tools operations.
1.0
SDFLoader project is cleaned up - We should create another project (e.g. IHMCRobotModels) that contains all of the non-SDF stuff such as the various FullRobotModel implementations, so that the SDFLoader doesn't have to do a bunch of kinematics/screw tools operations.
non_defect
sdfloader project is cleaned up we should create another project e g ihmcrobotmodels that contains all of the non sdf stuff such as the various fullrobotmodel implementations so that the sdfloader doesn t have to do a bunch of kinematics screw tools operations
0
59,743
17,023,226,968
IssuesEvent
2021-07-03 00:57:08
tomhughes/trac-tickets
https://api.github.com/repos/tomhughes/trac-tickets
closed
http://trac.openstreetmap.org/report/7 doesn't work in this Trac
Component: admin Priority: minor Resolution: worksforme Type: defect
**[Submitted to the original trac issue database at 11.24pm, Tuesday, 25th March 2008]** http://trac.openstreetmap.org/report/7 (My Tickets) doesn't work on this Trac installation. I get ``` {7} My Tickets This report demonstrates the use of the automatically set $USER dynamic variable, replaced with the username of the logged in user when executed. No matches found. ```
1.0
http://trac.openstreetmap.org/report/7 doesn't work in this Trac - **[Submitted to the original trac issue database at 11.24pm, Tuesday, 25th March 2008]** http://trac.openstreetmap.org/report/7 (My Tickets) doesn't work on this Trac installation. I get ``` {7} My Tickets This report demonstrates the use of the automatically set $USER dynamic variable, replaced with the username of the logged in user when executed. No matches found. ```
defect
doesn t work in this trac my tickets doesn t work on this trac installation i get my tickets this report demonstrates the use of the automatically set user dynamic variable replaced with the username of the logged in user when executed no matches found
1
9,555
2,615,162,328
IssuesEvent
2015-03-01 06:41:40
chrsmith/reaver-wps
https://api.github.com/repos/chrsmith/reaver-wps
opened
15 characters PIN ?
auto-migrated Priority-Triage Type-Defect
``` What version of Reaver are you using? (Only defects against the latest version will be considered.) Use Latest version 1. What operating system are you using (Linux is the only supported OS)? Backtrack 5 R2 KDE 2. Is your wireless card in monitor mode (yes/no)? Yes 3. What is the signal strength of the Access Point you are trying to crack? -20/-30 at the router 4. What is the manufacturer and model # of the device you are trying to crack? mon0 Atheros AR9287 ath9k - [phy0] wlan0 Atheros AR9287 ath9k - [phy0] 5. What is the entire command line string you are supplying to reaver? reaver -i mon0 -b 00:24:17:73:DD:3D -vv 6. Please describe what you think the issue is. STOP cracking on 90.90% My suggestion if start crack PIN then generate file wo have keys from 0000 to 9999 if all tested then END on 90.90%, i think all routers wo STOP on 90.90% don't have WPS "old" where use PINS i look new WPS where to connect to the network you press the button on the router i capute Pcap file and look Serial number 15 characters, normal WPS routers have 8 characters Serial numbers, i think Serial number in wireshark are Router PIN ``` Original issue reported on code.google.com by `wiruspol...@gmail.com` on 1 May 2012 at 9:49
1.0
15 characters PIN ? - ``` What version of Reaver are you using? (Only defects against the latest version will be considered.) Use Latest version 1. What operating system are you using (Linux is the only supported OS)? Backtrack 5 R2 KDE 2. Is your wireless card in monitor mode (yes/no)? Yes 3. What is the signal strength of the Access Point you are trying to crack? -20/-30 at the router 4. What is the manufacturer and model # of the device you are trying to crack? mon0 Atheros AR9287 ath9k - [phy0] wlan0 Atheros AR9287 ath9k - [phy0] 5. What is the entire command line string you are supplying to reaver? reaver -i mon0 -b 00:24:17:73:DD:3D -vv 6. Please describe what you think the issue is. STOP cracking on 90.90% My suggestion if start crack PIN then generate file wo have keys from 0000 to 9999 if all tested then END on 90.90%, i think all routers wo STOP on 90.90% don't have WPS "old" where use PINS i look new WPS where to connect to the network you press the button on the router i capute Pcap file and look Serial number 15 characters, normal WPS routers have 8 characters Serial numbers, i think Serial number in wireshark are Router PIN ``` Original issue reported on code.google.com by `wiruspol...@gmail.com` on 1 May 2012 at 9:49
defect
characters pin what version of reaver are you using only defects against the latest version will be considered use latest version what operating system are you using linux is the only supported os backtrack kde is your wireless card in monitor mode yes no yes what is the signal strength of the access point you are trying to crack at the router what is the manufacturer and model of the device you are trying to crack atheros atheros what is the entire command line string you are supplying to reaver reaver i b dd vv please describe what you think the issue is stop cracking on my suggestion if start crack pin then generate file wo have keys from to if all tested then end on i think all routers wo stop on don t have wps old where use pins i look new wps where to connect to the network you press the button on the router i capute pcap file and look serial number characters normal wps routers have characters serial numbers i think serial number in wireshark are router pin original issue reported on code google com by wiruspol gmail com on may at
1
221,354
17,334,731,599
IssuesEvent
2021-07-28 08:50:08
mennaelkashef/eShop
https://api.github.com/repos/mennaelkashef/eShop
opened
No description entered by the user.
DOES-NOT-CONTAIN-STRING Hello! RULE-GOT-APPLIED Rule-works-on-convert-to-bug instabug test
# :clipboard: Bug Details >No description entered by the user. key | value --|-- Reported At | 2021-07-28 08:49:46 UTC Categories | Report a bug, Cat 2 Tags | test, Hello!, RULE-GOT-APPLIED, DOES-NOT-CONTAIN-STRING, Rule-works-on-convert-to-bug, instabug App Version | 1.0-kotlin (1) Session Duration | 9 Device | Google Android SDK built for x86, OS Level 24 Display | 1080x1920 (xhdpi) Location | Giza, Egypt (en) ## :point_right: [View Full Bug Report on Instabug](https://dashboard.instabug.com/applications/android-sample/beta/bugs/7958?utm_source=github&utm_medium=integrations) :point_left: ___ # :chart_with_downwards_trend: Session Profiler Here is what the app was doing right before the bug was reported: Key | Value --|-- Used Memory | 30.0% - 0.44/1.48 GB Used Storage | 4.5% - 0.26/5.81 GB Connectivity | LTE - Android Battery | 100% - plugged Orientation | portrait Find all the changes that happened in the parameters mentioned above during the last 60 seconds before the bug was reported here: :point_right: **[View Full Session Profiler](https://dashboard.instabug.com/applications/android-sample/beta/bugs/7958?show-session-profiler=true&utm_source=github&utm_medium=integrations)** :point_left: ___ # :bust_in_silhouette: User Info ### User Attributes ``` key_name -2005597073: key value bla bla bla la key_name -342890808: key value bla bla bla la key_name -1610989224: key value bla bla bla la ``` ___ # :mag_right: Logs ### User Steps Here are the last 10 steps done by the user right before the bug was reported: ``` 08:49:39 In activity com.example.app.main.MainActivity: fragment com.example.app.main.MainFragment was started. 08:49:39 In activity com.example.app.main.MainActivity: fragment com.example.app.main.MainFragment was resumed. 08:49:40 com.example.app.main.MainActivity was resumed. 08:49:40 com.example.app.splash.SplashActivity was stopped. 08:49:40 com.example.app.splash.SplashActivity was destroyed. 08:49:43 Tap in "Sdk version: 10..." of type "androidx.appcompat.widget.AppCompatTextView" in "com.example.app.main.MainActivity" 08:49:44 com.example.app.main.MainActivity was paused. 08:49:44 In activity com.example.app.main.MainActivity: fragment com.example.app.main.MainFragment was paused. 08:49:45 Tap in "androidx.constraintlayout.widget.ConstraintLayout" in "com.example.app.main.MainActivity" 08:49:46 Tap in "androidx.constraintlayout.widget.ConstraintLayout" in "com.example.app.main.MainActivity" ``` Find all the user steps done by the user throughout the session here: :point_right: **[View All User Steps](https://dashboard.instabug.com/applications/android-sample/beta/bugs/7958?show-logs=user_steps&utm_source=github&utm_medium=integrations)** :point_left: ### Console Log Here are the last 10 console logs logged right before the bug was reported: ``` 08:49:54 D/EGL_emulation( 5332): eglMakeCurrent: 0x924f7060: ver 2 0 (tinfo 0x924db260) 08:49:54 D/EGL_emulation( 5332): eglMakeCurrent: 0x924f7060: ver 2 0 (tinfo 0x924db260) 08:49:54 I/IB-StringUtility( 5332): trimming string to 15 08:49:55 D/IB-BaseReportingPresenter( 5332): onEmailChanged set live bug with email:te 08:49:55 D/IB-BaseReportingPresenter( 5332): onEmailChanged set live bug with email:t 08:49:55 D/IB-BaseReportingPresenter( 5332): onEmailChanged set live bug with email: 08:49:56 D/IB-BaseReportingPresenter( 5332): checkUserEmailValid : 08:49:56 D/IB-BaseReportingPresenter( 5332): onEmailChanged set live bug with email: 08:49:56 D/IB-ActionsOrchestrator( 5332): runAction 08:49:56 D/IB-AttachmentsUtility( 5332): encryptAttachments ``` Find all the logged console logs throughout the session here: :point_right: **[View All Console Log](https://dashboard.instabug.com/applications/android-sample/beta/bugs/7958?show-logs=console_log&utm_source=github&utm_medium=integrations)** :point_left: ___ # :camera: Images [![image attachment](https://d38gnqwzxziyyy.cloudfront.net/attachments/bugs/16379585/c01cb7fca708f9cd71ade48bcbd36fd1_one_bug_thumb/22160652/bug_1627462184017_.jpg?Expires=4783135807&Signature=iJo6~0KjqrOzaDBlMOg-kTsHqQDGtCDjXklESDQ08pSXeU~8vjIeSqKKcXVPhT14PMdtBXw5R6zzqtiQNaDqLVahfceql6q2Pb7Ali6VsFfeVOrs7TcMBYLCxKZilSTBq9IzmFKdZu95Y5Yj14D2iZsEDOabMouAC9j2cvF~m42qSUBiNZoKzKN~rdrMsvi2sELQ2X5LvfqZTbFA6Qz1hshVKmYUU888UaaRTmGSv3kCKf9HSJVRK6HubtICMKNpPKCZb0OCQz9zhmG-MjS-ijxjA-h0VZuVgdM00zLEPUR83jWknquDf3RdwiNBqEXi1GhcvDB16x~OLtYnr4aNzw__&Key-Pair-Id=APKAIXAG65U6UUX7JAQQ)](https://d38gnqwzxziyyy.cloudfront.net/attachments/bugs/16379585/c01cb7fca708f9cd71ade48bcbd36fd1_original/22160652/bug_1627462184017_.jpg?Expires=4783135807&Signature=JYAhimG9V9R97WW5BYyx4GqQKr3wisbRzd8oW2c1HymD4PEYoEM8WrwCGDadmiJKbitZVFCs8IiXvd9P173z1NbOxV7Hk4RetZhZyYtTX0opic8S42IGs0WCZ47HsjK5rEwUELdgSOIEPBwLRa~leKC6QxLmKyqL9siP9WTGcIRqIDLwki15exW8xrYoKLju~Ai4XumVX1uTFSTU09mg4CtkgU5v6buWgtQYAQU7~baoR7qY6QHA31RH8l3cTnpFPHuDOw0FVqdAYzzpvheRioSgJnXvySxmudi3lutQOQdl8oEZ0hxD2p7T94JkIzB4a0McRiFyhNuVx7F6A3xnVg__&Key-Pair-Id=APKAIXAG65U6UUX7JAQQ) ___ # :warning: Looking for More Details? 1. **Network Log**: we are unable to capture your network requests automatically. If you are using HttpUrlConnection or Okhttp requests, [**check the details mentioned here**](https://docs.instabug.com/docs/android-logging?utm_source=github&utm_medium=integrations#section-network-logs). 2. **User Events**: start capturing custom User Events to send them along with each report. [**Find all the details in the docs**](https://docs.instabug.com/docs/android-logging?utm_source=github&utm_medium=integrations). 3. **Instabug Log**: start adding Instabug logs to see them right inside each report you receive. [**Find all the details in the docs**](https://docs.instabug.com/docs/android-logging?utm_source=github&utm_medium=integrations).
1.0
No description entered by the user. - # :clipboard: Bug Details >No description entered by the user. key | value --|-- Reported At | 2021-07-28 08:49:46 UTC Categories | Report a bug, Cat 2 Tags | test, Hello!, RULE-GOT-APPLIED, DOES-NOT-CONTAIN-STRING, Rule-works-on-convert-to-bug, instabug App Version | 1.0-kotlin (1) Session Duration | 9 Device | Google Android SDK built for x86, OS Level 24 Display | 1080x1920 (xhdpi) Location | Giza, Egypt (en) ## :point_right: [View Full Bug Report on Instabug](https://dashboard.instabug.com/applications/android-sample/beta/bugs/7958?utm_source=github&utm_medium=integrations) :point_left: ___ # :chart_with_downwards_trend: Session Profiler Here is what the app was doing right before the bug was reported: Key | Value --|-- Used Memory | 30.0% - 0.44/1.48 GB Used Storage | 4.5% - 0.26/5.81 GB Connectivity | LTE - Android Battery | 100% - plugged Orientation | portrait Find all the changes that happened in the parameters mentioned above during the last 60 seconds before the bug was reported here: :point_right: **[View Full Session Profiler](https://dashboard.instabug.com/applications/android-sample/beta/bugs/7958?show-session-profiler=true&utm_source=github&utm_medium=integrations)** :point_left: ___ # :bust_in_silhouette: User Info ### User Attributes ``` key_name -2005597073: key value bla bla bla la key_name -342890808: key value bla bla bla la key_name -1610989224: key value bla bla bla la ``` ___ # :mag_right: Logs ### User Steps Here are the last 10 steps done by the user right before the bug was reported: ``` 08:49:39 In activity com.example.app.main.MainActivity: fragment com.example.app.main.MainFragment was started. 08:49:39 In activity com.example.app.main.MainActivity: fragment com.example.app.main.MainFragment was resumed. 08:49:40 com.example.app.main.MainActivity was resumed. 08:49:40 com.example.app.splash.SplashActivity was stopped. 08:49:40 com.example.app.splash.SplashActivity was destroyed. 08:49:43 Tap in "Sdk version: 10..." of type "androidx.appcompat.widget.AppCompatTextView" in "com.example.app.main.MainActivity" 08:49:44 com.example.app.main.MainActivity was paused. 08:49:44 In activity com.example.app.main.MainActivity: fragment com.example.app.main.MainFragment was paused. 08:49:45 Tap in "androidx.constraintlayout.widget.ConstraintLayout" in "com.example.app.main.MainActivity" 08:49:46 Tap in "androidx.constraintlayout.widget.ConstraintLayout" in "com.example.app.main.MainActivity" ``` Find all the user steps done by the user throughout the session here: :point_right: **[View All User Steps](https://dashboard.instabug.com/applications/android-sample/beta/bugs/7958?show-logs=user_steps&utm_source=github&utm_medium=integrations)** :point_left: ### Console Log Here are the last 10 console logs logged right before the bug was reported: ``` 08:49:54 D/EGL_emulation( 5332): eglMakeCurrent: 0x924f7060: ver 2 0 (tinfo 0x924db260) 08:49:54 D/EGL_emulation( 5332): eglMakeCurrent: 0x924f7060: ver 2 0 (tinfo 0x924db260) 08:49:54 I/IB-StringUtility( 5332): trimming string to 15 08:49:55 D/IB-BaseReportingPresenter( 5332): onEmailChanged set live bug with email:te 08:49:55 D/IB-BaseReportingPresenter( 5332): onEmailChanged set live bug with email:t 08:49:55 D/IB-BaseReportingPresenter( 5332): onEmailChanged set live bug with email: 08:49:56 D/IB-BaseReportingPresenter( 5332): checkUserEmailValid : 08:49:56 D/IB-BaseReportingPresenter( 5332): onEmailChanged set live bug with email: 08:49:56 D/IB-ActionsOrchestrator( 5332): runAction 08:49:56 D/IB-AttachmentsUtility( 5332): encryptAttachments ``` Find all the logged console logs throughout the session here: :point_right: **[View All Console Log](https://dashboard.instabug.com/applications/android-sample/beta/bugs/7958?show-logs=console_log&utm_source=github&utm_medium=integrations)** :point_left: ___ # :camera: Images [![image attachment](https://d38gnqwzxziyyy.cloudfront.net/attachments/bugs/16379585/c01cb7fca708f9cd71ade48bcbd36fd1_one_bug_thumb/22160652/bug_1627462184017_.jpg?Expires=4783135807&Signature=iJo6~0KjqrOzaDBlMOg-kTsHqQDGtCDjXklESDQ08pSXeU~8vjIeSqKKcXVPhT14PMdtBXw5R6zzqtiQNaDqLVahfceql6q2Pb7Ali6VsFfeVOrs7TcMBYLCxKZilSTBq9IzmFKdZu95Y5Yj14D2iZsEDOabMouAC9j2cvF~m42qSUBiNZoKzKN~rdrMsvi2sELQ2X5LvfqZTbFA6Qz1hshVKmYUU888UaaRTmGSv3kCKf9HSJVRK6HubtICMKNpPKCZb0OCQz9zhmG-MjS-ijxjA-h0VZuVgdM00zLEPUR83jWknquDf3RdwiNBqEXi1GhcvDB16x~OLtYnr4aNzw__&Key-Pair-Id=APKAIXAG65U6UUX7JAQQ)](https://d38gnqwzxziyyy.cloudfront.net/attachments/bugs/16379585/c01cb7fca708f9cd71ade48bcbd36fd1_original/22160652/bug_1627462184017_.jpg?Expires=4783135807&Signature=JYAhimG9V9R97WW5BYyx4GqQKr3wisbRzd8oW2c1HymD4PEYoEM8WrwCGDadmiJKbitZVFCs8IiXvd9P173z1NbOxV7Hk4RetZhZyYtTX0opic8S42IGs0WCZ47HsjK5rEwUELdgSOIEPBwLRa~leKC6QxLmKyqL9siP9WTGcIRqIDLwki15exW8xrYoKLju~Ai4XumVX1uTFSTU09mg4CtkgU5v6buWgtQYAQU7~baoR7qY6QHA31RH8l3cTnpFPHuDOw0FVqdAYzzpvheRioSgJnXvySxmudi3lutQOQdl8oEZ0hxD2p7T94JkIzB4a0McRiFyhNuVx7F6A3xnVg__&Key-Pair-Id=APKAIXAG65U6UUX7JAQQ) ___ # :warning: Looking for More Details? 1. **Network Log**: we are unable to capture your network requests automatically. If you are using HttpUrlConnection or Okhttp requests, [**check the details mentioned here**](https://docs.instabug.com/docs/android-logging?utm_source=github&utm_medium=integrations#section-network-logs). 2. **User Events**: start capturing custom User Events to send them along with each report. [**Find all the details in the docs**](https://docs.instabug.com/docs/android-logging?utm_source=github&utm_medium=integrations). 3. **Instabug Log**: start adding Instabug logs to see them right inside each report you receive. [**Find all the details in the docs**](https://docs.instabug.com/docs/android-logging?utm_source=github&utm_medium=integrations).
non_defect
no description entered by the user clipboard bug details no description entered by the user key value reported at utc categories report a bug cat tags test hello rule got applied does not contain string rule works on convert to bug instabug app version kotlin session duration device google android sdk built for os level display xhdpi location giza egypt en point right point left chart with downwards trend session profiler here is what the app was doing right before the bug was reported key value used memory gb used storage gb connectivity lte android battery plugged orientation portrait find all the changes that happened in the parameters mentioned above during the last seconds before the bug was reported here point right point left bust in silhouette user info user attributes key name key value bla bla bla la key name key value bla bla bla la key name key value bla bla bla la mag right logs user steps here are the last steps done by the user right before the bug was reported in activity com example app main mainactivity fragment com example app main mainfragment was started in activity com example app main mainactivity fragment com example app main mainfragment was resumed com example app main mainactivity was resumed com example app splash splashactivity was stopped com example app splash splashactivity was destroyed tap in sdk version of type androidx appcompat widget appcompattextview in com example app main mainactivity com example app main mainactivity was paused in activity com example app main mainactivity fragment com example app main mainfragment was paused tap in androidx constraintlayout widget constraintlayout in com example app main mainactivity tap in androidx constraintlayout widget constraintlayout in com example app main mainactivity find all the user steps done by the user throughout the session here point right point left console log here are the last console logs logged right before the bug was reported d egl emulation eglmakecurrent ver tinfo d egl emulation eglmakecurrent ver tinfo i ib stringutility trimming string to d ib basereportingpresenter onemailchanged set live bug with email te d ib basereportingpresenter onemailchanged set live bug with email t d ib basereportingpresenter onemailchanged set live bug with email d ib basereportingpresenter checkuseremailvalid d ib basereportingpresenter onemailchanged set live bug with email d ib actionsorchestrator runaction d ib attachmentsutility encryptattachments find all the logged console logs throughout the session here point right point left camera images warning looking for more details network log we are unable to capture your network requests automatically if you are using httpurlconnection or okhttp requests user events start capturing custom user events to send them along with each report instabug log start adding instabug logs to see them right inside each report you receive
0
362,047
25,358,650,181
IssuesEvent
2022-11-20 16:39:14
cdklabs/cdk-nag
https://api.github.com/repos/cdklabs/cdk-nag
opened
doc: Resolving Tokens when inspecting CDK stack
documentation needs-triage
### Describe your issue? I am inspecting stack objects in the following way. ```ts // Add CDK NAG resource suppressions for Lambda Functions. stack.node.findAll().forEach(item => { if (!(item instanceof cdk.aws_lambda.Function)) { return } const fn = item as cdk.aws_lambda.Function; console.log(fn.runtime); console.log(fn.functionName); return }); ``` The output: ``` Runtime { name: 'python3.9', supportsInlineCode: true, family: 2, bundlingDockerImage: DockerImage { image: 'public.ecr.aws/sam/build-python3.9', _imageHash: undefined }, bundlingImage: DockerImage { image: 'public.ecr.aws/sam/build-python3.9', _imageHash: undefined }, supportsCodeGuruProfiling: true } ${Token[TOKEN.987]} ``` What is the way to resolve the name behind `${Token[TOKEN.987]}`?
1.0
doc: Resolving Tokens when inspecting CDK stack - ### Describe your issue? I am inspecting stack objects in the following way. ```ts // Add CDK NAG resource suppressions for Lambda Functions. stack.node.findAll().forEach(item => { if (!(item instanceof cdk.aws_lambda.Function)) { return } const fn = item as cdk.aws_lambda.Function; console.log(fn.runtime); console.log(fn.functionName); return }); ``` The output: ``` Runtime { name: 'python3.9', supportsInlineCode: true, family: 2, bundlingDockerImage: DockerImage { image: 'public.ecr.aws/sam/build-python3.9', _imageHash: undefined }, bundlingImage: DockerImage { image: 'public.ecr.aws/sam/build-python3.9', _imageHash: undefined }, supportsCodeGuruProfiling: true } ${Token[TOKEN.987]} ``` What is the way to resolve the name behind `${Token[TOKEN.987]}`?
non_defect
doc resolving tokens when inspecting cdk stack describe your issue i am inspecting stack objects in the following way ts add cdk nag resource suppressions for lambda functions stack node findall foreach item if item instanceof cdk aws lambda function return const fn item as cdk aws lambda function console log fn runtime console log fn functionname return the output runtime name supportsinlinecode true family bundlingdockerimage dockerimage image public ecr aws sam build imagehash undefined bundlingimage dockerimage image public ecr aws sam build imagehash undefined supportscodeguruprofiling true token what is the way to resolve the name behind token
0
248,471
7,931,573,468
IssuesEvent
2018-07-07 01:49:42
brave/browser-laptop
https://api.github.com/repos/brave/browser-laptop
closed
Cookies are not persisted across restart
bug feature/cookies priority/P2 regression regression-range-wanted
### Description On a fresh profile, logging in to a site (or any other operation that creates cookies that can be read back later) does not persist after a browser restart. ### Steps to Reproduce #### Explicit cookie check 1. Fresh profile (delete existing) 2. Start browser 3. Open http://www.html-kit.com/tools/cookietester/ 4. Click 'Set Test Cookie' 5. Restart browser 6. Visit http://www.html-kit.com/tools/cookietester/ again **Actual result:** `Number of cookies received: 0` **Expected result:** `Number of cookies received: 1` **Reproduces how often:** 100% #### Real world login check 1. Fresh profile (delete existing) 2. Start browser 3. Open http://www.google.com 4. Sign-in with valid credentials 5. Observe correctly logged in with avatar icon on google.com 5. Restart browser 6. Visit http://www.google.com again **Actual result:** No avatar present. 'Sign In' button is there instead. **Expected result:** Avatar shown for user which was used to login before restart. No 'Sign In' button present. **Reproduces how often:** 100% however see notes below re: opening another site before the restart. ### Brave Version **about:brave info:** Brave: 0.23.19 V8: 6.7.288.46 rev: 178c3fbc045a0cbdbe098db08307503cce952081 Muon: 7.1.3 OS Release: 17.5.0 Update Channel: Release OS Architecture: x64 OS Platform: macOS Node.js: 7.9.0 Tor: 0.3.3.7 (git-035a35178c92da94) Brave Sync: v1.4.2 libchromiumcontent: 67.0.3396.87 **Reproducible on current live release:** Yes ### Additional Information This may be more restricted to the most recently visited site as does not seem to reproduce 100% on the 2nd or 3rd most recently visited site that sets cookies. Or it could be to do with which tab is active. @srirambv reports that he can retain login when he has a different tab active for approx. 1 minute before closing the browser.
1.0
Cookies are not persisted across restart - ### Description On a fresh profile, logging in to a site (or any other operation that creates cookies that can be read back later) does not persist after a browser restart. ### Steps to Reproduce #### Explicit cookie check 1. Fresh profile (delete existing) 2. Start browser 3. Open http://www.html-kit.com/tools/cookietester/ 4. Click 'Set Test Cookie' 5. Restart browser 6. Visit http://www.html-kit.com/tools/cookietester/ again **Actual result:** `Number of cookies received: 0` **Expected result:** `Number of cookies received: 1` **Reproduces how often:** 100% #### Real world login check 1. Fresh profile (delete existing) 2. Start browser 3. Open http://www.google.com 4. Sign-in with valid credentials 5. Observe correctly logged in with avatar icon on google.com 5. Restart browser 6. Visit http://www.google.com again **Actual result:** No avatar present. 'Sign In' button is there instead. **Expected result:** Avatar shown for user which was used to login before restart. No 'Sign In' button present. **Reproduces how often:** 100% however see notes below re: opening another site before the restart. ### Brave Version **about:brave info:** Brave: 0.23.19 V8: 6.7.288.46 rev: 178c3fbc045a0cbdbe098db08307503cce952081 Muon: 7.1.3 OS Release: 17.5.0 Update Channel: Release OS Architecture: x64 OS Platform: macOS Node.js: 7.9.0 Tor: 0.3.3.7 (git-035a35178c92da94) Brave Sync: v1.4.2 libchromiumcontent: 67.0.3396.87 **Reproducible on current live release:** Yes ### Additional Information This may be more restricted to the most recently visited site as does not seem to reproduce 100% on the 2nd or 3rd most recently visited site that sets cookies. Or it could be to do with which tab is active. @srirambv reports that he can retain login when he has a different tab active for approx. 1 minute before closing the browser.
non_defect
cookies are not persisted across restart description on a fresh profile logging in to a site or any other operation that creates cookies that can be read back later does not persist after a browser restart steps to reproduce explicit cookie check fresh profile delete existing start browser open click set test cookie restart browser visit again actual result number of cookies received expected result number of cookies received reproduces how often real world login check fresh profile delete existing start browser open sign in with valid credentials observe correctly logged in with avatar icon on google com restart browser visit again actual result no avatar present sign in button is there instead expected result avatar shown for user which was used to login before restart no sign in button present reproduces how often however see notes below re opening another site before the restart brave version about brave info brave rev muon os release update channel release os architecture os platform macos node js tor git brave sync libchromiumcontent reproducible on current live release yes additional information this may be more restricted to the most recently visited site as does not seem to reproduce on the or most recently visited site that sets cookies or it could be to do with which tab is active srirambv reports that he can retain login when he has a different tab active for approx minute before closing the browser
0
25,982
4,540,072,148
IssuesEvent
2016-09-09 13:33:00
stunpix/stacklessexamples
https://api.github.com/repos/stunpix/stacklessexamples
closed
error in StacklessNonblockModules/socketlibevent.py
auto-migrated Priority-Medium Type-Defect
``` In wiki/StacklessNonblockModules/socketlibevent.py Line 98: def create_connection(address, timeout=0.1): If try: >>>urllib2.urlopen("http://www.google.com").read(12) get error: TypeError: create_connection() takes at most 2 arguments (3 given) I think this more correctly: Line 98: def create_connection(address, timeout=0.1, sourse_address=''): ``` Original issue reported on code.google.com by `Faun...@gmail.com` on 8 Jan 2014 at 4:42
1.0
error in StacklessNonblockModules/socketlibevent.py - ``` In wiki/StacklessNonblockModules/socketlibevent.py Line 98: def create_connection(address, timeout=0.1): If try: >>>urllib2.urlopen("http://www.google.com").read(12) get error: TypeError: create_connection() takes at most 2 arguments (3 given) I think this more correctly: Line 98: def create_connection(address, timeout=0.1, sourse_address=''): ``` Original issue reported on code.google.com by `Faun...@gmail.com` on 8 Jan 2014 at 4:42
defect
error in stacklessnonblockmodules socketlibevent py in wiki stacklessnonblockmodules socketlibevent py line def create connection address timeout if try urlopen get error typeerror create connection takes at most arguments given i think this more correctly line def create connection address timeout sourse address original issue reported on code google com by faun gmail com on jan at
1
37,246
8,243,745,513
IssuesEvent
2018-09-11 02:07:37
triplea-game/triplea
https://api.github.com/repos/triplea-game/triplea
closed
Change TripleA versioning
category: admin category: code improvement ice box - close and revisit later
I'm a huge fan of semantic versioning and I believe triplea should go for it as well. Because of travis we need to keep the build numbers though! I'd like to have `major.minor.patch.build` e.g. `1.9.0.4313` instead of `1.9.0.0.4313`. Every time we'd like to evaluate the versions we'd just cut off the build number. Read more about semantic versioning [here](http://semver.org/#summary).
1.0
Change TripleA versioning - I'm a huge fan of semantic versioning and I believe triplea should go for it as well. Because of travis we need to keep the build numbers though! I'd like to have `major.minor.patch.build` e.g. `1.9.0.4313` instead of `1.9.0.0.4313`. Every time we'd like to evaluate the versions we'd just cut off the build number. Read more about semantic versioning [here](http://semver.org/#summary).
non_defect
change triplea versioning i m a huge fan of semantic versioning and i believe triplea should go for it as well because of travis we need to keep the build numbers though i d like to have major minor patch build e g instead of every time we d like to evaluate the versions we d just cut off the build number read more about semantic versioning
0
55,625
8,015,921,125
IssuesEvent
2018-07-25 11:42:25
mlr-org/mlr
https://api.github.com/repos/mlr-org/mlr
closed
Wrong links in readme
type-documentation
Two links in the readme text (see below) do not work: Some parts of the package were created as part of other publications. If you use these parts, please cite the relevant work appropriately. An overview of all mlr related publications can be found here. A list of publications that cite mlr can be found in the wiki.
1.0
Wrong links in readme - Two links in the readme text (see below) do not work: Some parts of the package were created as part of other publications. If you use these parts, please cite the relevant work appropriately. An overview of all mlr related publications can be found here. A list of publications that cite mlr can be found in the wiki.
non_defect
wrong links in readme two links in the readme text see below do not work some parts of the package were created as part of other publications if you use these parts please cite the relevant work appropriately an overview of all mlr related publications can be found here a list of publications that cite mlr can be found in the wiki
0
84,067
15,720,827,972
IssuesEvent
2021-03-29 01:20:22
ysmanohar/myRetail
https://api.github.com/repos/ysmanohar/myRetail
opened
CVE-2020-11113 (High) detected in jackson-databind-2.7.4.jar
security vulnerability
## CVE-2020-11113 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.7.4.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /myRetail/myRetail/pom.xml</p> <p>Path to vulnerable library: 2/repository/com/fasterxml/jackson/core/jackson-databind/2.7.4/jackson-databind-2.7.4.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.7.4.jar** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.openjpa.ee.WASRegistryManagedRuntime (aka openjpa). <p>Publish Date: 2020-03-31 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11113>CVE-2020-11113</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11113">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11113</a></p> <p>Release Date: 2020-03-31</p> <p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.9.10.4;2.10.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2020-11113 (High) detected in jackson-databind-2.7.4.jar - ## CVE-2020-11113 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.7.4.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /myRetail/myRetail/pom.xml</p> <p>Path to vulnerable library: 2/repository/com/fasterxml/jackson/core/jackson-databind/2.7.4/jackson-databind-2.7.4.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.7.4.jar** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.openjpa.ee.WASRegistryManagedRuntime (aka openjpa). <p>Publish Date: 2020-03-31 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11113>CVE-2020-11113</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11113">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11113</a></p> <p>Release Date: 2020-03-31</p> <p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.9.10.4;2.10.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_defect
cve high detected in jackson databind jar cve high severity vulnerability vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file myretail myretail pom xml path to vulnerable library repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy x jackson databind jar vulnerable library vulnerability details fasterxml jackson databind x before mishandles the interaction between serialization gadgets and typing related to org apache openjpa ee wasregistrymanagedruntime aka openjpa publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson core jackson databind step up your open source security game with whitesource
0
666,723
22,365,171,476
IssuesEvent
2022-06-16 02:42:25
alibaba/GraphScope
https://api.github.com/repos/alibaba/GraphScope
closed
GraphScope Gremlin 引擎问题反馈
priority:high component:gaia
**Describe the bug** 使用 Gremlin 查询过程中遇到的问题,都反馈到这个 issues 下面, 麻烦 @yecol 统一看一下,感谢! - [x] nodejs id 不一致 - [x] valueMap 支持 - [x] gremlin 3.5.1 patch 包发布 - [x] `bothE` failed - [x] `both().bothE()` failed - [x] `valueMap` 为 None 的点也返回 - [ ] 边属性 (#1723 ) - [x] 模式匹配:JSON 转 Gremlin 语句,查询结果 - [ ] ~~g.V().has('id', 'xxx'),报错 key id must be positive number~~ - [ ] repeat operator support (#1722 )
1.0
GraphScope Gremlin 引擎问题反馈 - **Describe the bug** 使用 Gremlin 查询过程中遇到的问题,都反馈到这个 issues 下面, 麻烦 @yecol 统一看一下,感谢! - [x] nodejs id 不一致 - [x] valueMap 支持 - [x] gremlin 3.5.1 patch 包发布 - [x] `bothE` failed - [x] `both().bothE()` failed - [x] `valueMap` 为 None 的点也返回 - [ ] 边属性 (#1723 ) - [x] 模式匹配:JSON 转 Gremlin 语句,查询结果 - [ ] ~~g.V().has('id', 'xxx'),报错 key id must be positive number~~ - [ ] repeat operator support (#1722 )
non_defect
graphscope gremlin 引擎问题反馈 describe the bug 使用 gremlin 查询过程中遇到的问题,都反馈到这个 issues 下面, 麻烦 yecol 统一看一下,感谢! nodejs id 不一致 valuemap 支持 gremlin patch 包发布 bothe failed both bothe failed valuemap 为 none 的点也返回 边属性 模式匹配:json 转 gremlin 语句,查询结果 g v has id xxx ,报错 key id must be positive number repeat operator support
0
21,014
3,670,543,551
IssuesEvent
2016-02-21 22:32:07
gustafl/lexeme
https://api.github.com/repos/gustafl/lexeme
opened
Implement cookies
design future server
At some point, I probably need to keep track of users with cookies. The last module in this course seem like a good starting point: https://app.pluralsight.com/library/courses/xhttp-fund/table-of-contents
1.0
Implement cookies - At some point, I probably need to keep track of users with cookies. The last module in this course seem like a good starting point: https://app.pluralsight.com/library/courses/xhttp-fund/table-of-contents
non_defect
implement cookies at some point i probably need to keep track of users with cookies the last module in this course seem like a good starting point
0
81,033
10,221,067,250
IssuesEvent
2019-08-15 23:46:48
gatsbyjs/gatsby
https://api.github.com/repos/gatsbyjs/gatsby
closed
[docs][recipes] Images: querying with GraphQL and gatsby-image
effort: med impact: high topic: GraphQL topic: images/media topic: recipes type: documentation
## Summary To improve key learning workflows in the Recipes section of the docs, there should be a short, actionable recipe on querying for images with gatsby-image. This should come after #14985 and #14986. This recipe should briefly mention the benefits of Gatsby's data layer and show how to query for an image with GraphQL _inline_ as concisely as possible. It should include code snippets and potentially an embedded example. The [Gatsby Image doc](https://www.gatsbyjs.org/docs/gatsby-image/) and other [image docs](https://www.gatsbyjs.org/docs/using-gatsby-image/) can be used for reference. Because the various methods we want to show for images are such small tweaks (and would carry a lot of boilerplate if all broken out individually), this issue covers multiple variations that can be slotted into the "Step-by-step instructions" part of the recipe. Recipes now follow this format: - Requirements or prerequisites - Step-by-step instructions - Relevant links to any relevant information - Gatsby Image API https://www.gatsbyjs.org/docs/gatsby-image/ - Using Gatsby Image https://www.gatsbyjs.org/docs/using-gatsby-image/ - More on working with images in Gatsby https://www.gatsbyjs.org/docs/working-with-images/ - Link to a live example Techniques this issue should cover: - [ ] Querying by relativePath - [ ] from a directory - [ ] from post frontmatter - [ ] fixed width and height - [ ] fixed maxWidth - [ ] fluid maxWidth and quality - [ ] fluid but limited by height - [ ] with inline styles applied - [ ] with a fragment like `GatsbyImageSharpFixed` - [ ] preserving an aspectRatio These recipes should go into a new section of [`docs/docs/recipes.md`](https://github.com/gatsbyjs/gatsby/blob/master/docs/docs/recipes.md) titled "Images" (if it isn't already created). There is a recipe template in the contributing docs, including tips on adding a new section: https://www.gatsbyjs.org/contributing/docs-templates/#recipes For reference, the new recipe collection is also listed in a spreadsheet: https://docs.google.com/spreadsheets/d/1yNUQi_-3TsuDtE98hCIJQvLZ6X1YHlDmC-EJwOGxiHk/edit#gid=1252007048
1.0
[docs][recipes] Images: querying with GraphQL and gatsby-image - ## Summary To improve key learning workflows in the Recipes section of the docs, there should be a short, actionable recipe on querying for images with gatsby-image. This should come after #14985 and #14986. This recipe should briefly mention the benefits of Gatsby's data layer and show how to query for an image with GraphQL _inline_ as concisely as possible. It should include code snippets and potentially an embedded example. The [Gatsby Image doc](https://www.gatsbyjs.org/docs/gatsby-image/) and other [image docs](https://www.gatsbyjs.org/docs/using-gatsby-image/) can be used for reference. Because the various methods we want to show for images are such small tweaks (and would carry a lot of boilerplate if all broken out individually), this issue covers multiple variations that can be slotted into the "Step-by-step instructions" part of the recipe. Recipes now follow this format: - Requirements or prerequisites - Step-by-step instructions - Relevant links to any relevant information - Gatsby Image API https://www.gatsbyjs.org/docs/gatsby-image/ - Using Gatsby Image https://www.gatsbyjs.org/docs/using-gatsby-image/ - More on working with images in Gatsby https://www.gatsbyjs.org/docs/working-with-images/ - Link to a live example Techniques this issue should cover: - [ ] Querying by relativePath - [ ] from a directory - [ ] from post frontmatter - [ ] fixed width and height - [ ] fixed maxWidth - [ ] fluid maxWidth and quality - [ ] fluid but limited by height - [ ] with inline styles applied - [ ] with a fragment like `GatsbyImageSharpFixed` - [ ] preserving an aspectRatio These recipes should go into a new section of [`docs/docs/recipes.md`](https://github.com/gatsbyjs/gatsby/blob/master/docs/docs/recipes.md) titled "Images" (if it isn't already created). There is a recipe template in the contributing docs, including tips on adding a new section: https://www.gatsbyjs.org/contributing/docs-templates/#recipes For reference, the new recipe collection is also listed in a spreadsheet: https://docs.google.com/spreadsheets/d/1yNUQi_-3TsuDtE98hCIJQvLZ6X1YHlDmC-EJwOGxiHk/edit#gid=1252007048
non_defect
images querying with graphql and gatsby image summary to improve key learning workflows in the recipes section of the docs there should be a short actionable recipe on querying for images with gatsby image this should come after and this recipe should briefly mention the benefits of gatsby s data layer and show how to query for an image with graphql inline as concisely as possible it should include code snippets and potentially an embedded example the and other can be used for reference because the various methods we want to show for images are such small tweaks and would carry a lot of boilerplate if all broken out individually this issue covers multiple variations that can be slotted into the step by step instructions part of the recipe recipes now follow this format requirements or prerequisites step by step instructions relevant links to any relevant information gatsby image api using gatsby image more on working with images in gatsby link to a live example techniques this issue should cover querying by relativepath from a directory from post frontmatter fixed width and height fixed maxwidth fluid maxwidth and quality fluid but limited by height with inline styles applied with a fragment like gatsbyimagesharpfixed preserving an aspectratio these recipes should go into a new section of titled images if it isn t already created there is a recipe template in the contributing docs including tips on adding a new section for reference the new recipe collection is also listed in a spreadsheet
0
369,681
25,863,495,707
IssuesEvent
2022-12-13 18:47:43
iobroker-community-adapters/ioBroker.snmp
https://api.github.com/repos/iobroker-community-adapters/ioBroker.snmp
closed
[Documentation] Tables incorrectly formatted at german guide
bug fixed documentation
Tables are not formatted as tables in german deocument. Might be incorrec t in russian version too.
1.0
[Documentation] Tables incorrectly formatted at german guide - Tables are not formatted as tables in german deocument. Might be incorrec t in russian version too.
non_defect
tables incorrectly formatted at german guide tables are not formatted as tables in german deocument might be incorrec t in russian version too
0
6,873
2,867,140,695
IssuesEvent
2015-06-05 11:22:36
TinyModularThings/IC2Classic
https://api.github.com/repos/TinyModularThings/IC2Classic
closed
Nuclear Jetpack
In Testing Textures Needed
I like the idea. Logic is still breeding (like a breeder xD) in my head but i think i will implement that to classic. It has its good a bad side, for sure. But it will be fun. (Worst case: Nuclear explosion at the air because overheated xD)
1.0
Nuclear Jetpack - I like the idea. Logic is still breeding (like a breeder xD) in my head but i think i will implement that to classic. It has its good a bad side, for sure. But it will be fun. (Worst case: Nuclear explosion at the air because overheated xD)
non_defect
nuclear jetpack i like the idea logic is still breeding like a breeder xd in my head but i think i will implement that to classic it has its good a bad side for sure but it will be fun worst case nuclear explosion at the air because overheated xd
0
13,866
8,700,446,024
IssuesEvent
2018-12-05 08:46:03
agazso/postmodern
https://api.github.com/repos/agazso/postmodern
closed
after adding a feed, it is unclear if it's added, or it was just found / validated
idea usability
### Possible solutions ##### Short term After adding a feed, move to the tab where we show the content, and refresh it automatically ##### Long term There should be a view for an individual feed, we should open it after adding the feed
True
after adding a feed, it is unclear if it's added, or it was just found / validated - ### Possible solutions ##### Short term After adding a feed, move to the tab where we show the content, and refresh it automatically ##### Long term There should be a view for an individual feed, we should open it after adding the feed
non_defect
after adding a feed it is unclear if it s added or it was just found validated possible solutions short term after adding a feed move to the tab where we show the content and refresh it automatically long term there should be a view for an individual feed we should open it after adding the feed
0
24,078
3,907,575,900
IssuesEvent
2016-04-19 13:20:25
sky-map-team/stardroid
https://api.github.com/repos/sky-map-team/stardroid
closed
Constants are being modified
auto-migrated Priority-Medium Type-Defect
``` When ApplicationConstants.INITIAL_SOUTH and INITIAL_DOWN are being assigned to variables, this leads to these constants getting modified by the code. Wherever the constants are assigned to variables, there needs to be a .copy(). ``` Original issue reported on code.google.com by `arpruss` on 23 Oct 2013 at 11:25
1.0
Constants are being modified - ``` When ApplicationConstants.INITIAL_SOUTH and INITIAL_DOWN are being assigned to variables, this leads to these constants getting modified by the code. Wherever the constants are assigned to variables, there needs to be a .copy(). ``` Original issue reported on code.google.com by `arpruss` on 23 Oct 2013 at 11:25
defect
constants are being modified when applicationconstants initial south and initial down are being assigned to variables this leads to these constants getting modified by the code wherever the constants are assigned to variables there needs to be a copy original issue reported on code google com by arpruss on oct at
1
3,996
6,823,885,786
IssuesEvent
2017-11-08 02:30:52
cobalt-org/liquid-rust
https://api.github.com/repos/cobalt-org/liquid-rust
opened
Pass variables to `include`d partial?
shopify-compatibility
Shopify and Jekyll seem to handle this different. Shopify seems to put the variable in the global namespace and uses ":" for assignment - https://help.shopify.com/themes/liquid/tags/theme-tags#include Jekyll seems to scope the variables to the partial's name and uses `=` for assignment - https://jekyllrb.com/docs/includes/#passing-parameters-to-includes
True
Pass variables to `include`d partial? - Shopify and Jekyll seem to handle this different. Shopify seems to put the variable in the global namespace and uses ":" for assignment - https://help.shopify.com/themes/liquid/tags/theme-tags#include Jekyll seems to scope the variables to the partial's name and uses `=` for assignment - https://jekyllrb.com/docs/includes/#passing-parameters-to-includes
non_defect
pass variables to include d partial shopify and jekyll seem to handle this different shopify seems to put the variable in the global namespace and uses for assignment jekyll seems to scope the variables to the partial s name and uses for assignment
0
45,207
7,166,358,990
IssuesEvent
2018-01-29 16:59:24
CICE-Consortium/Icepack
https://api.github.com/repos/CICE-Consortium/Icepack
closed
clean up index of variables
Documentation
Remove anything not in Icepack, and make sure all of the namelist options are included (bullets). This one is extremely tedious, and I welcome all the help I can get. We could divide up the alphabet... I'll take X!
1.0
clean up index of variables - Remove anything not in Icepack, and make sure all of the namelist options are included (bullets). This one is extremely tedious, and I welcome all the help I can get. We could divide up the alphabet... I'll take X!
non_defect
clean up index of variables remove anything not in icepack and make sure all of the namelist options are included bullets this one is extremely tedious and i welcome all the help i can get we could divide up the alphabet i ll take x
0
309,112
9,461,648,995
IssuesEvent
2019-04-17 13:54:42
project-koku/koku
https://api.github.com/repos/project-koku/koku
closed
OCP order_by derived and infrastructure costs
bug priority - medium
## User Story As a user, I want to sort the OCP details page by derived and infrastructure cost. It appears that `order_by[derived_cost]=asc` and `order_by[infrastructure_cost]=asc` are not supported parameters of the reports/openshift/costs API. ## Impacts Ex. API, UI, Docs ## Role User ## Assumptions - - ## API Details | API | Detail| | --- | --- | | **Method** | GET | | **Path** | /api/v1/reports/openshift/costs/ | | **Body** | &order_by[derived_cost]=asc | | **Response** | | | API | Detail| | --- | --- | | **Method** | GET | | **Path** | /api/v1/reports/openshift/costs/ | | **Body** | &order_by[infrastructure_cost]=asc | | **Response** | | <img width="1177" alt="Screen Shot 2019-04-07 at 10 57 55 AM" src="https://user-images.githubusercontent.com/17481322/55685481-d93f2680-5924-11e9-8a8c-79e6ff6d7ead.png"> <img width="1193" alt="Screen Shot 2019-04-07 at 10 57 22 AM" src="https://user-images.githubusercontent.com/17481322/55685483-dd6b4400-5924-11e9-970e-6c1a15b37ef3.png"> ## UI Details We want to update the Cost details page with derived and infrastructure columns, like so: <img width="1262" alt="Screen Shot 2019-04-07 at 11 00 03 AM" src="https://user-images.githubusercontent.com/17481322/55685463-92513100-5924-11e9-9548-a975046177be.png"> ## Acceptance Criteria - [ ] Sort by derived cost - [ ] Sort by infrastructure cost
1.0
OCP order_by derived and infrastructure costs - ## User Story As a user, I want to sort the OCP details page by derived and infrastructure cost. It appears that `order_by[derived_cost]=asc` and `order_by[infrastructure_cost]=asc` are not supported parameters of the reports/openshift/costs API. ## Impacts Ex. API, UI, Docs ## Role User ## Assumptions - - ## API Details | API | Detail| | --- | --- | | **Method** | GET | | **Path** | /api/v1/reports/openshift/costs/ | | **Body** | &order_by[derived_cost]=asc | | **Response** | | | API | Detail| | --- | --- | | **Method** | GET | | **Path** | /api/v1/reports/openshift/costs/ | | **Body** | &order_by[infrastructure_cost]=asc | | **Response** | | <img width="1177" alt="Screen Shot 2019-04-07 at 10 57 55 AM" src="https://user-images.githubusercontent.com/17481322/55685481-d93f2680-5924-11e9-8a8c-79e6ff6d7ead.png"> <img width="1193" alt="Screen Shot 2019-04-07 at 10 57 22 AM" src="https://user-images.githubusercontent.com/17481322/55685483-dd6b4400-5924-11e9-970e-6c1a15b37ef3.png"> ## UI Details We want to update the Cost details page with derived and infrastructure columns, like so: <img width="1262" alt="Screen Shot 2019-04-07 at 11 00 03 AM" src="https://user-images.githubusercontent.com/17481322/55685463-92513100-5924-11e9-9548-a975046177be.png"> ## Acceptance Criteria - [ ] Sort by derived cost - [ ] Sort by infrastructure cost
non_defect
ocp order by derived and infrastructure costs user story as a user i want to sort the ocp details page by derived and infrastructure cost it appears that order by asc and order by asc are not supported parameters of the reports openshift costs api impacts ex api ui docs role user assumptions api details api detail method get path api reports openshift costs body order by asc response api detail method get path api reports openshift costs body order by asc response img width alt screen shot at am src img width alt screen shot at am src ui details we want to update the cost details page with derived and infrastructure columns like so img width alt screen shot at am src acceptance criteria sort by derived cost sort by infrastructure cost
0
73,057
24,433,221,383
IssuesEvent
2022-10-06 09:36:24
vector-im/element-web
https://api.github.com/repos/vector-im/element-web
closed
Unread notification not associated with a room
T-Defect P1 A-Room-List A-Notifications
### Description Messages sent (by others) to a particular room result in an unread messages notification badge on the rooms section header, but there is no notifications badge for the corresponding room. This makes it very hard to track down where the notification is coming from (and clear it). This behaviour is seen on all of my devices and was observed before enabling edits / reactions. As requested by @dbkr - Here are my push notification rules. ``` { "global": { "underride": [ { "conditions": [ { "kind": "event_match", "key": "type", "pattern": "m.call.invite" } ], "actions": [ "notify", { "set_tweak": "sound", "value": "ring" }, { "set_tweak": "highlight", "value": false } ], "rule_id": ".m.rule.call", "default": true, "enabled": true }, { "conditions": [ { "kind": "room_member_count", "is": "2" }, { "kind": "event_match", "key": "type", "pattern": "m.room.message" } ], "actions": [ "notify", { "set_tweak": "sound", "value": "default" }, { "set_tweak": "highlight", "value": false } ], "rule_id": ".m.rule.room_one_to_one", "default": true, "enabled": true }, { "conditions": [ { "kind": "room_member_count", "is": "2" }, { "kind": "event_match", "key": "type", "pattern": "m.room.encrypted" } ], "actions": [ "notify", { "set_tweak": "sound", "value": "default" }, { "set_tweak": "highlight", "value": false } ], "rule_id": ".m.rule.encrypted_room_one_to_one", "default": true, "enabled": true }, { "conditions": [ { "kind": "event_match", "key": "type", "pattern": "m.room.message" } ], "actions": [ "notify", { "set_tweak": "highlight", "value": false } ], "rule_id": ".m.rule.message", "default": true, "enabled": true }, { "conditions": [ { "kind": "event_match", "key": "type", "pattern": "m.room.encrypted" } ], "actions": [ "notify", { "set_tweak": "highlight", "value": false } ], "rule_id": ".m.rule.encrypted", "default": true, "enabled": true } ], "sender": [], "room": [ { "actions": [ "dont_notify" ], "rule_id": "!zVpPeWAObqutioiNzB:jki.re", "enabled": true }, { "actions": [ "dont_notify" ], "rule_id": "!nOUsIUkdCEMFqwiMXO:matrix.org", "enabled": true }, { "actions": [ "dont_notify" ], "rule_id": "!FPUfgzXYWTKgIrwKxW:matrix.org", "enabled": true }, { "actions": [ "dont_notify" ], "rule_id": "!yjVgJUsMLYLAONsoii:jki.re", "enabled": true }, { "actions": [ "dont_notify" ], "rule_id": "!OYyXUbcTKVsDBUniNn:matrix.eclabs.de", "enabled": true }, { "actions": [ "dont_notify" ], "rule_id": "!DdJkzRliezrwpNebLk:matrix.org", "enabled": true }, { "actions": [ "dont_notify" ], "rule_id": "!UmtgDmQCkKlaIkLEyH:half-shot.uk", "enabled": true }, { "actions": [ "dont_notify" ], "rule_id": "!qXkGwIopNrIUglrMJT:lant.uk", "enabled": true }, { "actions": [ "dont_notify" ], "rule_id": "!svJUttHBtRMdXmEhEy:matrix.org", "enabled": true }, { "actions": [ "dont_notify" ], "rule_id": "!TfGOBljmIFILPqKYwQ:matrix.org", "enabled": true }, { "actions": [ "dont_notify" ], "rule_id": "!yZHTGeDKZUeKaqeTeU:matrix.org", "enabled": true }, { "actions": [ "dont_notify" ], "rule_id": "!DYgXKezaHgMbiPMzjX:matrix.org", "enabled": true }, { "actions": [ "dont_notify" ], "rule_id": "!YkZelGRiqijtzXZODa:matrix.org", "enabled": true }, { "actions": [ "dont_notify" ], "rule_id": "!RbKRuLTvHIhArQcvjr:matrix.org", "enabled": true }, { "actions": [ "dont_notify" ], "rule_id": "!JJWoPvaGeOhPudCOMt:matrix.org", "enabled": true }, { "actions": [ "dont_notify" ], "rule_id": "!iNmaIQExDMeqdITdHH:matrix.org", "enabled": true }, { "actions": [ "dont_notify" ], "rule_id": "!UwfyezyoefyCIPOOXS:matrix.org", "enabled": true } ], "content": [ { "actions": [ "notify", { "set_tweak": "sound", "value": "default" }, { "set_tweak": "highlight" } ], "pattern": "rxl881", "rule_id": ".m.rule.contains_user_name", "default": true, "enabled": true } ], "override": [ { "conditions": [], "actions": [ "dont_notify" ], "rule_id": ".m.rule.master", "default": true, "enabled": false }, { "conditions": [ { "kind": "event_match", "key": "content.msgtype", "pattern": "m.notice" } ], "actions": [ "dont_notify" ], "rule_id": ".m.rule.suppress_notices", "default": true, "enabled": true }, { "conditions": [ { "kind": "event_match", "key": "type", "pattern": "m.room.member" }, { "kind": "event_match", "key": "content.membership", "pattern": "invite" }, { "kind": "event_match", "key": "state_key", "pattern": "@rxl881:vector.modular.im" } ], "actions": [ "notify", { "set_tweak": "sound", "value": "default" }, { "set_tweak": "highlight", "value": false } ], "rule_id": ".m.rule.invite_for_me", "default": true, "enabled": true }, { "conditions": [ { "kind": "event_match", "key": "type", "pattern": "m.room.member" } ], "actions": [ "dont_notify" ], "rule_id": ".m.rule.member_event", "default": true, "enabled": true }, { "conditions": [ { "kind": "contains_display_name" } ], "actions": [ "notify", { "set_tweak": "sound", "value": "default" }, { "set_tweak": "highlight" } ], "rule_id": ".m.rule.contains_display_name", "default": true, "enabled": true }, { "conditions": [ { "kind": "event_match", "key": "content.body", "pattern": "@room" }, { "kind": "sender_notification_permission", "key": "room" } ], "actions": [ "notify", { "set_tweak": "highlight", "value": true } ], "rule_id": ".m.rule.roomnotif", "default": true, "enabled": true }, { "conditions": [ { "kind": "event_match", "key": "type", "pattern": "m.room.tombstone" } ], "actions": [ "notify", { "set_tweak": "highlight", "value": true } ], "rule_id": ".m.rule.tombstone", "default": true, "enabled": true } ] }, "device": {} } ``` - **Platform**: web (in-browser) or desktop? For the web app: - **Browser**: Chrome - **OS**: macOS, Ubuntu - **URL**: riot.im/develop
1.0
Unread notification not associated with a room - ### Description Messages sent (by others) to a particular room result in an unread messages notification badge on the rooms section header, but there is no notifications badge for the corresponding room. This makes it very hard to track down where the notification is coming from (and clear it). This behaviour is seen on all of my devices and was observed before enabling edits / reactions. As requested by @dbkr - Here are my push notification rules. ``` { "global": { "underride": [ { "conditions": [ { "kind": "event_match", "key": "type", "pattern": "m.call.invite" } ], "actions": [ "notify", { "set_tweak": "sound", "value": "ring" }, { "set_tweak": "highlight", "value": false } ], "rule_id": ".m.rule.call", "default": true, "enabled": true }, { "conditions": [ { "kind": "room_member_count", "is": "2" }, { "kind": "event_match", "key": "type", "pattern": "m.room.message" } ], "actions": [ "notify", { "set_tweak": "sound", "value": "default" }, { "set_tweak": "highlight", "value": false } ], "rule_id": ".m.rule.room_one_to_one", "default": true, "enabled": true }, { "conditions": [ { "kind": "room_member_count", "is": "2" }, { "kind": "event_match", "key": "type", "pattern": "m.room.encrypted" } ], "actions": [ "notify", { "set_tweak": "sound", "value": "default" }, { "set_tweak": "highlight", "value": false } ], "rule_id": ".m.rule.encrypted_room_one_to_one", "default": true, "enabled": true }, { "conditions": [ { "kind": "event_match", "key": "type", "pattern": "m.room.message" } ], "actions": [ "notify", { "set_tweak": "highlight", "value": false } ], "rule_id": ".m.rule.message", "default": true, "enabled": true }, { "conditions": [ { "kind": "event_match", "key": "type", "pattern": "m.room.encrypted" } ], "actions": [ "notify", { "set_tweak": "highlight", "value": false } ], "rule_id": ".m.rule.encrypted", "default": true, "enabled": true } ], "sender": [], "room": [ { "actions": [ "dont_notify" ], "rule_id": "!zVpPeWAObqutioiNzB:jki.re", "enabled": true }, { "actions": [ "dont_notify" ], "rule_id": "!nOUsIUkdCEMFqwiMXO:matrix.org", "enabled": true }, { "actions": [ "dont_notify" ], "rule_id": "!FPUfgzXYWTKgIrwKxW:matrix.org", "enabled": true }, { "actions": [ "dont_notify" ], "rule_id": "!yjVgJUsMLYLAONsoii:jki.re", "enabled": true }, { "actions": [ "dont_notify" ], "rule_id": "!OYyXUbcTKVsDBUniNn:matrix.eclabs.de", "enabled": true }, { "actions": [ "dont_notify" ], "rule_id": "!DdJkzRliezrwpNebLk:matrix.org", "enabled": true }, { "actions": [ "dont_notify" ], "rule_id": "!UmtgDmQCkKlaIkLEyH:half-shot.uk", "enabled": true }, { "actions": [ "dont_notify" ], "rule_id": "!qXkGwIopNrIUglrMJT:lant.uk", "enabled": true }, { "actions": [ "dont_notify" ], "rule_id": "!svJUttHBtRMdXmEhEy:matrix.org", "enabled": true }, { "actions": [ "dont_notify" ], "rule_id": "!TfGOBljmIFILPqKYwQ:matrix.org", "enabled": true }, { "actions": [ "dont_notify" ], "rule_id": "!yZHTGeDKZUeKaqeTeU:matrix.org", "enabled": true }, { "actions": [ "dont_notify" ], "rule_id": "!DYgXKezaHgMbiPMzjX:matrix.org", "enabled": true }, { "actions": [ "dont_notify" ], "rule_id": "!YkZelGRiqijtzXZODa:matrix.org", "enabled": true }, { "actions": [ "dont_notify" ], "rule_id": "!RbKRuLTvHIhArQcvjr:matrix.org", "enabled": true }, { "actions": [ "dont_notify" ], "rule_id": "!JJWoPvaGeOhPudCOMt:matrix.org", "enabled": true }, { "actions": [ "dont_notify" ], "rule_id": "!iNmaIQExDMeqdITdHH:matrix.org", "enabled": true }, { "actions": [ "dont_notify" ], "rule_id": "!UwfyezyoefyCIPOOXS:matrix.org", "enabled": true } ], "content": [ { "actions": [ "notify", { "set_tweak": "sound", "value": "default" }, { "set_tweak": "highlight" } ], "pattern": "rxl881", "rule_id": ".m.rule.contains_user_name", "default": true, "enabled": true } ], "override": [ { "conditions": [], "actions": [ "dont_notify" ], "rule_id": ".m.rule.master", "default": true, "enabled": false }, { "conditions": [ { "kind": "event_match", "key": "content.msgtype", "pattern": "m.notice" } ], "actions": [ "dont_notify" ], "rule_id": ".m.rule.suppress_notices", "default": true, "enabled": true }, { "conditions": [ { "kind": "event_match", "key": "type", "pattern": "m.room.member" }, { "kind": "event_match", "key": "content.membership", "pattern": "invite" }, { "kind": "event_match", "key": "state_key", "pattern": "@rxl881:vector.modular.im" } ], "actions": [ "notify", { "set_tweak": "sound", "value": "default" }, { "set_tweak": "highlight", "value": false } ], "rule_id": ".m.rule.invite_for_me", "default": true, "enabled": true }, { "conditions": [ { "kind": "event_match", "key": "type", "pattern": "m.room.member" } ], "actions": [ "dont_notify" ], "rule_id": ".m.rule.member_event", "default": true, "enabled": true }, { "conditions": [ { "kind": "contains_display_name" } ], "actions": [ "notify", { "set_tweak": "sound", "value": "default" }, { "set_tweak": "highlight" } ], "rule_id": ".m.rule.contains_display_name", "default": true, "enabled": true }, { "conditions": [ { "kind": "event_match", "key": "content.body", "pattern": "@room" }, { "kind": "sender_notification_permission", "key": "room" } ], "actions": [ "notify", { "set_tweak": "highlight", "value": true } ], "rule_id": ".m.rule.roomnotif", "default": true, "enabled": true }, { "conditions": [ { "kind": "event_match", "key": "type", "pattern": "m.room.tombstone" } ], "actions": [ "notify", { "set_tweak": "highlight", "value": true } ], "rule_id": ".m.rule.tombstone", "default": true, "enabled": true } ] }, "device": {} } ``` - **Platform**: web (in-browser) or desktop? For the web app: - **Browser**: Chrome - **OS**: macOS, Ubuntu - **URL**: riot.im/develop
defect
unread notification not associated with a room description messages sent by others to a particular room result in an unread messages notification badge on the rooms section header but there is no notifications badge for the corresponding room this makes it very hard to track down where the notification is coming from and clear it this behaviour is seen on all of my devices and was observed before enabling edits reactions as requested by dbkr here are my push notification rules global underride conditions kind event match key type pattern m call invite actions notify set tweak sound value ring set tweak highlight value false rule id m rule call default true enabled true conditions kind room member count is kind event match key type pattern m room message actions notify set tweak sound value default set tweak highlight value false rule id m rule room one to one default true enabled true conditions kind room member count is kind event match key type pattern m room encrypted actions notify set tweak sound value default set tweak highlight value false rule id m rule encrypted room one to one default true enabled true conditions kind event match key type pattern m room message actions notify set tweak highlight value false rule id m rule message default true enabled true conditions kind event match key type pattern m room encrypted actions notify set tweak highlight value false rule id m rule encrypted default true enabled true sender room actions dont notify rule id zvppewaobqutioinzb jki re enabled true actions dont notify rule id nousiukdcemfqwimxo matrix org enabled true actions dont notify rule id fpufgzxywtkgirwkxw matrix org enabled true actions dont notify rule id yjvgjusmlylaonsoii jki re enabled true actions dont notify rule id oyyxubctkvsdbuninn matrix eclabs de enabled true actions dont notify rule id ddjkzrliezrwpneblk matrix org enabled true actions dont notify rule id umtgdmqckklaikleyh half shot uk enabled true actions dont notify rule id qxkgwiopnriuglrmjt lant uk enabled true actions dont notify rule id svjutthbtrmdxmehey matrix org enabled true actions dont notify rule id tfgobljmifilpqkywq matrix org enabled true actions dont notify rule id yzhtgedkzuekaqeteu matrix org enabled true actions dont notify rule id dygxkezahgmbipmzjx matrix org enabled true actions dont notify rule id ykzelgriqijtzxzoda matrix org enabled true actions dont notify rule id rbkrultvhiharqcvjr matrix org enabled true actions dont notify rule id jjwopvageohpudcomt matrix org enabled true actions dont notify rule id inmaiqexdmeqditdhh matrix org enabled true actions dont notify rule id uwfyezyoefycipooxs matrix org enabled true content actions notify set tweak sound value default set tweak highlight pattern rule id m rule contains user name default true enabled true override conditions actions dont notify rule id m rule master default true enabled false conditions kind event match key content msgtype pattern m notice actions dont notify rule id m rule suppress notices default true enabled true conditions kind event match key type pattern m room member kind event match key content membership pattern invite kind event match key state key pattern vector modular im actions notify set tweak sound value default set tweak highlight value false rule id m rule invite for me default true enabled true conditions kind event match key type pattern m room member actions dont notify rule id m rule member event default true enabled true conditions kind contains display name actions notify set tweak sound value default set tweak highlight rule id m rule contains display name default true enabled true conditions kind event match key content body pattern room kind sender notification permission key room actions notify set tweak highlight value true rule id m rule roomnotif default true enabled true conditions kind event match key type pattern m room tombstone actions notify set tweak highlight value true rule id m rule tombstone default true enabled true device platform web in browser or desktop for the web app browser chrome os macos ubuntu url riot im develop
1
26,706
4,777,613,997
IssuesEvent
2016-10-27 16:46:59
wheeler-microfluidics/microdrop
https://api.github.com/repos/wheeler-microfluidics/microdrop
closed
Fix startup behaviour (Trac #35)
defect microdrop Migrated from Trac
Fix problems with initial startup (e.g., when no device is loaded, disable protocol menu and other relevant controls, etc.). Migrated from http://microfluidics.utoronto.ca/ticket/35 ```json { "status": "closed", "changetime": "2014-04-17T19:39:01", "description": "Fix problems with initial startup (e.g., when no device is loaded,\ndisable protocol menu and other relevant controls, etc.).", "reporter": "cfobel", "cc": "", "resolution": "fixed", "_ts": "1397763541728826", "component": "microdrop", "summary": "Fix startup behaviour", "priority": "major", "keywords": "", "version": "0.1", "time": "2012-01-06T21:40:02", "milestone": "Microdrop 1.0", "owner": "cfobel", "type": "defect" } ```
1.0
Fix startup behaviour (Trac #35) - Fix problems with initial startup (e.g., when no device is loaded, disable protocol menu and other relevant controls, etc.). Migrated from http://microfluidics.utoronto.ca/ticket/35 ```json { "status": "closed", "changetime": "2014-04-17T19:39:01", "description": "Fix problems with initial startup (e.g., when no device is loaded,\ndisable protocol menu and other relevant controls, etc.).", "reporter": "cfobel", "cc": "", "resolution": "fixed", "_ts": "1397763541728826", "component": "microdrop", "summary": "Fix startup behaviour", "priority": "major", "keywords": "", "version": "0.1", "time": "2012-01-06T21:40:02", "milestone": "Microdrop 1.0", "owner": "cfobel", "type": "defect" } ```
defect
fix startup behaviour trac fix problems with initial startup e g when no device is loaded disable protocol menu and other relevant controls etc migrated from json status closed changetime description fix problems with initial startup e g when no device is loaded ndisable protocol menu and other relevant controls etc reporter cfobel cc resolution fixed ts component microdrop summary fix startup behaviour priority major keywords version time milestone microdrop owner cfobel type defect
1
30,615
6,194,260,517
IssuesEvent
2017-07-05 09:27:57
contao/standard-edition
https://api.github.com/repos/contao/standard-edition
closed
Add basic security
defect
I would like to add the [NelmioSecurityBundle](https://github.com/nelmio/NelmioSecurityBundle) to our default configuration and configure it with the following basic settings: ```yaml # Security configuration nelmio_security: clickjacking: paths: '^/.*': SAMEORIGIN content_type: nosniff: true referrer_policy: enabled: true policies: - 'origin-when-cross-origin' xss_protection: enabled: true mode_block: true ``` These basic settings should apply (and should be applied :smile:) to every website. @contao/developers Any objections?
1.0
Add basic security - I would like to add the [NelmioSecurityBundle](https://github.com/nelmio/NelmioSecurityBundle) to our default configuration and configure it with the following basic settings: ```yaml # Security configuration nelmio_security: clickjacking: paths: '^/.*': SAMEORIGIN content_type: nosniff: true referrer_policy: enabled: true policies: - 'origin-when-cross-origin' xss_protection: enabled: true mode_block: true ``` These basic settings should apply (and should be applied :smile:) to every website. @contao/developers Any objections?
defect
add basic security i would like to add the to our default configuration and configure it with the following basic settings yaml security configuration nelmio security clickjacking paths sameorigin content type nosniff true referrer policy enabled true policies origin when cross origin xss protection enabled true mode block true these basic settings should apply and should be applied smile to every website contao developers any objections
1
26,765
4,778,175,888
IssuesEvent
2016-10-27 18:30:02
wheeler-microfluidics/microdrop
https://api.github.com/repos/wheeler-microfluidics/microdrop
closed
Problem installing task-scheduler (Trac #151)
defect microdrop Migrated from Trac
I am getting the following error when running the `pip install -r requirements.txt` file. The problems seems to be intermittent (i.e., it doesn't happen every time), but I was able to reproduce it on a clean repository. ``` Obtaining task-scheduler from git+https://github.com/cfobel/task_scheduler.git@master#egg=task-scheduler-dev (from -r requirements.txt (line 17)) Cloning https://github.com/cfobel/task_scheduler.git (to master) to c:\users\ryan\documents\dev\python\microdrop\src\task-scheduler Unpacking objects: 100% (30/30), done. Running setup.py egg_info for package task-scheduler Traceback (most recent call last): File "<string>", line 14, in <module> File "C:\Users\ryan\Documents\dev\python\microdrop\src\task-scheduler\setup.py", line 7, in <module> version=version.getVersion(), File "version.py", line 116, in getVersion raise ValueError('Cannot find the version number') ValueError: Cannot find the version number Complete output from command python setup.py egg_info: Traceback (most recent call last): File "<string>", line 14, in <module> File "C:\Users\ryan\Documents\dev\python\microdrop\src\task-scheduler\setup.py", line 7, in <module> version=version.getVersion(), File "version.py", line 116, in getVersion raise ValueError('Cannot find the version number') ValueError: Cannot find the version number ---------------------------------------- Command python setup.py egg_info failed with error code 1 ``` Migrated from http://microfluidics.utoronto.ca/microdrop/ticket/151 ```json { "status": "closed", "changetime": "2014-04-17T19:39:01", "description": "I am getting the following error when running the `pip install -r requirements.txt` file. The problems seems to be intermittent (i.e., it doesn't happen every time), but I was able to reproduce it on a clean repository.\n\n{{{\nObtaining task-scheduler from git+https://github.com/cfobel/task_scheduler.git@master#egg=task-scheduler-dev (from -r requirements.txt (line 17))\n Cloning https://github.com/cfobel/task_scheduler.git (to master) to c:\\users\\ryan\\documents\\dev\\python\\microdrop\\src\\task-scheduler\nUnpacking objects: 100% (30/30), done.\n Running setup.py egg_info for package task-scheduler\n Traceback (most recent call last):\n File \"<string>\", line 14, in <module>\n File \"C:\\Users\\ryan\\Documents\\dev\\python\\microdrop\\src\\task-scheduler\\setup.py\", line 7, in <module>\n version=version.getVersion(),\n File \"version.py\", line 116, in getVersion\n raise ValueError('Cannot find the version number')\n ValueError: Cannot find the version number\n Complete output from command python setup.py egg_info:\n Traceback (most recent call last):\n File \"<string>\", line 14, in <module>\n File \"C:\\Users\\ryan\\Documents\\dev\\python\\microdrop\\src\\task-scheduler\\setup.py\", line 7, in <module>\n version=version.getVersion(),\n File \"version.py\", line 116, in getVersion\n raise ValueError('Cannot find the version number')\nValueError: Cannot find the version number\n\n----------------------------------------\nCommand python setup.py egg_info failed with error code 1\n}}}", "reporter": "ryan", "cc": "", "resolution": "fixed", "_ts": "1397763541728826", "component": "microdrop", "summary": "Problem installing task-scheduler", "priority": "major", "keywords": "", "version": "0.1", "time": "2014-03-14T02:14:25", "milestone": "Microdrop 1.0", "owner": "", "type": "defect" } ```
1.0
Problem installing task-scheduler (Trac #151) - I am getting the following error when running the `pip install -r requirements.txt` file. The problems seems to be intermittent (i.e., it doesn't happen every time), but I was able to reproduce it on a clean repository. ``` Obtaining task-scheduler from git+https://github.com/cfobel/task_scheduler.git@master#egg=task-scheduler-dev (from -r requirements.txt (line 17)) Cloning https://github.com/cfobel/task_scheduler.git (to master) to c:\users\ryan\documents\dev\python\microdrop\src\task-scheduler Unpacking objects: 100% (30/30), done. Running setup.py egg_info for package task-scheduler Traceback (most recent call last): File "<string>", line 14, in <module> File "C:\Users\ryan\Documents\dev\python\microdrop\src\task-scheduler\setup.py", line 7, in <module> version=version.getVersion(), File "version.py", line 116, in getVersion raise ValueError('Cannot find the version number') ValueError: Cannot find the version number Complete output from command python setup.py egg_info: Traceback (most recent call last): File "<string>", line 14, in <module> File "C:\Users\ryan\Documents\dev\python\microdrop\src\task-scheduler\setup.py", line 7, in <module> version=version.getVersion(), File "version.py", line 116, in getVersion raise ValueError('Cannot find the version number') ValueError: Cannot find the version number ---------------------------------------- Command python setup.py egg_info failed with error code 1 ``` Migrated from http://microfluidics.utoronto.ca/microdrop/ticket/151 ```json { "status": "closed", "changetime": "2014-04-17T19:39:01", "description": "I am getting the following error when running the `pip install -r requirements.txt` file. The problems seems to be intermittent (i.e., it doesn't happen every time), but I was able to reproduce it on a clean repository.\n\n{{{\nObtaining task-scheduler from git+https://github.com/cfobel/task_scheduler.git@master#egg=task-scheduler-dev (from -r requirements.txt (line 17))\n Cloning https://github.com/cfobel/task_scheduler.git (to master) to c:\\users\\ryan\\documents\\dev\\python\\microdrop\\src\\task-scheduler\nUnpacking objects: 100% (30/30), done.\n Running setup.py egg_info for package task-scheduler\n Traceback (most recent call last):\n File \"<string>\", line 14, in <module>\n File \"C:\\Users\\ryan\\Documents\\dev\\python\\microdrop\\src\\task-scheduler\\setup.py\", line 7, in <module>\n version=version.getVersion(),\n File \"version.py\", line 116, in getVersion\n raise ValueError('Cannot find the version number')\n ValueError: Cannot find the version number\n Complete output from command python setup.py egg_info:\n Traceback (most recent call last):\n File \"<string>\", line 14, in <module>\n File \"C:\\Users\\ryan\\Documents\\dev\\python\\microdrop\\src\\task-scheduler\\setup.py\", line 7, in <module>\n version=version.getVersion(),\n File \"version.py\", line 116, in getVersion\n raise ValueError('Cannot find the version number')\nValueError: Cannot find the version number\n\n----------------------------------------\nCommand python setup.py egg_info failed with error code 1\n}}}", "reporter": "ryan", "cc": "", "resolution": "fixed", "_ts": "1397763541728826", "component": "microdrop", "summary": "Problem installing task-scheduler", "priority": "major", "keywords": "", "version": "0.1", "time": "2014-03-14T02:14:25", "milestone": "Microdrop 1.0", "owner": "", "type": "defect" } ```
defect
problem installing task scheduler trac i am getting the following error when running the pip install r requirements txt file the problems seems to be intermittent i e it doesn t happen every time but i was able to reproduce it on a clean repository obtaining task scheduler from git from r requirements txt line cloning to master to c users ryan documents dev python microdrop src task scheduler unpacking objects done running setup py egg info for package task scheduler traceback most recent call last file line in file c users ryan documents dev python microdrop src task scheduler setup py line in version version getversion file version py line in getversion raise valueerror cannot find the version number valueerror cannot find the version number complete output from command python setup py egg info traceback most recent call last file line in file c users ryan documents dev python microdrop src task scheduler setup py line in version version getversion file version py line in getversion raise valueerror cannot find the version number valueerror cannot find the version number command python setup py egg info failed with error code migrated from json status closed changetime description i am getting the following error when running the pip install r requirements txt file the problems seems to be intermittent i e it doesn t happen every time but i was able to reproduce it on a clean repository n n nobtaining task scheduler from git from r requirements txt line n cloning to master to c users ryan documents dev python microdrop src task scheduler nunpacking objects done n running setup py egg info for package task scheduler n traceback most recent call last n file line in n file c users ryan documents dev python microdrop src task scheduler setup py line in n version version getversion n file version py line in getversion n raise valueerror cannot find the version number n valueerror cannot find the version number n complete output from command python setup py egg info n traceback most recent call last n file line in n file c users ryan documents dev python microdrop src task scheduler setup py line in n version version getversion n file version py line in getversion n raise valueerror cannot find the version number nvalueerror cannot find the version number n n ncommand python setup py egg info failed with error code n reporter ryan cc resolution fixed ts component microdrop summary problem installing task scheduler priority major keywords version time milestone microdrop owner type defect
1
816,063
30,586,863,016
IssuesEvent
2023-07-21 14:00:57
kytos-ng/telemetry_int
https://api.github.com/repos/kytos-ng/telemetry_int
opened
UI: placeholder to refine the UI
priority_low epic_telemetry_int_v1
The minimal UI to enable INT in a single EVC will be covered on `mef_eline`'s UI https://github.com/kytos-ng/mef_eline/issues/180 But still it's desirable to have UI fully supporting these endpoints: - `POST v1/evc/enable` - `POST v1/evc/disable` - `GET v1/evc` It still needs refined, but I'll go ahead and capture this on this issue, based on our last planning `2023.2`, it's desirable to have, it's our tentative list, so I'll leave it with priority_low at this time
1.0
UI: placeholder to refine the UI - The minimal UI to enable INT in a single EVC will be covered on `mef_eline`'s UI https://github.com/kytos-ng/mef_eline/issues/180 But still it's desirable to have UI fully supporting these endpoints: - `POST v1/evc/enable` - `POST v1/evc/disable` - `GET v1/evc` It still needs refined, but I'll go ahead and capture this on this issue, based on our last planning `2023.2`, it's desirable to have, it's our tentative list, so I'll leave it with priority_low at this time
non_defect
ui placeholder to refine the ui the minimal ui to enable int in a single evc will be covered on mef eline s ui but still it s desirable to have ui fully supporting these endpoints post evc enable post evc disable get evc it still needs refined but i ll go ahead and capture this on this issue based on our last planning it s desirable to have it s our tentative list so i ll leave it with priority low at this time
0
1,767
2,571,135,844
IssuesEvent
2015-02-10 14:52:05
pydata/pandas
https://api.github.com/repos/pydata/pandas
closed
Groupby behaves differently when using levels and list of column keys
API Design Groupby
When grouping by several levels of a MultiIndex, groupby evaltuates all possible combinations of the groupby keys. When grouping by column name, it only evaluates what exist in the DataFrame. Also, this behavior does not exist in 0.14.1, but does in all final releases from 0.15.0 on. This may be a new feature, not a bug, but I couldn't find anything in the [docs](http://pandas.pydata.org/pandas-docs/stable/generated/pandas.DataFrame.groupby.html#pandas.DataFrame.groupby), open or closed issues, etc. (closest was Issue #8138). If this is the intended behavior, it would be nice to have in the docs. ```python import pandas as pd import numpy as np df = pd.DataFrame(np.arange(12).reshape(-1, 3)) df.index = pd.MultiIndex.from_tuples([(1, 1), (1, 2), (3, 4), (5, 6)]) idx_names = ['x', 'y'] df.index.names = idx_names # Adds nan's for (x, y) combinations that aren't in the data by_levels = df.groupby(level=idx_names).mean() # This does not add missing combinations of the groupby keys by_columns = df.reset_index().groupby(idx_names).mean() print by_levels print by_columns # This passes in 0.14.1, but not >=0.15.0 final assert by_levels.equals(by_columns) ``` INSTALLED VERSIONS ------------------ commit: None python: 2.7.7.final.0 python-bits: 64 OS: Windows OS-release: 7 machine: AMD64 processor: Intel64 Family 6 Model 60 Stepping 3, GenuineIntel byteorder: little LC_ALL: None LANG: None pandas: 0.15.2 nose: 1.3.4 Cython: 0.20.1 numpy: 1.9.1 scipy: 0.15.1 statsmodels: 0.7.0.dev-161a0f8 IPython: 2.3.0 sphinx: 1.2.2 patsy: 0.3.0 dateutil: 1.5 pytz: 2014.9 bottleneck: 0.8.0 tables: 3.1.1 numexpr: 2.3.1 matplotlib: 1.4.2 openpyxl: 1.8.5 xlrd: 0.9.3 xlwt: 0.7.5 xlsxwriter: 0.5.5 lxml: 3.3.5 bs4: 4.3.1 html5lib: None httplib2: None apiclient: None rpy2: None sqlalchemy: 0.9.4 pymysql: None psycopg2: None
1.0
Groupby behaves differently when using levels and list of column keys - When grouping by several levels of a MultiIndex, groupby evaltuates all possible combinations of the groupby keys. When grouping by column name, it only evaluates what exist in the DataFrame. Also, this behavior does not exist in 0.14.1, but does in all final releases from 0.15.0 on. This may be a new feature, not a bug, but I couldn't find anything in the [docs](http://pandas.pydata.org/pandas-docs/stable/generated/pandas.DataFrame.groupby.html#pandas.DataFrame.groupby), open or closed issues, etc. (closest was Issue #8138). If this is the intended behavior, it would be nice to have in the docs. ```python import pandas as pd import numpy as np df = pd.DataFrame(np.arange(12).reshape(-1, 3)) df.index = pd.MultiIndex.from_tuples([(1, 1), (1, 2), (3, 4), (5, 6)]) idx_names = ['x', 'y'] df.index.names = idx_names # Adds nan's for (x, y) combinations that aren't in the data by_levels = df.groupby(level=idx_names).mean() # This does not add missing combinations of the groupby keys by_columns = df.reset_index().groupby(idx_names).mean() print by_levels print by_columns # This passes in 0.14.1, but not >=0.15.0 final assert by_levels.equals(by_columns) ``` INSTALLED VERSIONS ------------------ commit: None python: 2.7.7.final.0 python-bits: 64 OS: Windows OS-release: 7 machine: AMD64 processor: Intel64 Family 6 Model 60 Stepping 3, GenuineIntel byteorder: little LC_ALL: None LANG: None pandas: 0.15.2 nose: 1.3.4 Cython: 0.20.1 numpy: 1.9.1 scipy: 0.15.1 statsmodels: 0.7.0.dev-161a0f8 IPython: 2.3.0 sphinx: 1.2.2 patsy: 0.3.0 dateutil: 1.5 pytz: 2014.9 bottleneck: 0.8.0 tables: 3.1.1 numexpr: 2.3.1 matplotlib: 1.4.2 openpyxl: 1.8.5 xlrd: 0.9.3 xlwt: 0.7.5 xlsxwriter: 0.5.5 lxml: 3.3.5 bs4: 4.3.1 html5lib: None httplib2: None apiclient: None rpy2: None sqlalchemy: 0.9.4 pymysql: None psycopg2: None
non_defect
groupby behaves differently when using levels and list of column keys when grouping by several levels of a multiindex groupby evaltuates all possible combinations of the groupby keys when grouping by column name it only evaluates what exist in the dataframe also this behavior does not exist in but does in all final releases from on this may be a new feature not a bug but i couldn t find anything in the open or closed issues etc closest was issue if this is the intended behavior it would be nice to have in the docs python import pandas as pd import numpy as np df pd dataframe np arange reshape df index pd multiindex from tuples idx names df index names idx names adds nan s for x y combinations that aren t in the data by levels df groupby level idx names mean this does not add missing combinations of the groupby keys by columns df reset index groupby idx names mean print by levels print by columns this passes in but not final assert by levels equals by columns installed versions commit none python final python bits os windows os release machine processor family model stepping genuineintel byteorder little lc all none lang none pandas nose cython numpy scipy statsmodels dev ipython sphinx patsy dateutil pytz bottleneck tables numexpr matplotlib openpyxl xlrd xlwt xlsxwriter lxml none none apiclient none none sqlalchemy pymysql none none
0
48,277
13,067,594,027
IssuesEvent
2020-07-31 00:57:50
icecube-trac/tix2
https://api.github.com/repos/icecube-trac/tix2
closed
[spline-reco] Bug leads to segmentation violation in case of an 'anomalously large charge' (Trac #2119)
Migrated from Trac analysis defect
In `I3SplineRecoLikelihood::KS0Limit(int npulses, int level)` an array is accessed with `ks_test[npulses - 1]` but does not check if `npulses < 1`. I saw a couple of events that call this function with `npulses = 0` but apparently it didn't break the execution. However, I found a case with ```text I3HitOm.h:111 WARNING: got anomalously large charge=1.64923e+10 PE in OM at (x,y,z)=(429.8,351.0,-344.9) ``` that leads to an overflow of `totalcharge` in `I3SplineRecoLikelihood::GetApprovedCharge`. Finally, `npulses` is small enough (e.g. `npulses = -2147483648`) to cause a segmentation violation. http://code.icecube.wisc.edu/projects/icecube/browser/IceCube/projects/spline-reco/trunk/private/spline-reco/I3SplineRecoLikelihood.cxx?rev=157082#L867 This bug blocks processing of a pass2 file. Migrated from https://code.icecube.wisc.edu/ticket/2119 ```json { "status": "closed", "changetime": "2019-02-13T14:14:55", "description": "In `I3SplineRecoLikelihood::KS0Limit(int npulses, int level)` an array is accessed with `ks_test[npulses - 1]` but does not check if `npulses < 1`.\n\nI saw a couple of events that call this function with `npulses = 0` but apparently it didn't break the execution. However, I found a case with\n\n{{{\nI3HitOm.h:111 WARNING: got anomalously large charge=1.64923e+10 PE in OM at (x,y,z)=(429.8,351.0,-344.9)\n}}}\n\nthat leads to an overflow of `totalcharge` in `I3SplineRecoLikelihood::GetApprovedCharge`. Finally, `npulses` is small enough (e.g. `npulses = -2147483648`) to cause a segmentation violation.\n\nhttp://code.icecube.wisc.edu/projects/icecube/browser/IceCube/projects/spline-reco/trunk/private/spline-reco/I3SplineRecoLikelihood.cxx?rev=157082#L867\n\nThis bug blocks processing of a pass2 file.", "reporter": "joertlin", "cc": "", "resolution": "fixed", "_ts": "1550067295757382", "component": "analysis", "summary": "[spline-reco] Bug leads to segmentation violation in case of an 'anomalously large charge'", "priority": "critical", "keywords": "", "time": "2017-12-01T21:22:27", "milestone": "", "owner": "kjmeagher", "type": "defect" } ```
1.0
[spline-reco] Bug leads to segmentation violation in case of an 'anomalously large charge' (Trac #2119) - In `I3SplineRecoLikelihood::KS0Limit(int npulses, int level)` an array is accessed with `ks_test[npulses - 1]` but does not check if `npulses < 1`. I saw a couple of events that call this function with `npulses = 0` but apparently it didn't break the execution. However, I found a case with ```text I3HitOm.h:111 WARNING: got anomalously large charge=1.64923e+10 PE in OM at (x,y,z)=(429.8,351.0,-344.9) ``` that leads to an overflow of `totalcharge` in `I3SplineRecoLikelihood::GetApprovedCharge`. Finally, `npulses` is small enough (e.g. `npulses = -2147483648`) to cause a segmentation violation. http://code.icecube.wisc.edu/projects/icecube/browser/IceCube/projects/spline-reco/trunk/private/spline-reco/I3SplineRecoLikelihood.cxx?rev=157082#L867 This bug blocks processing of a pass2 file. Migrated from https://code.icecube.wisc.edu/ticket/2119 ```json { "status": "closed", "changetime": "2019-02-13T14:14:55", "description": "In `I3SplineRecoLikelihood::KS0Limit(int npulses, int level)` an array is accessed with `ks_test[npulses - 1]` but does not check if `npulses < 1`.\n\nI saw a couple of events that call this function with `npulses = 0` but apparently it didn't break the execution. However, I found a case with\n\n{{{\nI3HitOm.h:111 WARNING: got anomalously large charge=1.64923e+10 PE in OM at (x,y,z)=(429.8,351.0,-344.9)\n}}}\n\nthat leads to an overflow of `totalcharge` in `I3SplineRecoLikelihood::GetApprovedCharge`. Finally, `npulses` is small enough (e.g. `npulses = -2147483648`) to cause a segmentation violation.\n\nhttp://code.icecube.wisc.edu/projects/icecube/browser/IceCube/projects/spline-reco/trunk/private/spline-reco/I3SplineRecoLikelihood.cxx?rev=157082#L867\n\nThis bug blocks processing of a pass2 file.", "reporter": "joertlin", "cc": "", "resolution": "fixed", "_ts": "1550067295757382", "component": "analysis", "summary": "[spline-reco] Bug leads to segmentation violation in case of an 'anomalously large charge'", "priority": "critical", "keywords": "", "time": "2017-12-01T21:22:27", "milestone": "", "owner": "kjmeagher", "type": "defect" } ```
defect
bug leads to segmentation violation in case of an anomalously large charge trac in int npulses int level an array is accessed with ks test but does not check if npulses i saw a couple of events that call this function with npulses but apparently it didn t break the execution however i found a case with text h warning got anomalously large charge pe in om at x y z that leads to an overflow of totalcharge in getapprovedcharge finally npulses is small enough e g npulses to cause a segmentation violation this bug blocks processing of a file migrated from json status closed changetime description in int npulses int level an array is accessed with ks test but does not check if npulses n ni saw a couple of events that call this function with npulses but apparently it didn t break the execution however i found a case with n n h warning got anomalously large charge pe in om at x y z n n nthat leads to an overflow of totalcharge in getapprovedcharge finally npulses is small enough e g npulses to cause a segmentation violation n n bug blocks processing of a file reporter joertlin cc resolution fixed ts component analysis summary bug leads to segmentation violation in case of an anomalously large charge priority critical keywords time milestone owner kjmeagher type defect
1
418,953
28,133,424,673
IssuesEvent
2023-04-01 04:58:39
Lekuini/Tp1_grupal_Prog3
https://api.github.com/repos/Lekuini/Tp1_grupal_Prog3
closed
Ejercicio 1 - Aporte 1
documentation
1 - Creación del formulario "Ejercicio 1". 2 - Modificación de las propiedades nombre y texto. 3 - Agregar el código dentro del evento Click del botón "ejercicio 1" del formulario principal. 4 - Agregar todos elementos que componen el formulario "Nombres"
1.0
Ejercicio 1 - Aporte 1 - 1 - Creación del formulario "Ejercicio 1". 2 - Modificación de las propiedades nombre y texto. 3 - Agregar el código dentro del evento Click del botón "ejercicio 1" del formulario principal. 4 - Agregar todos elementos que componen el formulario "Nombres"
non_defect
ejercicio aporte creación del formulario ejercicio modificación de las propiedades nombre y texto agregar el código dentro del evento click del botón ejercicio del formulario principal agregar todos elementos que componen el formulario nombres
0
97,059
20,158,279,907
IssuesEvent
2022-02-09 18:36:04
sourcegraph/sourcegraph
https://api.github.com/repos/sourcegraph/sourcegraph
closed
Focus search input issues when using keyboard navigation
bug team/growth-and-integrations vscode-extension
Issue 1: search input not adding cursor when using keybindings to navigate back and forth between tabs. #### Expected behavior: When keyboard navigating back and forth between other files back to Sourcegraph search file, users expect that hitting tab once in the Sourcegraph search will highlight input field and add cursor to edit. #### Actual behavior: Taken from [internal feedback](https://sourcegraph.slack.com/archives/C02E3HHDZ98/p1643662302885139). When user keyboard navigates to a different VS Code file then returns to the Sourcegraph search file (using keyboard nav), hitting tab once on the Sourcegraph search file highlights the search input field, but does not include a cursor for a user to edit.
1.0
Focus search input issues when using keyboard navigation - Issue 1: search input not adding cursor when using keybindings to navigate back and forth between tabs. #### Expected behavior: When keyboard navigating back and forth between other files back to Sourcegraph search file, users expect that hitting tab once in the Sourcegraph search will highlight input field and add cursor to edit. #### Actual behavior: Taken from [internal feedback](https://sourcegraph.slack.com/archives/C02E3HHDZ98/p1643662302885139). When user keyboard navigates to a different VS Code file then returns to the Sourcegraph search file (using keyboard nav), hitting tab once on the Sourcegraph search file highlights the search input field, but does not include a cursor for a user to edit.
non_defect
focus search input issues when using keyboard navigation issue search input not adding cursor when using keybindings to navigate back and forth between tabs expected behavior when keyboard navigating back and forth between other files back to sourcegraph search file users expect that hitting tab once in the sourcegraph search will highlight input field and add cursor to edit actual behavior taken from when user keyboard navigates to a different vs code file then returns to the sourcegraph search file using keyboard nav hitting tab once on the sourcegraph search file highlights the search input field but does not include a cursor for a user to edit
0
64,901
18,957,074,134
IssuesEvent
2021-11-18 21:41:10
matrix-org/synapse
https://api.github.com/repos/matrix-org/synapse
opened
Incremental `/sync` and `/transactions query events differently
z-application-service z-sync T-Defect
*As discovered in https://github.com/matrix-org/synapse/pull/11265#discussion_r745413607* --- `/sync` looks for `stream_ordering` but excludes all `outliers`. https://github.com/matrix-org/synapse/blob/b09d90cac9179f84024d4cb3ab4574480c1fd1df/synapse/storage/databases/main/stream.py#L519-L527 Whereas `/transactions`(Application service API) only cares about `stream_ordering`. https://github.com/matrix-org/synapse/blob/b09d90cac9179f84024d4cb3ab4574480c1fd1df/synapse/storage/databases/main/appservice.py#L358-L368 The behavior of these two endpoints should probably return and push the same events. Here is the history behind why we added `AND not outlier` to the incremental sync endpoint, "Don't return outliers when we get recent events for rooms.", https://github.com/matrix-org/synapse/commit/1505055334ecff6516c0b388efe4c5759e59fad0 but it doesn't explain the why or which interaction creates `outlier` events that aren't `backfilled`. ## What does the spec say? For `/transactions`, the spec doesn't distinguish which events a homeserver should and shouldn't push, https://spec.matrix.org/v1.1/application-service-api/#put_matrixappv1transactionstxnid For [`/sync`](https://spec.matrix.org/v1.1/client-server-api/#get_matrixclientv3sync), there is also nothing so clear cut but it's obvious using the `since` pagination query parameter that it should return anything after which equates to `stream_ordering` in Synapse land. ## Potential solutions ### Exclude `outliers` in both Perhaps we should exclude `outliers` in `/transactions` so they both just match? @richvdh had some critique about this approach though: > the outlier flag seems like a poor way to decide whether we should push this data. (Yes, outliers shouldn't be sent over `/transactions`, but there are probably many other events which shouldn't be sent). > > `FederationEventHandler._process_received_pdu` has a `backfilled` parameter (see [`synapse/handlers/federation_event.py#L945`](https://github.com/matrix-org/synapse/blob/b09d90cac9179f84024d4cb3ab4574480c1fd1df/synapse/handlers/federation_event.py#L945)), whose purpose is slightly unclear, but I *think* one of its jobs is this sort of thing. Maybe we should use similar logic to that, somehow? > > [*-- @richvdh, https://github.com/matrix-org/synapse/pull/11265#discussion_r746523400*](https://github.com/matrix-org/synapse/pull/11265#discussion_r746523400) But for `/transactions`, we can't tell whether the event was `backfilled`. The only indication is that the `stream_ordering` would be negative which is what the `/transactions` code already takes into account. ### Only exclude `backfilled` events This means only relying on `stream_ordering`. Then any interaction creating `outliers` that we don't want to appear down `/sync`/`/transactions`, should be updated to be marked as `backfilled`. ## Dev notes ### `/sync` stack trace - [`SyncRestServlet.on_GET`](https://github.com/matrix-org/synapse/blob/b09d90cac9179f84024d4cb3ab4574480c1fd1df/synapse/rest/client/sync.py#L113) - [`wait_for_sync_for_user`](https://github.com/matrix-org/synapse/blob/b09d90cac9179f84024d4cb3ab4574480c1fd1df/synapse/handlers/sync.py#L299) - [`_wait_for_sync_for_user`](https://github.com/matrix-org/synapse/blob/b09d90cac9179f84024d4cb3ab4574480c1fd1df/synapse/handlers/sync.py#L329) - [`current_sync_for_user`](https://github.com/matrix-org/synapse/blob/b09d90cac9179f84024d4cb3ab4574480c1fd1df/synapse/handlers/sync.py#L399) - [`generate_sync_result`](https://github.com/matrix-org/synapse/blob/b09d90cac9179f84024d4cb3ab4574480c1fd1df/synapse/handlers/sync.py#L1039) - [`_generate_sync_entry_for_rooms`](https://github.com/matrix-org/synapse/blob/b09d90cac9179f84024d4cb3ab4574480c1fd1df/synapse/handlers/sync.py#L1455) - [`_get_rooms_changed`](https://github.com/matrix-org/synapse/blob/b09d90cac9179f84024d4cb3ab4574480c1fd1df/synapse/handlers/sync.py#L1614) - [`get_room_events_stream_for_rooms`](https://github.com/matrix-org/synapse/blob/b09d90cac9179f84024d4cb3ab4574480c1fd1df/synapse/storage/databases/main/stream.py#L409) - [`get_room_events_stream_for_room`](https://github.com/matrix-org/synapse/blob/b09d90cac9179f84024d4cb3ab4574480c1fd1df/synapse/storage/databases/main/stream.py#L478-L527) ### `/transactions` stack trace - [`notify_interested_services`](https://github.com/matrix-org/synapse/blob/b09d90cac9179f84024d4cb3ab4574480c1fd1df/synapse/handlers/appservice.py#L66-L87) - [`_notify_interested_services`](https://github.com/matrix-org/synapse/blob/b09d90cac9179f84024d4cb3ab4574480c1fd1df/synapse/handlers/appservice.py#L90-L135) - [`get_new_events_for_appservice`](https://github.com/matrix-org/synapse/blob/b09d90cac9179f84024d4cb3ab4574480c1fd1df/synapse/storage/databases/main/appservice.py#L353-L368) - [`submit_event_for_as`](https://github.com/matrix-org/synapse/blob/b09d90cac9179f84024d4cb3ab4574480c1fd1df/synapse/handlers/appservice.py#L133-L135) [`submit_event_for_as`](https://github.com/matrix-org/synapse/blob/b09d90cac9179f84024d4cb3ab4574480c1fd1df/synapse/appservice/scheduler.py#L94-L95) -> - [`enqueue_event`](https://github.com/matrix-org/synapse/blob/b09d90cac9179f84024d4cb3ab4574480c1fd1df/synapse/appservice/scheduler.py#L129-L131) - [`_send_request`](https://github.com/matrix-org/synapse/blob/b09d90cac9179f84024d4cb3ab4574480c1fd1df/synapse/appservice/scheduler.py#L137-L157) - `appservice.scheduler.send` - [`create_appservice_txn`](https://github.com/matrix-org/synapse/blob/b09d90cac9179f84024d4cb3ab4574480c1fd1df/synapse/appservice/scheduler.py#L196-L201) - [`AppServiceTransaction.send`](https://github.com/matrix-org/synapse/blob/b09d90cac9179f84024d4cb3ab4574480c1fd1df/synapse/appservice/__init__.py#L338) - [`push_bulk`](https://github.com/matrix-org/synapse/blob/b09d90cac9179f84024d4cb3ab4574480c1fd1df/synapse/appservice/api.py#L202) - [`/transactions`](https://github.com/matrix-org/synapse/blob/b09d90cac9179f84024d4cb3ab4574480c1fd1df/synapse/appservice/api.py#L220)
1.0
Incremental `/sync` and `/transactions query events differently - *As discovered in https://github.com/matrix-org/synapse/pull/11265#discussion_r745413607* --- `/sync` looks for `stream_ordering` but excludes all `outliers`. https://github.com/matrix-org/synapse/blob/b09d90cac9179f84024d4cb3ab4574480c1fd1df/synapse/storage/databases/main/stream.py#L519-L527 Whereas `/transactions`(Application service API) only cares about `stream_ordering`. https://github.com/matrix-org/synapse/blob/b09d90cac9179f84024d4cb3ab4574480c1fd1df/synapse/storage/databases/main/appservice.py#L358-L368 The behavior of these two endpoints should probably return and push the same events. Here is the history behind why we added `AND not outlier` to the incremental sync endpoint, "Don't return outliers when we get recent events for rooms.", https://github.com/matrix-org/synapse/commit/1505055334ecff6516c0b388efe4c5759e59fad0 but it doesn't explain the why or which interaction creates `outlier` events that aren't `backfilled`. ## What does the spec say? For `/transactions`, the spec doesn't distinguish which events a homeserver should and shouldn't push, https://spec.matrix.org/v1.1/application-service-api/#put_matrixappv1transactionstxnid For [`/sync`](https://spec.matrix.org/v1.1/client-server-api/#get_matrixclientv3sync), there is also nothing so clear cut but it's obvious using the `since` pagination query parameter that it should return anything after which equates to `stream_ordering` in Synapse land. ## Potential solutions ### Exclude `outliers` in both Perhaps we should exclude `outliers` in `/transactions` so they both just match? @richvdh had some critique about this approach though: > the outlier flag seems like a poor way to decide whether we should push this data. (Yes, outliers shouldn't be sent over `/transactions`, but there are probably many other events which shouldn't be sent). > > `FederationEventHandler._process_received_pdu` has a `backfilled` parameter (see [`synapse/handlers/federation_event.py#L945`](https://github.com/matrix-org/synapse/blob/b09d90cac9179f84024d4cb3ab4574480c1fd1df/synapse/handlers/federation_event.py#L945)), whose purpose is slightly unclear, but I *think* one of its jobs is this sort of thing. Maybe we should use similar logic to that, somehow? > > [*-- @richvdh, https://github.com/matrix-org/synapse/pull/11265#discussion_r746523400*](https://github.com/matrix-org/synapse/pull/11265#discussion_r746523400) But for `/transactions`, we can't tell whether the event was `backfilled`. The only indication is that the `stream_ordering` would be negative which is what the `/transactions` code already takes into account. ### Only exclude `backfilled` events This means only relying on `stream_ordering`. Then any interaction creating `outliers` that we don't want to appear down `/sync`/`/transactions`, should be updated to be marked as `backfilled`. ## Dev notes ### `/sync` stack trace - [`SyncRestServlet.on_GET`](https://github.com/matrix-org/synapse/blob/b09d90cac9179f84024d4cb3ab4574480c1fd1df/synapse/rest/client/sync.py#L113) - [`wait_for_sync_for_user`](https://github.com/matrix-org/synapse/blob/b09d90cac9179f84024d4cb3ab4574480c1fd1df/synapse/handlers/sync.py#L299) - [`_wait_for_sync_for_user`](https://github.com/matrix-org/synapse/blob/b09d90cac9179f84024d4cb3ab4574480c1fd1df/synapse/handlers/sync.py#L329) - [`current_sync_for_user`](https://github.com/matrix-org/synapse/blob/b09d90cac9179f84024d4cb3ab4574480c1fd1df/synapse/handlers/sync.py#L399) - [`generate_sync_result`](https://github.com/matrix-org/synapse/blob/b09d90cac9179f84024d4cb3ab4574480c1fd1df/synapse/handlers/sync.py#L1039) - [`_generate_sync_entry_for_rooms`](https://github.com/matrix-org/synapse/blob/b09d90cac9179f84024d4cb3ab4574480c1fd1df/synapse/handlers/sync.py#L1455) - [`_get_rooms_changed`](https://github.com/matrix-org/synapse/blob/b09d90cac9179f84024d4cb3ab4574480c1fd1df/synapse/handlers/sync.py#L1614) - [`get_room_events_stream_for_rooms`](https://github.com/matrix-org/synapse/blob/b09d90cac9179f84024d4cb3ab4574480c1fd1df/synapse/storage/databases/main/stream.py#L409) - [`get_room_events_stream_for_room`](https://github.com/matrix-org/synapse/blob/b09d90cac9179f84024d4cb3ab4574480c1fd1df/synapse/storage/databases/main/stream.py#L478-L527) ### `/transactions` stack trace - [`notify_interested_services`](https://github.com/matrix-org/synapse/blob/b09d90cac9179f84024d4cb3ab4574480c1fd1df/synapse/handlers/appservice.py#L66-L87) - [`_notify_interested_services`](https://github.com/matrix-org/synapse/blob/b09d90cac9179f84024d4cb3ab4574480c1fd1df/synapse/handlers/appservice.py#L90-L135) - [`get_new_events_for_appservice`](https://github.com/matrix-org/synapse/blob/b09d90cac9179f84024d4cb3ab4574480c1fd1df/synapse/storage/databases/main/appservice.py#L353-L368) - [`submit_event_for_as`](https://github.com/matrix-org/synapse/blob/b09d90cac9179f84024d4cb3ab4574480c1fd1df/synapse/handlers/appservice.py#L133-L135) [`submit_event_for_as`](https://github.com/matrix-org/synapse/blob/b09d90cac9179f84024d4cb3ab4574480c1fd1df/synapse/appservice/scheduler.py#L94-L95) -> - [`enqueue_event`](https://github.com/matrix-org/synapse/blob/b09d90cac9179f84024d4cb3ab4574480c1fd1df/synapse/appservice/scheduler.py#L129-L131) - [`_send_request`](https://github.com/matrix-org/synapse/blob/b09d90cac9179f84024d4cb3ab4574480c1fd1df/synapse/appservice/scheduler.py#L137-L157) - `appservice.scheduler.send` - [`create_appservice_txn`](https://github.com/matrix-org/synapse/blob/b09d90cac9179f84024d4cb3ab4574480c1fd1df/synapse/appservice/scheduler.py#L196-L201) - [`AppServiceTransaction.send`](https://github.com/matrix-org/synapse/blob/b09d90cac9179f84024d4cb3ab4574480c1fd1df/synapse/appservice/__init__.py#L338) - [`push_bulk`](https://github.com/matrix-org/synapse/blob/b09d90cac9179f84024d4cb3ab4574480c1fd1df/synapse/appservice/api.py#L202) - [`/transactions`](https://github.com/matrix-org/synapse/blob/b09d90cac9179f84024d4cb3ab4574480c1fd1df/synapse/appservice/api.py#L220)
defect
incremental sync and transactions query events differently as discovered in sync looks for stream ordering but excludes all outliers whereas transactions application service api only cares about stream ordering the behavior of these two endpoints should probably return and push the same events here is the history behind why we added and not outlier to the incremental sync endpoint don t return outliers when we get recent events for rooms but it doesn t explain the why or which interaction creates outlier events that aren t backfilled what does the spec say for transactions the spec doesn t distinguish which events a homeserver should and shouldn t push for there is also nothing so clear cut but it s obvious using the since pagination query parameter that it should return anything after which equates to stream ordering in synapse land potential solutions exclude outliers in both perhaps we should exclude outliers in transactions so they both just match richvdh had some critique about this approach though the outlier flag seems like a poor way to decide whether we should push this data yes outliers shouldn t be sent over transactions but there are probably many other events which shouldn t be sent federationeventhandler process received pdu has a backfilled parameter see whose purpose is slightly unclear but i think one of its jobs is this sort of thing maybe we should use similar logic to that somehow but for transactions we can t tell whether the event was backfilled the only indication is that the stream ordering would be negative which is what the transactions code already takes into account only exclude backfilled events this means only relying on stream ordering then any interaction creating outliers that we don t want to appear down sync transactions should be updated to be marked as backfilled dev notes sync stack trace transactions stack trace appservice scheduler send
1
30,656
6,218,141,313
IssuesEvent
2017-07-08 21:53:29
codenautas/taller-simple
https://api.github.com/repos/codenautas/taller-simple
closed
Alguien tiene que controlar antes de despacharlas que las URL recibidas sean válidas
auto-migrated Priority-Medium Type-Defect
``` para que no pidan por ejemplo agregar una entidad que no existe (o que no está permitidas) ``` Original issue reported on code.google.com by `RaquelZS...@gmail.com` on 2 Oct 2014 at 3:58
1.0
Alguien tiene que controlar antes de despacharlas que las URL recibidas sean válidas - ``` para que no pidan por ejemplo agregar una entidad que no existe (o que no está permitidas) ``` Original issue reported on code.google.com by `RaquelZS...@gmail.com` on 2 Oct 2014 at 3:58
defect
alguien tiene que controlar antes de despacharlas que las url recibidas sean válidas para que no pidan por ejemplo agregar una entidad que no existe o que no está permitidas original issue reported on code google com by raquelzs gmail com on oct at
1
29,256
5,630,025,132
IssuesEvent
2017-04-05 11:03:14
buildo/react-components
https://api.github.com/repos/buildo/react-components
closed
Dropdown: no style for focus
breaking defect waiting for merge
## description Border-color should change when the dropdown is focused ## how to reproduce - focus on a dropdown ## specs - Add a new variable: `$border-color-focused` (with default value `$waterBlue`) and use it when needed ## misc {optional: other useful info}
1.0
Dropdown: no style for focus - ## description Border-color should change when the dropdown is focused ## how to reproduce - focus on a dropdown ## specs - Add a new variable: `$border-color-focused` (with default value `$waterBlue`) and use it when needed ## misc {optional: other useful info}
defect
dropdown no style for focus description border color should change when the dropdown is focused how to reproduce focus on a dropdown specs add a new variable border color focused with default value waterblue and use it when needed misc optional other useful info
1
416,718
12,150,820,629
IssuesEvent
2020-04-24 18:42:24
TheCodeXTeam/Kandahar-IHS
https://api.github.com/repos/TheCodeXTeam/Kandahar-IHS
closed
CSS sizes need fix
Effort: 2 For: UI Priority: Low Status: Completed Type: Bug
# Environment - The width of the browser 1280px and height is 619px. - All the sizes need to be change due to new design. # Steps to reproduce See CSS file. # Expected behavior Consistency in design. # Actual behavior Inconsistent design.
1.0
CSS sizes need fix - # Environment - The width of the browser 1280px and height is 619px. - All the sizes need to be change due to new design. # Steps to reproduce See CSS file. # Expected behavior Consistency in design. # Actual behavior Inconsistent design.
non_defect
css sizes need fix environment the width of the browser and height is all the sizes need to be change due to new design steps to reproduce see css file expected behavior consistency in design actual behavior inconsistent design
0
279,863
30,761,176,389
IssuesEvent
2023-07-29 18:17:37
hinoshiba/news
https://api.github.com/repos/hinoshiba/news
closed
[SecurityWeek] CardioComm Takes Systems Offline Following Cyberattack
SecurityWeek Stale
Canadian medical software provider CardioComm has taken systems offline to contain a cyberattack. The post [CardioComm Takes Systems Offline Following Cyberattack](https://www.securityweek.com/cardiocomm-takes-systems-offline-following-cyberattack/) appeared first on [SecurityWeek](https://www.securityweek.com). <https://www.securityweek.com/cardiocomm-takes-systems-offline-following-cyberattack/>
True
[SecurityWeek] CardioComm Takes Systems Offline Following Cyberattack - Canadian medical software provider CardioComm has taken systems offline to contain a cyberattack. The post [CardioComm Takes Systems Offline Following Cyberattack](https://www.securityweek.com/cardiocomm-takes-systems-offline-following-cyberattack/) appeared first on [SecurityWeek](https://www.securityweek.com). <https://www.securityweek.com/cardiocomm-takes-systems-offline-following-cyberattack/>
non_defect
cardiocomm takes systems offline following cyberattack canadian medical software provider cardiocomm has taken systems offline to contain a cyberattack the post appeared first on
0
158,925
24,919,326,578
IssuesEvent
2022-10-30 19:20:26
nextcloud/server
https://api.github.com/repos/nextcloud/server
closed
[Bug]: Menu elements not display block
bug design good first issue
### ⚠️ This issue respects the following points: ⚠️ - [X] This is a **bug**, not a question or a configuration/webserver/proxy issue. - [X] This issue is **not** already reported on Github _(I've searched it)_. - [X] Nextcloud Server **is** up to date. See [Maintenance and Release Schedule](https://github.com/nextcloud/server/wiki/Maintenance-and-Release-Schedule) for supported versions. - [X] Nextcloud Server **is** running on 64bit capable CPU, PHP and OS. - [X] I agree to follow Nextcloud's [Code of Conduct](https://nextcloud.com/contribute/code-of-conduct/). ### Bug description Menu items not display block. See animation: ![Animation](https://user-images.githubusercontent.com/1473674/198673855-13b2d61b-90dc-4e68-aa74-1fa122d7b653.gif) ### Steps to reproduce 1. open the menu of a file 2. the entries not 100% width ### Expected behavior full width is clickable for a user ### Installation method Community Manual installation with Archive ### Operating system Debian/Ubuntu ### PHP engine version PHP 8.1 ### Web server Apache (supported) ### Database engine version MariaDB ### Is this bug present after an update or on a fresh install? Updated to a major version (ex. 22.2.3 to 23.0.1) ### Are you using the Nextcloud Server Encryption module? Encryption is Enabled ### What user-backends are you using? - [ ] Default user-backend _(database)_ - [X] LDAP/ Active Directory - [ ] SSO - SAML - [ ] Other ### Configuration report _No response_ ### List of activated Apps ```shell default ``` ### Nextcloud Signing status _No response_ ### Nextcloud Logs _No response_ ### Additional info _No response_
1.0
[Bug]: Menu elements not display block - ### ⚠️ This issue respects the following points: ⚠️ - [X] This is a **bug**, not a question or a configuration/webserver/proxy issue. - [X] This issue is **not** already reported on Github _(I've searched it)_. - [X] Nextcloud Server **is** up to date. See [Maintenance and Release Schedule](https://github.com/nextcloud/server/wiki/Maintenance-and-Release-Schedule) for supported versions. - [X] Nextcloud Server **is** running on 64bit capable CPU, PHP and OS. - [X] I agree to follow Nextcloud's [Code of Conduct](https://nextcloud.com/contribute/code-of-conduct/). ### Bug description Menu items not display block. See animation: ![Animation](https://user-images.githubusercontent.com/1473674/198673855-13b2d61b-90dc-4e68-aa74-1fa122d7b653.gif) ### Steps to reproduce 1. open the menu of a file 2. the entries not 100% width ### Expected behavior full width is clickable for a user ### Installation method Community Manual installation with Archive ### Operating system Debian/Ubuntu ### PHP engine version PHP 8.1 ### Web server Apache (supported) ### Database engine version MariaDB ### Is this bug present after an update or on a fresh install? Updated to a major version (ex. 22.2.3 to 23.0.1) ### Are you using the Nextcloud Server Encryption module? Encryption is Enabled ### What user-backends are you using? - [ ] Default user-backend _(database)_ - [X] LDAP/ Active Directory - [ ] SSO - SAML - [ ] Other ### Configuration report _No response_ ### List of activated Apps ```shell default ``` ### Nextcloud Signing status _No response_ ### Nextcloud Logs _No response_ ### Additional info _No response_
non_defect
menu elements not display block ⚠️ this issue respects the following points ⚠️ this is a bug not a question or a configuration webserver proxy issue this issue is not already reported on github i ve searched it nextcloud server is up to date see for supported versions nextcloud server is running on capable cpu php and os i agree to follow nextcloud s bug description menu items not display block see animation steps to reproduce open the menu of a file the entries not width expected behavior full width is clickable for a user installation method community manual installation with archive operating system debian ubuntu php engine version php web server apache supported database engine version mariadb is this bug present after an update or on a fresh install updated to a major version ex to are you using the nextcloud server encryption module encryption is enabled what user backends are you using default user backend database ldap active directory sso saml other configuration report no response list of activated apps shell default nextcloud signing status no response nextcloud logs no response additional info no response
0
79,765
7,724,396,302
IssuesEvent
2018-05-24 14:58:57
test4gloirin/m
https://api.github.com/repos/test4gloirin/m
closed
0000046: add controller and backend tests for role managemnt
Feature Request Unittests
**Reported by pschuele on 2 May 2008 18:20** - complete tests for Admin_Controller - complete tests for Tinebase_Acl_Roles
1.0
0000046: add controller and backend tests for role managemnt - **Reported by pschuele on 2 May 2008 18:20** - complete tests for Admin_Controller - complete tests for Tinebase_Acl_Roles
non_defect
add controller and backend tests for role managemnt reported by pschuele on may complete tests for admin controller complete tests for tinebase acl roles
0
216,833
16,671,368,804
IssuesEvent
2021-06-07 11:18:58
p-s-vishnu/cassava_app
https://api.github.com/repos/p-s-vishnu/cassava_app
closed
Update readme
documentation
- [ ] Deployment links / guides - [ ] How to run app - [x] streamlit link [![Open in Streamlit](https://static.streamlit.io/badges/streamlit_badge_black_white.svg)](https://share.streamlit.io/yourGitHubName/yourRepo/yourApp/) - [x] gif demos right now i can only think of these if you have anything else add in comments @VpkPrasanna
1.0
Update readme - - [ ] Deployment links / guides - [ ] How to run app - [x] streamlit link [![Open in Streamlit](https://static.streamlit.io/badges/streamlit_badge_black_white.svg)](https://share.streamlit.io/yourGitHubName/yourRepo/yourApp/) - [x] gif demos right now i can only think of these if you have anything else add in comments @VpkPrasanna
non_defect
update readme deployment links guides how to run app streamlit link gif demos right now i can only think of these if you have anything else add in comments vpkprasanna
0
243,417
18,714,015,451
IssuesEvent
2021-11-03 00:19:53
apac-mcm-aiops-asset/mcm-aiops-gitops
https://api.github.com/repos/apac-mcm-aiops-asset/mcm-aiops-gitops
opened
Tidy up repositories and re-name to more meaningful names
documentation enhancement help wanted
Currently the repositories follow the same standard as the cloud-native-toolkit/multi-tenancy-gitops format. mcm-aiops-gitops - Main Repository which is used to bootstrap and enable/disable the objects within the Hub Cluster mcm-aiops-gitops-infra - This repository determines the Infrastructure components (e.g. machinesets, storage, infra nodes etc) within the Hub Cluster mcm-aiops-gitops-services - This repository determines the services deployed into the Hub Cluster (MCM, RHACM, Turbonomics etc) mcm-aiops-gitops-apps - This repository covers the Clusters imported, created and infrastructure components within MCM and RHACM. It also includes Cloud Paks. I believe we should rename the repositories to represent the asset created (maybe ztp-for-multi-cloud as an example, as well as separate the Cluster and Cloud Paks into their own repositories. Further discussion should be held and a decision made.
1.0
Tidy up repositories and re-name to more meaningful names - Currently the repositories follow the same standard as the cloud-native-toolkit/multi-tenancy-gitops format. mcm-aiops-gitops - Main Repository which is used to bootstrap and enable/disable the objects within the Hub Cluster mcm-aiops-gitops-infra - This repository determines the Infrastructure components (e.g. machinesets, storage, infra nodes etc) within the Hub Cluster mcm-aiops-gitops-services - This repository determines the services deployed into the Hub Cluster (MCM, RHACM, Turbonomics etc) mcm-aiops-gitops-apps - This repository covers the Clusters imported, created and infrastructure components within MCM and RHACM. It also includes Cloud Paks. I believe we should rename the repositories to represent the asset created (maybe ztp-for-multi-cloud as an example, as well as separate the Cluster and Cloud Paks into their own repositories. Further discussion should be held and a decision made.
non_defect
tidy up repositories and re name to more meaningful names currently the repositories follow the same standard as the cloud native toolkit multi tenancy gitops format mcm aiops gitops main repository which is used to bootstrap and enable disable the objects within the hub cluster mcm aiops gitops infra this repository determines the infrastructure components e g machinesets storage infra nodes etc within the hub cluster mcm aiops gitops services this repository determines the services deployed into the hub cluster mcm rhacm turbonomics etc mcm aiops gitops apps this repository covers the clusters imported created and infrastructure components within mcm and rhacm it also includes cloud paks i believe we should rename the repositories to represent the asset created maybe ztp for multi cloud as an example as well as separate the cluster and cloud paks into their own repositories further discussion should be held and a decision made
0
69,664
22,599,142,492
IssuesEvent
2022-06-29 07:32:50
vector-im/element-web
https://api.github.com/repos/vector-im/element-web
closed
Notification dot on ThreadsList in compact modern=group layout is not aligned to timestamp
T-Defect
### Steps to reproduce 1. Enable compact modern layout 2. Open a room with unread threads ### Outcome #### What did you expect? The dot should be aligned to the timestamp. ![after](https://user-images.githubusercontent.com/3362943/176004981-658b68ca-5a59-4d7d-bed0-94d5515ea5b2.png) #### What happened instead? It is not aligned to the timestamp. ![before](https://user-images.githubusercontent.com/3362943/176004996-9b76dc53-3eb5-44de-8b31-37a45b7da91b.png) ### Operating system Debian ### Browser information Firefox ESR 91 ### URL for webapp localhost ### Application version develop branch ### Homeserver _No response_ ### Will you send logs? No
1.0
Notification dot on ThreadsList in compact modern=group layout is not aligned to timestamp - ### Steps to reproduce 1. Enable compact modern layout 2. Open a room with unread threads ### Outcome #### What did you expect? The dot should be aligned to the timestamp. ![after](https://user-images.githubusercontent.com/3362943/176004981-658b68ca-5a59-4d7d-bed0-94d5515ea5b2.png) #### What happened instead? It is not aligned to the timestamp. ![before](https://user-images.githubusercontent.com/3362943/176004996-9b76dc53-3eb5-44de-8b31-37a45b7da91b.png) ### Operating system Debian ### Browser information Firefox ESR 91 ### URL for webapp localhost ### Application version develop branch ### Homeserver _No response_ ### Will you send logs? No
defect
notification dot on threadslist in compact modern group layout is not aligned to timestamp steps to reproduce enable compact modern layout open a room with unread threads outcome what did you expect the dot should be aligned to the timestamp what happened instead it is not aligned to the timestamp operating system debian browser information firefox esr url for webapp localhost application version develop branch homeserver no response will you send logs no
1
12,630
9,703,230,125
IssuesEvent
2019-05-27 10:48:03
astrolabsoftware/fink-broker
https://api.github.com/repos/astrolabsoftware/fink-broker
closed
Reintroduce tool to monitor the stream
missing services
**Describe the issue** In PR #162, the `monitor` service has been removed. It was valuable for test purposes, and we should re-introduce something similar. Action item: add a new service called `checkstream` whose function is to monitor the stream of alerts (measure rates).
1.0
Reintroduce tool to monitor the stream - **Describe the issue** In PR #162, the `monitor` service has been removed. It was valuable for test purposes, and we should re-introduce something similar. Action item: add a new service called `checkstream` whose function is to monitor the stream of alerts (measure rates).
non_defect
reintroduce tool to monitor the stream describe the issue in pr the monitor service has been removed it was valuable for test purposes and we should re introduce something similar action item add a new service called checkstream whose function is to monitor the stream of alerts measure rates
0
160,575
20,110,368,344
IssuesEvent
2022-02-07 14:34:38
shiriivtsan/NodeGoat
https://api.github.com/repos/shiriivtsan/NodeGoat
opened
grunt-npm-install-0.3.1.tgz: 29 vulnerabilities (highest severity is: 9.8)
security vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>grunt-npm-install-0.3.1.tgz</b></p></summary> <p></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/npm/node_modules/fstream/package.json</p> <p> <p>Found in HEAD commit: <a href="https://github.com/shiriivtsan/NodeGoat/commit/98fe87a557b23eb3b41abbc356778283c8f192d8">98fe87a557b23eb3b41abbc356778283c8f192d8</a></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | --- | --- | | [CVE-2021-3918](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-3918) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | json-schema-0.2.3.tgz | Transitive | N/A | ❌ | | [CVE-2018-16492](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-16492) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | extend-3.0.0.tgz | Transitive | N/A | ❌ | | [CVE-2021-23807](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23807) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jsonpointer-4.0.0.tgz | Transitive | N/A | ❌ | | [WS-2020-0344](https://github.com/mafintosh/is-my-json-valid/commit/3419563687df463b4ca709a2b46be8e15d6a2b3d) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | is-my-json-valid-2.15.0.tgz | Transitive | N/A | ❌ | | [WS-2020-0345](https://github.com/janl/node-jsonpointer/commit/234e3437019c6c07537ed2ad1e03b3e132b85e34) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.2 | jsonpointer-4.0.0.tgz | Transitive | N/A | ❌ | | [CVE-2019-16776](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-16776) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | npm-3.10.10.tgz | Transitive | N/A | ❌ | | [CVE-2021-32804](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-32804) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | tar-2.2.1.tgz | Transitive | N/A | ❌ | | [CVE-2018-20834](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-20834) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | tar-2.2.1.tgz | Transitive | N/A | ❌ | | [CVE-2017-15010](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-15010) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | tough-cookie-2.3.1.tgz | Transitive | N/A | ❌ | | [WS-2020-0180](https://github.com/npm/npm-user-validate/commit/c8a87dac1a4cc6988b5418f30411a8669bef204e) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | npm-user-validate-0.1.5.tgz | Transitive | N/A | ❌ | | [WS-2018-0069](https://github.com/mafintosh/is-my-json-valid/commit/b3051b277f7caa08cd2edc6f74f50aeda65d2976) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | is-my-json-valid-2.15.0.tgz | Transitive | N/A | ❌ | | [CVE-2017-1000048](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-1000048) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | qs-6.2.1.tgz | Transitive | N/A | ❌ | | [CVE-2020-7754](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7754) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | npm-user-validate-0.1.5.tgz | Transitive | N/A | ❌ | | [CVE-2018-3737](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-3737) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | sshpk-1.10.1.tgz | Transitive | N/A | ❌ | | [CVE-2017-18077](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-18077) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | brace-expansion-1.1.6.tgz | Transitive | N/A | ❌ | | [WS-2020-0342](https://github.com/mafintosh/is-my-json-valid/commit/c3fc04fc455d40e9b29537f8e2c73a28ce106edb) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | is-my-json-valid-2.15.0.tgz | Transitive | N/A | ❌ | | [CVE-2019-13173](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-13173) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | fstream-1.0.10.tgz | Transitive | N/A | ❌ | | [CVE-2020-7788](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7788) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.3 | ini-1.3.4.tgz | Transitive | N/A | ❌ | | [CVE-2018-21270](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-21270) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.5 | stringstream-0.0.5.tgz | Transitive | N/A | ❌ | | [CVE-2020-8244](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-8244) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.5 | bl-1.1.2.tgz | Transitive | N/A | ❌ | | [CVE-2019-16775](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-16775) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.5 | npm-3.10.10.tgz | Transitive | N/A | ❌ | | [CVE-2019-16777](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-16777) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.5 | npm-3.10.10.tgz | Transitive | N/A | ❌ | | [CVE-2020-7598](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7598) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.6 | minimist-0.0.8.tgz | Transitive | N/A | ❌ | | [CVE-2017-16032](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-16032) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.5 | brace-expansion-1.1.6.tgz | Transitive | N/A | ❌ | | [CVE-2021-23362](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23362) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.3 | hosted-git-info-2.1.5.tgz | Transitive | N/A | ❌ | | [CVE-2018-1107](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-1107) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.3 | is-my-json-valid-2.15.0.tgz | Transitive | N/A | ❌ | | [WS-2018-0103](https://hackerone.com/reports/321670) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 4.8 | stringstream-0.0.5.tgz | Transitive | N/A | ❌ | | [CVE-2020-15095](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-15095) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 4.4 | npm-3.10.10.tgz | Transitive | N/A | ❌ | | [CVE-2017-18869](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-18869) | <img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> Low | 2.5 | chownr-1.0.1.tgz | Transitive | N/A | ❌ | ## Details > Partial details (11 vulnerabilities) are displayed below due to a content size limitation in GitHub. To view information on the remaining vulnerabilities, navigate to the WhiteSource Application.<br> <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-3918</summary> ### Vulnerable Library - <b>json-schema-0.2.3.tgz</b></p> <p>JSON Schema validation and specifications</p> <p>Library home page: <a href="https://registry.npmjs.org/json-schema/-/json-schema-0.2.3.tgz">https://registry.npmjs.org/json-schema/-/json-schema-0.2.3.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/json-schema/package.json,/node_modules/npm/node_modules/request/node_modules/http-signature/node_modules/jsprim/node_modules/json-schema/package.json</p> <p> Dependency Hierarchy: - grunt-npm-install-0.3.1.tgz (Root Library) - npm-3.10.10.tgz - request-2.75.0.tgz - http-signature-1.1.1.tgz - jsprim-1.3.1.tgz - :x: **json-schema-0.2.3.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/shiriivtsan/NodeGoat/commit/98fe87a557b23eb3b41abbc356778283c8f192d8">98fe87a557b23eb3b41abbc356778283c8f192d8</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> json-schema is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') <p>Publish Date: 2021-11-13 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-3918>CVE-2021-3918</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3918">https://nvd.nist.gov/vuln/detail/CVE-2021-3918</a></p> <p>Release Date: 2021-11-13</p> <p>Fix Resolution: json-schema - 0.4.0</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2018-16492</summary> ### Vulnerable Library - <b>extend-3.0.0.tgz</b></p> <p>Port of jQuery.extend for node.js and the browser</p> <p>Library home page: <a href="https://registry.npmjs.org/extend/-/extend-3.0.0.tgz">https://registry.npmjs.org/extend/-/extend-3.0.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/npm/node_modules/request/node_modules/extend/package.json</p> <p> Dependency Hierarchy: - grunt-npm-install-0.3.1.tgz (Root Library) - npm-3.10.10.tgz - request-2.75.0.tgz - :x: **extend-3.0.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/shiriivtsan/NodeGoat/commit/98fe87a557b23eb3b41abbc356778283c8f192d8">98fe87a557b23eb3b41abbc356778283c8f192d8</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> A prototype pollution vulnerability was found in module extend <2.0.2, ~<3.0.2 that allows an attacker to inject arbitrary properties onto Object.prototype. <p>Publish Date: 2019-02-01 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-16492>CVE-2018-16492</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://hackerone.com/reports/381185">https://hackerone.com/reports/381185</a></p> <p>Release Date: 2019-02-01</p> <p>Fix Resolution: extend - v3.0.2,v2.0.2</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-23807</summary> ### Vulnerable Library - <b>jsonpointer-4.0.0.tgz</b></p> <p>Simple JSON Addressing.</p> <p>Library home page: <a href="https://registry.npmjs.org/jsonpointer/-/jsonpointer-4.0.0.tgz">https://registry.npmjs.org/jsonpointer/-/jsonpointer-4.0.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/npm/node_modules/request/node_modules/har-validator/node_modules/is-my-json-valid/node_modules/jsonpointer/package.json</p> <p> Dependency Hierarchy: - grunt-npm-install-0.3.1.tgz (Root Library) - npm-3.10.10.tgz - request-2.75.0.tgz - har-validator-2.0.6.tgz - is-my-json-valid-2.15.0.tgz - :x: **jsonpointer-4.0.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/shiriivtsan/NodeGoat/commit/98fe87a557b23eb3b41abbc356778283c8f192d8">98fe87a557b23eb3b41abbc356778283c8f192d8</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> This affects the package jsonpointer before 5.0.0. A type confusion vulnerability can lead to a bypass of a previous Prototype Pollution fix when the pointer components are arrays. <p>Publish Date: 2021-11-03 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23807>CVE-2021-23807</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23807">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23807</a></p> <p>Release Date: 2021-11-03</p> <p>Fix Resolution: jsonpointer - 5.0.0</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> WS-2020-0344</summary> ### Vulnerable Library - <b>is-my-json-valid-2.15.0.tgz</b></p> <p>A JSONSchema validator that uses code generation to be extremely fast</p> <p>Library home page: <a href="https://registry.npmjs.org/is-my-json-valid/-/is-my-json-valid-2.15.0.tgz">https://registry.npmjs.org/is-my-json-valid/-/is-my-json-valid-2.15.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/npm/node_modules/request/node_modules/har-validator/node_modules/is-my-json-valid/package.json</p> <p> Dependency Hierarchy: - grunt-npm-install-0.3.1.tgz (Root Library) - npm-3.10.10.tgz - request-2.75.0.tgz - har-validator-2.0.6.tgz - :x: **is-my-json-valid-2.15.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/shiriivtsan/NodeGoat/commit/98fe87a557b23eb3b41abbc356778283c8f192d8">98fe87a557b23eb3b41abbc356778283c8f192d8</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> Arbitrary Code Execution vulnerability was found in is-my-json-valid before 2.20.3 via the fromatName function. <p>Publish Date: 2020-06-09 <p>URL: <a href=https://github.com/mafintosh/is-my-json-valid/commit/3419563687df463b4ca709a2b46be8e15d6a2b3d>WS-2020-0344</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/mafintosh/is-my-json-valid/commit/c3fc04fc455d40e9b29537f8e2c73a28ce106edb">https://github.com/mafintosh/is-my-json-valid/commit/c3fc04fc455d40e9b29537f8e2c73a28ce106edb</a></p> <p>Release Date: 2020-06-09</p> <p>Fix Resolution: is-my-json-valid - 2.20.3</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> WS-2020-0345</summary> ### Vulnerable Library - <b>jsonpointer-4.0.0.tgz</b></p> <p>Simple JSON Addressing.</p> <p>Library home page: <a href="https://registry.npmjs.org/jsonpointer/-/jsonpointer-4.0.0.tgz">https://registry.npmjs.org/jsonpointer/-/jsonpointer-4.0.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/npm/node_modules/request/node_modules/har-validator/node_modules/is-my-json-valid/node_modules/jsonpointer/package.json</p> <p> Dependency Hierarchy: - grunt-npm-install-0.3.1.tgz (Root Library) - npm-3.10.10.tgz - request-2.75.0.tgz - har-validator-2.0.6.tgz - is-my-json-valid-2.15.0.tgz - :x: **jsonpointer-4.0.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/shiriivtsan/NodeGoat/commit/98fe87a557b23eb3b41abbc356778283c8f192d8">98fe87a557b23eb3b41abbc356778283c8f192d8</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> Prototype Pollution vulnerability was found in jsonpointer before 4.1.0 via the set function. <p>Publish Date: 2020-07-03 <p>URL: <a href=https://github.com/janl/node-jsonpointer/commit/234e3437019c6c07537ed2ad1e03b3e132b85e34>WS-2020-0345</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.2</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: Low - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/janl/node-jsonpointer/releases/tag/v4.1.0">https://github.com/janl/node-jsonpointer/releases/tag/v4.1.0</a></p> <p>Release Date: 2020-07-03</p> <p>Fix Resolution: jsonpointer - 4.1.0</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-16776</summary> ### Vulnerable Library - <b>npm-3.10.10.tgz</b></p> <p>a package manager for JavaScript</p> <p>Library home page: <a href="https://registry.npmjs.org/npm/-/npm-3.10.10.tgz">https://registry.npmjs.org/npm/-/npm-3.10.10.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/npm/package.json</p> <p> Dependency Hierarchy: - grunt-npm-install-0.3.1.tgz (Root Library) - :x: **npm-3.10.10.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/shiriivtsan/NodeGoat/commit/98fe87a557b23eb3b41abbc356778283c8f192d8">98fe87a557b23eb3b41abbc356778283c8f192d8</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> Versions of the npm CLI prior to 6.13.3 are vulnerable to an Arbitrary File Write. It fails to prevent access to folders outside of the intended node_modules folder through the bin field. A properly constructed entry in the package.json bin field would allow a package publisher to modify and/or gain access to arbitrary files on a user's system when the package is installed. This behavior is still possible through install scripts. This vulnerability bypasses a user using the --ignore-scripts install option. <p>Publish Date: 2019-12-13 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-16776>CVE-2019-16776</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.1</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://blog.npmjs.org/post/189618601100/binary-planting-with-the-npm-cli">https://blog.npmjs.org/post/189618601100/binary-planting-with-the-npm-cli</a></p> <p>Release Date: 2020-10-07</p> <p>Fix Resolution: npm - 6.13.3;yarn - 1.21.1</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-32804</summary> ### Vulnerable Library - <b>tar-2.2.1.tgz</b></p> <p>tar for node</p> <p>Library home page: <a href="https://registry.npmjs.org/tar/-/tar-2.2.1.tgz">https://registry.npmjs.org/tar/-/tar-2.2.1.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/npm/node_modules/tar/package.json</p> <p> Dependency Hierarchy: - grunt-npm-install-0.3.1.tgz (Root Library) - npm-3.10.10.tgz - :x: **tar-2.2.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/shiriivtsan/NodeGoat/commit/98fe87a557b23eb3b41abbc356778283c8f192d8">98fe87a557b23eb3b41abbc356778283c8f192d8</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> The npm package "tar" (aka node-tar) before versions 6.1.1, 5.0.6, 4.4.14, and 3.3.2 has a arbitrary File Creation/Overwrite vulnerability due to insufficient absolute path sanitization. node-tar aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the `preservePaths` flag is not set to `true`. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file. For example `/home/user/.bashrc` would turn into `home/user/.bashrc`. This logic was insufficient when file paths contained repeated path roots such as `////home/user/.bashrc`. `node-tar` would only strip a single path root from such paths. When given an absolute file path with repeating path roots, the resulting path (e.g. `///home/user/.bashrc`) would still resolve to an absolute path, thus allowing arbitrary file creation and overwrite. This issue was addressed in releases 3.2.2, 4.4.14, 5.0.6 and 6.1.1. Users may work around this vulnerability without upgrading by creating a custom `onentry` method which sanitizes the `entry.path` or a `filter` method which removes entries with absolute paths. See referenced GitHub Advisory for details. Be aware of CVE-2021-32803 which fixes a similar bug in later versions of tar. <p>Publish Date: 2021-08-03 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-32804>CVE-2021-32804</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.1</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9">https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9</a></p> <p>Release Date: 2021-08-03</p> <p>Fix Resolution: tar - 3.2.2, 4.4.14, 5.0.6, 6.1.1</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2018-20834</summary> ### Vulnerable Library - <b>tar-2.2.1.tgz</b></p> <p>tar for node</p> <p>Library home page: <a href="https://registry.npmjs.org/tar/-/tar-2.2.1.tgz">https://registry.npmjs.org/tar/-/tar-2.2.1.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/npm/node_modules/tar/package.json</p> <p> Dependency Hierarchy: - grunt-npm-install-0.3.1.tgz (Root Library) - npm-3.10.10.tgz - :x: **tar-2.2.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/shiriivtsan/NodeGoat/commit/98fe87a557b23eb3b41abbc356778283c8f192d8">98fe87a557b23eb3b41abbc356778283c8f192d8</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> A vulnerability was found in node-tar before version 4.4.2 (excluding version 2.2.2). An Arbitrary File Overwrite issue exists when extracting a tarball containing a hardlink to a file that already exists on the system, in conjunction with a later plain file with the same name as the hardlink. This plain file content replaces the existing file content. A patch has been applied to node-tar v2.2.2). <p>Publish Date: 2019-04-30 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-20834>CVE-2018-20834</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16082">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16082</a></p> <p>Release Date: 2019-04-30</p> <p>Fix Resolution: 2.2.2,4.4.2</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2017-15010</summary> ### Vulnerable Library - <b>tough-cookie-2.3.1.tgz</b></p> <p>RFC6265 Cookies and Cookie Jar for node.js</p> <p>Library home page: <a href="https://registry.npmjs.org/tough-cookie/-/tough-cookie-2.3.1.tgz">https://registry.npmjs.org/tough-cookie/-/tough-cookie-2.3.1.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/npm/node_modules/request/node_modules/tough-cookie/package.json</p> <p> Dependency Hierarchy: - grunt-npm-install-0.3.1.tgz (Root Library) - npm-3.10.10.tgz - request-2.75.0.tgz - :x: **tough-cookie-2.3.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/shiriivtsan/NodeGoat/commit/98fe87a557b23eb3b41abbc356778283c8f192d8">98fe87a557b23eb3b41abbc356778283c8f192d8</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> A ReDoS (regular expression denial of service) flaw was found in the tough-cookie module before 2.3.3 for Node.js. An attacker that is able to make an HTTP request using a specially crafted cookie may cause the application to consume an excessive amount of CPU. <p>Publish Date: 2017-10-04 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-15010>CVE-2017-15010</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2017-15010">https://nvd.nist.gov/vuln/detail/CVE-2017-15010</a></p> <p>Release Date: 2017-10-04</p> <p>Fix Resolution: 2.3.3</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> WS-2020-0180</summary> ### Vulnerable Library - <b>npm-user-validate-0.1.5.tgz</b></p> <p>User validations for npm</p> <p>Library home page: <a href="https://registry.npmjs.org/npm-user-validate/-/npm-user-validate-0.1.5.tgz">https://registry.npmjs.org/npm-user-validate/-/npm-user-validate-0.1.5.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/npm/node_modules/npm-user-validate/package.json</p> <p> Dependency Hierarchy: - grunt-npm-install-0.3.1.tgz (Root Library) - npm-3.10.10.tgz - :x: **npm-user-validate-0.1.5.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/shiriivtsan/NodeGoat/commit/98fe87a557b23eb3b41abbc356778283c8f192d8">98fe87a557b23eb3b41abbc356778283c8f192d8</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> The package npm-user-validate prior to version 1.0.1 is vulnerable to REDoS. The regex that validates a user's email took exponentially longer to process input strings that begin with the '@' character. <p>Publish Date: 2020-10-16 <p>URL: <a href=https://github.com/npm/npm-user-validate/commit/c8a87dac1a4cc6988b5418f30411a8669bef204e>WS-2020-0180</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-xgh6-85xh-479p">https://github.com/advisories/GHSA-xgh6-85xh-479p</a></p> <p>Release Date: 2020-10-16</p> <p>Fix Resolution: 1.0.1</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> WS-2018-0069</summary> ### Vulnerable Library - <b>is-my-json-valid-2.15.0.tgz</b></p> <p>A JSONSchema validator that uses code generation to be extremely fast</p> <p>Library home page: <a href="https://registry.npmjs.org/is-my-json-valid/-/is-my-json-valid-2.15.0.tgz">https://registry.npmjs.org/is-my-json-valid/-/is-my-json-valid-2.15.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/npm/node_modules/request/node_modules/har-validator/node_modules/is-my-json-valid/package.json</p> <p> Dependency Hierarchy: - grunt-npm-install-0.3.1.tgz (Root Library) - npm-3.10.10.tgz - request-2.75.0.tgz - har-validator-2.0.6.tgz - :x: **is-my-json-valid-2.15.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/shiriivtsan/NodeGoat/commit/98fe87a557b23eb3b41abbc356778283c8f192d8">98fe87a557b23eb3b41abbc356778283c8f192d8</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> Version of is-my-json-valid before 1.4.1 or 2.17.2 are vulnerable to regular expression denial of service (ReDoS) via the email validation function. <p>Publish Date: 2018-02-14 <p>URL: <a href=https://github.com/mafintosh/is-my-json-valid/commit/b3051b277f7caa08cd2edc6f74f50aeda65d2976>WS-2018-0069</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nodesecurity.io/advisories/572">https://nodesecurity.io/advisories/572</a></p> <p>Release Date: 2018-02-14</p> <p>Fix Resolution: 1.4.1</p> </p> <p></p> </details> <!-- <REMEDIATE>[{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"json-schema","packageVersion":"0.2.3","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"grunt-npm-install:0.3.1;npm:3.10.10;request:2.75.0;http-signature:1.1.1;jsprim:1.3.1;json-schema:0.2.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"json-schema - 0.4.0","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2021-3918","vulnerabilityDetails":"json-schema is vulnerable to Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-3918","cvss3Severity":"high","cvss3Score":"9.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"extend","packageVersion":"3.0.0","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"grunt-npm-install:0.3.1;npm:3.10.10;request:2.75.0;extend:3.0.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"extend - v3.0.2,v2.0.2","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2018-16492","vulnerabilityDetails":"A prototype pollution vulnerability was found in module extend \u003c2.0.2, ~\u003c3.0.2 that allows an attacker to inject arbitrary properties onto Object.prototype.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-16492","cvss3Severity":"high","cvss3Score":"9.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"jsonpointer","packageVersion":"4.0.0","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"grunt-npm-install:0.3.1;npm:3.10.10;request:2.75.0;har-validator:2.0.6;is-my-json-valid:2.15.0;jsonpointer:4.0.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"jsonpointer - 5.0.0","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2021-23807","vulnerabilityDetails":"This affects the package jsonpointer before 5.0.0. A type confusion vulnerability can lead to a bypass of a previous Prototype Pollution fix when the pointer components are arrays.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23807","cvss3Severity":"high","cvss3Score":"9.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"is-my-json-valid","packageVersion":"2.15.0","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"grunt-npm-install:0.3.1;npm:3.10.10;request:2.75.0;har-validator:2.0.6;is-my-json-valid:2.15.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"is-my-json-valid - 2.20.3","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"WS-2020-0344","vulnerabilityDetails":"Arbitrary Code Execution vulnerability was found in is-my-json-valid before 2.20.3 via the fromatName function.","vulnerabilityUrl":"https://github.com/mafintosh/is-my-json-valid/commit/3419563687df463b4ca709a2b46be8e15d6a2b3d","cvss3Severity":"high","cvss3Score":"9.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"jsonpointer","packageVersion":"4.0.0","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"grunt-npm-install:0.3.1;npm:3.10.10;request:2.75.0;har-validator:2.0.6;is-my-json-valid:2.15.0;jsonpointer:4.0.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"jsonpointer - 4.1.0","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"WS-2020-0345","vulnerabilityDetails":"Prototype Pollution vulnerability was found in jsonpointer before 4.1.0 via the set function.","vulnerabilityUrl":"https://github.com/janl/node-jsonpointer/commit/234e3437019c6c07537ed2ad1e03b3e132b85e34","cvss3Severity":"high","cvss3Score":"8.2","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"Low"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"npm","packageVersion":"3.10.10","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"grunt-npm-install:0.3.1;npm:3.10.10","isMinimumFixVersionAvailable":true,"minimumFixVersion":"npm - 6.13.3;yarn - 1.21.1","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2019-16776","vulnerabilityDetails":"Versions of the npm CLI prior to 6.13.3 are vulnerable to an Arbitrary File Write. It fails to prevent access to folders outside of the intended node_modules folder through the bin field. A properly constructed entry in the package.json bin field would allow a package publisher to modify and/or gain access to arbitrary files on a user\u0027s system when the package is installed. This behavior is still possible through install scripts. This vulnerability bypasses a user using the --ignore-scripts install option.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-16776","cvss3Severity":"high","cvss3Score":"8.1","cvss3Metrics":{"A":"None","AC":"Low","PR":"Low","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"tar","packageVersion":"2.2.1","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"grunt-npm-install:0.3.1;npm:3.10.10;tar:2.2.1","isMinimumFixVersionAvailable":true,"minimumFixVersion":"tar - 3.2.2, 4.4.14, 5.0.6, 6.1.1","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2021-32804","vulnerabilityDetails":"The npm package \"tar\" (aka node-tar) before versions 6.1.1, 5.0.6, 4.4.14, and 3.3.2 has a arbitrary File Creation/Overwrite vulnerability due to insufficient absolute path sanitization. node-tar aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the `preservePaths` flag is not set to `true`. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file. For example `/home/user/.bashrc` would turn into `home/user/.bashrc`. This logic was insufficient when file paths contained repeated path roots such as `////home/user/.bashrc`. `node-tar` would only strip a single path root from such paths. When given an absolute file path with repeating path roots, the resulting path (e.g. `///home/user/.bashrc`) would still resolve to an absolute path, thus allowing arbitrary file creation and overwrite. This issue was addressed in releases 3.2.2, 4.4.14, 5.0.6 and 6.1.1. Users may work around this vulnerability without upgrading by creating a custom `onentry` method which sanitizes the `entry.path` or a `filter` method which removes entries with absolute paths. See referenced GitHub Advisory for details. Be aware of CVE-2021-32803 which fixes a similar bug in later versions of tar.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-32804","cvss3Severity":"high","cvss3Score":"8.1","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"Required","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"tar","packageVersion":"2.2.1","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"grunt-npm-install:0.3.1;npm:3.10.10;tar:2.2.1","isMinimumFixVersionAvailable":true,"minimumFixVersion":"2.2.2,4.4.2","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2018-20834","vulnerabilityDetails":"A vulnerability was found in node-tar before version 4.4.2 (excluding version 2.2.2). An Arbitrary File Overwrite issue exists when extracting a tarball containing a hardlink to a file that already exists on the system, in conjunction with a later plain file with the same name as the hardlink. This plain file content replaces the existing file content. A patch has been applied to node-tar v2.2.2).","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-20834","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"tough-cookie","packageVersion":"2.3.1","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"grunt-npm-install:0.3.1;npm:3.10.10;request:2.75.0;tough-cookie:2.3.1","isMinimumFixVersionAvailable":true,"minimumFixVersion":"2.3.3","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2017-15010","vulnerabilityDetails":"A ReDoS (regular expression denial of service) flaw was found in the tough-cookie module before 2.3.3 for Node.js. An attacker that is able to make an HTTP request using a specially crafted cookie may cause the application to consume an excessive amount of CPU.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-15010","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"npm-user-validate","packageVersion":"0.1.5","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"grunt-npm-install:0.3.1;npm:3.10.10;npm-user-validate:0.1.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.0.1","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"WS-2020-0180","vulnerabilityDetails":"The package npm-user-validate prior to version 1.0.1 is vulnerable to REDoS. The regex that validates a user\u0027s email took exponentially longer to process input strings that begin with the \u0027@\u0027 character.","vulnerabilityUrl":"https://github.com/npm/npm-user-validate/commit/c8a87dac1a4cc6988b5418f30411a8669bef204e","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"is-my-json-valid","packageVersion":"2.15.0","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"grunt-npm-install:0.3.1;npm:3.10.10;request:2.75.0;har-validator:2.0.6;is-my-json-valid:2.15.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.4.1","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"WS-2018-0069","vulnerabilityDetails":"Version of is-my-json-valid before 1.4.1 or 2.17.2 are vulnerable to regular expression denial of service (ReDoS) via the email validation function.","vulnerabilityUrl":"https://github.com/mafintosh/is-my-json-valid/commit/b3051b277f7caa08cd2edc6f74f50aeda65d2976","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"qs","packageVersion":"6.2.1","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"grunt-npm-install:0.3.1;npm:3.10.10;request:2.75.0;qs:6.2.1","isMinimumFixVersionAvailable":true,"minimumFixVersion":"qs - 6.0.4,6.1.2,6.2.3,6.3.2","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2017-1000048","vulnerabilityDetails":"the web framework using ljharb\u0027s qs module older than v6.3.2, v6.2.3, v6.1.2, and v6.0.4 is vulnerable to a DoS. A malicious user can send a evil request to cause the web framework crash.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-1000048","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"npm-user-validate","packageVersion":"0.1.5","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"grunt-npm-install:0.3.1;npm:3.10.10;npm-user-validate:0.1.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.0.1","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-7754","vulnerabilityDetails":"This affects the package npm-user-validate before 1.0.1. The regex that validates user emails took exponentially longer to process long input strings beginning with @ characters.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7754","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"sshpk","packageVersion":"1.10.1","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"grunt-npm-install:0.3.1;npm:3.10.10;request:2.75.0;http-signature:1.1.1;sshpk:1.10.1","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.13.2","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2018-3737","vulnerabilityDetails":"sshpk is vulnerable to ReDoS when parsing crafted invalid public keys.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-3737","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"brace-expansion","packageVersion":"1.1.6","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"grunt-npm-install:0.3.1;npm:3.10.10;read-package-json:2.0.4;glob:6.0.4;minimatch:3.0.3;brace-expansion:1.1.6","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.1.7","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2017-18077","vulnerabilityDetails":"index.js in brace-expansion before 1.1.7 is vulnerable to Regular Expression Denial of Service (ReDoS) attacks, as demonstrated by an expand argument containing many comma characters.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-18077","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"is-my-json-valid","packageVersion":"2.15.0","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"grunt-npm-install:0.3.1;npm:3.10.10;request:2.75.0;har-validator:2.0.6;is-my-json-valid:2.15.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"is-my-json-valid - 2.20.2","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"WS-2020-0342","vulnerabilityDetails":"Regular Expression Denial of Service (ReDoS) vulnerability was found in is-my-json-valid before 2.20.2 via the style format.","vulnerabilityUrl":"https://github.com/mafintosh/is-my-json-valid/commit/c3fc04fc455d40e9b29537f8e2c73a28ce106edb","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"fstream","packageVersion":"1.0.10","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"grunt-npm-install:0.3.1;npm:3.10.10;fstream:1.0.10","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.0.12","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2019-13173","vulnerabilityDetails":"fstream before 1.0.12 is vulnerable to Arbitrary File Overwrite. Extracting tarballs containing a hardlink to a file that already exists in the system, and a file that matches the hardlink, will overwrite the system\u0027s file with the contents of the extracted file. The fstream.DirWriter() function is vulnerable.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-13173","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"ini","packageVersion":"1.3.4","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"grunt-npm-install:0.3.1;npm:3.10.10;ini:1.3.4","isMinimumFixVersionAvailable":true,"minimumFixVersion":"v1.3.6","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-7788","vulnerabilityDetails":"This affects the package ini before 1.3.6. If an attacker submits a malicious INI file to an application that parses it with ini.parse, they will pollute the prototype on the application. This can be exploited further depending on the context.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7788","cvss3Severity":"high","cvss3Score":"7.3","cvss3Metrics":{"A":"Low","AC":"Low","PR":"None","S":"Unchanged","C":"Low","UI":"None","AV":"Network","I":"Low"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"stringstream","packageVersion":"0.0.5","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"grunt-npm-install:0.3.1;npm:3.10.10;request:2.75.0;stringstream:0.0.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"0.0.6","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2018-21270","vulnerabilityDetails":"Versions less than 0.0.6 of the Node.js stringstream module are vulnerable to an out-of-bounds read because of allocation of uninitialized buffers when a number is passed in the input stream (when using Node.js 4.x).","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-21270","cvss3Severity":"medium","cvss3Score":"6.5","cvss3Metrics":{"A":"High","AC":"High","PR":"None","S":"Unchanged","C":"Low","UI":"None","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"bl","packageVersion":"1.1.2","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"grunt-npm-install:0.3.1;npm:3.10.10;request:2.75.0;bl:1.1.2","isMinimumFixVersionAvailable":true,"minimumFixVersion":"bl - 1.2.3,2.2.1,3.0.1,4.0.3","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-8244","vulnerabilityDetails":"A buffer over-read vulnerability exists in bl \u003c4.0.3, \u003c3.0.1, \u003c2.2.1, and \u003c1.2.3 which could allow an attacker to supply user input (even typed) that if it ends up in consume() argument and can become negative, the BufferList state can be corrupted, tricking it into exposing uninitialized memory via regular .slice() calls.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-8244","cvss3Severity":"medium","cvss3Score":"6.5","cvss3Metrics":{"A":"Low","AC":"Low","PR":"None","S":"Unchanged","C":"Low","UI":"None","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"npm","packageVersion":"3.10.10","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"grunt-npm-install:0.3.1;npm:3.10.10","isMinimumFixVersionAvailable":true,"minimumFixVersion":"npm - 6.13.3;yarn - 1.21.1","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2019-16775","vulnerabilityDetails":"Versions of the npm CLI prior to 6.13.3 are vulnerable to an Arbitrary File Write. It is possible for packages to create symlinks to files outside of thenode_modules folder through the bin field upon installation. A properly constructed entry in the package.json bin field would allow a package publisher to create a symlink pointing to arbitrary files on a user\u0027s system when the package is installed. This behavior is still possible through install scripts. This vulnerability bypasses a user using the --ignore-scripts install option.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-16775","cvss3Severity":"medium","cvss3Score":"6.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"Low","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"npm","packageVersion":"3.10.10","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"grunt-npm-install:0.3.1;npm:3.10.10","isMinimumFixVersionAvailable":true,"minimumFixVersion":"npm - 6.13.4","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2019-16777","vulnerabilityDetails":"Versions of the npm CLI prior to 6.13.4 are vulnerable to an Arbitrary File Overwrite. It fails to prevent existing globally-installed binaries to be overwritten by other package installations. For example, if a package was installed globally and created a serve binary, any subsequent installs of packages that also create a serve binary would overwrite the previous serve binary. This behavior is still allowed in local installations and also through install scripts. This vulnerability bypasses a user using the --ignore-scripts install option.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-16777","cvss3Severity":"medium","cvss3Score":"6.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"Low","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"minimist","packageVersion":"0.0.8","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"grunt-npm-install:0.3.1;npm:3.10.10;mkdirp:0.5.1;minimist:0.0.8","isMinimumFixVersionAvailable":true,"minimumFixVersion":"minimist - 0.2.1,1.2.3","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-7598","vulnerabilityDetails":"minimist before 1.2.2 could be tricked into adding or modifying properties of Object.prototype using a \"constructor\" or \"__proto__\" payload.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7598","cvss3Severity":"medium","cvss3Score":"5.6","cvss3Metrics":{"A":"Low","AC":"High","PR":"None","S":"Unchanged","C":"Low","UI":"None","AV":"Network","I":"Low"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"brace-expansion","packageVersion":"1.1.6","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"grunt-npm-install:0.3.1;npm:3.10.10;read-package-json:2.0.4;glob:6.0.4;minimatch:3.0.3;brace-expansion:1.1.6","isMinimumFixVersionAvailable":true,"minimumFixVersion":"v1.1.7","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2017-16032","vulnerabilityDetails":"brace-expansion before 1.1.7 are vulnerable to a regular expression denial of service.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-16032","cvss3Severity":"medium","cvss3Score":"5.5","cvss3Metrics":{"A":"High","AC":"High","PR":"Low","S":"Unchanged","C":"Low","UI":"Required","AV":"Local","I":"Low"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"hosted-git-info","packageVersion":"2.1.5","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"grunt-npm-install:0.3.1;npm:3.10.10;hosted-git-info:2.1.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"hosted-git-info - 2.8.9,3.0.8","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2021-23362","vulnerabilityDetails":"The package hosted-git-info before 3.0.8 are vulnerable to Regular Expression Denial of Service (ReDoS) via regular expression shortcutMatch in the fromUrl function in index.js. The affected regular expression exhibits polynomial worst-case time complexity.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23362","cvss3Severity":"medium","cvss3Score":"5.3","cvss3Metrics":{"A":"Low","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"is-my-json-valid","packageVersion":"2.15.0","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"grunt-npm-install:0.3.1;npm:3.10.10;request:2.75.0;har-validator:2.0.6;is-my-json-valid:2.15.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"is-my-json-valid - 1.4.1, 2.17.2","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2018-1107","vulnerabilityDetails":"It was discovered that the is-my-json-valid JavaScript library used an inefficient regular expression to validate JSON fields defined to have email format. A specially crafted JSON file could cause it to consume an excessive amount of CPU time when validated.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-1107","cvss3Severity":"medium","cvss3Score":"5.3","cvss3Metrics":{"A":"Low","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"stringstream","packageVersion":"0.0.5","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"grunt-npm-install:0.3.1;npm:3.10.10;request:2.75.0;stringstream:0.0.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"0.0.6","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"WS-2018-0103","vulnerabilityDetails":"All versions of stringstream are vulnerable to out-of-bounds read as it allocates uninitialized Buffers when number is passed in input stream on Node.js 4.x and below.","vulnerabilityUrl":"https://hackerone.com/reports/321670","cvss3Severity":"medium","cvss3Score":"4.8","cvss3Metrics":{"A":"Low","AC":"High","PR":"None","S":"Unchanged","C":"Low","UI":"None","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"npm","packageVersion":"3.10.10","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"grunt-npm-install:0.3.1;npm:3.10.10","isMinimumFixVersionAvailable":true,"minimumFixVersion":"npm - 6.14.6","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-15095","vulnerabilityDetails":"Versions of the npm CLI prior to 6.14.6 are vulnerable to an information exposure vulnerability through log files. The CLI supports URLs like \"\u003cprotocol\u003e://[\u003cuser\u003e[:\u003cpassword\u003e]@]\u003chostname\u003e[:\u003cport\u003e][:][/]\u003cpath\u003e\". The password value is not redacted and is printed to stdout and also to any generated log files.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-15095","cvss3Severity":"medium","cvss3Score":"4.4","cvss3Metrics":{"A":"None","AC":"High","PR":"Low","S":"Unchanged","C":"High","UI":"Required","AV":"Local","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"chownr","packageVersion":"1.0.1","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"grunt-npm-install:0.3.1;npm:3.10.10;chownr:1.0.1","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.1.0","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2017-18869","vulnerabilityDetails":"A TOCTOU issue in the chownr package before 1.1.0 for Node.js 10.10 could allow a local attacker to trick it into descending into unintended directories via symlink attacks.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-18869","cvss3Severity":"low","cvss3Score":"2.5","cvss3Metrics":{"A":"None","AC":"High","PR":"Low","S":"Unchanged","C":"None","UI":"None","AV":"Local","I":"Low"},"extraData":{}}]</REMEDIATE> -->
True
grunt-npm-install-0.3.1.tgz: 29 vulnerabilities (highest severity is: 9.8) - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>grunt-npm-install-0.3.1.tgz</b></p></summary> <p></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/npm/node_modules/fstream/package.json</p> <p> <p>Found in HEAD commit: <a href="https://github.com/shiriivtsan/NodeGoat/commit/98fe87a557b23eb3b41abbc356778283c8f192d8">98fe87a557b23eb3b41abbc356778283c8f192d8</a></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | --- | --- | | [CVE-2021-3918](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-3918) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | json-schema-0.2.3.tgz | Transitive | N/A | ❌ | | [CVE-2018-16492](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-16492) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | extend-3.0.0.tgz | Transitive | N/A | ❌ | | [CVE-2021-23807](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23807) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jsonpointer-4.0.0.tgz | Transitive | N/A | ❌ | | [WS-2020-0344](https://github.com/mafintosh/is-my-json-valid/commit/3419563687df463b4ca709a2b46be8e15d6a2b3d) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | is-my-json-valid-2.15.0.tgz | Transitive | N/A | ❌ | | [WS-2020-0345](https://github.com/janl/node-jsonpointer/commit/234e3437019c6c07537ed2ad1e03b3e132b85e34) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.2 | jsonpointer-4.0.0.tgz | Transitive | N/A | ❌ | | [CVE-2019-16776](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-16776) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | npm-3.10.10.tgz | Transitive | N/A | ❌ | | [CVE-2021-32804](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-32804) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | tar-2.2.1.tgz | Transitive | N/A | ❌ | | [CVE-2018-20834](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-20834) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | tar-2.2.1.tgz | Transitive | N/A | ❌ | | [CVE-2017-15010](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-15010) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | tough-cookie-2.3.1.tgz | Transitive | N/A | ❌ | | [WS-2020-0180](https://github.com/npm/npm-user-validate/commit/c8a87dac1a4cc6988b5418f30411a8669bef204e) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | npm-user-validate-0.1.5.tgz | Transitive | N/A | ❌ | | [WS-2018-0069](https://github.com/mafintosh/is-my-json-valid/commit/b3051b277f7caa08cd2edc6f74f50aeda65d2976) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | is-my-json-valid-2.15.0.tgz | Transitive | N/A | ❌ | | [CVE-2017-1000048](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-1000048) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | qs-6.2.1.tgz | Transitive | N/A | ❌ | | [CVE-2020-7754](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7754) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | npm-user-validate-0.1.5.tgz | Transitive | N/A | ❌ | | [CVE-2018-3737](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-3737) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | sshpk-1.10.1.tgz | Transitive | N/A | ❌ | | [CVE-2017-18077](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-18077) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | brace-expansion-1.1.6.tgz | Transitive | N/A | ❌ | | [WS-2020-0342](https://github.com/mafintosh/is-my-json-valid/commit/c3fc04fc455d40e9b29537f8e2c73a28ce106edb) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | is-my-json-valid-2.15.0.tgz | Transitive | N/A | ❌ | | [CVE-2019-13173](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-13173) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | fstream-1.0.10.tgz | Transitive | N/A | ❌ | | [CVE-2020-7788](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7788) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.3 | ini-1.3.4.tgz | Transitive | N/A | ❌ | | [CVE-2018-21270](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-21270) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.5 | stringstream-0.0.5.tgz | Transitive | N/A | ❌ | | [CVE-2020-8244](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-8244) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.5 | bl-1.1.2.tgz | Transitive | N/A | ❌ | | [CVE-2019-16775](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-16775) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.5 | npm-3.10.10.tgz | Transitive | N/A | ❌ | | [CVE-2019-16777](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-16777) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.5 | npm-3.10.10.tgz | Transitive | N/A | ❌ | | [CVE-2020-7598](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7598) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.6 | minimist-0.0.8.tgz | Transitive | N/A | ❌ | | [CVE-2017-16032](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-16032) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.5 | brace-expansion-1.1.6.tgz | Transitive | N/A | ❌ | | [CVE-2021-23362](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23362) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.3 | hosted-git-info-2.1.5.tgz | Transitive | N/A | ❌ | | [CVE-2018-1107](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-1107) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.3 | is-my-json-valid-2.15.0.tgz | Transitive | N/A | ❌ | | [WS-2018-0103](https://hackerone.com/reports/321670) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 4.8 | stringstream-0.0.5.tgz | Transitive | N/A | ❌ | | [CVE-2020-15095](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-15095) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 4.4 | npm-3.10.10.tgz | Transitive | N/A | ❌ | | [CVE-2017-18869](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-18869) | <img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> Low | 2.5 | chownr-1.0.1.tgz | Transitive | N/A | ❌ | ## Details > Partial details (11 vulnerabilities) are displayed below due to a content size limitation in GitHub. To view information on the remaining vulnerabilities, navigate to the WhiteSource Application.<br> <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-3918</summary> ### Vulnerable Library - <b>json-schema-0.2.3.tgz</b></p> <p>JSON Schema validation and specifications</p> <p>Library home page: <a href="https://registry.npmjs.org/json-schema/-/json-schema-0.2.3.tgz">https://registry.npmjs.org/json-schema/-/json-schema-0.2.3.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/json-schema/package.json,/node_modules/npm/node_modules/request/node_modules/http-signature/node_modules/jsprim/node_modules/json-schema/package.json</p> <p> Dependency Hierarchy: - grunt-npm-install-0.3.1.tgz (Root Library) - npm-3.10.10.tgz - request-2.75.0.tgz - http-signature-1.1.1.tgz - jsprim-1.3.1.tgz - :x: **json-schema-0.2.3.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/shiriivtsan/NodeGoat/commit/98fe87a557b23eb3b41abbc356778283c8f192d8">98fe87a557b23eb3b41abbc356778283c8f192d8</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> json-schema is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') <p>Publish Date: 2021-11-13 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-3918>CVE-2021-3918</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3918">https://nvd.nist.gov/vuln/detail/CVE-2021-3918</a></p> <p>Release Date: 2021-11-13</p> <p>Fix Resolution: json-schema - 0.4.0</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2018-16492</summary> ### Vulnerable Library - <b>extend-3.0.0.tgz</b></p> <p>Port of jQuery.extend for node.js and the browser</p> <p>Library home page: <a href="https://registry.npmjs.org/extend/-/extend-3.0.0.tgz">https://registry.npmjs.org/extend/-/extend-3.0.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/npm/node_modules/request/node_modules/extend/package.json</p> <p> Dependency Hierarchy: - grunt-npm-install-0.3.1.tgz (Root Library) - npm-3.10.10.tgz - request-2.75.0.tgz - :x: **extend-3.0.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/shiriivtsan/NodeGoat/commit/98fe87a557b23eb3b41abbc356778283c8f192d8">98fe87a557b23eb3b41abbc356778283c8f192d8</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> A prototype pollution vulnerability was found in module extend <2.0.2, ~<3.0.2 that allows an attacker to inject arbitrary properties onto Object.prototype. <p>Publish Date: 2019-02-01 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-16492>CVE-2018-16492</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://hackerone.com/reports/381185">https://hackerone.com/reports/381185</a></p> <p>Release Date: 2019-02-01</p> <p>Fix Resolution: extend - v3.0.2,v2.0.2</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-23807</summary> ### Vulnerable Library - <b>jsonpointer-4.0.0.tgz</b></p> <p>Simple JSON Addressing.</p> <p>Library home page: <a href="https://registry.npmjs.org/jsonpointer/-/jsonpointer-4.0.0.tgz">https://registry.npmjs.org/jsonpointer/-/jsonpointer-4.0.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/npm/node_modules/request/node_modules/har-validator/node_modules/is-my-json-valid/node_modules/jsonpointer/package.json</p> <p> Dependency Hierarchy: - grunt-npm-install-0.3.1.tgz (Root Library) - npm-3.10.10.tgz - request-2.75.0.tgz - har-validator-2.0.6.tgz - is-my-json-valid-2.15.0.tgz - :x: **jsonpointer-4.0.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/shiriivtsan/NodeGoat/commit/98fe87a557b23eb3b41abbc356778283c8f192d8">98fe87a557b23eb3b41abbc356778283c8f192d8</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> This affects the package jsonpointer before 5.0.0. A type confusion vulnerability can lead to a bypass of a previous Prototype Pollution fix when the pointer components are arrays. <p>Publish Date: 2021-11-03 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23807>CVE-2021-23807</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23807">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23807</a></p> <p>Release Date: 2021-11-03</p> <p>Fix Resolution: jsonpointer - 5.0.0</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> WS-2020-0344</summary> ### Vulnerable Library - <b>is-my-json-valid-2.15.0.tgz</b></p> <p>A JSONSchema validator that uses code generation to be extremely fast</p> <p>Library home page: <a href="https://registry.npmjs.org/is-my-json-valid/-/is-my-json-valid-2.15.0.tgz">https://registry.npmjs.org/is-my-json-valid/-/is-my-json-valid-2.15.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/npm/node_modules/request/node_modules/har-validator/node_modules/is-my-json-valid/package.json</p> <p> Dependency Hierarchy: - grunt-npm-install-0.3.1.tgz (Root Library) - npm-3.10.10.tgz - request-2.75.0.tgz - har-validator-2.0.6.tgz - :x: **is-my-json-valid-2.15.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/shiriivtsan/NodeGoat/commit/98fe87a557b23eb3b41abbc356778283c8f192d8">98fe87a557b23eb3b41abbc356778283c8f192d8</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> Arbitrary Code Execution vulnerability was found in is-my-json-valid before 2.20.3 via the fromatName function. <p>Publish Date: 2020-06-09 <p>URL: <a href=https://github.com/mafintosh/is-my-json-valid/commit/3419563687df463b4ca709a2b46be8e15d6a2b3d>WS-2020-0344</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/mafintosh/is-my-json-valid/commit/c3fc04fc455d40e9b29537f8e2c73a28ce106edb">https://github.com/mafintosh/is-my-json-valid/commit/c3fc04fc455d40e9b29537f8e2c73a28ce106edb</a></p> <p>Release Date: 2020-06-09</p> <p>Fix Resolution: is-my-json-valid - 2.20.3</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> WS-2020-0345</summary> ### Vulnerable Library - <b>jsonpointer-4.0.0.tgz</b></p> <p>Simple JSON Addressing.</p> <p>Library home page: <a href="https://registry.npmjs.org/jsonpointer/-/jsonpointer-4.0.0.tgz">https://registry.npmjs.org/jsonpointer/-/jsonpointer-4.0.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/npm/node_modules/request/node_modules/har-validator/node_modules/is-my-json-valid/node_modules/jsonpointer/package.json</p> <p> Dependency Hierarchy: - grunt-npm-install-0.3.1.tgz (Root Library) - npm-3.10.10.tgz - request-2.75.0.tgz - har-validator-2.0.6.tgz - is-my-json-valid-2.15.0.tgz - :x: **jsonpointer-4.0.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/shiriivtsan/NodeGoat/commit/98fe87a557b23eb3b41abbc356778283c8f192d8">98fe87a557b23eb3b41abbc356778283c8f192d8</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> Prototype Pollution vulnerability was found in jsonpointer before 4.1.0 via the set function. <p>Publish Date: 2020-07-03 <p>URL: <a href=https://github.com/janl/node-jsonpointer/commit/234e3437019c6c07537ed2ad1e03b3e132b85e34>WS-2020-0345</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.2</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: Low - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/janl/node-jsonpointer/releases/tag/v4.1.0">https://github.com/janl/node-jsonpointer/releases/tag/v4.1.0</a></p> <p>Release Date: 2020-07-03</p> <p>Fix Resolution: jsonpointer - 4.1.0</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-16776</summary> ### Vulnerable Library - <b>npm-3.10.10.tgz</b></p> <p>a package manager for JavaScript</p> <p>Library home page: <a href="https://registry.npmjs.org/npm/-/npm-3.10.10.tgz">https://registry.npmjs.org/npm/-/npm-3.10.10.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/npm/package.json</p> <p> Dependency Hierarchy: - grunt-npm-install-0.3.1.tgz (Root Library) - :x: **npm-3.10.10.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/shiriivtsan/NodeGoat/commit/98fe87a557b23eb3b41abbc356778283c8f192d8">98fe87a557b23eb3b41abbc356778283c8f192d8</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> Versions of the npm CLI prior to 6.13.3 are vulnerable to an Arbitrary File Write. It fails to prevent access to folders outside of the intended node_modules folder through the bin field. A properly constructed entry in the package.json bin field would allow a package publisher to modify and/or gain access to arbitrary files on a user's system when the package is installed. This behavior is still possible through install scripts. This vulnerability bypasses a user using the --ignore-scripts install option. <p>Publish Date: 2019-12-13 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-16776>CVE-2019-16776</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.1</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://blog.npmjs.org/post/189618601100/binary-planting-with-the-npm-cli">https://blog.npmjs.org/post/189618601100/binary-planting-with-the-npm-cli</a></p> <p>Release Date: 2020-10-07</p> <p>Fix Resolution: npm - 6.13.3;yarn - 1.21.1</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-32804</summary> ### Vulnerable Library - <b>tar-2.2.1.tgz</b></p> <p>tar for node</p> <p>Library home page: <a href="https://registry.npmjs.org/tar/-/tar-2.2.1.tgz">https://registry.npmjs.org/tar/-/tar-2.2.1.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/npm/node_modules/tar/package.json</p> <p> Dependency Hierarchy: - grunt-npm-install-0.3.1.tgz (Root Library) - npm-3.10.10.tgz - :x: **tar-2.2.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/shiriivtsan/NodeGoat/commit/98fe87a557b23eb3b41abbc356778283c8f192d8">98fe87a557b23eb3b41abbc356778283c8f192d8</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> The npm package "tar" (aka node-tar) before versions 6.1.1, 5.0.6, 4.4.14, and 3.3.2 has a arbitrary File Creation/Overwrite vulnerability due to insufficient absolute path sanitization. node-tar aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the `preservePaths` flag is not set to `true`. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file. For example `/home/user/.bashrc` would turn into `home/user/.bashrc`. This logic was insufficient when file paths contained repeated path roots such as `////home/user/.bashrc`. `node-tar` would only strip a single path root from such paths. When given an absolute file path with repeating path roots, the resulting path (e.g. `///home/user/.bashrc`) would still resolve to an absolute path, thus allowing arbitrary file creation and overwrite. This issue was addressed in releases 3.2.2, 4.4.14, 5.0.6 and 6.1.1. Users may work around this vulnerability without upgrading by creating a custom `onentry` method which sanitizes the `entry.path` or a `filter` method which removes entries with absolute paths. See referenced GitHub Advisory for details. Be aware of CVE-2021-32803 which fixes a similar bug in later versions of tar. <p>Publish Date: 2021-08-03 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-32804>CVE-2021-32804</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.1</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9">https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9</a></p> <p>Release Date: 2021-08-03</p> <p>Fix Resolution: tar - 3.2.2, 4.4.14, 5.0.6, 6.1.1</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2018-20834</summary> ### Vulnerable Library - <b>tar-2.2.1.tgz</b></p> <p>tar for node</p> <p>Library home page: <a href="https://registry.npmjs.org/tar/-/tar-2.2.1.tgz">https://registry.npmjs.org/tar/-/tar-2.2.1.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/npm/node_modules/tar/package.json</p> <p> Dependency Hierarchy: - grunt-npm-install-0.3.1.tgz (Root Library) - npm-3.10.10.tgz - :x: **tar-2.2.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/shiriivtsan/NodeGoat/commit/98fe87a557b23eb3b41abbc356778283c8f192d8">98fe87a557b23eb3b41abbc356778283c8f192d8</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> A vulnerability was found in node-tar before version 4.4.2 (excluding version 2.2.2). An Arbitrary File Overwrite issue exists when extracting a tarball containing a hardlink to a file that already exists on the system, in conjunction with a later plain file with the same name as the hardlink. This plain file content replaces the existing file content. A patch has been applied to node-tar v2.2.2). <p>Publish Date: 2019-04-30 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-20834>CVE-2018-20834</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16082">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16082</a></p> <p>Release Date: 2019-04-30</p> <p>Fix Resolution: 2.2.2,4.4.2</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2017-15010</summary> ### Vulnerable Library - <b>tough-cookie-2.3.1.tgz</b></p> <p>RFC6265 Cookies and Cookie Jar for node.js</p> <p>Library home page: <a href="https://registry.npmjs.org/tough-cookie/-/tough-cookie-2.3.1.tgz">https://registry.npmjs.org/tough-cookie/-/tough-cookie-2.3.1.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/npm/node_modules/request/node_modules/tough-cookie/package.json</p> <p> Dependency Hierarchy: - grunt-npm-install-0.3.1.tgz (Root Library) - npm-3.10.10.tgz - request-2.75.0.tgz - :x: **tough-cookie-2.3.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/shiriivtsan/NodeGoat/commit/98fe87a557b23eb3b41abbc356778283c8f192d8">98fe87a557b23eb3b41abbc356778283c8f192d8</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> A ReDoS (regular expression denial of service) flaw was found in the tough-cookie module before 2.3.3 for Node.js. An attacker that is able to make an HTTP request using a specially crafted cookie may cause the application to consume an excessive amount of CPU. <p>Publish Date: 2017-10-04 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-15010>CVE-2017-15010</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2017-15010">https://nvd.nist.gov/vuln/detail/CVE-2017-15010</a></p> <p>Release Date: 2017-10-04</p> <p>Fix Resolution: 2.3.3</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> WS-2020-0180</summary> ### Vulnerable Library - <b>npm-user-validate-0.1.5.tgz</b></p> <p>User validations for npm</p> <p>Library home page: <a href="https://registry.npmjs.org/npm-user-validate/-/npm-user-validate-0.1.5.tgz">https://registry.npmjs.org/npm-user-validate/-/npm-user-validate-0.1.5.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/npm/node_modules/npm-user-validate/package.json</p> <p> Dependency Hierarchy: - grunt-npm-install-0.3.1.tgz (Root Library) - npm-3.10.10.tgz - :x: **npm-user-validate-0.1.5.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/shiriivtsan/NodeGoat/commit/98fe87a557b23eb3b41abbc356778283c8f192d8">98fe87a557b23eb3b41abbc356778283c8f192d8</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> The package npm-user-validate prior to version 1.0.1 is vulnerable to REDoS. The regex that validates a user's email took exponentially longer to process input strings that begin with the '@' character. <p>Publish Date: 2020-10-16 <p>URL: <a href=https://github.com/npm/npm-user-validate/commit/c8a87dac1a4cc6988b5418f30411a8669bef204e>WS-2020-0180</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-xgh6-85xh-479p">https://github.com/advisories/GHSA-xgh6-85xh-479p</a></p> <p>Release Date: 2020-10-16</p> <p>Fix Resolution: 1.0.1</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> WS-2018-0069</summary> ### Vulnerable Library - <b>is-my-json-valid-2.15.0.tgz</b></p> <p>A JSONSchema validator that uses code generation to be extremely fast</p> <p>Library home page: <a href="https://registry.npmjs.org/is-my-json-valid/-/is-my-json-valid-2.15.0.tgz">https://registry.npmjs.org/is-my-json-valid/-/is-my-json-valid-2.15.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/npm/node_modules/request/node_modules/har-validator/node_modules/is-my-json-valid/package.json</p> <p> Dependency Hierarchy: - grunt-npm-install-0.3.1.tgz (Root Library) - npm-3.10.10.tgz - request-2.75.0.tgz - har-validator-2.0.6.tgz - :x: **is-my-json-valid-2.15.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/shiriivtsan/NodeGoat/commit/98fe87a557b23eb3b41abbc356778283c8f192d8">98fe87a557b23eb3b41abbc356778283c8f192d8</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> Version of is-my-json-valid before 1.4.1 or 2.17.2 are vulnerable to regular expression denial of service (ReDoS) via the email validation function. <p>Publish Date: 2018-02-14 <p>URL: <a href=https://github.com/mafintosh/is-my-json-valid/commit/b3051b277f7caa08cd2edc6f74f50aeda65d2976>WS-2018-0069</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nodesecurity.io/advisories/572">https://nodesecurity.io/advisories/572</a></p> <p>Release Date: 2018-02-14</p> <p>Fix Resolution: 1.4.1</p> </p> <p></p> </details> <!-- <REMEDIATE>[{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"json-schema","packageVersion":"0.2.3","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"grunt-npm-install:0.3.1;npm:3.10.10;request:2.75.0;http-signature:1.1.1;jsprim:1.3.1;json-schema:0.2.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"json-schema - 0.4.0","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2021-3918","vulnerabilityDetails":"json-schema is vulnerable to Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-3918","cvss3Severity":"high","cvss3Score":"9.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"extend","packageVersion":"3.0.0","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"grunt-npm-install:0.3.1;npm:3.10.10;request:2.75.0;extend:3.0.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"extend - v3.0.2,v2.0.2","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2018-16492","vulnerabilityDetails":"A prototype pollution vulnerability was found in module extend \u003c2.0.2, ~\u003c3.0.2 that allows an attacker to inject arbitrary properties onto Object.prototype.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-16492","cvss3Severity":"high","cvss3Score":"9.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"jsonpointer","packageVersion":"4.0.0","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"grunt-npm-install:0.3.1;npm:3.10.10;request:2.75.0;har-validator:2.0.6;is-my-json-valid:2.15.0;jsonpointer:4.0.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"jsonpointer - 5.0.0","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2021-23807","vulnerabilityDetails":"This affects the package jsonpointer before 5.0.0. A type confusion vulnerability can lead to a bypass of a previous Prototype Pollution fix when the pointer components are arrays.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23807","cvss3Severity":"high","cvss3Score":"9.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"is-my-json-valid","packageVersion":"2.15.0","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"grunt-npm-install:0.3.1;npm:3.10.10;request:2.75.0;har-validator:2.0.6;is-my-json-valid:2.15.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"is-my-json-valid - 2.20.3","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"WS-2020-0344","vulnerabilityDetails":"Arbitrary Code Execution vulnerability was found in is-my-json-valid before 2.20.3 via the fromatName function.","vulnerabilityUrl":"https://github.com/mafintosh/is-my-json-valid/commit/3419563687df463b4ca709a2b46be8e15d6a2b3d","cvss3Severity":"high","cvss3Score":"9.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"jsonpointer","packageVersion":"4.0.0","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"grunt-npm-install:0.3.1;npm:3.10.10;request:2.75.0;har-validator:2.0.6;is-my-json-valid:2.15.0;jsonpointer:4.0.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"jsonpointer - 4.1.0","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"WS-2020-0345","vulnerabilityDetails":"Prototype Pollution vulnerability was found in jsonpointer before 4.1.0 via the set function.","vulnerabilityUrl":"https://github.com/janl/node-jsonpointer/commit/234e3437019c6c07537ed2ad1e03b3e132b85e34","cvss3Severity":"high","cvss3Score":"8.2","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"Low"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"npm","packageVersion":"3.10.10","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"grunt-npm-install:0.3.1;npm:3.10.10","isMinimumFixVersionAvailable":true,"minimumFixVersion":"npm - 6.13.3;yarn - 1.21.1","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2019-16776","vulnerabilityDetails":"Versions of the npm CLI prior to 6.13.3 are vulnerable to an Arbitrary File Write. It fails to prevent access to folders outside of the intended node_modules folder through the bin field. A properly constructed entry in the package.json bin field would allow a package publisher to modify and/or gain access to arbitrary files on a user\u0027s system when the package is installed. This behavior is still possible through install scripts. This vulnerability bypasses a user using the --ignore-scripts install option.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-16776","cvss3Severity":"high","cvss3Score":"8.1","cvss3Metrics":{"A":"None","AC":"Low","PR":"Low","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"tar","packageVersion":"2.2.1","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"grunt-npm-install:0.3.1;npm:3.10.10;tar:2.2.1","isMinimumFixVersionAvailable":true,"minimumFixVersion":"tar - 3.2.2, 4.4.14, 5.0.6, 6.1.1","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2021-32804","vulnerabilityDetails":"The npm package \"tar\" (aka node-tar) before versions 6.1.1, 5.0.6, 4.4.14, and 3.3.2 has a arbitrary File Creation/Overwrite vulnerability due to insufficient absolute path sanitization. node-tar aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the `preservePaths` flag is not set to `true`. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file. For example `/home/user/.bashrc` would turn into `home/user/.bashrc`. This logic was insufficient when file paths contained repeated path roots such as `////home/user/.bashrc`. `node-tar` would only strip a single path root from such paths. When given an absolute file path with repeating path roots, the resulting path (e.g. `///home/user/.bashrc`) would still resolve to an absolute path, thus allowing arbitrary file creation and overwrite. This issue was addressed in releases 3.2.2, 4.4.14, 5.0.6 and 6.1.1. Users may work around this vulnerability without upgrading by creating a custom `onentry` method which sanitizes the `entry.path` or a `filter` method which removes entries with absolute paths. See referenced GitHub Advisory for details. Be aware of CVE-2021-32803 which fixes a similar bug in later versions of tar.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-32804","cvss3Severity":"high","cvss3Score":"8.1","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"Required","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"tar","packageVersion":"2.2.1","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"grunt-npm-install:0.3.1;npm:3.10.10;tar:2.2.1","isMinimumFixVersionAvailable":true,"minimumFixVersion":"2.2.2,4.4.2","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2018-20834","vulnerabilityDetails":"A vulnerability was found in node-tar before version 4.4.2 (excluding version 2.2.2). An Arbitrary File Overwrite issue exists when extracting a tarball containing a hardlink to a file that already exists on the system, in conjunction with a later plain file with the same name as the hardlink. This plain file content replaces the existing file content. A patch has been applied to node-tar v2.2.2).","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-20834","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"tough-cookie","packageVersion":"2.3.1","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"grunt-npm-install:0.3.1;npm:3.10.10;request:2.75.0;tough-cookie:2.3.1","isMinimumFixVersionAvailable":true,"minimumFixVersion":"2.3.3","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2017-15010","vulnerabilityDetails":"A ReDoS (regular expression denial of service) flaw was found in the tough-cookie module before 2.3.3 for Node.js. An attacker that is able to make an HTTP request using a specially crafted cookie may cause the application to consume an excessive amount of CPU.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-15010","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"npm-user-validate","packageVersion":"0.1.5","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"grunt-npm-install:0.3.1;npm:3.10.10;npm-user-validate:0.1.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.0.1","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"WS-2020-0180","vulnerabilityDetails":"The package npm-user-validate prior to version 1.0.1 is vulnerable to REDoS. The regex that validates a user\u0027s email took exponentially longer to process input strings that begin with the \u0027@\u0027 character.","vulnerabilityUrl":"https://github.com/npm/npm-user-validate/commit/c8a87dac1a4cc6988b5418f30411a8669bef204e","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"is-my-json-valid","packageVersion":"2.15.0","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"grunt-npm-install:0.3.1;npm:3.10.10;request:2.75.0;har-validator:2.0.6;is-my-json-valid:2.15.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.4.1","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"WS-2018-0069","vulnerabilityDetails":"Version of is-my-json-valid before 1.4.1 or 2.17.2 are vulnerable to regular expression denial of service (ReDoS) via the email validation function.","vulnerabilityUrl":"https://github.com/mafintosh/is-my-json-valid/commit/b3051b277f7caa08cd2edc6f74f50aeda65d2976","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"qs","packageVersion":"6.2.1","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"grunt-npm-install:0.3.1;npm:3.10.10;request:2.75.0;qs:6.2.1","isMinimumFixVersionAvailable":true,"minimumFixVersion":"qs - 6.0.4,6.1.2,6.2.3,6.3.2","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2017-1000048","vulnerabilityDetails":"the web framework using ljharb\u0027s qs module older than v6.3.2, v6.2.3, v6.1.2, and v6.0.4 is vulnerable to a DoS. A malicious user can send a evil request to cause the web framework crash.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-1000048","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"npm-user-validate","packageVersion":"0.1.5","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"grunt-npm-install:0.3.1;npm:3.10.10;npm-user-validate:0.1.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.0.1","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-7754","vulnerabilityDetails":"This affects the package npm-user-validate before 1.0.1. The regex that validates user emails took exponentially longer to process long input strings beginning with @ characters.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7754","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"sshpk","packageVersion":"1.10.1","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"grunt-npm-install:0.3.1;npm:3.10.10;request:2.75.0;http-signature:1.1.1;sshpk:1.10.1","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.13.2","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2018-3737","vulnerabilityDetails":"sshpk is vulnerable to ReDoS when parsing crafted invalid public keys.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-3737","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"brace-expansion","packageVersion":"1.1.6","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"grunt-npm-install:0.3.1;npm:3.10.10;read-package-json:2.0.4;glob:6.0.4;minimatch:3.0.3;brace-expansion:1.1.6","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.1.7","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2017-18077","vulnerabilityDetails":"index.js in brace-expansion before 1.1.7 is vulnerable to Regular Expression Denial of Service (ReDoS) attacks, as demonstrated by an expand argument containing many comma characters.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-18077","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"is-my-json-valid","packageVersion":"2.15.0","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"grunt-npm-install:0.3.1;npm:3.10.10;request:2.75.0;har-validator:2.0.6;is-my-json-valid:2.15.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"is-my-json-valid - 2.20.2","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"WS-2020-0342","vulnerabilityDetails":"Regular Expression Denial of Service (ReDoS) vulnerability was found in is-my-json-valid before 2.20.2 via the style format.","vulnerabilityUrl":"https://github.com/mafintosh/is-my-json-valid/commit/c3fc04fc455d40e9b29537f8e2c73a28ce106edb","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"fstream","packageVersion":"1.0.10","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"grunt-npm-install:0.3.1;npm:3.10.10;fstream:1.0.10","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.0.12","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2019-13173","vulnerabilityDetails":"fstream before 1.0.12 is vulnerable to Arbitrary File Overwrite. Extracting tarballs containing a hardlink to a file that already exists in the system, and a file that matches the hardlink, will overwrite the system\u0027s file with the contents of the extracted file. The fstream.DirWriter() function is vulnerable.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-13173","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"ini","packageVersion":"1.3.4","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"grunt-npm-install:0.3.1;npm:3.10.10;ini:1.3.4","isMinimumFixVersionAvailable":true,"minimumFixVersion":"v1.3.6","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-7788","vulnerabilityDetails":"This affects the package ini before 1.3.6. If an attacker submits a malicious INI file to an application that parses it with ini.parse, they will pollute the prototype on the application. This can be exploited further depending on the context.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7788","cvss3Severity":"high","cvss3Score":"7.3","cvss3Metrics":{"A":"Low","AC":"Low","PR":"None","S":"Unchanged","C":"Low","UI":"None","AV":"Network","I":"Low"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"stringstream","packageVersion":"0.0.5","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"grunt-npm-install:0.3.1;npm:3.10.10;request:2.75.0;stringstream:0.0.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"0.0.6","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2018-21270","vulnerabilityDetails":"Versions less than 0.0.6 of the Node.js stringstream module are vulnerable to an out-of-bounds read because of allocation of uninitialized buffers when a number is passed in the input stream (when using Node.js 4.x).","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-21270","cvss3Severity":"medium","cvss3Score":"6.5","cvss3Metrics":{"A":"High","AC":"High","PR":"None","S":"Unchanged","C":"Low","UI":"None","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"bl","packageVersion":"1.1.2","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"grunt-npm-install:0.3.1;npm:3.10.10;request:2.75.0;bl:1.1.2","isMinimumFixVersionAvailable":true,"minimumFixVersion":"bl - 1.2.3,2.2.1,3.0.1,4.0.3","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-8244","vulnerabilityDetails":"A buffer over-read vulnerability exists in bl \u003c4.0.3, \u003c3.0.1, \u003c2.2.1, and \u003c1.2.3 which could allow an attacker to supply user input (even typed) that if it ends up in consume() argument and can become negative, the BufferList state can be corrupted, tricking it into exposing uninitialized memory via regular .slice() calls.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-8244","cvss3Severity":"medium","cvss3Score":"6.5","cvss3Metrics":{"A":"Low","AC":"Low","PR":"None","S":"Unchanged","C":"Low","UI":"None","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"npm","packageVersion":"3.10.10","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"grunt-npm-install:0.3.1;npm:3.10.10","isMinimumFixVersionAvailable":true,"minimumFixVersion":"npm - 6.13.3;yarn - 1.21.1","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2019-16775","vulnerabilityDetails":"Versions of the npm CLI prior to 6.13.3 are vulnerable to an Arbitrary File Write. It is possible for packages to create symlinks to files outside of thenode_modules folder through the bin field upon installation. A properly constructed entry in the package.json bin field would allow a package publisher to create a symlink pointing to arbitrary files on a user\u0027s system when the package is installed. This behavior is still possible through install scripts. This vulnerability bypasses a user using the --ignore-scripts install option.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-16775","cvss3Severity":"medium","cvss3Score":"6.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"Low","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"npm","packageVersion":"3.10.10","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"grunt-npm-install:0.3.1;npm:3.10.10","isMinimumFixVersionAvailable":true,"minimumFixVersion":"npm - 6.13.4","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2019-16777","vulnerabilityDetails":"Versions of the npm CLI prior to 6.13.4 are vulnerable to an Arbitrary File Overwrite. It fails to prevent existing globally-installed binaries to be overwritten by other package installations. For example, if a package was installed globally and created a serve binary, any subsequent installs of packages that also create a serve binary would overwrite the previous serve binary. This behavior is still allowed in local installations and also through install scripts. This vulnerability bypasses a user using the --ignore-scripts install option.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-16777","cvss3Severity":"medium","cvss3Score":"6.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"Low","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"minimist","packageVersion":"0.0.8","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"grunt-npm-install:0.3.1;npm:3.10.10;mkdirp:0.5.1;minimist:0.0.8","isMinimumFixVersionAvailable":true,"minimumFixVersion":"minimist - 0.2.1,1.2.3","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-7598","vulnerabilityDetails":"minimist before 1.2.2 could be tricked into adding or modifying properties of Object.prototype using a \"constructor\" or \"__proto__\" payload.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7598","cvss3Severity":"medium","cvss3Score":"5.6","cvss3Metrics":{"A":"Low","AC":"High","PR":"None","S":"Unchanged","C":"Low","UI":"None","AV":"Network","I":"Low"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"brace-expansion","packageVersion":"1.1.6","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"grunt-npm-install:0.3.1;npm:3.10.10;read-package-json:2.0.4;glob:6.0.4;minimatch:3.0.3;brace-expansion:1.1.6","isMinimumFixVersionAvailable":true,"minimumFixVersion":"v1.1.7","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2017-16032","vulnerabilityDetails":"brace-expansion before 1.1.7 are vulnerable to a regular expression denial of service.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-16032","cvss3Severity":"medium","cvss3Score":"5.5","cvss3Metrics":{"A":"High","AC":"High","PR":"Low","S":"Unchanged","C":"Low","UI":"Required","AV":"Local","I":"Low"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"hosted-git-info","packageVersion":"2.1.5","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"grunt-npm-install:0.3.1;npm:3.10.10;hosted-git-info:2.1.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"hosted-git-info - 2.8.9,3.0.8","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2021-23362","vulnerabilityDetails":"The package hosted-git-info before 3.0.8 are vulnerable to Regular Expression Denial of Service (ReDoS) via regular expression shortcutMatch in the fromUrl function in index.js. The affected regular expression exhibits polynomial worst-case time complexity.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23362","cvss3Severity":"medium","cvss3Score":"5.3","cvss3Metrics":{"A":"Low","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"is-my-json-valid","packageVersion":"2.15.0","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"grunt-npm-install:0.3.1;npm:3.10.10;request:2.75.0;har-validator:2.0.6;is-my-json-valid:2.15.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"is-my-json-valid - 1.4.1, 2.17.2","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2018-1107","vulnerabilityDetails":"It was discovered that the is-my-json-valid JavaScript library used an inefficient regular expression to validate JSON fields defined to have email format. A specially crafted JSON file could cause it to consume an excessive amount of CPU time when validated.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-1107","cvss3Severity":"medium","cvss3Score":"5.3","cvss3Metrics":{"A":"Low","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"stringstream","packageVersion":"0.0.5","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"grunt-npm-install:0.3.1;npm:3.10.10;request:2.75.0;stringstream:0.0.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"0.0.6","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"WS-2018-0103","vulnerabilityDetails":"All versions of stringstream are vulnerable to out-of-bounds read as it allocates uninitialized Buffers when number is passed in input stream on Node.js 4.x and below.","vulnerabilityUrl":"https://hackerone.com/reports/321670","cvss3Severity":"medium","cvss3Score":"4.8","cvss3Metrics":{"A":"Low","AC":"High","PR":"None","S":"Unchanged","C":"Low","UI":"None","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"npm","packageVersion":"3.10.10","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"grunt-npm-install:0.3.1;npm:3.10.10","isMinimumFixVersionAvailable":true,"minimumFixVersion":"npm - 6.14.6","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-15095","vulnerabilityDetails":"Versions of the npm CLI prior to 6.14.6 are vulnerable to an information exposure vulnerability through log files. The CLI supports URLs like \"\u003cprotocol\u003e://[\u003cuser\u003e[:\u003cpassword\u003e]@]\u003chostname\u003e[:\u003cport\u003e][:][/]\u003cpath\u003e\". The password value is not redacted and is printed to stdout and also to any generated log files.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-15095","cvss3Severity":"medium","cvss3Score":"4.4","cvss3Metrics":{"A":"None","AC":"High","PR":"Low","S":"Unchanged","C":"High","UI":"Required","AV":"Local","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"chownr","packageVersion":"1.0.1","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"grunt-npm-install:0.3.1;npm:3.10.10;chownr:1.0.1","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.1.0","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2017-18869","vulnerabilityDetails":"A TOCTOU issue in the chownr package before 1.1.0 for Node.js 10.10 could allow a local attacker to trick it into descending into unintended directories via symlink attacks.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-18869","cvss3Severity":"low","cvss3Score":"2.5","cvss3Metrics":{"A":"None","AC":"High","PR":"Low","S":"Unchanged","C":"None","UI":"None","AV":"Local","I":"Low"},"extraData":{}}]</REMEDIATE> -->
non_defect
grunt npm install tgz vulnerabilities highest severity is vulnerable library grunt npm install tgz path to dependency file package json path to vulnerable library node modules npm node modules fstream package json found in head commit a href vulnerabilities cve severity cvss dependency type fixed in remediation available high json schema tgz transitive n a ❌ high extend tgz transitive n a ❌ high jsonpointer tgz transitive n a ❌ high is my json valid tgz transitive n a ❌ high jsonpointer tgz transitive n a ❌ high npm tgz transitive n a ❌ high tar tgz transitive n a ❌ high tar tgz transitive n a ❌ high tough cookie tgz transitive n a ❌ high npm user validate tgz transitive n a ❌ high is my json valid tgz transitive n a ❌ high qs tgz transitive n a ❌ high npm user validate tgz transitive n a ❌ high sshpk tgz transitive n a ❌ high brace expansion tgz transitive n a ❌ high is my json valid tgz transitive n a ❌ high fstream tgz transitive n a ❌ high ini tgz transitive n a ❌ medium stringstream tgz transitive n a ❌ medium bl tgz transitive n a ❌ medium npm tgz transitive n a ❌ medium npm tgz transitive n a ❌ medium minimist tgz transitive n a ❌ medium brace expansion tgz transitive n a ❌ medium hosted git info tgz transitive n a ❌ medium is my json valid tgz transitive n a ❌ medium stringstream tgz transitive n a ❌ medium npm tgz transitive n a ❌ low chownr tgz transitive n a ❌ details partial details vulnerabilities are displayed below due to a content size limitation in github to view information on the remaining vulnerabilities navigate to the whitesource application cve vulnerable library json schema tgz json schema validation and specifications library home page a href path to dependency file package json path to vulnerable library node modules json schema package json node modules npm node modules request node modules http signature node modules jsprim node modules json schema package json dependency hierarchy grunt npm install tgz root library npm tgz request tgz http signature tgz jsprim tgz x json schema tgz vulnerable library found in head commit a href found in base branch master vulnerability details json schema is vulnerable to improperly controlled modification of object prototype attributes prototype pollution publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution json schema cve vulnerable library extend tgz port of jquery extend for node js and the browser library home page a href path to dependency file package json path to vulnerable library node modules npm node modules request node modules extend package json dependency hierarchy grunt npm install tgz root library npm tgz request tgz x extend tgz vulnerable library found in head commit a href found in base branch master vulnerability details a prototype pollution vulnerability was found in module extend that allows an attacker to inject arbitrary properties onto object prototype publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution extend cve vulnerable library jsonpointer tgz simple json addressing library home page a href path to dependency file package json path to vulnerable library node modules npm node modules request node modules har validator node modules is my json valid node modules jsonpointer package json dependency hierarchy grunt npm install tgz root library npm tgz request tgz har validator tgz is my json valid tgz x jsonpointer tgz vulnerable library found in head commit a href found in base branch master vulnerability details this affects the package jsonpointer before a type confusion vulnerability can lead to a bypass of a previous prototype pollution fix when the pointer components are arrays publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution jsonpointer ws vulnerable library is my json valid tgz a jsonschema validator that uses code generation to be extremely fast library home page a href path to dependency file package json path to vulnerable library node modules npm node modules request node modules har validator node modules is my json valid package json dependency hierarchy grunt npm install tgz root library npm tgz request tgz har validator tgz x is my json valid tgz vulnerable library found in head commit a href found in base branch master vulnerability details arbitrary code execution vulnerability was found in is my json valid before via the fromatname function publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution is my json valid ws vulnerable library jsonpointer tgz simple json addressing library home page a href path to dependency file package json path to vulnerable library node modules npm node modules request node modules har validator node modules is my json valid node modules jsonpointer package json dependency hierarchy grunt npm install tgz root library npm tgz request tgz har validator tgz is my json valid tgz x jsonpointer tgz vulnerable library found in head commit a href found in base branch master vulnerability details prototype pollution vulnerability was found in jsonpointer before via the set function publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact low availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution jsonpointer cve vulnerable library npm tgz a package manager for javascript library home page a href path to dependency file package json path to vulnerable library node modules npm package json dependency hierarchy grunt npm install tgz root library x npm tgz vulnerable library found in head commit a href found in base branch master vulnerability details versions of the npm cli prior to are vulnerable to an arbitrary file write it fails to prevent access to folders outside of the intended node modules folder through the bin field a properly constructed entry in the package json bin field would allow a package publisher to modify and or gain access to arbitrary files on a user s system when the package is installed this behavior is still possible through install scripts this vulnerability bypasses a user using the ignore scripts install option publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution npm yarn cve vulnerable library tar tgz tar for node library home page a href path to dependency file package json path to vulnerable library node modules npm node modules tar package json dependency hierarchy grunt npm install tgz root library npm tgz x tar tgz vulnerable library found in head commit a href found in base branch master vulnerability details the npm package tar aka node tar before versions and has a arbitrary file creation overwrite vulnerability due to insufficient absolute path sanitization node tar aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the preservepaths flag is not set to true this is achieved by stripping the absolute path root from any absolute file paths contained in a tar file for example home user bashrc would turn into home user bashrc this logic was insufficient when file paths contained repeated path roots such as home user bashrc node tar would only strip a single path root from such paths when given an absolute file path with repeating path roots the resulting path e g home user bashrc would still resolve to an absolute path thus allowing arbitrary file creation and overwrite this issue was addressed in releases and users may work around this vulnerability without upgrading by creating a custom onentry method which sanitizes the entry path or a filter method which removes entries with absolute paths see referenced github advisory for details be aware of cve which fixes a similar bug in later versions of tar publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact none integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution tar cve vulnerable library tar tgz tar for node library home page a href path to dependency file package json path to vulnerable library node modules npm node modules tar package json dependency hierarchy grunt npm install tgz root library npm tgz x tar tgz vulnerable library found in head commit a href found in base branch master vulnerability details a vulnerability was found in node tar before version excluding version an arbitrary file overwrite issue exists when extracting a tarball containing a hardlink to a file that already exists on the system in conjunction with a later plain file with the same name as the hardlink this plain file content replaces the existing file content a patch has been applied to node tar publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact high availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution cve vulnerable library tough cookie tgz cookies and cookie jar for node js library home page a href path to dependency file package json path to vulnerable library node modules npm node modules request node modules tough cookie package json dependency hierarchy grunt npm install tgz root library npm tgz request tgz x tough cookie tgz vulnerable library found in head commit a href found in base branch master vulnerability details a redos regular expression denial of service flaw was found in the tough cookie module before for node js an attacker that is able to make an http request using a specially crafted cookie may cause the application to consume an excessive amount of cpu publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution ws vulnerable library npm user validate tgz user validations for npm library home page a href path to dependency file package json path to vulnerable library node modules npm node modules npm user validate package json dependency hierarchy grunt npm install tgz root library npm tgz x npm user validate tgz vulnerable library found in head commit a href found in base branch master vulnerability details the package npm user validate prior to version is vulnerable to redos the regex that validates a user s email took exponentially longer to process input strings that begin with the character publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution ws vulnerable library is my json valid tgz a jsonschema validator that uses code generation to be extremely fast library home page a href path to dependency file package json path to vulnerable library node modules npm node modules request node modules har validator node modules is my json valid package json dependency hierarchy grunt npm install tgz root library npm tgz request tgz har validator tgz x is my json valid tgz vulnerable library found in head commit a href found in base branch master vulnerability details version of is my json valid before or are vulnerable to regular expression denial of service redos via the email validation function publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution istransitivedependency true dependencytree grunt npm install npm request http signature jsprim json schema isminimumfixversionavailable true minimumfixversion json schema isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails json schema is vulnerable to improperly controlled modification of object prototype attributes pollution vulnerabilityurl istransitivedependency true dependencytree grunt npm install npm request extend isminimumfixversionavailable true minimumfixversion extend isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails a prototype pollution vulnerability was found in module extend that allows an attacker to inject arbitrary properties onto object prototype vulnerabilityurl istransitivedependency true dependencytree grunt npm install npm request har validator is my json valid jsonpointer isminimumfixversionavailable true minimumfixversion jsonpointer isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails this affects the package jsonpointer before a type confusion vulnerability can lead to a bypass of a previous prototype pollution fix when the pointer components are arrays vulnerabilityurl istransitivedependency true dependencytree grunt npm install npm request har validator is my json valid isminimumfixversionavailable true minimumfixversion is my json valid isbinary false basebranches vulnerabilityidentifier ws vulnerabilitydetails arbitrary code execution vulnerability was found in is my json valid before via the fromatname function vulnerabilityurl istransitivedependency true dependencytree grunt npm install npm request har validator is my json valid jsonpointer isminimumfixversionavailable true minimumfixversion jsonpointer isbinary false basebranches vulnerabilityidentifier ws vulnerabilitydetails prototype pollution vulnerability was found in jsonpointer before via the set function vulnerabilityurl istransitivedependency true dependencytree grunt npm install npm isminimumfixversionavailable true minimumfixversion npm yarn isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails versions of the npm cli prior to are vulnerable to an arbitrary file write it fails to prevent access to folders outside of the intended node modules folder through the bin field a properly constructed entry in the package json bin field would allow a package publisher to modify and or gain access to arbitrary files on a user system when the package is installed this behavior is still possible through install scripts this vulnerability bypasses a user using the ignore scripts install option vulnerabilityurl istransitivedependency true dependencytree grunt npm install npm tar isminimumfixversionavailable true minimumfixversion tar isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails the npm package tar aka node tar before versions and has a arbitrary file creation overwrite vulnerability due to insufficient absolute path sanitization node tar aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the preservepaths flag is not set to true this is achieved by stripping the absolute path root from any absolute file paths contained in a tar file for example home user bashrc would turn into home user bashrc this logic was insufficient when file paths contained repeated path roots such as home user bashrc node tar would only strip a single path root from such paths when given an absolute file path with repeating path roots the resulting path e g home user bashrc would still resolve to an absolute path thus allowing arbitrary file creation and overwrite this issue was addressed in releases and users may work around this vulnerability without upgrading by creating a custom onentry method which sanitizes the entry path or a filter method which removes entries with absolute paths see referenced github advisory for details be aware of cve which fixes a similar bug in later versions of tar vulnerabilityurl istransitivedependency true dependencytree grunt npm install npm tar isminimumfixversionavailable true minimumfixversion isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails a vulnerability was found in node tar before version excluding version an arbitrary file overwrite issue exists when extracting a tarball containing a hardlink to a file that already exists on the system in conjunction with a later plain file with the same name as the hardlink this plain file content replaces the existing file content a patch has been applied to node tar vulnerabilityurl istransitivedependency true dependencytree grunt npm install npm request tough cookie isminimumfixversionavailable true minimumfixversion isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails a redos regular expression denial of service flaw was found in the tough cookie module before for node js an attacker that is able to make an http request using a specially crafted cookie may cause the application to consume an excessive amount of cpu vulnerabilityurl istransitivedependency true dependencytree grunt npm install npm npm user validate isminimumfixversionavailable true minimumfixversion isbinary false basebranches vulnerabilityidentifier ws vulnerabilitydetails the package npm user validate prior to version is vulnerable to redos the regex that validates a user email took exponentially longer to process input strings that begin with the character vulnerabilityurl istransitivedependency true dependencytree grunt npm install npm request har validator is my json valid isminimumfixversionavailable true minimumfixversion isbinary false basebranches vulnerabilityidentifier ws vulnerabilitydetails version of is my json valid before or are vulnerable to regular expression denial of service redos via the email validation function vulnerabilityurl istransitivedependency true dependencytree grunt npm install npm request qs isminimumfixversionavailable true minimumfixversion qs isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails the web framework using ljharb qs module older than and is vulnerable to a dos a malicious user can send a evil request to cause the web framework crash vulnerabilityurl istransitivedependency true dependencytree grunt npm install npm npm user validate isminimumfixversionavailable true minimumfixversion isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails this affects the package npm user validate before the regex that validates user emails took exponentially longer to process long input strings beginning with characters vulnerabilityurl istransitivedependency true dependencytree grunt npm install npm request http signature sshpk isminimumfixversionavailable true minimumfixversion isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails sshpk is vulnerable to redos when parsing crafted invalid public keys vulnerabilityurl istransitivedependency true dependencytree grunt npm install npm read package json glob minimatch brace expansion isminimumfixversionavailable true minimumfixversion isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails index js in brace expansion before is vulnerable to regular expression denial of service redos attacks as demonstrated by an expand argument containing many comma characters vulnerabilityurl istransitivedependency true dependencytree grunt npm install npm request har validator is my json valid isminimumfixversionavailable true minimumfixversion is my json valid isbinary false basebranches vulnerabilityidentifier ws vulnerabilitydetails regular expression denial of service redos vulnerability was found in is my json valid before via the style format vulnerabilityurl istransitivedependency true dependencytree grunt npm install npm fstream isminimumfixversionavailable true minimumfixversion isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails fstream before is vulnerable to arbitrary file overwrite extracting tarballs containing a hardlink to a file that already exists in the system and a file that matches the hardlink will overwrite the system file with the contents of the extracted file the fstream dirwriter function is vulnerable vulnerabilityurl istransitivedependency true dependencytree grunt npm install npm ini isminimumfixversionavailable true minimumfixversion isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails this affects the package ini before if an attacker submits a malicious ini file to an application that parses it with ini parse they will pollute the prototype on the application this can be exploited further depending on the context vulnerabilityurl istransitivedependency true dependencytree grunt npm install npm request stringstream isminimumfixversionavailable true minimumfixversion isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails versions less than of the node js stringstream module are vulnerable to an out of bounds read because of allocation of uninitialized buffers when a number is passed in the input stream when using node js x vulnerabilityurl istransitivedependency true dependencytree grunt npm install npm request bl isminimumfixversionavailable true minimumfixversion bl isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails a buffer over read vulnerability exists in bl and which could allow an attacker to supply user input even typed that if it ends up in consume argument and can become negative the bufferlist state can be corrupted tricking it into exposing uninitialized memory via regular slice calls vulnerabilityurl istransitivedependency true dependencytree grunt npm install npm isminimumfixversionavailable true minimumfixversion npm yarn isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails versions of the npm cli prior to are vulnerable to an arbitrary file write it is possible for packages to create symlinks to files outside of thenode modules folder through the bin field upon installation a properly constructed entry in the package json bin field would allow a package publisher to create a symlink pointing to arbitrary files on a user system when the package is installed this behavior is still possible through install scripts this vulnerability bypasses a user using the ignore scripts install option vulnerabilityurl istransitivedependency true dependencytree grunt npm install npm isminimumfixversionavailable true minimumfixversion npm isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails versions of the npm cli prior to are vulnerable to an arbitrary file overwrite it fails to prevent existing globally installed binaries to be overwritten by other package installations for example if a package was installed globally and created a serve binary any subsequent installs of packages that also create a serve binary would overwrite the previous serve binary this behavior is still allowed in local installations and also through install scripts this vulnerability bypasses a user using the ignore scripts install option vulnerabilityurl istransitivedependency true dependencytree grunt npm install npm mkdirp minimist isminimumfixversionavailable true minimumfixversion minimist isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails minimist before could be tricked into adding or modifying properties of object prototype using a constructor or proto payload vulnerabilityurl istransitivedependency true dependencytree grunt npm install npm read package json glob minimatch brace expansion isminimumfixversionavailable true minimumfixversion isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails brace expansion before are vulnerable to a regular expression denial of service vulnerabilityurl istransitivedependency true dependencytree grunt npm install npm hosted git info isminimumfixversionavailable true minimumfixversion hosted git info isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails the package hosted git info before are vulnerable to regular expression denial of service redos via regular expression shortcutmatch in the fromurl function in index js the affected regular expression exhibits polynomial worst case time complexity vulnerabilityurl istransitivedependency true dependencytree grunt npm install npm request har validator is my json valid isminimumfixversionavailable true minimumfixversion is my json valid isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails it was discovered that the is my json valid javascript library used an inefficient regular expression to validate json fields defined to have email format a specially crafted json file could cause it to consume an excessive amount of cpu time when validated vulnerabilityurl istransitivedependency true dependencytree grunt npm install npm request stringstream isminimumfixversionavailable true minimumfixversion isbinary false basebranches vulnerabilityidentifier ws vulnerabilitydetails all versions of stringstream are vulnerable to out of bounds read as it allocates uninitialized buffers when number is passed in input stream on node js x and below vulnerabilityurl istransitivedependency true dependencytree grunt npm install npm isminimumfixversionavailable true minimumfixversion npm isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails versions of the npm cli prior to are vulnerable to an information exposure vulnerability through log files the cli supports urls like the password value is not redacted and is printed to stdout and also to any generated log files vulnerabilityurl istransitivedependency true dependencytree grunt npm install npm chownr isminimumfixversionavailable true minimumfixversion isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails a toctou issue in the chownr package before for node js could allow a local attacker to trick it into descending into unintended directories via symlink attacks vulnerabilityurl
0
4,409
2,610,093,607
IssuesEvent
2015-02-26 18:28:15
chrsmith/dsdsdaadf
https://api.github.com/repos/chrsmith/dsdsdaadf
opened
深圳孩子脸上长青春痘怎么办
auto-migrated Priority-Medium Type-Defect
``` 深圳孩子脸上长青春痘怎么办【深圳韩方科颜全国热线400-869- 1818,24小时QQ4008691818】深圳韩方科颜专业祛痘连锁机构,机�� �以韩国秘方——韩方科颜这一国妆准字号治疗型权威,祛痘� ��品,韩方科颜专业祛痘连锁机构,采用韩国秘方配合专业“ 不反弹”健康祛痘技术并结合先进“先进豪华彩光”仪,开�� �国内专业治疗粉刺、痤疮签约包治先河,成功消除了许多顾� ��脸上的痘痘。 ``` ----- Original issue reported on code.google.com by `szft...@163.com` on 14 May 2014 at 8:09
1.0
深圳孩子脸上长青春痘怎么办 - ``` 深圳孩子脸上长青春痘怎么办【深圳韩方科颜全国热线400-869- 1818,24小时QQ4008691818】深圳韩方科颜专业祛痘连锁机构,机�� �以韩国秘方——韩方科颜这一国妆准字号治疗型权威,祛痘� ��品,韩方科颜专业祛痘连锁机构,采用韩国秘方配合专业“ 不反弹”健康祛痘技术并结合先进“先进豪华彩光”仪,开�� �国内专业治疗粉刺、痤疮签约包治先河,成功消除了许多顾� ��脸上的痘痘。 ``` ----- Original issue reported on code.google.com by `szft...@163.com` on 14 May 2014 at 8:09
defect
深圳孩子脸上长青春痘怎么办 深圳孩子脸上长青春痘怎么办【 , 】深圳韩方科颜专业祛痘连锁机构,机�� �以韩国秘方——韩方科颜这一国妆准字号治疗型权威,祛痘� ��品,韩方科颜专业祛痘连锁机构,采用韩国秘方配合专业“ 不反弹”健康祛痘技术并结合先进“先进豪华彩光”仪,开�� �国内专业治疗粉刺、痤疮签约包治先河,成功消除了许多顾� ��脸上的痘痘。 original issue reported on code google com by szft com on may at
1
179,416
30,234,648,036
IssuesEvent
2023-07-06 09:22:55
neondatabase/neon
https://api.github.com/repos/neondatabase/neon
opened
Consumption metrics faster after restart
t/feature c/storage/pageserver t/tech_design_rfc a/consumption_metrics
Right now we start to collect consumption metrics every N minutes, and calculate synthetic size every M minutes for all tenants in sequence (order unspecified). In default config N == M, so there is a change that on first rounds after the restart: 1. upload may have some synthetic sizes 2. upload may will have some synthetic sizes 3. upload may will have most synthetic sizes 4. upload should have most if not all synthetic sizes However, we now need due to external requirements reporting every N instead of possibly multiples of N. There have also been ideas of setting up an SLI for how often we upload the metrics -- I think the interesting case is "how often we upload these per tenant", not "how often a POST request goes out". On #3542 I noticed that we also leak a bit of metrics for any detached tenants, as we never clear them. The problems with the current approach of listing all tenants and iterating them is that we lack the ability to clean things up once complete, or react to for example synthetic size calculation completing. I think we should instead organize metrics sending so that: - task to buffer and collected metrics is spawned - each tenant gets a process collecting the metrics on tick, including synthetic size - per tenant caching - synthetic size has a global rate limit already - synthetic size could be "ongoing" while other metrics are collected, and when it completes, we would just send it like other metrics to be buffered and sent - on tenant deactivating, we would exit the task - the top-level consumption metrics task - spawning up new tasks for appeared tenants - maintaining that we should *send over* the cached metrics every K minutes by signalling all per-tenant collectors I think this design would allow us fine grained control over metrics buffering (send everything at 1min, or at buffer size), easy to see path to use the `reqwest_retry` using retry mechanism, etc. The per-tenant tasks would be able to measure if we are keeping up with the goal of collecting all metrics every 5min, and have no leaks.
1.0
Consumption metrics faster after restart - Right now we start to collect consumption metrics every N minutes, and calculate synthetic size every M minutes for all tenants in sequence (order unspecified). In default config N == M, so there is a change that on first rounds after the restart: 1. upload may have some synthetic sizes 2. upload may will have some synthetic sizes 3. upload may will have most synthetic sizes 4. upload should have most if not all synthetic sizes However, we now need due to external requirements reporting every N instead of possibly multiples of N. There have also been ideas of setting up an SLI for how often we upload the metrics -- I think the interesting case is "how often we upload these per tenant", not "how often a POST request goes out". On #3542 I noticed that we also leak a bit of metrics for any detached tenants, as we never clear them. The problems with the current approach of listing all tenants and iterating them is that we lack the ability to clean things up once complete, or react to for example synthetic size calculation completing. I think we should instead organize metrics sending so that: - task to buffer and collected metrics is spawned - each tenant gets a process collecting the metrics on tick, including synthetic size - per tenant caching - synthetic size has a global rate limit already - synthetic size could be "ongoing" while other metrics are collected, and when it completes, we would just send it like other metrics to be buffered and sent - on tenant deactivating, we would exit the task - the top-level consumption metrics task - spawning up new tasks for appeared tenants - maintaining that we should *send over* the cached metrics every K minutes by signalling all per-tenant collectors I think this design would allow us fine grained control over metrics buffering (send everything at 1min, or at buffer size), easy to see path to use the `reqwest_retry` using retry mechanism, etc. The per-tenant tasks would be able to measure if we are keeping up with the goal of collecting all metrics every 5min, and have no leaks.
non_defect
consumption metrics faster after restart right now we start to collect consumption metrics every n minutes and calculate synthetic size every m minutes for all tenants in sequence order unspecified in default config n m so there is a change that on first rounds after the restart upload may have some synthetic sizes upload may will have some synthetic sizes upload may will have most synthetic sizes upload should have most if not all synthetic sizes however we now need due to external requirements reporting every n instead of possibly multiples of n there have also been ideas of setting up an sli for how often we upload the metrics i think the interesting case is how often we upload these per tenant not how often a post request goes out on i noticed that we also leak a bit of metrics for any detached tenants as we never clear them the problems with the current approach of listing all tenants and iterating them is that we lack the ability to clean things up once complete or react to for example synthetic size calculation completing i think we should instead organize metrics sending so that task to buffer and collected metrics is spawned each tenant gets a process collecting the metrics on tick including synthetic size per tenant caching synthetic size has a global rate limit already synthetic size could be ongoing while other metrics are collected and when it completes we would just send it like other metrics to be buffered and sent on tenant deactivating we would exit the task the top level consumption metrics task spawning up new tasks for appeared tenants maintaining that we should send over the cached metrics every k minutes by signalling all per tenant collectors i think this design would allow us fine grained control over metrics buffering send everything at or at buffer size easy to see path to use the reqwest retry using retry mechanism etc the per tenant tasks would be able to measure if we are keeping up with the goal of collecting all metrics every and have no leaks
0
180,056
6,642,913,861
IssuesEvent
2017-09-27 09:17:36
EyeSeeTea/pictureapp
https://api.github.com/repos/EyeSeeTea/pictureapp
closed
Migrate to eReferrals the new fix to language selection issue
complexity - low (1hr) eReferrals priority - critical type - bug
English does not exist in language selection, so there's no way to select it. In a nutshell, just bring to pictureapp what was done in [this malariapp PR](https://github.com/EyeSeeTea/malariapp/pull/1599)
1.0
Migrate to eReferrals the new fix to language selection issue - English does not exist in language selection, so there's no way to select it. In a nutshell, just bring to pictureapp what was done in [this malariapp PR](https://github.com/EyeSeeTea/malariapp/pull/1599)
non_defect
migrate to ereferrals the new fix to language selection issue english does not exist in language selection so there s no way to select it in a nutshell just bring to pictureapp what was done in
0
23,988
3,883,363,962
IssuesEvent
2016-04-13 13:39:15
svnpenn/mp4v2
https://api.github.com/repos/svnpenn/mp4v2
closed
Enhancement: Python API for mp4v2
auto-migrated Priority-Medium Type-Defect
``` I've written a Python API using cython for the mp4v2 public API. It's a first draft, but pretty much done. Need to finish up the unittests to tease out any remaining bugs and probably add some more detailed comments. Would this be something the project would be interested in adding to their library? -james ``` Original issue reported on code.google.com by `kru...@gmail.com` on 24 Nov 2009 at 2:31
1.0
Enhancement: Python API for mp4v2 - ``` I've written a Python API using cython for the mp4v2 public API. It's a first draft, but pretty much done. Need to finish up the unittests to tease out any remaining bugs and probably add some more detailed comments. Would this be something the project would be interested in adding to their library? -james ``` Original issue reported on code.google.com by `kru...@gmail.com` on 24 Nov 2009 at 2:31
defect
enhancement python api for i ve written a python api using cython for the public api it s a first draft but pretty much done need to finish up the unittests to tease out any remaining bugs and probably add some more detailed comments would this be something the project would be interested in adding to their library james original issue reported on code google com by kru gmail com on nov at
1
56,202
14,978,013,192
IssuesEvent
2021-01-28 10:15:50
vim/vim
https://api.github.com/repos/vim/vim
closed
Patch 475 - Can't compile on a system where Xutf8SetWMProperties() - on AIX 6.1
Priority-Medium auto-migrated defect
``` What steps will reproduce the problem? two steps, configure and make : 1. The command: ./configure --with-features=huge --enable-gui=no works, a few output lines : configure: creating cache auto/config.cache checking whether make sets $(MAKE)... yes checking for gcc... no checking for cc... cc checking whether the C compiler works... yes checking for C compiler default output file name... a.out checking for suffix of executables... checking whether we are cross compiling... no checking for suffix of object files... o checking whether we are using the GNU C compiler... no checking whether cc accepts -g... yes checking for cc option to accept ISO C89... -qlanglvl=extc89 checking how to run the C preprocessor... cc -qlanglvl=extc89 -E checking for grep that handles long lines and -e... /usr/bin/grep checking for egrep... /usr/bin/grep -E checking for fgrep... /usr/bin/grep -F checking for library containing strerror... none required checking for gawk... no checking for mawk... no checking for nawk... nawk checking for strip... strip checking for ANSI C header files... yes checking for sys/wait.h that is POSIX.1 compatible... yes checking --enable-fail-if-missing argument... no checking for recent clang version... no configure: checking for buggy tools... checking for BeOS... no ... checking whether Xutf8SetWMProperties() can be used... no checking for _xpg4_setrunelocale in -lxpg4... no checking how to create tags... ctags -t checking how to run man with a section nr... man checking --disable-nls argument... no checking for msgfmt... no checking for NLS... msgfmt not found - disabled checking dlfcn.h usability... yes checking dlfcn.h presence... yes checking for dlfcn.h... yes checking for dlopen()... yes checking for dlsym()... yes checking setjmp.h usability... yes checking setjmp.h presence... yes checking for setjmp.h... yes checking linker --as-needed support... no configure: updating cache auto/config.cache configure: creating auto/config.status config.status: creating auto/config.mk config.status: creating auto/config.h 2. The "make" command, it re-execute configure, compile and stop with an error, the output: Starting make in the src directory. If there are problems, cd to the src directory and run make there cd src && make first rm -f auto/config.cache if test "X" != "Xclean" -a "X" != "Xdistclean" -a "X" != "Xautoconf" -a "X" != "Xreconfig"; then GUI_INC_LOC="" GUI_LIB_LOC="" CC="cc -qlanglvl=extc89" CPPFLAGS="" CFLAGS="-g" LDFLAGS="" srcdir="." ./configure ; fi configure: creating cache auto/config.cache checking whether make sets $(MAKE)... yes checking for gcc... cc -qlanglvl=extc89 checking whether the C compiler works... yes checking for C compiler default output file name... a.out checking for suffix of executables... checking whether we are cross compiling... no checking for suffix of object files... o checking whether we are using the GNU C compiler... no checking whether cc -qlanglvl=extc89 accepts -g... yes checking for cc -qlanglvl=extc89 option to accept ISO C89... none needed checking how to run the C preprocessor... cc -qlanglvl=extc89 -E checking for grep that handles long lines and -e... /usr/bin/grep checking for egrep... /usr/bin/grep -E checking for fgrep... /usr/bin/grep -F checking for library containing strerror... none required checking for gawk... no checking for mawk... no checking for nawk... nawk checking for strip... strip checking for ANSI C header files... yes checking for sys/wait.h that is POSIX.1 compatible... yes checking --enable-fail-if-missing argument... no checking for recent clang version... no configure: checking for buggy tools... checking for BeOS... no checking for QNX... no checking for Darwin (Mac OS X)... no checking AvailabilityMacros.h usability... no checking AvailabilityMacros.h presence... no checking for AvailabilityMacros.h... no checking --with-local-dir argument... Defaulting to /usr/local checking --with-vim-name argument... Defaulting to vim checking --with-ex-name argument... Defaulting to ex checking --with-view-name argument... Defaulting to view checking --with-global-runtime argument... no checking --with-modified-by argument... no checking if character set is EBCDIC... no checking --disable-smack argument... no checking linux/xattr.h usability... no checking linux/xattr.h presence... no checking for linux/xattr.h... no checking --disable-selinux argument... no checking for is_selinux_enabled in -lselinux... no checking --with-features argument... Defaulting to normal checking --with-compiledby argument... no checking --disable-xsmp argument... no checking --disable-xsmp-interact argument... no checking --enable-luainterp argument... no checking --enable-mzschemeinterp argument... no checking --enable-perlinterp argument... no checking --enable-pythoninterp argument... no checking --enable-python3interp argument... no checking --enable-tclinterp argument... no checking --enable-rubyinterp argument... no checking --enable-cscope argument... no checking --enable-workshop argument... no checking --disable-netbeans argument... no checking for socket in -lsocket... no checking for gethostbyname in -lnsl... yes checking whether compiling netbeans integration is possible... yes checking --enable-sniff argument... no checking --enable-multibyte argument... no checking --enable-hangulinput argument... no checking --enable-xim argument... defaulting to auto checking --enable-fontset argument... no checking for xmkmf... /usr/bin/X11/xmkmf checking for X... libraries , headers checking for gethostbyname... yes checking for connect... yes checking for remove... yes checking for shmat... yes checking for IceConnectionNumber in -lICE... yes checking if X11 header files can be found... yes checking for _XdmcpAuthDoIt in -lXdmcp... no checking for IceOpenConnection in -lICE... no checking for XpmCreatePixmapFromData in -lXpm... yes checking if X11 header files implicitly declare return values... no checking size of wchar_t is 2 bytes... no checking --enable-gui argument... yes/auto - automatic GUI support checking whether or not to look for GTK+ 2... yes checking whether or not to look for GNOME... no checking whether or not to look for Motif... yes checking whether or not to look for Athena... yes checking whether or not to look for neXtaw... yes checking whether or not to look for Carbon... yes checking --disable-gtktest argument... gtk test enabled checking for pkg-config... no checking for location of Motif GUI includes... <not found> checking if Athena header files can be found... yes checking if neXtaw header files can be found... no checking for XShapeQueryExtension in -lXext... yes checking for wslen in -lw... no checking for dlsym in -ldl... yes checking for XmuCreateStippledPixmap in -lXmu... yes checking for extra X11 defines... -DFUNCPROTO=15 checking X11/SM/SMlib.h usability... yes checking X11/SM/SMlib.h presence... yes checking for X11/SM/SMlib.h... yes checking X11/xpm.h usability... yes checking X11/xpm.h presence... yes checking for X11/xpm.h... yes checking X11/Sunkeysym.h usability... yes checking X11/Sunkeysym.h presence... yes checking for X11/Sunkeysym.h... yes checking for XIMText in X11/Xlib.h... yes X GUI selected; xim has been enabled checking for X11/Xmu/Editres.h... yes checking for CYGWIN environment... no checking whether toupper is broken... no checking whether __DATE__ and __TIME__ work... yes checking whether __attribute__((unused)) is allowed... yes checking elf.h usability... no checking elf.h presence... no checking for elf.h... no checking for dirent.h that defines DIR... yes checking for library containing opendir... none required checking stdarg.h usability... yes checking stdarg.h presence... yes checking for stdarg.h... yes checking stdint.h usability... yes checking stdint.h presence... yes checking for stdint.h... yes checking stdlib.h usability... yes checking stdlib.h presence... yes checking for stdlib.h... yes checking string.h usability... yes checking string.h presence... yes checking for string.h... yes checking sys/select.h usability... yes checking sys/select.h presence... yes checking for sys/select.h... yes checking sys/utsname.h usability... yes checking sys/utsname.h presence... yes checking for sys/utsname.h... yes checking termcap.h usability... no checking termcap.h presence... no checking for termcap.h... no checking fcntl.h usability... yes checking fcntl.h presence... yes checking for fcntl.h... yes checking sgtty.h usability... yes checking sgtty.h presence... yes checking for sgtty.h... yes checking sys/ioctl.h usability... yes checking sys/ioctl.h presence... yes checking for sys/ioctl.h... yes checking sys/time.h usability... yes checking sys/time.h presence... yes checking for sys/time.h... yes checking sys/types.h usability... yes checking sys/types.h presence... yes checking for sys/types.h... yes checking termio.h usability... yes checking termio.h presence... yes checking for termio.h... yes checking iconv.h usability... yes checking iconv.h presence... yes checking for iconv.h... yes checking inttypes.h usability... yes checking inttypes.h presence... yes checking for inttypes.h... yes checking langinfo.h usability... yes checking langinfo.h presence... yes checking for langinfo.h... yes checking math.h usability... yes checking math.h presence... yes checking for math.h... yes checking unistd.h usability... yes checking unistd.h presence... yes checking for unistd.h... yes checking stropts.h usability... yes checking stropts.h presence... yes checking for stropts.h... yes checking errno.h usability... yes checking errno.h presence... yes checking for errno.h... yes checking sys/resource.h usability... yes checking sys/resource.h presence... yes checking for sys/resource.h... yes checking sys/systeminfo.h usability... no checking sys/systeminfo.h presence... no checking for sys/systeminfo.h... no checking locale.h usability... yes checking locale.h presence... yes checking for locale.h... yes checking sys/stream.h usability... yes checking sys/stream.h presence... yes checking for sys/stream.h... yes checking termios.h usability... yes checking termios.h presence... yes checking for termios.h... yes checking libc.h usability... no checking libc.h presence... no checking for libc.h... no checking sys/statfs.h usability... yes checking sys/statfs.h presence... yes checking for sys/statfs.h... yes checking poll.h usability... yes checking poll.h presence... yes checking for poll.h... yes checking sys/poll.h usability... yes checking sys/poll.h presence... yes checking for sys/poll.h... yes checking pwd.h usability... yes checking pwd.h presence... yes checking for pwd.h... yes checking utime.h usability... yes checking utime.h presence... yes checking for utime.h... yes checking sys/param.h usability... yes checking sys/param.h presence... yes checking for sys/param.h... yes checking libintl.h usability... no checking libintl.h presence... no checking for libintl.h... no checking libgen.h usability... yes checking libgen.h presence... yes checking for libgen.h... yes checking util/debug.h usability... no checking util/debug.h presence... no checking for util/debug.h... no checking util/msg18n.h usability... no checking util/msg18n.h presence... no checking for util/msg18n.h... no checking frame.h usability... no checking frame.h presence... no checking for frame.h... no checking sys/acl.h usability... yes checking sys/acl.h presence... yes checking for sys/acl.h... yes checking sys/access.h usability... yes checking sys/access.h presence... yes checking for sys/access.h... yes checking sys/sysinfo.h usability... yes checking sys/sysinfo.h presence... yes checking for sys/sysinfo.h... yes checking wchar.h usability... yes checking wchar.h presence... yes checking for wchar.h... yes checking wctype.h usability... yes checking wctype.h presence... yes checking for wctype.h... yes checking for sys/ptem.h... no checking for sys/sysctl.h... no checking for pthread_np.h... no checking strings.h usability... yes checking strings.h presence... yes checking for strings.h... yes checking if strings.h can be included after string.h... yes checking for an ANSI C-conforming const... yes checking for working volatile... yes checking for mode_t... yes checking for off_t... yes checking for pid_t... yes checking for size_t... yes checking for uid_t in sys/types.h... yes checking for uint32_t... yes checking whether time.h and sys/time.h may both be included... yes checking for ino_t... yes checking for dev_t... yes checking whether byte ordering is bigendian... yes checking for rlim_t... yes checking for stack_t... yes checking whether stack_t has an ss_base field... no checking --with-tlib argument... empty: automatic terminal library selection checking for tgetent in -ltinfo... no checking for tgetent in -lncurses... no checking for tgetent in -ltermlib... no checking for tgetent in -ltermcap... no checking for tgetent in -lcurses... yes checking whether we talk terminfo... yes checking what tgetent() returns for an unknown terminal... zero checking whether termcap.h contains ospeed... no checking whether ospeed can be extern... yes checking whether termcap.h contains UP, BC and PC... no checking whether UP, BC and PC can be extern... no checking whether tputs() uses outfuntype... no checking whether sys/select.h and sys/time.h may both be included... yes checking for /dev/ptc... yes checking for SVR4 ptys... no checking for ptyranges... p / 0123456789abcdef checking default tty permissions/group... can't determine - assume ptys are world accessible world checking return type of signal handlers... void checking for struct sigcontext... yes checking getcwd implementation is broken... no checking for bcmp... yes checking for fchdir... yes checking for fchown... yes checking for fsync... yes checking for getcwd... yes checking for getpseudotty... no checking for getpwent... yes checking for getpwnam... yes checking for getpwuid... yes checking for getrlimit... yes checking for gettimeofday... yes checking for getwd... yes checking for lstat... yes checking for memcmp... yes checking for memset... yes checking for mkdtemp... yes checking for nanosleep... yes checking for opendir... yes checking for putenv... yes checking for qsort... yes checking for readlink... yes checking for select... yes checking for setenv... yes checking for setpgid... yes checking for setsid... yes checking for sigaltstack... yes checking for sigstack... yes checking for sigset... yes checking for sigsetjmp... yes checking for sigaction... yes checking for sigvec... yes checking for strcasecmp... yes checking for strerror... yes checking for strftime... yes checking for stricmp... no checking for strncasecmp... yes checking for strnicmp... no checking for strpbrk... yes checking for strtol... yes checking for tgetent... yes checking for towlower... yes checking for towupper... yes checking for iswupper... yes checking for usleep... yes checking for utime... yes checking for utimes... yes checking for _LARGEFILE_SOURCE value needed for large files... no checking for special C compiler options needed for large files... no checking for _FILE_OFFSET_BITS value needed for large files... no checking for st_blksize... yes checking whether stat() ignores a trailing slash... yes checking for iconv_open()... yes; with -liconv checking for nl_langinfo(CODESET)... yes checking for strtod in -lm... yes checking for strtod() and other floating point functions... yes checking --disable-acl argument... no checking for acl_get_file in -lposix1e... no checking for acl_get_file in -lacl... no checking for POSIX ACL support... no checking for acl_get in -lsec... no checking for Solaris ACL support... no checking for AIX ACL support... yes checking --disable-gpm argument... no checking for gpm... no checking --disable-sysmouse argument... no checking for sysmouse... no checking for FD_CLOEXEC... yes checking for rename... yes checking for sysctl... not usable checking for sysinfo... not usable checking for sysinfo.mem_unit... no checking for sysconf... yes checking size of int... 4 checking size of long... 8 checking size of time_t... 8 checking size of off_t... 8 checking uint32_t is 32 bits... ok checking whether memmove handles overlaps... yes checking whether X_LOCALE needed... no checking whether Xutf8SetWMProperties() can be used... no checking for _xpg4_setrunelocale in -lxpg4... no checking how to create tags... ctags -t checking how to run man with a section nr... man checking --disable-nls argument... no checking for msgfmt... no checking for NLS... msgfmt not found - disabled checking dlfcn.h usability... yes checking dlfcn.h presence... yes checking for dlfcn.h... yes checking for dlopen()... yes checking for dlsym()... yes checking setjmp.h usability... yes checking setjmp.h presence... yes checking for setjmp.h... yes checking linker --as-needed support... no configure: updating cache auto/config.cache configure: creating auto/config.status config.status: creating auto/config.mk config.status: creating auto/config.h CC="cc -qlanglvl=extc89 -Iproto -DHAVE_CONFIG_H " srcdir=. sh ./osdef.sh cc -qlanglvl=extc89 -c -I. -Iproto -DHAVE_CONFIG_H -g -o objects/buffer.o buffer.c cc -qlanglvl=extc89 -c -I. -Iproto -DHAVE_CONFIG_H -g -o objects/blowfish.o blowfish.c cc -qlanglvl=extc89 -c -I. -Iproto -DHAVE_CONFIG_H -g -o objects/charset.o charset.c cc -qlanglvl=extc89 -c -I. -Iproto -DHAVE_CONFIG_H -g -o objects/crypt.o crypt.c cc -qlanglvl=extc89 -c -I. -Iproto -DHAVE_CONFIG_H -g -o objects/crypt_zip.o crypt_zip.c cc -qlanglvl=extc89 -c -I. -Iproto -DHAVE_CONFIG_H -g -o objects/diff.o diff.c cc -qlanglvl=extc89 -c -I. -Iproto -DHAVE_CONFIG_H -g -o objects/digraph.o digraph.c cc -qlanglvl=extc89 -c -I. -Iproto -DHAVE_CONFIG_H -g -o objects/edit.o edit.c cc -qlanglvl=extc89 -c -I. -Iproto -DHAVE_CONFIG_H -g -o objects/eval.o eval.c cc -qlanglvl=extc89 -c -I. -Iproto -DHAVE_CONFIG_H -g -o objects/ex_cmds.o ex_cmds.c cc -qlanglvl=extc89 -c -I. -Iproto -DHAVE_CONFIG_H -g -o objects/ex_cmds2.o ex_cmds2.c cc -qlanglvl=extc89 -c -I. -Iproto -DHAVE_CONFIG_H -g -o objects/ex_docmd.o ex_docmd.c cc -qlanglvl=extc89 -c -I. -Iproto -DHAVE_CONFIG_H -g -o objects/ex_eval.o ex_eval.c cc -qlanglvl=extc89 -c -I. -Iproto -DHAVE_CONFIG_H -g -o objects/ex_getln.o ex_getln.c cc -qlanglvl=extc89 -c -I. -Iproto -DHAVE_CONFIG_H -g -o objects/fileio.o fileio.c cc -qlanglvl=extc89 -c -I. -Iproto -DHAVE_CONFIG_H -g -o objects/fold.o fold.c cc -qlanglvl=extc89 -c -I. -Iproto -DHAVE_CONFIG_H -g -o objects/getchar.o getchar.c cc -qlanglvl=extc89 -c -I. -Iproto -DHAVE_CONFIG_H -g -o objects/hardcopy.o hardcopy.c cc -qlanglvl=extc89 -c -I. -Iproto -DHAVE_CONFIG_H -g -o objects/hashtab.o hashtab.c cc -qlanglvl=extc89 -c -I. -Iproto -DHAVE_CONFIG_H -g -o objects/if_cscope.o if_cscope.c cc -qlanglvl=extc89 -c -I. -Iproto -DHAVE_CONFIG_H -g -o objects/if_xcmdsrv.o if_xcmdsrv.c cc -qlanglvl=extc89 -c -I. -Iproto -DHAVE_CONFIG_H -g -o objects/mark.o mark.c cc -qlanglvl=extc89 -c -I. -Iproto -DHAVE_CONFIG_H -g -o objects/memline.o memline.c cc -qlanglvl=extc89 -c -I. -Iproto -DHAVE_CONFIG_H -g -o objects/menu.o menu.c cc -qlanglvl=extc89 -c -I. -Iproto -DHAVE_CONFIG_H -g -o objects/message.o message.c cc -qlanglvl=extc89 -c -I. -Iproto -DHAVE_CONFIG_H -g -o objects/misc1.o misc1.c cc -qlanglvl=extc89 -c -I. -Iproto -DHAVE_CONFIG_H -g -o objects/misc2.o misc2.c cc -qlanglvl=extc89 -c -I. -Iproto -DHAVE_CONFIG_H -g -o objects/move.o move.c cc -qlanglvl=extc89 -c -I. -Iproto -DHAVE_CONFIG_H -g -o objects/mbyte.o mbyte.c "mbyte.c", line 5327.14: 1506-045 (S) Undeclared identifier input_style. "mbyte.c", line 5410.9: 1506-045 (S) Undeclared identifier input_style. "mbyte.c", line 5412.13: 1506-045 (S) Undeclared identifier xim_fg_color. "mbyte.c", line 5412.29: 1506-045 (S) Undeclared identifier INVALCOLOR. "mbyte.c", line 5414.28: 1506-045 (S) Undeclared identifier gui. "mbyte.c", line 5415.13: 1506-045 (S) Undeclared identifier xim_bg_color. "mbyte.c", line 5779.9: 1506-045 (S) Undeclared identifier input_style. "mbyte.c", line 5794.33: 1506-045 (S) Undeclared identifier gui. "mbyte.c", line 5870.9: 1506-045 (S) Undeclared identifier status_area_enabled. "mbyte.c", line 5871.16: 1506-045 (S) Undeclared identifier gui. make: The error code from the last command is 1. Stop. make: The error code from the last command is 2. Stop. 3. What is the expected output? Compile and create the vim binary file. What do you see instead? The error above. What version of the product are you using? On what operating system? Vim 7.4.475 on Aix 6.1 C compiler version: ]xlc -qversion IBM XL C/C++ for AIX, V11.1 (5724-X13) Version: 11.01.0000.0006 ``` Original issue reported on code.google.com by `Zulolox4...@gmail.com` on 13 Oct 2014 at 7:30
1.0
Patch 475 - Can't compile on a system where Xutf8SetWMProperties() - on AIX 6.1 - ``` What steps will reproduce the problem? two steps, configure and make : 1. The command: ./configure --with-features=huge --enable-gui=no works, a few output lines : configure: creating cache auto/config.cache checking whether make sets $(MAKE)... yes checking for gcc... no checking for cc... cc checking whether the C compiler works... yes checking for C compiler default output file name... a.out checking for suffix of executables... checking whether we are cross compiling... no checking for suffix of object files... o checking whether we are using the GNU C compiler... no checking whether cc accepts -g... yes checking for cc option to accept ISO C89... -qlanglvl=extc89 checking how to run the C preprocessor... cc -qlanglvl=extc89 -E checking for grep that handles long lines and -e... /usr/bin/grep checking for egrep... /usr/bin/grep -E checking for fgrep... /usr/bin/grep -F checking for library containing strerror... none required checking for gawk... no checking for mawk... no checking for nawk... nawk checking for strip... strip checking for ANSI C header files... yes checking for sys/wait.h that is POSIX.1 compatible... yes checking --enable-fail-if-missing argument... no checking for recent clang version... no configure: checking for buggy tools... checking for BeOS... no ... checking whether Xutf8SetWMProperties() can be used... no checking for _xpg4_setrunelocale in -lxpg4... no checking how to create tags... ctags -t checking how to run man with a section nr... man checking --disable-nls argument... no checking for msgfmt... no checking for NLS... msgfmt not found - disabled checking dlfcn.h usability... yes checking dlfcn.h presence... yes checking for dlfcn.h... yes checking for dlopen()... yes checking for dlsym()... yes checking setjmp.h usability... yes checking setjmp.h presence... yes checking for setjmp.h... yes checking linker --as-needed support... no configure: updating cache auto/config.cache configure: creating auto/config.status config.status: creating auto/config.mk config.status: creating auto/config.h 2. The "make" command, it re-execute configure, compile and stop with an error, the output: Starting make in the src directory. If there are problems, cd to the src directory and run make there cd src && make first rm -f auto/config.cache if test "X" != "Xclean" -a "X" != "Xdistclean" -a "X" != "Xautoconf" -a "X" != "Xreconfig"; then GUI_INC_LOC="" GUI_LIB_LOC="" CC="cc -qlanglvl=extc89" CPPFLAGS="" CFLAGS="-g" LDFLAGS="" srcdir="." ./configure ; fi configure: creating cache auto/config.cache checking whether make sets $(MAKE)... yes checking for gcc... cc -qlanglvl=extc89 checking whether the C compiler works... yes checking for C compiler default output file name... a.out checking for suffix of executables... checking whether we are cross compiling... no checking for suffix of object files... o checking whether we are using the GNU C compiler... no checking whether cc -qlanglvl=extc89 accepts -g... yes checking for cc -qlanglvl=extc89 option to accept ISO C89... none needed checking how to run the C preprocessor... cc -qlanglvl=extc89 -E checking for grep that handles long lines and -e... /usr/bin/grep checking for egrep... /usr/bin/grep -E checking for fgrep... /usr/bin/grep -F checking for library containing strerror... none required checking for gawk... no checking for mawk... no checking for nawk... nawk checking for strip... strip checking for ANSI C header files... yes checking for sys/wait.h that is POSIX.1 compatible... yes checking --enable-fail-if-missing argument... no checking for recent clang version... no configure: checking for buggy tools... checking for BeOS... no checking for QNX... no checking for Darwin (Mac OS X)... no checking AvailabilityMacros.h usability... no checking AvailabilityMacros.h presence... no checking for AvailabilityMacros.h... no checking --with-local-dir argument... Defaulting to /usr/local checking --with-vim-name argument... Defaulting to vim checking --with-ex-name argument... Defaulting to ex checking --with-view-name argument... Defaulting to view checking --with-global-runtime argument... no checking --with-modified-by argument... no checking if character set is EBCDIC... no checking --disable-smack argument... no checking linux/xattr.h usability... no checking linux/xattr.h presence... no checking for linux/xattr.h... no checking --disable-selinux argument... no checking for is_selinux_enabled in -lselinux... no checking --with-features argument... Defaulting to normal checking --with-compiledby argument... no checking --disable-xsmp argument... no checking --disable-xsmp-interact argument... no checking --enable-luainterp argument... no checking --enable-mzschemeinterp argument... no checking --enable-perlinterp argument... no checking --enable-pythoninterp argument... no checking --enable-python3interp argument... no checking --enable-tclinterp argument... no checking --enable-rubyinterp argument... no checking --enable-cscope argument... no checking --enable-workshop argument... no checking --disable-netbeans argument... no checking for socket in -lsocket... no checking for gethostbyname in -lnsl... yes checking whether compiling netbeans integration is possible... yes checking --enable-sniff argument... no checking --enable-multibyte argument... no checking --enable-hangulinput argument... no checking --enable-xim argument... defaulting to auto checking --enable-fontset argument... no checking for xmkmf... /usr/bin/X11/xmkmf checking for X... libraries , headers checking for gethostbyname... yes checking for connect... yes checking for remove... yes checking for shmat... yes checking for IceConnectionNumber in -lICE... yes checking if X11 header files can be found... yes checking for _XdmcpAuthDoIt in -lXdmcp... no checking for IceOpenConnection in -lICE... no checking for XpmCreatePixmapFromData in -lXpm... yes checking if X11 header files implicitly declare return values... no checking size of wchar_t is 2 bytes... no checking --enable-gui argument... yes/auto - automatic GUI support checking whether or not to look for GTK+ 2... yes checking whether or not to look for GNOME... no checking whether or not to look for Motif... yes checking whether or not to look for Athena... yes checking whether or not to look for neXtaw... yes checking whether or not to look for Carbon... yes checking --disable-gtktest argument... gtk test enabled checking for pkg-config... no checking for location of Motif GUI includes... <not found> checking if Athena header files can be found... yes checking if neXtaw header files can be found... no checking for XShapeQueryExtension in -lXext... yes checking for wslen in -lw... no checking for dlsym in -ldl... yes checking for XmuCreateStippledPixmap in -lXmu... yes checking for extra X11 defines... -DFUNCPROTO=15 checking X11/SM/SMlib.h usability... yes checking X11/SM/SMlib.h presence... yes checking for X11/SM/SMlib.h... yes checking X11/xpm.h usability... yes checking X11/xpm.h presence... yes checking for X11/xpm.h... yes checking X11/Sunkeysym.h usability... yes checking X11/Sunkeysym.h presence... yes checking for X11/Sunkeysym.h... yes checking for XIMText in X11/Xlib.h... yes X GUI selected; xim has been enabled checking for X11/Xmu/Editres.h... yes checking for CYGWIN environment... no checking whether toupper is broken... no checking whether __DATE__ and __TIME__ work... yes checking whether __attribute__((unused)) is allowed... yes checking elf.h usability... no checking elf.h presence... no checking for elf.h... no checking for dirent.h that defines DIR... yes checking for library containing opendir... none required checking stdarg.h usability... yes checking stdarg.h presence... yes checking for stdarg.h... yes checking stdint.h usability... yes checking stdint.h presence... yes checking for stdint.h... yes checking stdlib.h usability... yes checking stdlib.h presence... yes checking for stdlib.h... yes checking string.h usability... yes checking string.h presence... yes checking for string.h... yes checking sys/select.h usability... yes checking sys/select.h presence... yes checking for sys/select.h... yes checking sys/utsname.h usability... yes checking sys/utsname.h presence... yes checking for sys/utsname.h... yes checking termcap.h usability... no checking termcap.h presence... no checking for termcap.h... no checking fcntl.h usability... yes checking fcntl.h presence... yes checking for fcntl.h... yes checking sgtty.h usability... yes checking sgtty.h presence... yes checking for sgtty.h... yes checking sys/ioctl.h usability... yes checking sys/ioctl.h presence... yes checking for sys/ioctl.h... yes checking sys/time.h usability... yes checking sys/time.h presence... yes checking for sys/time.h... yes checking sys/types.h usability... yes checking sys/types.h presence... yes checking for sys/types.h... yes checking termio.h usability... yes checking termio.h presence... yes checking for termio.h... yes checking iconv.h usability... yes checking iconv.h presence... yes checking for iconv.h... yes checking inttypes.h usability... yes checking inttypes.h presence... yes checking for inttypes.h... yes checking langinfo.h usability... yes checking langinfo.h presence... yes checking for langinfo.h... yes checking math.h usability... yes checking math.h presence... yes checking for math.h... yes checking unistd.h usability... yes checking unistd.h presence... yes checking for unistd.h... yes checking stropts.h usability... yes checking stropts.h presence... yes checking for stropts.h... yes checking errno.h usability... yes checking errno.h presence... yes checking for errno.h... yes checking sys/resource.h usability... yes checking sys/resource.h presence... yes checking for sys/resource.h... yes checking sys/systeminfo.h usability... no checking sys/systeminfo.h presence... no checking for sys/systeminfo.h... no checking locale.h usability... yes checking locale.h presence... yes checking for locale.h... yes checking sys/stream.h usability... yes checking sys/stream.h presence... yes checking for sys/stream.h... yes checking termios.h usability... yes checking termios.h presence... yes checking for termios.h... yes checking libc.h usability... no checking libc.h presence... no checking for libc.h... no checking sys/statfs.h usability... yes checking sys/statfs.h presence... yes checking for sys/statfs.h... yes checking poll.h usability... yes checking poll.h presence... yes checking for poll.h... yes checking sys/poll.h usability... yes checking sys/poll.h presence... yes checking for sys/poll.h... yes checking pwd.h usability... yes checking pwd.h presence... yes checking for pwd.h... yes checking utime.h usability... yes checking utime.h presence... yes checking for utime.h... yes checking sys/param.h usability... yes checking sys/param.h presence... yes checking for sys/param.h... yes checking libintl.h usability... no checking libintl.h presence... no checking for libintl.h... no checking libgen.h usability... yes checking libgen.h presence... yes checking for libgen.h... yes checking util/debug.h usability... no checking util/debug.h presence... no checking for util/debug.h... no checking util/msg18n.h usability... no checking util/msg18n.h presence... no checking for util/msg18n.h... no checking frame.h usability... no checking frame.h presence... no checking for frame.h... no checking sys/acl.h usability... yes checking sys/acl.h presence... yes checking for sys/acl.h... yes checking sys/access.h usability... yes checking sys/access.h presence... yes checking for sys/access.h... yes checking sys/sysinfo.h usability... yes checking sys/sysinfo.h presence... yes checking for sys/sysinfo.h... yes checking wchar.h usability... yes checking wchar.h presence... yes checking for wchar.h... yes checking wctype.h usability... yes checking wctype.h presence... yes checking for wctype.h... yes checking for sys/ptem.h... no checking for sys/sysctl.h... no checking for pthread_np.h... no checking strings.h usability... yes checking strings.h presence... yes checking for strings.h... yes checking if strings.h can be included after string.h... yes checking for an ANSI C-conforming const... yes checking for working volatile... yes checking for mode_t... yes checking for off_t... yes checking for pid_t... yes checking for size_t... yes checking for uid_t in sys/types.h... yes checking for uint32_t... yes checking whether time.h and sys/time.h may both be included... yes checking for ino_t... yes checking for dev_t... yes checking whether byte ordering is bigendian... yes checking for rlim_t... yes checking for stack_t... yes checking whether stack_t has an ss_base field... no checking --with-tlib argument... empty: automatic terminal library selection checking for tgetent in -ltinfo... no checking for tgetent in -lncurses... no checking for tgetent in -ltermlib... no checking for tgetent in -ltermcap... no checking for tgetent in -lcurses... yes checking whether we talk terminfo... yes checking what tgetent() returns for an unknown terminal... zero checking whether termcap.h contains ospeed... no checking whether ospeed can be extern... yes checking whether termcap.h contains UP, BC and PC... no checking whether UP, BC and PC can be extern... no checking whether tputs() uses outfuntype... no checking whether sys/select.h and sys/time.h may both be included... yes checking for /dev/ptc... yes checking for SVR4 ptys... no checking for ptyranges... p / 0123456789abcdef checking default tty permissions/group... can't determine - assume ptys are world accessible world checking return type of signal handlers... void checking for struct sigcontext... yes checking getcwd implementation is broken... no checking for bcmp... yes checking for fchdir... yes checking for fchown... yes checking for fsync... yes checking for getcwd... yes checking for getpseudotty... no checking for getpwent... yes checking for getpwnam... yes checking for getpwuid... yes checking for getrlimit... yes checking for gettimeofday... yes checking for getwd... yes checking for lstat... yes checking for memcmp... yes checking for memset... yes checking for mkdtemp... yes checking for nanosleep... yes checking for opendir... yes checking for putenv... yes checking for qsort... yes checking for readlink... yes checking for select... yes checking for setenv... yes checking for setpgid... yes checking for setsid... yes checking for sigaltstack... yes checking for sigstack... yes checking for sigset... yes checking for sigsetjmp... yes checking for sigaction... yes checking for sigvec... yes checking for strcasecmp... yes checking for strerror... yes checking for strftime... yes checking for stricmp... no checking for strncasecmp... yes checking for strnicmp... no checking for strpbrk... yes checking for strtol... yes checking for tgetent... yes checking for towlower... yes checking for towupper... yes checking for iswupper... yes checking for usleep... yes checking for utime... yes checking for utimes... yes checking for _LARGEFILE_SOURCE value needed for large files... no checking for special C compiler options needed for large files... no checking for _FILE_OFFSET_BITS value needed for large files... no checking for st_blksize... yes checking whether stat() ignores a trailing slash... yes checking for iconv_open()... yes; with -liconv checking for nl_langinfo(CODESET)... yes checking for strtod in -lm... yes checking for strtod() and other floating point functions... yes checking --disable-acl argument... no checking for acl_get_file in -lposix1e... no checking for acl_get_file in -lacl... no checking for POSIX ACL support... no checking for acl_get in -lsec... no checking for Solaris ACL support... no checking for AIX ACL support... yes checking --disable-gpm argument... no checking for gpm... no checking --disable-sysmouse argument... no checking for sysmouse... no checking for FD_CLOEXEC... yes checking for rename... yes checking for sysctl... not usable checking for sysinfo... not usable checking for sysinfo.mem_unit... no checking for sysconf... yes checking size of int... 4 checking size of long... 8 checking size of time_t... 8 checking size of off_t... 8 checking uint32_t is 32 bits... ok checking whether memmove handles overlaps... yes checking whether X_LOCALE needed... no checking whether Xutf8SetWMProperties() can be used... no checking for _xpg4_setrunelocale in -lxpg4... no checking how to create tags... ctags -t checking how to run man with a section nr... man checking --disable-nls argument... no checking for msgfmt... no checking for NLS... msgfmt not found - disabled checking dlfcn.h usability... yes checking dlfcn.h presence... yes checking for dlfcn.h... yes checking for dlopen()... yes checking for dlsym()... yes checking setjmp.h usability... yes checking setjmp.h presence... yes checking for setjmp.h... yes checking linker --as-needed support... no configure: updating cache auto/config.cache configure: creating auto/config.status config.status: creating auto/config.mk config.status: creating auto/config.h CC="cc -qlanglvl=extc89 -Iproto -DHAVE_CONFIG_H " srcdir=. sh ./osdef.sh cc -qlanglvl=extc89 -c -I. -Iproto -DHAVE_CONFIG_H -g -o objects/buffer.o buffer.c cc -qlanglvl=extc89 -c -I. -Iproto -DHAVE_CONFIG_H -g -o objects/blowfish.o blowfish.c cc -qlanglvl=extc89 -c -I. -Iproto -DHAVE_CONFIG_H -g -o objects/charset.o charset.c cc -qlanglvl=extc89 -c -I. -Iproto -DHAVE_CONFIG_H -g -o objects/crypt.o crypt.c cc -qlanglvl=extc89 -c -I. -Iproto -DHAVE_CONFIG_H -g -o objects/crypt_zip.o crypt_zip.c cc -qlanglvl=extc89 -c -I. -Iproto -DHAVE_CONFIG_H -g -o objects/diff.o diff.c cc -qlanglvl=extc89 -c -I. -Iproto -DHAVE_CONFIG_H -g -o objects/digraph.o digraph.c cc -qlanglvl=extc89 -c -I. -Iproto -DHAVE_CONFIG_H -g -o objects/edit.o edit.c cc -qlanglvl=extc89 -c -I. -Iproto -DHAVE_CONFIG_H -g -o objects/eval.o eval.c cc -qlanglvl=extc89 -c -I. -Iproto -DHAVE_CONFIG_H -g -o objects/ex_cmds.o ex_cmds.c cc -qlanglvl=extc89 -c -I. -Iproto -DHAVE_CONFIG_H -g -o objects/ex_cmds2.o ex_cmds2.c cc -qlanglvl=extc89 -c -I. -Iproto -DHAVE_CONFIG_H -g -o objects/ex_docmd.o ex_docmd.c cc -qlanglvl=extc89 -c -I. -Iproto -DHAVE_CONFIG_H -g -o objects/ex_eval.o ex_eval.c cc -qlanglvl=extc89 -c -I. -Iproto -DHAVE_CONFIG_H -g -o objects/ex_getln.o ex_getln.c cc -qlanglvl=extc89 -c -I. -Iproto -DHAVE_CONFIG_H -g -o objects/fileio.o fileio.c cc -qlanglvl=extc89 -c -I. -Iproto -DHAVE_CONFIG_H -g -o objects/fold.o fold.c cc -qlanglvl=extc89 -c -I. -Iproto -DHAVE_CONFIG_H -g -o objects/getchar.o getchar.c cc -qlanglvl=extc89 -c -I. -Iproto -DHAVE_CONFIG_H -g -o objects/hardcopy.o hardcopy.c cc -qlanglvl=extc89 -c -I. -Iproto -DHAVE_CONFIG_H -g -o objects/hashtab.o hashtab.c cc -qlanglvl=extc89 -c -I. -Iproto -DHAVE_CONFIG_H -g -o objects/if_cscope.o if_cscope.c cc -qlanglvl=extc89 -c -I. -Iproto -DHAVE_CONFIG_H -g -o objects/if_xcmdsrv.o if_xcmdsrv.c cc -qlanglvl=extc89 -c -I. -Iproto -DHAVE_CONFIG_H -g -o objects/mark.o mark.c cc -qlanglvl=extc89 -c -I. -Iproto -DHAVE_CONFIG_H -g -o objects/memline.o memline.c cc -qlanglvl=extc89 -c -I. -Iproto -DHAVE_CONFIG_H -g -o objects/menu.o menu.c cc -qlanglvl=extc89 -c -I. -Iproto -DHAVE_CONFIG_H -g -o objects/message.o message.c cc -qlanglvl=extc89 -c -I. -Iproto -DHAVE_CONFIG_H -g -o objects/misc1.o misc1.c cc -qlanglvl=extc89 -c -I. -Iproto -DHAVE_CONFIG_H -g -o objects/misc2.o misc2.c cc -qlanglvl=extc89 -c -I. -Iproto -DHAVE_CONFIG_H -g -o objects/move.o move.c cc -qlanglvl=extc89 -c -I. -Iproto -DHAVE_CONFIG_H -g -o objects/mbyte.o mbyte.c "mbyte.c", line 5327.14: 1506-045 (S) Undeclared identifier input_style. "mbyte.c", line 5410.9: 1506-045 (S) Undeclared identifier input_style. "mbyte.c", line 5412.13: 1506-045 (S) Undeclared identifier xim_fg_color. "mbyte.c", line 5412.29: 1506-045 (S) Undeclared identifier INVALCOLOR. "mbyte.c", line 5414.28: 1506-045 (S) Undeclared identifier gui. "mbyte.c", line 5415.13: 1506-045 (S) Undeclared identifier xim_bg_color. "mbyte.c", line 5779.9: 1506-045 (S) Undeclared identifier input_style. "mbyte.c", line 5794.33: 1506-045 (S) Undeclared identifier gui. "mbyte.c", line 5870.9: 1506-045 (S) Undeclared identifier status_area_enabled. "mbyte.c", line 5871.16: 1506-045 (S) Undeclared identifier gui. make: The error code from the last command is 1. Stop. make: The error code from the last command is 2. Stop. 3. What is the expected output? Compile and create the vim binary file. What do you see instead? The error above. What version of the product are you using? On what operating system? Vim 7.4.475 on Aix 6.1 C compiler version: ]xlc -qversion IBM XL C/C++ for AIX, V11.1 (5724-X13) Version: 11.01.0000.0006 ``` Original issue reported on code.google.com by `Zulolox4...@gmail.com` on 13 Oct 2014 at 7:30
defect
patch can t compile on a system where on aix what steps will reproduce the problem two steps configure and make the command configure with features huge enable gui no works a few output lines configure creating cache auto config cache checking whether make sets make yes checking for gcc no checking for cc cc checking whether the c compiler works yes checking for c compiler default output file name a out checking for suffix of executables checking whether we are cross compiling no checking for suffix of object files o checking whether we are using the gnu c compiler no checking whether cc accepts g yes checking for cc option to accept iso qlanglvl checking how to run the c preprocessor cc qlanglvl e checking for grep that handles long lines and e usr bin grep checking for egrep usr bin grep e checking for fgrep usr bin grep f checking for library containing strerror none required checking for gawk no checking for mawk no checking for nawk nawk checking for strip strip checking for ansi c header files yes checking for sys wait h that is posix compatible yes checking enable fail if missing argument no checking for recent clang version no configure checking for buggy tools checking for beos no checking whether can be used no checking for setrunelocale in no checking how to create tags ctags t checking how to run man with a section nr man checking disable nls argument no checking for msgfmt no checking for nls msgfmt not found disabled checking dlfcn h usability yes checking dlfcn h presence yes checking for dlfcn h yes checking for dlopen yes checking for dlsym yes checking setjmp h usability yes checking setjmp h presence yes checking for setjmp h yes checking linker as needed support no configure updating cache auto config cache configure creating auto config status config status creating auto config mk config status creating auto config h the make command it re execute configure compile and stop with an error the output starting make in the src directory if there are problems cd to the src directory and run make there cd src make first rm f auto config cache if test x xclean a x xdistclean a x xautoconf a x xreconfig then gui inc loc gui lib loc cc cc qlanglvl cppflags cflags g ldflags srcdir configure fi configure creating cache auto config cache checking whether make sets make yes checking for gcc cc qlanglvl checking whether the c compiler works yes checking for c compiler default output file name a out checking for suffix of executables checking whether we are cross compiling no checking for suffix of object files o checking whether we are using the gnu c compiler no checking whether cc qlanglvl accepts g yes checking for cc qlanglvl option to accept iso none needed checking how to run the c preprocessor cc qlanglvl e checking for grep that handles long lines and e usr bin grep checking for egrep usr bin grep e checking for fgrep usr bin grep f checking for library containing strerror none required checking for gawk no checking for mawk no checking for nawk nawk checking for strip strip checking for ansi c header files yes checking for sys wait h that is posix compatible yes checking enable fail if missing argument no checking for recent clang version no configure checking for buggy tools checking for beos no checking for qnx no checking for darwin mac os x no checking availabilitymacros h usability no checking availabilitymacros h presence no checking for availabilitymacros h no checking with local dir argument defaulting to usr local checking with vim name argument defaulting to vim checking with ex name argument defaulting to ex checking with view name argument defaulting to view checking with global runtime argument no checking with modified by argument no checking if character set is ebcdic no checking disable smack argument no checking linux xattr h usability no checking linux xattr h presence no checking for linux xattr h no checking disable selinux argument no checking for is selinux enabled in lselinux no checking with features argument defaulting to normal checking with compiledby argument no checking disable xsmp argument no checking disable xsmp interact argument no checking enable luainterp argument no checking enable mzschemeinterp argument no checking enable perlinterp argument no checking enable pythoninterp argument no checking enable argument no checking enable tclinterp argument no checking enable rubyinterp argument no checking enable cscope argument no checking enable workshop argument no checking disable netbeans argument no checking for socket in lsocket no checking for gethostbyname in lnsl yes checking whether compiling netbeans integration is possible yes checking enable sniff argument no checking enable multibyte argument no checking enable hangulinput argument no checking enable xim argument defaulting to auto checking enable fontset argument no checking for xmkmf usr bin xmkmf checking for x libraries headers checking for gethostbyname yes checking for connect yes checking for remove yes checking for shmat yes checking for iceconnectionnumber in lice yes checking if header files can be found yes checking for xdmcpauthdoit in lxdmcp no checking for iceopenconnection in lice no checking for xpmcreatepixmapfromdata in lxpm yes checking if header files implicitly declare return values no checking size of wchar t is bytes no checking enable gui argument yes auto automatic gui support checking whether or not to look for gtk yes checking whether or not to look for gnome no checking whether or not to look for motif yes checking whether or not to look for athena yes checking whether or not to look for nextaw yes checking whether or not to look for carbon yes checking disable gtktest argument gtk test enabled checking for pkg config no checking for location of motif gui includes checking if athena header files can be found yes checking if nextaw header files can be found no checking for xshapequeryextension in lxext yes checking for wslen in lw no checking for dlsym in ldl yes checking for xmucreatestippledpixmap in lxmu yes checking for extra defines dfuncproto checking sm smlib h usability yes checking sm smlib h presence yes checking for sm smlib h yes checking xpm h usability yes checking xpm h presence yes checking for xpm h yes checking sunkeysym h usability yes checking sunkeysym h presence yes checking for sunkeysym h yes checking for ximtext in xlib h yes x gui selected xim has been enabled checking for xmu editres h yes checking for cygwin environment no checking whether toupper is broken no checking whether date and time work yes checking whether attribute unused is allowed yes checking elf h usability no checking elf h presence no checking for elf h no checking for dirent h that defines dir yes checking for library containing opendir none required checking stdarg h usability yes checking stdarg h presence yes checking for stdarg h yes checking stdint h usability yes checking stdint h presence yes checking for stdint h yes checking stdlib h usability yes checking stdlib h presence yes checking for stdlib h yes checking string h usability yes checking string h presence yes checking for string h yes checking sys select h usability yes checking sys select h presence yes checking for sys select h yes checking sys utsname h usability yes checking sys utsname h presence yes checking for sys utsname h yes checking termcap h usability no checking termcap h presence no checking for termcap h no checking fcntl h usability yes checking fcntl h presence yes checking for fcntl h yes checking sgtty h usability yes checking sgtty h presence yes checking for sgtty h yes checking sys ioctl h usability yes checking sys ioctl h presence yes checking for sys ioctl h yes checking sys time h usability yes checking sys time h presence yes checking for sys time h yes checking sys types h usability yes checking sys types h presence yes checking for sys types h yes checking termio h usability yes checking termio h presence yes checking for termio h yes checking iconv h usability yes checking iconv h presence yes checking for iconv h yes checking inttypes h usability yes checking inttypes h presence yes checking for inttypes h yes checking langinfo h usability yes checking langinfo h presence yes checking for langinfo h yes checking math h usability yes checking math h presence yes checking for math h yes checking unistd h usability yes checking unistd h presence yes checking for unistd h yes checking stropts h usability yes checking stropts h presence yes checking for stropts h yes checking errno h usability yes checking errno h presence yes checking for errno h yes checking sys resource h usability yes checking sys resource h presence yes checking for sys resource h yes checking sys systeminfo h usability no checking sys systeminfo h presence no checking for sys systeminfo h no checking locale h usability yes checking locale h presence yes checking for locale h yes checking sys stream h usability yes checking sys stream h presence yes checking for sys stream h yes checking termios h usability yes checking termios h presence yes checking for termios h yes checking libc h usability no checking libc h presence no checking for libc h no checking sys statfs h usability yes checking sys statfs h presence yes checking for sys statfs h yes checking poll h usability yes checking poll h presence yes checking for poll h yes checking sys poll h usability yes checking sys poll h presence yes checking for sys poll h yes checking pwd h usability yes checking pwd h presence yes checking for pwd h yes checking utime h usability yes checking utime h presence yes checking for utime h yes checking sys param h usability yes checking sys param h presence yes checking for sys param h yes checking libintl h usability no checking libintl h presence no checking for libintl h no checking libgen h usability yes checking libgen h presence yes checking for libgen h yes checking util debug h usability no checking util debug h presence no checking for util debug h no checking util h usability no checking util h presence no checking for util h no checking frame h usability no checking frame h presence no checking for frame h no checking sys acl h usability yes checking sys acl h presence yes checking for sys acl h yes checking sys access h usability yes checking sys access h presence yes checking for sys access h yes checking sys sysinfo h usability yes checking sys sysinfo h presence yes checking for sys sysinfo h yes checking wchar h usability yes checking wchar h presence yes checking for wchar h yes checking wctype h usability yes checking wctype h presence yes checking for wctype h yes checking for sys ptem h no checking for sys sysctl h no checking for pthread np h no checking strings h usability yes checking strings h presence yes checking for strings h yes checking if strings h can be included after string h yes checking for an ansi c conforming const yes checking for working volatile yes checking for mode t yes checking for off t yes checking for pid t yes checking for size t yes checking for uid t in sys types h yes checking for t yes checking whether time h and sys time h may both be included yes checking for ino t yes checking for dev t yes checking whether byte ordering is bigendian yes checking for rlim t yes checking for stack t yes checking whether stack t has an ss base field no checking with tlib argument empty automatic terminal library selection checking for tgetent in ltinfo no checking for tgetent in lncurses no checking for tgetent in ltermlib no checking for tgetent in ltermcap no checking for tgetent in lcurses yes checking whether we talk terminfo yes checking what tgetent returns for an unknown terminal zero checking whether termcap h contains ospeed no checking whether ospeed can be extern yes checking whether termcap h contains up bc and pc no checking whether up bc and pc can be extern no checking whether tputs uses outfuntype no checking whether sys select h and sys time h may both be included yes checking for dev ptc yes checking for ptys no checking for ptyranges p checking default tty permissions group can t determine assume ptys are world accessible world checking return type of signal handlers void checking for struct sigcontext yes checking getcwd implementation is broken no checking for bcmp yes checking for fchdir yes checking for fchown yes checking for fsync yes checking for getcwd yes checking for getpseudotty no checking for getpwent yes checking for getpwnam yes checking for getpwuid yes checking for getrlimit yes checking for gettimeofday yes checking for getwd yes checking for lstat yes checking for memcmp yes checking for memset yes checking for mkdtemp yes checking for nanosleep yes checking for opendir yes checking for putenv yes checking for qsort yes checking for readlink yes checking for select yes checking for setenv yes checking for setpgid yes checking for setsid yes checking for sigaltstack yes checking for sigstack yes checking for sigset yes checking for sigsetjmp yes checking for sigaction yes checking for sigvec yes checking for strcasecmp yes checking for strerror yes checking for strftime yes checking for stricmp no checking for strncasecmp yes checking for strnicmp no checking for strpbrk yes checking for strtol yes checking for tgetent yes checking for towlower yes checking for towupper yes checking for iswupper yes checking for usleep yes checking for utime yes checking for utimes yes checking for largefile source value needed for large files no checking for special c compiler options needed for large files no checking for file offset bits value needed for large files no checking for st blksize yes checking whether stat ignores a trailing slash yes checking for iconv open yes with liconv checking for nl langinfo codeset yes checking for strtod in lm yes checking for strtod and other floating point functions yes checking disable acl argument no checking for acl get file in no checking for acl get file in lacl no checking for posix acl support no checking for acl get in lsec no checking for solaris acl support no checking for aix acl support yes checking disable gpm argument no checking for gpm no checking disable sysmouse argument no checking for sysmouse no checking for fd cloexec yes checking for rename yes checking for sysctl not usable checking for sysinfo not usable checking for sysinfo mem unit no checking for sysconf yes checking size of int checking size of long checking size of time t checking size of off t checking t is bits ok checking whether memmove handles overlaps yes checking whether x locale needed no checking whether can be used no checking for setrunelocale in no checking how to create tags ctags t checking how to run man with a section nr man checking disable nls argument no checking for msgfmt no checking for nls msgfmt not found disabled checking dlfcn h usability yes checking dlfcn h presence yes checking for dlfcn h yes checking for dlopen yes checking for dlsym yes checking setjmp h usability yes checking setjmp h presence yes checking for setjmp h yes checking linker as needed support no configure updating cache auto config cache configure creating auto config status config status creating auto config mk config status creating auto config h cc cc qlanglvl iproto dhave config h srcdir sh osdef sh cc qlanglvl c i iproto dhave config h g o objects buffer o buffer c cc qlanglvl c i iproto dhave config h g o objects blowfish o blowfish c cc qlanglvl c i iproto dhave config h g o objects charset o charset c cc qlanglvl c i iproto dhave config h g o objects crypt o crypt c cc qlanglvl c i iproto dhave config h g o objects crypt zip o crypt zip c cc qlanglvl c i iproto dhave config h g o objects diff o diff c cc qlanglvl c i iproto dhave config h g o objects digraph o digraph c cc qlanglvl c i iproto dhave config h g o objects edit o edit c cc qlanglvl c i iproto dhave config h g o objects eval o eval c cc qlanglvl c i iproto dhave config h g o objects ex cmds o ex cmds c cc qlanglvl c i iproto dhave config h g o objects ex o ex c cc qlanglvl c i iproto dhave config h g o objects ex docmd o ex docmd c cc qlanglvl c i iproto dhave config h g o objects ex eval o ex eval c cc qlanglvl c i iproto dhave config h g o objects ex getln o ex getln c cc qlanglvl c i iproto dhave config h g o objects fileio o fileio c cc qlanglvl c i iproto dhave config h g o objects fold o fold c cc qlanglvl c i iproto dhave config h g o objects getchar o getchar c cc qlanglvl c i iproto dhave config h g o objects hardcopy o hardcopy c cc qlanglvl c i iproto dhave config h g o objects hashtab o hashtab c cc qlanglvl c i iproto dhave config h g o objects if cscope o if cscope c cc qlanglvl c i iproto dhave config h g o objects if xcmdsrv o if xcmdsrv c cc qlanglvl c i iproto dhave config h g o objects mark o mark c cc qlanglvl c i iproto dhave config h g o objects memline o memline c cc qlanglvl c i iproto dhave config h g o objects menu o menu c cc qlanglvl c i iproto dhave config h g o objects message o message c cc qlanglvl c i iproto dhave config h g o objects o c cc qlanglvl c i iproto dhave config h g o objects o c cc qlanglvl c i iproto dhave config h g o objects move o move c cc qlanglvl c i iproto dhave config h g o objects mbyte o mbyte c mbyte c line s undeclared identifier input style mbyte c line s undeclared identifier input style mbyte c line s undeclared identifier xim fg color mbyte c line s undeclared identifier invalcolor mbyte c line s undeclared identifier gui mbyte c line s undeclared identifier xim bg color mbyte c line s undeclared identifier input style mbyte c line s undeclared identifier gui mbyte c line s undeclared identifier status area enabled mbyte c line s undeclared identifier gui make the error code from the last command is stop make the error code from the last command is stop what is the expected output compile and create the vim binary file what do you see instead the error above what version of the product are you using on what operating system vim on aix c compiler version xlc qversion ibm xl c c for aix version original issue reported on code google com by gmail com on oct at
1
93,162
8,402,343,918
IssuesEvent
2018-10-11 06:12:57
tendermint/tendermint
https://api.github.com/repos/tendermint/tendermint
closed
Fail to go test rpc/lib/rpc_test.go
help wanted test waiting for response
<!-- Please fill in as much of the template below as you can. Be ready for followup questions, and please respond in a timely manner. We might ask you to provide additional logs and data (tendermint & app). --> **Tendermint version** (use `tendermint version` or `git rev-parse --verify HEAD` if installed from source): $ git rev-parse --verify HEAD c1f6f6479d8ed1c9e5512f5698749bb9cb85f79a **ABCI app** (name for built-in, URL for self-written if it's publicly available): **Environment**: 3.10.0-693.el7.x86_64 - **OS** (e.g. from /etc/os-release): CentOS Linux 7 (Core) - **Install tools**: - **Others**: Go version: go version go1.9.4 linux/amd64 **What happened**: 1. go get -u github.com/tendermint/tendermint/ 2. dep ensure 3. cd rpc/lib/ 4. go test -run TestWSClientPingPong 5. --- FAIL: TestWSClientPingPong (0.00s) require.go:765: Error Trace: rpc_test.go:365 Error: Expected nil, but got: &errors.errorString{s:"Moved Permanently"} Test: TestWSClientPingPong FAIL exit status 1 FAIL github.com/tendermint/tendermint/rpc/lib 2.009s **What you expected to happen**: 1. Test PASS **Have you tried the latest version**: yes/no 1. Last Commit: c1f6f6479d8ed1c9e5512f5698749bb9cb85f79a **How to reproduce it** (as minimally and precisely as possible): 1. go test -run TestWSClientPingPong **Logs (paste a small part showing an error (< 10 lines) or link a pastebin, gist, etc. containing more of the log file)**: **Config (you can paste only the changes you've made)**: **node command runtime flags**: **`/dump_consensus_state` output for consensus bugs** **Anything else we need to know**:
1.0
Fail to go test rpc/lib/rpc_test.go - <!-- Please fill in as much of the template below as you can. Be ready for followup questions, and please respond in a timely manner. We might ask you to provide additional logs and data (tendermint & app). --> **Tendermint version** (use `tendermint version` or `git rev-parse --verify HEAD` if installed from source): $ git rev-parse --verify HEAD c1f6f6479d8ed1c9e5512f5698749bb9cb85f79a **ABCI app** (name for built-in, URL for self-written if it's publicly available): **Environment**: 3.10.0-693.el7.x86_64 - **OS** (e.g. from /etc/os-release): CentOS Linux 7 (Core) - **Install tools**: - **Others**: Go version: go version go1.9.4 linux/amd64 **What happened**: 1. go get -u github.com/tendermint/tendermint/ 2. dep ensure 3. cd rpc/lib/ 4. go test -run TestWSClientPingPong 5. --- FAIL: TestWSClientPingPong (0.00s) require.go:765: Error Trace: rpc_test.go:365 Error: Expected nil, but got: &errors.errorString{s:"Moved Permanently"} Test: TestWSClientPingPong FAIL exit status 1 FAIL github.com/tendermint/tendermint/rpc/lib 2.009s **What you expected to happen**: 1. Test PASS **Have you tried the latest version**: yes/no 1. Last Commit: c1f6f6479d8ed1c9e5512f5698749bb9cb85f79a **How to reproduce it** (as minimally and precisely as possible): 1. go test -run TestWSClientPingPong **Logs (paste a small part showing an error (< 10 lines) or link a pastebin, gist, etc. containing more of the log file)**: **Config (you can paste only the changes you've made)**: **node command runtime flags**: **`/dump_consensus_state` output for consensus bugs** **Anything else we need to know**:
non_defect
fail to go test rpc lib rpc test go please fill in as much of the template below as you can be ready for followup questions and please respond in a timely manner we might ask you to provide additional logs and data tendermint app tendermint version use tendermint version or git rev parse verify head if installed from source git rev parse verify head abci app name for built in url for self written if it s publicly available environment os e g from etc os release centos linux core install tools others go version go version linux what happened go get u github com tendermint tendermint dep ensure cd rpc lib go test run testwsclientpingpong fail testwsclientpingpong require go error trace rpc test go error expected nil but got errors errorstring s moved permanently test testwsclientpingpong fail exit status fail github com tendermint tendermint rpc lib what you expected to happen test pass have you tried the latest version yes no last commit how to reproduce it as minimally and precisely as possible go test run testwsclientpingpong logs paste a small part showing an error lines or link a pastebin gist etc containing more of the log file config you can paste only the changes you ve made node command runtime flags dump consensus state output for consensus bugs anything else we need to know
0
11,479
2,652,258,647
IssuesEvent
2015-03-16 16:23:48
JoseExposito/touchegg
https://api.github.com/repos/JoseExposito/touchegg
closed
Multitouch gestures not working on VAIO SVS13AB1SX
auto-migrated Type-Defect
``` Hi guys, thanks for the great software, I have touchegg running in two ASUS machines with no problems. I also have a VAIO SVS13AB1SX that had multitouch gestures under Win7, but that doesn't work under linux. I mean the two finger scroll is working ok, but three and four fingers doesn't. When I connect an Apple Magick Track to this computer, touchegg works flawlessly. Could you help me walk through this issue? What should I do to discover if the pad accepts gestures on linux? Thank you ``` Original issue reported on code.google.com by `luis.na...@gmail.com` on 23 May 2014 at 10:40
1.0
Multitouch gestures not working on VAIO SVS13AB1SX - ``` Hi guys, thanks for the great software, I have touchegg running in two ASUS machines with no problems. I also have a VAIO SVS13AB1SX that had multitouch gestures under Win7, but that doesn't work under linux. I mean the two finger scroll is working ok, but three and four fingers doesn't. When I connect an Apple Magick Track to this computer, touchegg works flawlessly. Could you help me walk through this issue? What should I do to discover if the pad accepts gestures on linux? Thank you ``` Original issue reported on code.google.com by `luis.na...@gmail.com` on 23 May 2014 at 10:40
defect
multitouch gestures not working on vaio hi guys thanks for the great software i have touchegg running in two asus machines with no problems i also have a vaio that had multitouch gestures under but that doesn t work under linux i mean the two finger scroll is working ok but three and four fingers doesn t when i connect an apple magick track to this computer touchegg works flawlessly could you help me walk through this issue what should i do to discover if the pad accepts gestures on linux thank you original issue reported on code google com by luis na gmail com on may at
1
78,666
27,700,958,876
IssuesEvent
2023-03-14 07:58:35
volution/z-scratchpad
https://api.github.com/repos/volution/z-scratchpad
closed
Update `search` command to use document titles when multiple choices are available
defect
When one uses `z-scratchpad search -W body -a edit` for example, and one chooses a line that appears in multiple documents, currently `search` prompts for the user to select a document based on its identifier. Update that procedure to allow the user to select it based on the document's title instead.
1.0
Update `search` command to use document titles when multiple choices are available - When one uses `z-scratchpad search -W body -a edit` for example, and one chooses a line that appears in multiple documents, currently `search` prompts for the user to select a document based on its identifier. Update that procedure to allow the user to select it based on the document's title instead.
defect
update search command to use document titles when multiple choices are available when one uses z scratchpad search w body a edit for example and one chooses a line that appears in multiple documents currently search prompts for the user to select a document based on its identifier update that procedure to allow the user to select it based on the document s title instead
1
237,785
26,085,340,578
IssuesEvent
2022-12-26 01:33:51
AlexRogalskiy/wotd
https://api.github.com/repos/AlexRogalskiy/wotd
opened
CVE-2022-46175 (High) detected in json5-2.2.0.tgz, json5-1.0.1.tgz
security vulnerability
## CVE-2022-46175 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>json5-2.2.0.tgz</b>, <b>json5-1.0.1.tgz</b></p></summary> <p> <details><summary><b>json5-2.2.0.tgz</b></p></summary> <p>JSON for humans.</p> <p>Library home page: <a href="https://registry.npmjs.org/json5/-/json5-2.2.0.tgz">https://registry.npmjs.org/json5/-/json5-2.2.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/ts-jest/node_modules/json5/package.json,/node_modules/remark-preset-davidtheclark/node_modules/json5/package.json,/node_modules/@babel/core/node_modules/json5/package.json,/node_modules/unified-args/node_modules/json5/package.json,/node_modules/shiki/node_modules/json5/package.json</p> <p> Dependency Hierarchy: - typedoc-0.21.9.tgz (Root Library) - shiki-0.9.8.tgz - :x: **json5-2.2.0.tgz** (Vulnerable Library) </details> <details><summary><b>json5-1.0.1.tgz</b></p></summary> <p>JSON for humans.</p> <p>Library home page: <a href="https://registry.npmjs.org/json5/-/json5-1.0.1.tgz">https://registry.npmjs.org/json5/-/json5-1.0.1.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/json5/package.json,/tilt_modules/tilt_inspector/node_modules/json5/package.json</p> <p> Dependency Hierarchy: - eslint-import-resolver-typescript-2.4.0.tgz (Root Library) - tsconfig-paths-3.11.0.tgz - :x: **json5-1.0.1.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/AlexRogalskiy/wotd/commit/28565d6f22e9c28a7f45cf805c5f731095343f0f">28565d6f22e9c28a7f45cf805c5f731095343f0f</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> JSON5 is an extension to the popular JSON file format that aims to be easier to write and maintain by hand (e.g. for config files). The `parse` method of the JSON5 library before and including version `2.2.1` does not restrict parsing of keys named `__proto__`, allowing specially crafted strings to pollute the prototype of the resulting object. This vulnerability pollutes the prototype of the object returned by `JSON5.parse` and not the global Object prototype, which is the commonly understood definition of Prototype Pollution. However, polluting the prototype of a single object can have significant security impact for an application if the object is later used in trusted operations. This vulnerability could allow an attacker to set arbitrary and unexpected keys on the object returned from `JSON5.parse`. The actual impact will depend on how applications utilize the returned object and how they filter unwanted keys, but could include denial of service, cross-site scripting, elevation of privilege, and in extreme cases, remote code execution. `JSON5.parse` should restrict parsing of `__proto__` keys when parsing JSON strings to objects. As a point of reference, the `JSON.parse` method included in JavaScript ignores `__proto__` keys. Simply changing `JSON5.parse` to `JSON.parse` in the examples above mitigates this vulnerability. This vulnerability is patched in json5 version 2.2.2 and later. <p>Publish Date: 2022-12-24 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-46175>CVE-2022-46175</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: Low - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.cve.org/CVERecord?id=CVE-2022-46175">https://www.cve.org/CVERecord?id=CVE-2022-46175</a></p> <p>Release Date: 2022-12-24</p> <p>Fix Resolution: json5 - 2.2.2</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2022-46175 (High) detected in json5-2.2.0.tgz, json5-1.0.1.tgz - ## CVE-2022-46175 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>json5-2.2.0.tgz</b>, <b>json5-1.0.1.tgz</b></p></summary> <p> <details><summary><b>json5-2.2.0.tgz</b></p></summary> <p>JSON for humans.</p> <p>Library home page: <a href="https://registry.npmjs.org/json5/-/json5-2.2.0.tgz">https://registry.npmjs.org/json5/-/json5-2.2.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/ts-jest/node_modules/json5/package.json,/node_modules/remark-preset-davidtheclark/node_modules/json5/package.json,/node_modules/@babel/core/node_modules/json5/package.json,/node_modules/unified-args/node_modules/json5/package.json,/node_modules/shiki/node_modules/json5/package.json</p> <p> Dependency Hierarchy: - typedoc-0.21.9.tgz (Root Library) - shiki-0.9.8.tgz - :x: **json5-2.2.0.tgz** (Vulnerable Library) </details> <details><summary><b>json5-1.0.1.tgz</b></p></summary> <p>JSON for humans.</p> <p>Library home page: <a href="https://registry.npmjs.org/json5/-/json5-1.0.1.tgz">https://registry.npmjs.org/json5/-/json5-1.0.1.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/json5/package.json,/tilt_modules/tilt_inspector/node_modules/json5/package.json</p> <p> Dependency Hierarchy: - eslint-import-resolver-typescript-2.4.0.tgz (Root Library) - tsconfig-paths-3.11.0.tgz - :x: **json5-1.0.1.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/AlexRogalskiy/wotd/commit/28565d6f22e9c28a7f45cf805c5f731095343f0f">28565d6f22e9c28a7f45cf805c5f731095343f0f</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> JSON5 is an extension to the popular JSON file format that aims to be easier to write and maintain by hand (e.g. for config files). The `parse` method of the JSON5 library before and including version `2.2.1` does not restrict parsing of keys named `__proto__`, allowing specially crafted strings to pollute the prototype of the resulting object. This vulnerability pollutes the prototype of the object returned by `JSON5.parse` and not the global Object prototype, which is the commonly understood definition of Prototype Pollution. However, polluting the prototype of a single object can have significant security impact for an application if the object is later used in trusted operations. This vulnerability could allow an attacker to set arbitrary and unexpected keys on the object returned from `JSON5.parse`. The actual impact will depend on how applications utilize the returned object and how they filter unwanted keys, but could include denial of service, cross-site scripting, elevation of privilege, and in extreme cases, remote code execution. `JSON5.parse` should restrict parsing of `__proto__` keys when parsing JSON strings to objects. As a point of reference, the `JSON.parse` method included in JavaScript ignores `__proto__` keys. Simply changing `JSON5.parse` to `JSON.parse` in the examples above mitigates this vulnerability. This vulnerability is patched in json5 version 2.2.2 and later. <p>Publish Date: 2022-12-24 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-46175>CVE-2022-46175</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: Low - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.cve.org/CVERecord?id=CVE-2022-46175">https://www.cve.org/CVERecord?id=CVE-2022-46175</a></p> <p>Release Date: 2022-12-24</p> <p>Fix Resolution: json5 - 2.2.2</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_defect
cve high detected in tgz tgz cve high severity vulnerability vulnerable libraries tgz tgz tgz json for humans library home page a href path to dependency file package json path to vulnerable library node modules ts jest node modules package json node modules remark preset davidtheclark node modules package json node modules babel core node modules package json node modules unified args node modules package json node modules shiki node modules package json dependency hierarchy typedoc tgz root library shiki tgz x tgz vulnerable library tgz json for humans library home page a href path to dependency file package json path to vulnerable library node modules package json tilt modules tilt inspector node modules package json dependency hierarchy eslint import resolver typescript tgz root library tsconfig paths tgz x tgz vulnerable library found in head commit a href found in base branch master vulnerability details is an extension to the popular json file format that aims to be easier to write and maintain by hand e g for config files the parse method of the library before and including version does not restrict parsing of keys named proto allowing specially crafted strings to pollute the prototype of the resulting object this vulnerability pollutes the prototype of the object returned by parse and not the global object prototype which is the commonly understood definition of prototype pollution however polluting the prototype of a single object can have significant security impact for an application if the object is later used in trusted operations this vulnerability could allow an attacker to set arbitrary and unexpected keys on the object returned from parse the actual impact will depend on how applications utilize the returned object and how they filter unwanted keys but could include denial of service cross site scripting elevation of privilege and in extreme cases remote code execution parse should restrict parsing of proto keys when parsing json strings to objects as a point of reference the json parse method included in javascript ignores proto keys simply changing parse to json parse in the examples above mitigates this vulnerability this vulnerability is patched in version and later publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact low availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend
0
670,155
22,677,820,345
IssuesEvent
2022-07-04 07:07:05
opensquare-network/paid-qa
https://api.github.com/repos/opensquare-network/paid-qa
opened
notification item missed
bug priority:high
since we use the new format for mentioned user to display dynamic identity or address, the red bordered one missed in notification page. <img width="758" alt="image" src="https://user-images.githubusercontent.com/19513289/177096546-fd33e135-0565-4757-86c3-ae88efd72411.png"> <img width="1091" alt="image" src="https://user-images.githubusercontent.com/19513289/177096964-38e5a155-555b-4e68-87da-110f246dbddd.png">
1.0
notification item missed - since we use the new format for mentioned user to display dynamic identity or address, the red bordered one missed in notification page. <img width="758" alt="image" src="https://user-images.githubusercontent.com/19513289/177096546-fd33e135-0565-4757-86c3-ae88efd72411.png"> <img width="1091" alt="image" src="https://user-images.githubusercontent.com/19513289/177096964-38e5a155-555b-4e68-87da-110f246dbddd.png">
non_defect
notification item missed since we use the new format for mentioned user to display dynamic identity or address the red bordered one missed in notification page img width alt image src img width alt image src
0
741,850
25,824,510,767
IssuesEvent
2022-12-12 11:59:44
status-im/status-desktop
https://api.github.com/repos/status-im/status-desktop
opened
[Community Mint Collectibles] Create new collectible edit page
ui Communities priority F2: important S:2
### Description [Epic](https://github.com/status-im/status-desktop/issues/8694) 1. Implement `Collectibles Edit` page design with **mocked data** 2. From permissions dropdown, create [navigation](https://www.figma.com/file/17fc13UBFvInrLgNUKJJg5/Kuba%E2%8E%9CDesktop?node-id=2934%3A485259&t=6E3gZk9l72B1DqRy-0) [Collectible edit page design](https://www.figma.com/file/17fc13UBFvInrLgNUKJJg5/Kuba%E2%8E%9CDesktop?node-id=2934%3A480877&t=6E3gZk9l72B1DqRy-0) ![Screenshot 2022-12-12 at 12 56 21](https://user-images.githubusercontent.com/97019400/207039159-c1c12189-b234-44b7-b4c6-9619215a69a0.png) ![Screenshot 2022-12-12 at 12 56 45](https://user-images.githubusercontent.com/97019400/207039235-1542c19e-887b-446a-8639-c9be5ec4069c.png)
1.0
[Community Mint Collectibles] Create new collectible edit page - ### Description [Epic](https://github.com/status-im/status-desktop/issues/8694) 1. Implement `Collectibles Edit` page design with **mocked data** 2. From permissions dropdown, create [navigation](https://www.figma.com/file/17fc13UBFvInrLgNUKJJg5/Kuba%E2%8E%9CDesktop?node-id=2934%3A485259&t=6E3gZk9l72B1DqRy-0) [Collectible edit page design](https://www.figma.com/file/17fc13UBFvInrLgNUKJJg5/Kuba%E2%8E%9CDesktop?node-id=2934%3A480877&t=6E3gZk9l72B1DqRy-0) ![Screenshot 2022-12-12 at 12 56 21](https://user-images.githubusercontent.com/97019400/207039159-c1c12189-b234-44b7-b4c6-9619215a69a0.png) ![Screenshot 2022-12-12 at 12 56 45](https://user-images.githubusercontent.com/97019400/207039235-1542c19e-887b-446a-8639-c9be5ec4069c.png)
non_defect
create new collectible edit page description implement collectibles edit page design with mocked data from permissions dropdown create
0
502,124
14,540,639,185
IssuesEvent
2020-12-15 13:35:27
enso-org/enso
https://api.github.com/repos/enso-org/enso
opened
Improve Json to_text Performance
Category: Libraries Change: Non-Breaking Difficulty: Core Contributor Priority: High Type: Enhancement
### Summary <!-- - A summary of the task. --> Current `Json.to_text` implementation allocates text buffer for each json node. This is not ideal and can be improved. ### Value `Json.to_text` is used as a default visualization expression. Rewriting it will improve the visualizations performance. <!-- - This section should describe the value of this task. - This value can be for users, to the team, etc. --> ### Specification Rewrite `Json.to_text` utilizing the events stream. <!-- - Detailed requirements for the feature. - The performance requirements for the feature. --> ### Acceptance Criteria & Test Cases `Json.to_text` uses the events stream to produce the text output. <!-- - Any criteria that must be satisfied for the task to be accepted. - The test plan for the feature, related to the acceptance criteria. -->
1.0
Improve Json to_text Performance - ### Summary <!-- - A summary of the task. --> Current `Json.to_text` implementation allocates text buffer for each json node. This is not ideal and can be improved. ### Value `Json.to_text` is used as a default visualization expression. Rewriting it will improve the visualizations performance. <!-- - This section should describe the value of this task. - This value can be for users, to the team, etc. --> ### Specification Rewrite `Json.to_text` utilizing the events stream. <!-- - Detailed requirements for the feature. - The performance requirements for the feature. --> ### Acceptance Criteria & Test Cases `Json.to_text` uses the events stream to produce the text output. <!-- - Any criteria that must be satisfied for the task to be accepted. - The test plan for the feature, related to the acceptance criteria. -->
non_defect
improve json to text performance summary a summary of the task current json to text implementation allocates text buffer for each json node this is not ideal and can be improved value json to text is used as a default visualization expression rewriting it will improve the visualizations performance this section should describe the value of this task this value can be for users to the team etc specification rewrite json to text utilizing the events stream detailed requirements for the feature the performance requirements for the feature acceptance criteria test cases json to text uses the events stream to produce the text output any criteria that must be satisfied for the task to be accepted the test plan for the feature related to the acceptance criteria
0
25,542
4,381,556,367
IssuesEvent
2016-08-06 09:27:55
scipy/scipy
https://api.github.com/repos/scipy/scipy
closed
expm_multiply, complex matrices not working using start,stop,ect...
defect scipy.sparse.linalg
Hi, There is a bug with expm_multiply. If I just use a complex matrix and vector the function returns the correct vector but when I use the linear grid feature it seems to be casting the vector to a float while iterating through the grid points: site-packages/scipy/sparse/linalg/_expm_multiply.py:568: ComplexWarning: Casting complex values to real discards the imaginary part X[0] = _expm_multiply_simple_core(A, B, t_0, mu, m_star, s) site-packages/scipy/sparse/linalg/_expm_multiply.py:654: ComplexWarning: Casting complex values to real discards the imaginary part K[p] = h * A.dot(K[p-1]) / float(p) site-packages/scipy/sparse/linalg/_expm_multiply.py:663: ComplexWarning: Casting complex values to real discards the imaginary part X[k + id] = np.exp(kh*mu) * F I'm using scipy 0.17.1.
1.0
expm_multiply, complex matrices not working using start,stop,ect... - Hi, There is a bug with expm_multiply. If I just use a complex matrix and vector the function returns the correct vector but when I use the linear grid feature it seems to be casting the vector to a float while iterating through the grid points: site-packages/scipy/sparse/linalg/_expm_multiply.py:568: ComplexWarning: Casting complex values to real discards the imaginary part X[0] = _expm_multiply_simple_core(A, B, t_0, mu, m_star, s) site-packages/scipy/sparse/linalg/_expm_multiply.py:654: ComplexWarning: Casting complex values to real discards the imaginary part K[p] = h * A.dot(K[p-1]) / float(p) site-packages/scipy/sparse/linalg/_expm_multiply.py:663: ComplexWarning: Casting complex values to real discards the imaginary part X[k + id] = np.exp(kh*mu) * F I'm using scipy 0.17.1.
defect
expm multiply complex matrices not working using start stop ect hi there is a bug with expm multiply if i just use a complex matrix and vector the function returns the correct vector but when i use the linear grid feature it seems to be casting the vector to a float while iterating through the grid points site packages scipy sparse linalg expm multiply py complexwarning casting complex values to real discards the imaginary part x expm multiply simple core a b t mu m star s site packages scipy sparse linalg expm multiply py complexwarning casting complex values to real discards the imaginary part k h a dot k float p site packages scipy sparse linalg expm multiply py complexwarning casting complex values to real discards the imaginary part x np exp kh mu f i m using scipy
1
5,483
2,610,188,526
IssuesEvent
2015-02-26 18:59:43
chrsmith/quchuseban
https://api.github.com/repos/chrsmith/quchuseban
opened
分享脸上长色斑如何祛除
auto-migrated Priority-Medium Type-Defect
``` 《摘要》 昔我往矣,杨柳依依,今我来思,雨雪霏霏。如若没有开始�� �是不是就不会有这一把辛酸泪;如若没有经历,是不是就不� ��有这一缕相思情。如若没有如果,我想重新洗牌,重新上演 这不是只属于一个人的独角戏。听风,划过浅浅的忧伤;听�� �,淋过丝丝的惆怅;听花开的声音,隐藏绵绵的落寞。一件� ��衣,一席长衫,一肩长发,一把天蓝伞,走进了下得正大的 雨中。这一次,我没有丢掉了伞,我喜欢天蓝色的伞遮住我�� �容颜,不被路人的眼神留连。不让他们看见我脸上的色斑!� ��上长色斑如何祛除, 《客户案例》   我今年26岁了,宝宝也两岁多了,我是在怀孕的时候长的 妊娠斑,医生说是因为孕激素分泌太多引起的色素沉淀现象�� �说是只要休息好,多增加营养,这些妊娠斑就会自己消除,� ��是等我生完宝宝,斑却越来越重了,那个时候要喂奶也没敢 用什么药品,就这样宝宝都两岁了,我脸上的妊娠斑不但没�� �减少反而越来越多了,我是实在看不下去了,到处打听祛斑� ��方法,后来我在网上查祛斑产品的时候看到「黛芙薇尔精华 液」,说是纯精华的祛斑产品,看很多人都说这个产品效果�� �错,忍不住好奇,我就去了他们的商城上,仔细看了他们的产 品介绍,我忍不住咨询了他们的客服,给他们说了我的情况�� �客服专家说,我这种斑是可以彻底去掉的,平时多注意休息� ��水果蔬菜,我就试着订购了两个周期,没想到三天就收到了 ,按照专家的建议,我平时很注意睡眠,坚持用完后,我脸�� �的妊娠斑真的没有了,皮肤也白了很多,这个祛斑产品确实� ��不错的。 阅读了脸上长色斑如何祛除,再看脸上容易长斑的原因: 《色斑形成原因》   内部因素   一、压力   当人受到压力时,就会分泌肾上腺素,为对付压力而做�� �备。如果长期受到压力,人体新陈代谢的平衡就会遭到破坏� ��皮肤所需的营养供应趋于缓慢,色素母细胞就会变得很活跃 。   二、荷尔蒙分泌失调   避孕药里所含的女性荷尔蒙雌激素,会刺激麦拉宁细胞�� �分泌而形成不均匀的斑点,因避孕药而形成的斑点,虽然在� ��药中断后会停止,但仍会在皮肤上停留很长一段时间。怀孕 中因女性荷尔蒙雌激素的增加,从怀孕4—5个月开始会容易出 现斑,这时候出现的斑点在产后大部分会消失。可是,新陈�� �谢不正常、肌肤裸露在强烈的紫外线下、精神上受到压力等� ��因,都会使斑加深。有时新长出的斑,产后也不会消失,所 以需要更加注意。   三、新陈代谢缓慢   肝的新陈代谢功能不正常或卵巢功能减退时也会出现斑�� �因为新陈代谢不顺畅、或内分泌失调,使身体处于敏感状态� ��,从而加剧色素问题。我们常说的便秘会形成斑,其实就是 内分泌失调导致过敏体质而形成的。另外,身体状态不正常�� �时候,紫外线的照射也会加速斑的形成。   四、错误的使用化妆品   使用了不适合自己皮肤的化妆品,会导致皮肤过敏。在�� �疗的过程中如过量照射到紫外线,皮肤会为了抵御外界的侵� ��,在有炎症的部位聚集麦拉宁色素,这样会出现色素沉着的 问题。   外部因素   一、紫外线   照射紫外线的时候,人体为了保护皮肤,会在基底层产�� �很多麦拉宁色素。所以为了保护皮肤,会在敏感部位聚集更� ��的色素。经常裸露在强烈的阳光底下不仅促进皮肤的老化, 还会引起黑斑、雀斑等色素沉着的皮肤疾患。   二、不良的清洁习惯   因强烈的清洁习惯使皮肤变得敏感,这样会刺激皮肤。�� �皮肤敏感时,人体为了保护皮肤,黑色素细胞会分泌很多麦� ��宁色素,当色素过剩时就出现了斑、瑕疵等皮肤色素沉着的 问题。   三、遗传基因   父母中有长斑的,则本人长斑的概率就很高,这种情况�� �一定程度上就可判定是遗传基因的作用。所以家里特别是长� ��有长斑的人,要注意避免引发长斑的重要因素之一——紫外 线照射,这是预防斑必须注意的。 《有疑问帮你解决》   1,黛芙薇尔精华液真的有效果吗?真的可以把脸上的黄褐�� �去掉吗?   答:黛芙薇尔精华液DNA精华能够有效的修复周围难以触�� �的色斑,其独有的纳豆成分为皮肤的美白与靓丽,提供了必� ��可少的营养物质,可以有效的去除黄褐斑,黄褐斑,黄褐斑 ,蝴蝶斑,晒斑、妊娠斑等。它它完全突破了传统的美肤时�� �,宛如在皮肤中注入了一杯兼具活化、再生、滋养等功效的� ��尾酒,同时为脸部提供大量有机维生素精华,脸部的改变显 而易见。自产品上市以来,老顾客纷纷介绍新顾客,71%的新�� �客都是通过老顾客介绍而来,口碑由此而来!   2,服用黛芙薇尔美白,会伤身体吗?有副作用吗?   答:黛芙薇尔精华液应用了精纯复合配方和领先的分类�� �斑科技,并将“DNA美肤系统”疗法应用到了该产品中,能彻� ��祛除黄褐斑,蝴蝶斑,妊娠斑,晒斑,黄褐斑,老年斑,有 效淡化黄褐斑至接近肤色。黛芙薇尔通过法国、美国、台湾�� �地的专家通力协作,超过10年的研究以全新的DNA肌肤修复技�� �,挑战传统化学护肤理念,不懈追寻发现破译大自然的美丽� ��迹,令每一位爱美的女性都能享受到科技创新所带来的自然 之美。 专为亚洲女性肤质研制,精心呵护女性美丽,多年来,为数�� �百万计的女性解除了黄褐斑困扰。深得广大女性朋友的信赖!   3,去除黄褐斑之后,会反弹吗?   答:很多曾经长了黄褐斑的人士,自从选择了黛芙薇尔�� �白,就一劳永逸。这款祛斑产品是经过数十位权威祛斑专家� ��据斑的形成原因精心研制而成用事实说话,让消费者打分。 树立权威品牌!我们的很多新客户都是老客户介绍而来,请问� ��如果效果不好,会有客户转介绍吗?   4,你们的价格有点贵,能不能便宜一点?   答:如果您使用西药最少需要2000元,煎服的药最少需要3 000元,做手术最少是5000元,而这些毫无疑问,不会对彻底去� ��你的斑点有任何帮助!一分价钱,一份价值,我们现在做的�� �是一个口碑,一个品牌,价钱并不高。如果花这点钱把你的� ��褐斑彻底去除,你还会觉得贵吗?你还会再去花那么多冤枉�� �,不但斑没去掉,还把自己的皮肤弄的越来越糟吗   5,我适合用黛芙薇尔精华液吗?   答:黛芙薇尔适用人群:   1、生理紊乱引起的黄褐斑人群   2、生育引起的妊娠斑人群   3、年纪增长引起的老年斑人群   4、化妆品色素沉积、辐射斑人群   5、长期日照引起的日晒斑人群   6、肌肤暗淡急需美白的人群 《祛斑小方法》 脸上长色斑如何祛除,同时为您分享祛斑小方法 2、30克杏仁与适量鸡蛋清混合调匀,每晚睡前搽于面部有色�� �处,次日早晨用白酒洗掉。 ``` ----- Original issue reported on code.google.com by `additive...@gmail.com` on 1 Jul 2014 at 4:29
1.0
分享脸上长色斑如何祛除 - ``` 《摘要》 昔我往矣,杨柳依依,今我来思,雨雪霏霏。如若没有开始�� �是不是就不会有这一把辛酸泪;如若没有经历,是不是就不� ��有这一缕相思情。如若没有如果,我想重新洗牌,重新上演 这不是只属于一个人的独角戏。听风,划过浅浅的忧伤;听�� �,淋过丝丝的惆怅;听花开的声音,隐藏绵绵的落寞。一件� ��衣,一席长衫,一肩长发,一把天蓝伞,走进了下得正大的 雨中。这一次,我没有丢掉了伞,我喜欢天蓝色的伞遮住我�� �容颜,不被路人的眼神留连。不让他们看见我脸上的色斑!� ��上长色斑如何祛除, 《客户案例》   我今年26岁了,宝宝也两岁多了,我是在怀孕的时候长的 妊娠斑,医生说是因为孕激素分泌太多引起的色素沉淀现象�� �说是只要休息好,多增加营养,这些妊娠斑就会自己消除,� ��是等我生完宝宝,斑却越来越重了,那个时候要喂奶也没敢 用什么药品,就这样宝宝都两岁了,我脸上的妊娠斑不但没�� �减少反而越来越多了,我是实在看不下去了,到处打听祛斑� ��方法,后来我在网上查祛斑产品的时候看到「黛芙薇尔精华 液」,说是纯精华的祛斑产品,看很多人都说这个产品效果�� �错,忍不住好奇,我就去了他们的商城上,仔细看了他们的产 品介绍,我忍不住咨询了他们的客服,给他们说了我的情况�� �客服专家说,我这种斑是可以彻底去掉的,平时多注意休息� ��水果蔬菜,我就试着订购了两个周期,没想到三天就收到了 ,按照专家的建议,我平时很注意睡眠,坚持用完后,我脸�� �的妊娠斑真的没有了,皮肤也白了很多,这个祛斑产品确实� ��不错的。 阅读了脸上长色斑如何祛除,再看脸上容易长斑的原因: 《色斑形成原因》   内部因素   一、压力   当人受到压力时,就会分泌肾上腺素,为对付压力而做�� �备。如果长期受到压力,人体新陈代谢的平衡就会遭到破坏� ��皮肤所需的营养供应趋于缓慢,色素母细胞就会变得很活跃 。   二、荷尔蒙分泌失调   避孕药里所含的女性荷尔蒙雌激素,会刺激麦拉宁细胞�� �分泌而形成不均匀的斑点,因避孕药而形成的斑点,虽然在� ��药中断后会停止,但仍会在皮肤上停留很长一段时间。怀孕 中因女性荷尔蒙雌激素的增加,从怀孕4—5个月开始会容易出 现斑,这时候出现的斑点在产后大部分会消失。可是,新陈�� �谢不正常、肌肤裸露在强烈的紫外线下、精神上受到压力等� ��因,都会使斑加深。有时新长出的斑,产后也不会消失,所 以需要更加注意。   三、新陈代谢缓慢   肝的新陈代谢功能不正常或卵巢功能减退时也会出现斑�� �因为新陈代谢不顺畅、或内分泌失调,使身体处于敏感状态� ��,从而加剧色素问题。我们常说的便秘会形成斑,其实就是 内分泌失调导致过敏体质而形成的。另外,身体状态不正常�� �时候,紫外线的照射也会加速斑的形成。   四、错误的使用化妆品   使用了不适合自己皮肤的化妆品,会导致皮肤过敏。在�� �疗的过程中如过量照射到紫外线,皮肤会为了抵御外界的侵� ��,在有炎症的部位聚集麦拉宁色素,这样会出现色素沉着的 问题。   外部因素   一、紫外线   照射紫外线的时候,人体为了保护皮肤,会在基底层产�� �很多麦拉宁色素。所以为了保护皮肤,会在敏感部位聚集更� ��的色素。经常裸露在强烈的阳光底下不仅促进皮肤的老化, 还会引起黑斑、雀斑等色素沉着的皮肤疾患。   二、不良的清洁习惯   因强烈的清洁习惯使皮肤变得敏感,这样会刺激皮肤。�� �皮肤敏感时,人体为了保护皮肤,黑色素细胞会分泌很多麦� ��宁色素,当色素过剩时就出现了斑、瑕疵等皮肤色素沉着的 问题。   三、遗传基因   父母中有长斑的,则本人长斑的概率就很高,这种情况�� �一定程度上就可判定是遗传基因的作用。所以家里特别是长� ��有长斑的人,要注意避免引发长斑的重要因素之一——紫外 线照射,这是预防斑必须注意的。 《有疑问帮你解决》   1,黛芙薇尔精华液真的有效果吗?真的可以把脸上的黄褐�� �去掉吗?   答:黛芙薇尔精华液DNA精华能够有效的修复周围难以触�� �的色斑,其独有的纳豆成分为皮肤的美白与靓丽,提供了必� ��可少的营养物质,可以有效的去除黄褐斑,黄褐斑,黄褐斑 ,蝴蝶斑,晒斑、妊娠斑等。它它完全突破了传统的美肤时�� �,宛如在皮肤中注入了一杯兼具活化、再生、滋养等功效的� ��尾酒,同时为脸部提供大量有机维生素精华,脸部的改变显 而易见。自产品上市以来,老顾客纷纷介绍新顾客,71%的新�� �客都是通过老顾客介绍而来,口碑由此而来!   2,服用黛芙薇尔美白,会伤身体吗?有副作用吗?   答:黛芙薇尔精华液应用了精纯复合配方和领先的分类�� �斑科技,并将“DNA美肤系统”疗法应用到了该产品中,能彻� ��祛除黄褐斑,蝴蝶斑,妊娠斑,晒斑,黄褐斑,老年斑,有 效淡化黄褐斑至接近肤色。黛芙薇尔通过法国、美国、台湾�� �地的专家通力协作,超过10年的研究以全新的DNA肌肤修复技�� �,挑战传统化学护肤理念,不懈追寻发现破译大自然的美丽� ��迹,令每一位爱美的女性都能享受到科技创新所带来的自然 之美。 专为亚洲女性肤质研制,精心呵护女性美丽,多年来,为数�� �百万计的女性解除了黄褐斑困扰。深得广大女性朋友的信赖!   3,去除黄褐斑之后,会反弹吗?   答:很多曾经长了黄褐斑的人士,自从选择了黛芙薇尔�� �白,就一劳永逸。这款祛斑产品是经过数十位权威祛斑专家� ��据斑的形成原因精心研制而成用事实说话,让消费者打分。 树立权威品牌!我们的很多新客户都是老客户介绍而来,请问� ��如果效果不好,会有客户转介绍吗?   4,你们的价格有点贵,能不能便宜一点?   答:如果您使用西药最少需要2000元,煎服的药最少需要3 000元,做手术最少是5000元,而这些毫无疑问,不会对彻底去� ��你的斑点有任何帮助!一分价钱,一份价值,我们现在做的�� �是一个口碑,一个品牌,价钱并不高。如果花这点钱把你的� ��褐斑彻底去除,你还会觉得贵吗?你还会再去花那么多冤枉�� �,不但斑没去掉,还把自己的皮肤弄的越来越糟吗   5,我适合用黛芙薇尔精华液吗?   答:黛芙薇尔适用人群:   1、生理紊乱引起的黄褐斑人群   2、生育引起的妊娠斑人群   3、年纪增长引起的老年斑人群   4、化妆品色素沉积、辐射斑人群   5、长期日照引起的日晒斑人群   6、肌肤暗淡急需美白的人群 《祛斑小方法》 脸上长色斑如何祛除,同时为您分享祛斑小方法 2、30克杏仁与适量鸡蛋清混合调匀,每晚睡前搽于面部有色�� �处,次日早晨用白酒洗掉。 ``` ----- Original issue reported on code.google.com by `additive...@gmail.com` on 1 Jul 2014 at 4:29
defect
分享脸上长色斑如何祛除 《摘要》 昔我往矣,杨柳依依,今我来思,雨雪霏霏。如若没有开始�� �是不是就不会有这一把辛酸泪;如若没有经历,是不是就不� ��有这一缕相思情。如若没有如果,我想重新洗牌,重新上演 这不是只属于一个人的独角戏。听风,划过浅浅的忧伤;听�� �,淋过丝丝的惆怅;听花开的声音,隐藏绵绵的落寞。一件� ��衣,一席长衫,一肩长发,一把天蓝伞,走进了下得正大的 雨中。这一次,我没有丢掉了伞,我喜欢天蓝色的伞遮住我�� �容颜,不被路人的眼神留连。不让他们看见我脸上的色斑!� ��上长色斑如何祛除, 《客户案例》    ,宝宝也两岁多了,我是在怀孕的时候长的 妊娠斑,医生说是因为孕激素分泌太多引起的色素沉淀现象�� �说是只要休息好,多增加营养,这些妊娠斑就会自己消除,� ��是等我生完宝宝,斑却越来越重了,那个时候要喂奶也没敢 用什么药品,就这样宝宝都两岁了,我脸上的妊娠斑不但没�� �减少反而越来越多了,我是实在看不下去了,到处打听祛斑� ��方法,后来我在网上查祛斑产品的时候看到「黛芙薇尔精华 液」,说是纯精华的祛斑产品,看很多人都说这个产品效果�� �错,忍不住好奇,我就去了他们的商城上 仔细看了他们的产 品介绍,我忍不住咨询了他们的客服,给他们说了我的情况�� �客服专家说,我这种斑是可以彻底去掉的,平时多注意休息� ��水果蔬菜,我就试着订购了两个周期,没想到三天就收到了 ,按照专家的建议,我平时很注意睡眠,坚持用完后,我脸�� �的妊娠斑真的没有了,皮肤也白了很多,这个祛斑产品确实� ��不错的。 阅读了脸上长色斑如何祛除,再看脸上容易长斑的原因: 《色斑形成原因》   内部因素   一、压力   当人受到压力时,就会分泌肾上腺素,为对付压力而做�� �备。如果长期受到压力,人体新陈代谢的平衡就会遭到破坏� ��皮肤所需的营养供应趋于缓慢,色素母细胞就会变得很活跃 。   二、荷尔蒙分泌失调   避孕药里所含的女性荷尔蒙雌激素,会刺激麦拉宁细胞�� �分泌而形成不均匀的斑点,因避孕药而形成的斑点,虽然在� ��药中断后会停止,但仍会在皮肤上停留很长一段时间。怀孕 中因女性荷尔蒙雌激素的增加, — 现斑,这时候出现的斑点在产后大部分会消失。可是,新陈�� �谢不正常、肌肤裸露在强烈的紫外线下、精神上受到压力等� ��因,都会使斑加深。有时新长出的斑,产后也不会消失,所 以需要更加注意。   三、新陈代谢缓慢   肝的新陈代谢功能不正常或卵巢功能减退时也会出现斑�� �因为新陈代谢不顺畅、或内分泌失调,使身体处于敏感状态� ��,从而加剧色素问题。我们常说的便秘会形成斑,其实就是 内分泌失调导致过敏体质而形成的。另外,身体状态不正常�� �时候,紫外线的照射也会加速斑的形成。   四、错误的使用化妆品   使用了不适合自己皮肤的化妆品,会导致皮肤过敏。在�� �疗的过程中如过量照射到紫外线,皮肤会为了抵御外界的侵� ��,在有炎症的部位聚集麦拉宁色素,这样会出现色素沉着的 问题。   外部因素   一、紫外线   照射紫外线的时候,人体为了保护皮肤,会在基底层产�� �很多麦拉宁色素。所以为了保护皮肤,会在敏感部位聚集更� ��的色素。经常裸露在强烈的阳光底下不仅促进皮肤的老化, 还会引起黑斑、雀斑等色素沉着的皮肤疾患。   二、不良的清洁习惯   因强烈的清洁习惯使皮肤变得敏感,这样会刺激皮肤。�� �皮肤敏感时,人体为了保护皮肤,黑色素细胞会分泌很多麦� ��宁色素,当色素过剩时就出现了斑、瑕疵等皮肤色素沉着的 问题。   三、遗传基因   父母中有长斑的,则本人长斑的概率就很高,这种情况�� �一定程度上就可判定是遗传基因的作用。所以家里特别是长� ��有长斑的人,要注意避免引发长斑的重要因素之一——紫外 线照射,这是预防斑必须注意的。 《有疑问帮你解决》    黛芙薇尔精华液真的有效果吗 真的可以把脸上的黄褐�� �去掉吗   答:黛芙薇尔精华液dna精华能够有效的修复周围难以触�� �的色斑,其独有的纳豆成分为皮肤的美白与靓丽,提供了必� ��可少的营养物质,可以有效的去除黄褐斑,黄褐斑,黄褐斑 ,蝴蝶斑,晒斑、妊娠斑等。它它完全突破了传统的美肤时�� �,宛如在皮肤中注入了一杯兼具活化、再生、滋养等功效的� ��尾酒,同时为脸部提供大量有机维生素精华,脸部的改变显 而易见。自产品上市以来,老顾客纷纷介绍新顾客, 的新�� �客都是通过老顾客介绍而来,口碑由此而来    ,服用黛芙薇尔美白,会伤身体吗 有副作用吗   答:黛芙薇尔精华液应用了精纯复合配方和领先的分类�� �斑科技,并将“dna美肤系统”疗法应用到了该产品中,能彻� ��祛除黄褐斑,蝴蝶斑,妊娠斑,晒斑,黄褐斑,老年斑,有 效淡化黄褐斑至接近肤色。黛芙薇尔通过法国、美国、台湾�� �地的专家通力协作, �� �,挑战传统化学护肤理念,不懈追寻发现破译大自然的美丽� ��迹,令每一位爱美的女性都能享受到科技创新所带来的自然 之美。 专为亚洲女性肤质研制,精心呵护女性美丽,多年来,为数�� �百万计的女性解除了黄褐斑困扰。深得广大女性朋友的信赖    ,去除黄褐斑之后,会反弹吗   答:很多曾经长了黄褐斑的人士,自从选择了黛芙薇尔�� �白,就一劳永逸。这款祛斑产品是经过数十位权威祛斑专家� ��据斑的形成原因精心研制而成用事实说话,让消费者打分。 树立权威品牌 我们的很多新客户都是老客户介绍而来,请问� ��如果效果不好,会有客户转介绍吗    ,你们的价格有点贵,能不能便宜一点   答: , , ,而这些毫无疑问,不会对彻底去� ��你的斑点有任何帮助 一分价钱,一份价值,我们现在做的�� �是一个口碑,一个品牌,价钱并不高。如果花这点钱把你的� ��褐斑彻底去除,你还会觉得贵吗 你还会再去花那么多冤枉�� �,不但斑没去掉,还把自己的皮肤弄的越来越糟吗    ,我适合用黛芙薇尔精华液吗   答:黛芙薇尔适用人群:    、生理紊乱引起的黄褐斑人群    、生育引起的妊娠斑人群    、年纪增长引起的老年斑人群    、化妆品色素沉积、辐射斑人群    、长期日照引起的日晒斑人群    、肌肤暗淡急需美白的人群 《祛斑小方法》 脸上长色斑如何祛除,同时为您分享祛斑小方法 、 ,每晚睡前搽于面部有色�� �处,次日早晨用白酒洗掉。 original issue reported on code google com by additive gmail com on jul at
1
46,409
13,055,908,922
IssuesEvent
2020-07-30 03:05:23
icecube-trac/tix2
https://api.github.com/repos/icecube-trac/tix2
opened
[VHESelfVeto] example is broken, other details (Trac #1164)
Incomplete Migration Migrated from Trac combo reconstruction defect
Migrated from https://code.icecube.wisc.edu/ticket/1164 ```json { "status": "closed", "changetime": "2019-02-13T14:11:57", "description": "I.- resources/:\n\n1.- examples/analysis.py:\n \n1.1.- if a number of frames is given (tray.Execute(100)), the result is:\n\nNOTICE (I3Tray): I3Tray finishing... (I3Tray.cxx:519 in void I3Tray::Execute(unsigned int))\n0 events total\n0 events passed the veto\n0 events were vetoed\n0 events could not find a vertex\n\nis this expected(0 events)?, if so, please write down some notes.\n\n1.2.- Without giving the number of frames, it works well:\n\nNOTICE (I3Tray): I3Tray finishing... (I3Tray.cxx:481 in void I3Tray::Execute())\nWARN (I3TableWriter): 1 SubEventStreams ['ice_top',] were seen but not booked because they were not passed as part of the 'SubEventStreams' parameter of I3TableWriter (which was configured as ['in_ice',]). To book events from these streams, add them to the 'SubEventStreams' parameter of I3TableWriter. (I3TableWriter.cxx:450 in void I3TableWriter::Finish())\n149 events total\n0 events passed the veto\n44 events were vetoed\n105 events could not find a vertex\n qtot_total: 126467 calls to physics 15.26s user 0.22s system\n\n2.- examples/runveto.py, shows a FATAL\n\nLoading VHESelfVeto.......................................ok\nFATAL (icetray): Attempt to set parameter BoundaryWidth that doesn't exist (I3ConfigurationImpl.cxx:65 in void I3ConfigurationImpl::Set(const std::string&, const boost::python::api::object&))\nTraceback (most recent call last):\n File \"resources/examples/runveto.py\", line 16, in <module>\n tray.AddModule('VHESelfVeto', 'selfveto', TimeWindow=5000, VertexThreshold=100, BoundaryWidth=50,VetoThreshold=20, Pulses=pulses)\n File \"/scratch/gmaggi/icerectrunk/build/lib/I3Tray.py\", line 140, in AddModule\n super(I3Tray, self).SetParameter(_name, k, v)\nRuntimeError: Attempt to set parameter BoundaryWidth that doesn't exist (in void I3ConfigurationImpl::Set(const std::string&, const boost::python::api::object&))\n\nBoth examples were Ran like:\npython $I3_SRC/VHESelfVeto/resources/examples/file.py here.i3 /data/exp/IceCube/2011/filtered/level2/0630/Level2_IC86.2011_data_Run00118390_0630_GCD.i3.gz /data/exp/IceCube/2011/filtered/level2/0630/Level2_IC86.2011_data_Run00118390_Part00000000.i3.bz2 \n\n3.- examples/test is missing according : http://software.icecube.wisc.edu/icerec_trunk/code_reviews.html , it would allow the user to run the module without passing arguments by command line.\n\n4.- examples/index.dox is missing. Include information please in: http://software.icecube.wisc.edu/icerec_trunk/metaproject/index.html ", "reporter": "gmaggi", "cc": "", "resolution": "fixed", "_ts": "1550067117911749", "component": "combo reconstruction", "summary": "[VHESelfVeto] example is broken, other details", "priority": "critical", "keywords": "veto VHE HomogenizedQTot", "time": "2015-08-18T18:39:48", "milestone": "", "owner": "claudio.kopper", "type": "defect" } ```
1.0
[VHESelfVeto] example is broken, other details (Trac #1164) - Migrated from https://code.icecube.wisc.edu/ticket/1164 ```json { "status": "closed", "changetime": "2019-02-13T14:11:57", "description": "I.- resources/:\n\n1.- examples/analysis.py:\n \n1.1.- if a number of frames is given (tray.Execute(100)), the result is:\n\nNOTICE (I3Tray): I3Tray finishing... (I3Tray.cxx:519 in void I3Tray::Execute(unsigned int))\n0 events total\n0 events passed the veto\n0 events were vetoed\n0 events could not find a vertex\n\nis this expected(0 events)?, if so, please write down some notes.\n\n1.2.- Without giving the number of frames, it works well:\n\nNOTICE (I3Tray): I3Tray finishing... (I3Tray.cxx:481 in void I3Tray::Execute())\nWARN (I3TableWriter): 1 SubEventStreams ['ice_top',] were seen but not booked because they were not passed as part of the 'SubEventStreams' parameter of I3TableWriter (which was configured as ['in_ice',]). To book events from these streams, add them to the 'SubEventStreams' parameter of I3TableWriter. (I3TableWriter.cxx:450 in void I3TableWriter::Finish())\n149 events total\n0 events passed the veto\n44 events were vetoed\n105 events could not find a vertex\n qtot_total: 126467 calls to physics 15.26s user 0.22s system\n\n2.- examples/runveto.py, shows a FATAL\n\nLoading VHESelfVeto.......................................ok\nFATAL (icetray): Attempt to set parameter BoundaryWidth that doesn't exist (I3ConfigurationImpl.cxx:65 in void I3ConfigurationImpl::Set(const std::string&, const boost::python::api::object&))\nTraceback (most recent call last):\n File \"resources/examples/runveto.py\", line 16, in <module>\n tray.AddModule('VHESelfVeto', 'selfveto', TimeWindow=5000, VertexThreshold=100, BoundaryWidth=50,VetoThreshold=20, Pulses=pulses)\n File \"/scratch/gmaggi/icerectrunk/build/lib/I3Tray.py\", line 140, in AddModule\n super(I3Tray, self).SetParameter(_name, k, v)\nRuntimeError: Attempt to set parameter BoundaryWidth that doesn't exist (in void I3ConfigurationImpl::Set(const std::string&, const boost::python::api::object&))\n\nBoth examples were Ran like:\npython $I3_SRC/VHESelfVeto/resources/examples/file.py here.i3 /data/exp/IceCube/2011/filtered/level2/0630/Level2_IC86.2011_data_Run00118390_0630_GCD.i3.gz /data/exp/IceCube/2011/filtered/level2/0630/Level2_IC86.2011_data_Run00118390_Part00000000.i3.bz2 \n\n3.- examples/test is missing according : http://software.icecube.wisc.edu/icerec_trunk/code_reviews.html , it would allow the user to run the module without passing arguments by command line.\n\n4.- examples/index.dox is missing. Include information please in: http://software.icecube.wisc.edu/icerec_trunk/metaproject/index.html ", "reporter": "gmaggi", "cc": "", "resolution": "fixed", "_ts": "1550067117911749", "component": "combo reconstruction", "summary": "[VHESelfVeto] example is broken, other details", "priority": "critical", "keywords": "veto VHE HomogenizedQTot", "time": "2015-08-18T18:39:48", "milestone": "", "owner": "claudio.kopper", "type": "defect" } ```
defect
example is broken other details trac migrated from json status closed changetime description i resources n examples analysis py n if a number of frames is given tray execute the result is n nnotice finishing cxx in void execute unsigned int events total events passed the veto events were vetoed events could not find a vertex n nis this expected events if so please write down some notes n without giving the number of frames it works well n nnotice finishing cxx in void execute nwarn subeventstreams were seen but not booked because they were not passed as part of the subeventstreams parameter of which was configured as to book events from these streams add them to the subeventstreams parameter of cxx in void finish events total events passed the veto events were vetoed events could not find a vertex n qtot total calls to physics user system n examples runveto py shows a fatal n nloading vheselfveto ok nfatal icetray attempt to set parameter boundarywidth that doesn t exist cxx in void set const std string const boost python api object ntraceback most recent call last n file resources examples runveto py line in n tray addmodule vheselfveto selfveto timewindow vertexthreshold boundarywidth vetothreshold pulses pulses n file scratch gmaggi icerectrunk build lib py line in addmodule n super self setparameter name k v nruntimeerror attempt to set parameter boundarywidth that doesn t exist in void set const std string const boost python api object n nboth examples were ran like npython src vheselfveto resources examples file py here data exp icecube filtered data gcd gz data exp icecube filtered data n examples test is missing according it would allow the user to run the module without passing arguments by command line n examples index dox is missing include information please in reporter gmaggi cc resolution fixed ts component combo reconstruction summary example is broken other details priority critical keywords veto vhe homogenizedqtot time milestone owner claudio kopper type defect
1
68,343
21,645,137,161
IssuesEvent
2022-05-06 00:16:06
vector-im/element-web
https://api.github.com/repos/vector-im/element-web
closed
Emoji are small again
T-Defect X-Regression S-Minor A-Timeline A-Composer A-Emoji A11y O-Frequent
### Steps to reproduce Send or receive a message with an emoji, or insert one into the composer ### Outcome #### What did you expect? Emoji should be larger than the surrounding text #### What happened instead? They aren't ### Operating system NixOS unstable ### Browser information Firefox 99.0.1 ### URL for webapp develop.element.io ### Application version Element version: abb31c9b01a2-react-b5ac9493dd14-js-6b5f4aa0a9c1 Olm version: 3.2.8 ### Homeserver Synapse 1.58.0 ### Will you send logs? No
1.0
Emoji are small again - ### Steps to reproduce Send or receive a message with an emoji, or insert one into the composer ### Outcome #### What did you expect? Emoji should be larger than the surrounding text #### What happened instead? They aren't ### Operating system NixOS unstable ### Browser information Firefox 99.0.1 ### URL for webapp develop.element.io ### Application version Element version: abb31c9b01a2-react-b5ac9493dd14-js-6b5f4aa0a9c1 Olm version: 3.2.8 ### Homeserver Synapse 1.58.0 ### Will you send logs? No
defect
emoji are small again steps to reproduce send or receive a message with an emoji or insert one into the composer outcome what did you expect emoji should be larger than the surrounding text what happened instead they aren t operating system nixos unstable browser information firefox url for webapp develop element io application version element version react js olm version homeserver synapse will you send logs no
1
292,535
21,995,245,889
IssuesEvent
2022-05-26 05:17:02
dcSpark/carp
https://api.github.com/repos/dcSpark/carp
closed
Filter to only UTXOs for TransactionOutput query
bug documentation enhancement
Although it's not clear from [the query](https://dcspark.github.io/carp/openapi/#operation/TransactionOutput), this endpoint actually just gets you all outputs and doesn't check if they are spent or not. Probably filtering based on whether or not it is spent should be added as a feature and the behavior explicitly documented.
1.0
Filter to only UTXOs for TransactionOutput query - Although it's not clear from [the query](https://dcspark.github.io/carp/openapi/#operation/TransactionOutput), this endpoint actually just gets you all outputs and doesn't check if they are spent or not. Probably filtering based on whether or not it is spent should be added as a feature and the behavior explicitly documented.
non_defect
filter to only utxos for transactionoutput query although it s not clear from this endpoint actually just gets you all outputs and doesn t check if they are spent or not probably filtering based on whether or not it is spent should be added as a feature and the behavior explicitly documented
0
40,716
10,140,876,023
IssuesEvent
2019-08-03 08:30:57
STEllAR-GROUP/hpx
https://api.github.com/repos/STEllAR-GROUP/hpx
closed
Install failure on OS X -- duplicate rpath entries
compiler: clang platform: Mac OSX tag: wontfix type: defect
I am using OS X Yosemite. I currently cannot build HPX from source. This used to work fine on Mavericks. The build itself goes fine. The install then emits this error message: ``` /opt/local/bin/install_name_tool: object: /Users/eschnett/SIMFACTORY/hpx-master/install/lib/hpx/libparcel_coalescing.0.9.10.dylib malformed object (load command 39 cmdsize is zero) ``` If I use "otool -l" on this library, then I see that it is indeed broken; I see the same error message. Using "otool -l" on the original library (the one in the build directory), I see that it is healthy. Just before load command 39 (the load commands are numbered) are the definitions for LC_RPATH, i.e. the path names provided via the -rpath command. I see that the path "/Users/eschnett/SIMFACTORY/boost-1_56_0/install/lib" appears twice. According to my interpretation of the man page of "install_name_tool" (and Google), this should not be the case -- each path should be unique. It appears that the commands in the file "cmake_install.cmake" should rewrite these LC_RPATH paths, changing the HPX build directory to the HPX install directory. In my build, these commands are in lines 43 to 59 of this file, and read ``` execute_process(COMMAND "/opt/local/bin/install_name_tool" -id "libparcel_coalescing.0.dylib" -change "/Users/eschnett/SIMFACTORY/hpx-master/build/lib/libhpx.0.dylib" "libhpx.0.dylib" -change "/Users/eschnett/SIMFACTORY/hpx-master/build/lib/libhpx_serialization.0.dylib" "libhpx_serialization.0.dylib" "${file}") execute_process(COMMAND /opt/local/bin/install_name_tool -delete_rpath "/Users/eschnett/SIMFACTORY/hpx-master/build/lib" "${file}") execute_process(COMMAND /opt/local/bin/install_name_tool -delete_rpath "/Users/eschnett/SIMFACTORY/boost-1_56_0/install/lib" "${file}") execute_process(COMMAND /opt/local/bin/install_name_tool -add_rpath "/Users/eschnett/SIMFACTORY/hpx-master/install/lib" "${file}") execute_process(COMMAND /opt/local/bin/install_name_tool -add_rpath "/Users/eschnett/SIMFACTORY/boost-1_56_0/install/lib" "${file}") ``` It appears that these calls to "install_name_tool" somehow break the library. I think that this is an error either in install_name_tool, or in another system tool, or in clang 3.5 that I am using to build HPX, or in cmake 3.0. Would it be possible to manually uniquify the -rpath options that are passed to the linker, so that each path is listed only once? The file CMakeFiles/parcel_coalescing_lib.dir/link.txt contains indeed two identical -rpath options for the offending path. Unfortunately, my cmake-fu (or lack thereof) doesn't allow me to try this myself. See also https://github.com/pandegroup/openmm/issues/295, which seems to describe exactly my situation.
1.0
Install failure on OS X -- duplicate rpath entries - I am using OS X Yosemite. I currently cannot build HPX from source. This used to work fine on Mavericks. The build itself goes fine. The install then emits this error message: ``` /opt/local/bin/install_name_tool: object: /Users/eschnett/SIMFACTORY/hpx-master/install/lib/hpx/libparcel_coalescing.0.9.10.dylib malformed object (load command 39 cmdsize is zero) ``` If I use "otool -l" on this library, then I see that it is indeed broken; I see the same error message. Using "otool -l" on the original library (the one in the build directory), I see that it is healthy. Just before load command 39 (the load commands are numbered) are the definitions for LC_RPATH, i.e. the path names provided via the -rpath command. I see that the path "/Users/eschnett/SIMFACTORY/boost-1_56_0/install/lib" appears twice. According to my interpretation of the man page of "install_name_tool" (and Google), this should not be the case -- each path should be unique. It appears that the commands in the file "cmake_install.cmake" should rewrite these LC_RPATH paths, changing the HPX build directory to the HPX install directory. In my build, these commands are in lines 43 to 59 of this file, and read ``` execute_process(COMMAND "/opt/local/bin/install_name_tool" -id "libparcel_coalescing.0.dylib" -change "/Users/eschnett/SIMFACTORY/hpx-master/build/lib/libhpx.0.dylib" "libhpx.0.dylib" -change "/Users/eschnett/SIMFACTORY/hpx-master/build/lib/libhpx_serialization.0.dylib" "libhpx_serialization.0.dylib" "${file}") execute_process(COMMAND /opt/local/bin/install_name_tool -delete_rpath "/Users/eschnett/SIMFACTORY/hpx-master/build/lib" "${file}") execute_process(COMMAND /opt/local/bin/install_name_tool -delete_rpath "/Users/eschnett/SIMFACTORY/boost-1_56_0/install/lib" "${file}") execute_process(COMMAND /opt/local/bin/install_name_tool -add_rpath "/Users/eschnett/SIMFACTORY/hpx-master/install/lib" "${file}") execute_process(COMMAND /opt/local/bin/install_name_tool -add_rpath "/Users/eschnett/SIMFACTORY/boost-1_56_0/install/lib" "${file}") ``` It appears that these calls to "install_name_tool" somehow break the library. I think that this is an error either in install_name_tool, or in another system tool, or in clang 3.5 that I am using to build HPX, or in cmake 3.0. Would it be possible to manually uniquify the -rpath options that are passed to the linker, so that each path is listed only once? The file CMakeFiles/parcel_coalescing_lib.dir/link.txt contains indeed two identical -rpath options for the offending path. Unfortunately, my cmake-fu (or lack thereof) doesn't allow me to try this myself. See also https://github.com/pandegroup/openmm/issues/295, which seems to describe exactly my situation.
defect
install failure on os x duplicate rpath entries i am using os x yosemite i currently cannot build hpx from source this used to work fine on mavericks the build itself goes fine the install then emits this error message opt local bin install name tool object users eschnett simfactory hpx master install lib hpx libparcel coalescing dylib malformed object load command cmdsize is zero if i use otool l on this library then i see that it is indeed broken i see the same error message using otool l on the original library the one in the build directory i see that it is healthy just before load command the load commands are numbered are the definitions for lc rpath i e the path names provided via the rpath command i see that the path users eschnett simfactory boost install lib appears twice according to my interpretation of the man page of install name tool and google this should not be the case each path should be unique it appears that the commands in the file cmake install cmake should rewrite these lc rpath paths changing the hpx build directory to the hpx install directory in my build these commands are in lines to of this file and read execute process command opt local bin install name tool id libparcel coalescing dylib change users eschnett simfactory hpx master build lib libhpx dylib libhpx dylib change users eschnett simfactory hpx master build lib libhpx serialization dylib libhpx serialization dylib file execute process command opt local bin install name tool delete rpath users eschnett simfactory hpx master build lib file execute process command opt local bin install name tool delete rpath users eschnett simfactory boost install lib file execute process command opt local bin install name tool add rpath users eschnett simfactory hpx master install lib file execute process command opt local bin install name tool add rpath users eschnett simfactory boost install lib file it appears that these calls to install name tool somehow break the library i think that this is an error either in install name tool or in another system tool or in clang that i am using to build hpx or in cmake would it be possible to manually uniquify the rpath options that are passed to the linker so that each path is listed only once the file cmakefiles parcel coalescing lib dir link txt contains indeed two identical rpath options for the offending path unfortunately my cmake fu or lack thereof doesn t allow me to try this myself see also which seems to describe exactly my situation
1
44,717
11,494,676,361
IssuesEvent
2020-02-12 02:21:48
GrangerHub/tremulous-game-logic
https://api.github.com/repos/GrangerHub/tremulous-game-logic
closed
Remove the heal reserve from the medistation, but have the healing of recently damaged humans momentarily delayed (still allow removal of poison imediately though).
accepted buildable combat enhancement game mode human team swirl
Remove the heal reserve from the medistation, but have the healing of recently damaged humans momentarily delayed (still allow removal of poison imediately though).
1.0
Remove the heal reserve from the medistation, but have the healing of recently damaged humans momentarily delayed (still allow removal of poison imediately though). - Remove the heal reserve from the medistation, but have the healing of recently damaged humans momentarily delayed (still allow removal of poison imediately though).
non_defect
remove the heal reserve from the medistation but have the healing of recently damaged humans momentarily delayed still allow removal of poison imediately though remove the heal reserve from the medistation but have the healing of recently damaged humans momentarily delayed still allow removal of poison imediately though
0
61,357
17,023,673,920
IssuesEvent
2021-07-03 03:14:01
tomhughes/trac-tickets
https://api.github.com/repos/tomhughes/trac-tickets
closed
Rendering of pipelines within areas with certain landuse tags
Component: osmarender Priority: minor Resolution: wontfix Type: defect
**[Submitted to the original trac issue database at 9.55pm, Tuesday, 25th January 2011]** Osmarender has been so kind as to include pipelines in its rendering rules. Unfortunately, there seems to be an issue with pipelines running through certain landuse=* areas. Take a look at this: http://www.openstreetmap.org/?mlat=50.80511&mlon=6.16231&zoom=17&layers=O The heat pipeline (underground, therefore tagged layer=-1) at the tip of the marker is displayed as a reddish, dotted line. Within the farmland cutting into the commercial area, the pipeline disappears. It reappears in the commercial area again (to the west) and just before the motorway (to the northeast), only to disappear again a few hundred meters further, when it enters another landuse=farmland. The same happens with landuse=forest and landuse=cemetery. (Well yes, the course of the pipeline may still be a bit inaccurate or incomplete, but this ticket is only about the rendering...) With landuse=commercial, landuse=military and landuse=residential, there are no problems. By the way, I understand that Osmarender's standard layout is not a specialized "infrastructure map", so things like pipelines should not appear too prominently - but maybe the (yellow) gas pipelines could be given a slightly stronger color anyway?
1.0
Rendering of pipelines within areas with certain landuse tags - **[Submitted to the original trac issue database at 9.55pm, Tuesday, 25th January 2011]** Osmarender has been so kind as to include pipelines in its rendering rules. Unfortunately, there seems to be an issue with pipelines running through certain landuse=* areas. Take a look at this: http://www.openstreetmap.org/?mlat=50.80511&mlon=6.16231&zoom=17&layers=O The heat pipeline (underground, therefore tagged layer=-1) at the tip of the marker is displayed as a reddish, dotted line. Within the farmland cutting into the commercial area, the pipeline disappears. It reappears in the commercial area again (to the west) and just before the motorway (to the northeast), only to disappear again a few hundred meters further, when it enters another landuse=farmland. The same happens with landuse=forest and landuse=cemetery. (Well yes, the course of the pipeline may still be a bit inaccurate or incomplete, but this ticket is only about the rendering...) With landuse=commercial, landuse=military and landuse=residential, there are no problems. By the way, I understand that Osmarender's standard layout is not a specialized "infrastructure map", so things like pipelines should not appear too prominently - but maybe the (yellow) gas pipelines could be given a slightly stronger color anyway?
defect
rendering of pipelines within areas with certain landuse tags osmarender has been so kind as to include pipelines in its rendering rules unfortunately there seems to be an issue with pipelines running through certain landuse areas take a look at this the heat pipeline underground therefore tagged layer at the tip of the marker is displayed as a reddish dotted line within the farmland cutting into the commercial area the pipeline disappears it reappears in the commercial area again to the west and just before the motorway to the northeast only to disappear again a few hundred meters further when it enters another landuse farmland the same happens with landuse forest and landuse cemetery well yes the course of the pipeline may still be a bit inaccurate or incomplete but this ticket is only about the rendering with landuse commercial landuse military and landuse residential there are no problems by the way i understand that osmarender s standard layout is not a specialized infrastructure map so things like pipelines should not appear too prominently but maybe the yellow gas pipelines could be given a slightly stronger color anyway
1
445,474
12,831,446,668
IssuesEvent
2020-07-07 05:23:19
qlcchain/go-qlc
https://api.github.com/repos/qlcchain/go-qlc
closed
prepare scripts for the main network upgrade
Priority: High Type: Enhancement
- update the reverse proxy configuration - deploy new boot node - etc...
1.0
prepare scripts for the main network upgrade - - update the reverse proxy configuration - deploy new boot node - etc...
non_defect
prepare scripts for the main network upgrade update the reverse proxy configuration deploy new boot node etc
0
8,287
2,611,486,199
IssuesEvent
2015-02-27 05:27:27
chrsmith/switchlist
https://api.github.com/repos/chrsmith/switchlist
closed
Separate checkboxes for "staging" and "offline" is confusing
auto-migrated Priority-Medium Type-Defect
``` Towns can be in one of three states: in staging, offline, or on the layout. The Towns panel allows staging and offline to be both set, creating a fourth: both in staging and offline. That's incorrect, and a probably source of confusion and bugs. Change to a three-position pull down? ``` Original issue reported on code.google.com by `rwbowdi...@gmail.com` on 14 Apr 2012 at 4:55
1.0
Separate checkboxes for "staging" and "offline" is confusing - ``` Towns can be in one of three states: in staging, offline, or on the layout. The Towns panel allows staging and offline to be both set, creating a fourth: both in staging and offline. That's incorrect, and a probably source of confusion and bugs. Change to a three-position pull down? ``` Original issue reported on code.google.com by `rwbowdi...@gmail.com` on 14 Apr 2012 at 4:55
defect
separate checkboxes for staging and offline is confusing towns can be in one of three states in staging offline or on the layout the towns panel allows staging and offline to be both set creating a fourth both in staging and offline that s incorrect and a probably source of confusion and bugs change to a three position pull down original issue reported on code google com by rwbowdi gmail com on apr at
1
3,151
3,811,932,255
IssuesEvent
2016-03-27 06:17:55
moneyballau/statuspage
https://api.github.com/repos/moneyballau/statuspage
closed
API and Server connectivity issues
API degraded performance Website
We are currently experiencing significant connectivity issues to our cloud provider. This issue is being actively worked on and we should be back online soon. Contest scores and settlement are not affected. Apologies for any inconvenience.
True
API and Server connectivity issues - We are currently experiencing significant connectivity issues to our cloud provider. This issue is being actively worked on and we should be back online soon. Contest scores and settlement are not affected. Apologies for any inconvenience.
non_defect
api and server connectivity issues we are currently experiencing significant connectivity issues to our cloud provider this issue is being actively worked on and we should be back online soon contest scores and settlement are not affected apologies for any inconvenience
0
493,516
14,233,966,669
IssuesEvent
2020-11-18 12:56:45
StrangeLoopGames/EcoIssues
https://api.github.com/repos/StrangeLoopGames/EcoIssues
closed
Scrollable exception window
Category: UI Priority: Medium Status: Fixed
Window with exception after crashing should be fixed height with scroll
1.0
Scrollable exception window - Window with exception after crashing should be fixed height with scroll
non_defect
scrollable exception window window with exception after crashing should be fixed height with scroll
0
48,692
7,451,296,737
IssuesEvent
2018-03-29 02:05:22
marta-file-manager/marta-issues
https://api.github.com/repos/marta-file-manager/marta-issues
closed
Add instructions for removing Marta
documentation fixed
There should be clear instructions about how to delete Marta completely, without leaving its caches or configuration files.
1.0
Add instructions for removing Marta - There should be clear instructions about how to delete Marta completely, without leaving its caches or configuration files.
non_defect
add instructions for removing marta there should be clear instructions about how to delete marta completely without leaving its caches or configuration files
0
79,731
28,536,922,121
IssuesEvent
2023-04-20 00:32:27
snuailab/waffle_hub
https://api.github.com/repos/snuailab/waffle_hub
closed
Windows copatibility issue (ultralytics)
defect
### Search before asking - [X] I have searched the [issues](https://github.com///issues) and found no similar bug report. ### Select Component _No response_ ### Bug - cannot load pt file from linux on windows. issue https://github.com/ultralytics/ultralytics/issues/1900 ### Environment _No response_ ### Minimal Reproducible Example _No response_ ### Additional _No response_
1.0
Windows copatibility issue (ultralytics) - ### Search before asking - [X] I have searched the [issues](https://github.com///issues) and found no similar bug report. ### Select Component _No response_ ### Bug - cannot load pt file from linux on windows. issue https://github.com/ultralytics/ultralytics/issues/1900 ### Environment _No response_ ### Minimal Reproducible Example _No response_ ### Additional _No response_
defect
windows copatibility issue ultralytics search before asking i have searched the and found no similar bug report select component no response bug cannot load pt file from linux on windows issue environment no response minimal reproducible example no response additional no response
1
56,088
14,924,924,723
IssuesEvent
2021-01-24 02:56:35
AshleyYakeley/Truth
https://api.github.com/repos/AshleyYakeley/Truth
closed
Types not being brought into scope properly
defect script handling
`let import M; datatype D = MkD T; in return ()`, with `T` exported from `M`, doesn't check.
1.0
Types not being brought into scope properly - `let import M; datatype D = MkD T; in return ()`, with `T` exported from `M`, doesn't check.
defect
types not being brought into scope properly let import m datatype d mkd t in return with t exported from m doesn t check
1
380,175
26,406,927,368
IssuesEvent
2023-01-13 08:54:00
gravitational/teleport
https://api.github.com/repos/gravitational/teleport
closed
Add Machine ID guide showing `gravitational/teleport-actions/auth-k8s` action
documentation machine-id
Guide should show: - Creating role with access to a Kubernetes cluster that has already been configured with Teleport - Creating a bot with access to the above role - Using `gravitational/teleport-actions/setup` and `gravitational/teleport-actions/auth-k8s` to authenticate with the cluster Some brief documentation exists at https://github.com/gravitational/teleport-actions#gravitationalteleport-actionsauth-k8s
1.0
Add Machine ID guide showing `gravitational/teleport-actions/auth-k8s` action - Guide should show: - Creating role with access to a Kubernetes cluster that has already been configured with Teleport - Creating a bot with access to the above role - Using `gravitational/teleport-actions/setup` and `gravitational/teleport-actions/auth-k8s` to authenticate with the cluster Some brief documentation exists at https://github.com/gravitational/teleport-actions#gravitationalteleport-actionsauth-k8s
non_defect
add machine id guide showing gravitational teleport actions auth action guide should show creating role with access to a kubernetes cluster that has already been configured with teleport creating a bot with access to the above role using gravitational teleport actions setup and gravitational teleport actions auth to authenticate with the cluster some brief documentation exists at
0
16,420
2,892,782,152
IssuesEvent
2015-06-15 14:46:05
zaproxy/zaproxy
https://api.github.com/repos/zaproxy/zaproxy
closed
Search regex might not be validated
Priority-Medium Type-Defect
``` From Issue 1615. Steps to reproduce the issue: 1. Run ZAP; 2. Select the "Search" tab; 3. Add an invalid regex, for example "*", and press Enter; 4. Note that no dialogue is shown indicating that the regex is invalid, also in the log there's an exception: [...] 33606 [ZAP-SearchThread] ERROR org.zaproxy.zap.ZAP$UncaughtExceptionLogger - Exception in thread "ZAP-SearchThread" java.util.regex.PatternSyntaxException: Dangling meta character '*' near index 0 * ^ at java.util.regex.Pattern.error(Pattern.java:1924) at java.util.regex.Pattern.sequence(Pattern.java:2090) at java.util.regex.Pattern.expr(Pattern.java:1964) at java.util.regex.Pattern.compile(Pattern.java:1665) at java.util.regex.Pattern.<init>(Pattern.java:1337) at java.util.regex.Pattern.compile(Pattern.java:1047) at org.zaproxy.zap.extension.search.SearchThread.search(Unknown Source) at org.zaproxy.zap.extension.search.SearchThread.run(Unknown Source) [...] Remarks: If the search is started by clicking the "Search" button the regex is validated. ZAP Version: Version 2.4.0 (previous versions are also affected) ``` Original issue reported on code.google.com by `THC202` on 2015-04-30 14:04:12
1.0
Search regex might not be validated - ``` From Issue 1615. Steps to reproduce the issue: 1. Run ZAP; 2. Select the "Search" tab; 3. Add an invalid regex, for example "*", and press Enter; 4. Note that no dialogue is shown indicating that the regex is invalid, also in the log there's an exception: [...] 33606 [ZAP-SearchThread] ERROR org.zaproxy.zap.ZAP$UncaughtExceptionLogger - Exception in thread "ZAP-SearchThread" java.util.regex.PatternSyntaxException: Dangling meta character '*' near index 0 * ^ at java.util.regex.Pattern.error(Pattern.java:1924) at java.util.regex.Pattern.sequence(Pattern.java:2090) at java.util.regex.Pattern.expr(Pattern.java:1964) at java.util.regex.Pattern.compile(Pattern.java:1665) at java.util.regex.Pattern.<init>(Pattern.java:1337) at java.util.regex.Pattern.compile(Pattern.java:1047) at org.zaproxy.zap.extension.search.SearchThread.search(Unknown Source) at org.zaproxy.zap.extension.search.SearchThread.run(Unknown Source) [...] Remarks: If the search is started by clicking the "Search" button the regex is validated. ZAP Version: Version 2.4.0 (previous versions are also affected) ``` Original issue reported on code.google.com by `THC202` on 2015-04-30 14:04:12
defect
search regex might not be validated from issue steps to reproduce the issue run zap select the search tab add an invalid regex for example and press enter note that no dialogue is shown indicating that the regex is invalid also in the log there s an exception error org zaproxy zap zap uncaughtexceptionlogger exception in thread zap searchthread java util regex patternsyntaxexception dangling meta character near index at java util regex pattern error pattern java at java util regex pattern sequence pattern java at java util regex pattern expr pattern java at java util regex pattern compile pattern java at java util regex pattern pattern java at java util regex pattern compile pattern java at org zaproxy zap extension search searchthread search unknown source at org zaproxy zap extension search searchthread run unknown source remarks if the search is started by clicking the search button the regex is validated zap version version previous versions are also affected original issue reported on code google com by on
1
5,867
2,610,216,952
IssuesEvent
2015-02-26 19:09:06
chrsmith/somefinders
https://api.github.com/repos/chrsmith/somefinders
opened
практикум по бухгалтерскому учету самохвалова
auto-migrated Priority-Medium Type-Defect
``` '''Борис Щукин''' Привет всем не подскажите где можно найти .практикум по бухгалтерскому учету самохвалова. где то видел уже '''Виолен Сергеев''' Вот хороший сайт где можно скачать http://bit.ly/1862RsN '''Володар Егоров''' Просит ввести номер мобилы!Не опасно ли это? '''Гарибальди Дмитриев''' Не это не влияет на баланс '''Горазд Соколов''' Неа все ок у меня ничего не списало Информация о файле: практикум по бухгалтерскому учету самохвалова Загружен: В этом месяце Скачан раз: 215 Рейтинг: 313 Средняя скорость скачивания: 1242 Похожих файлов: 14 ``` ----- Original issue reported on code.google.com by `kondense...@gmail.com` on 16 Dec 2013 at 9:47
1.0
практикум по бухгалтерскому учету самохвалова - ``` '''Борис Щукин''' Привет всем не подскажите где можно найти .практикум по бухгалтерскому учету самохвалова. где то видел уже '''Виолен Сергеев''' Вот хороший сайт где можно скачать http://bit.ly/1862RsN '''Володар Егоров''' Просит ввести номер мобилы!Не опасно ли это? '''Гарибальди Дмитриев''' Не это не влияет на баланс '''Горазд Соколов''' Неа все ок у меня ничего не списало Информация о файле: практикум по бухгалтерскому учету самохвалова Загружен: В этом месяце Скачан раз: 215 Рейтинг: 313 Средняя скорость скачивания: 1242 Похожих файлов: 14 ``` ----- Original issue reported on code.google.com by `kondense...@gmail.com` on 16 Dec 2013 at 9:47
defect
практикум по бухгалтерскому учету самохвалова борис щукин привет всем не подскажите где можно найти практикум по бухгалтерскому учету самохвалова где то видел уже виолен сергеев вот хороший сайт где можно скачать володар егоров просит ввести номер мобилы не опасно ли это гарибальди дмитриев не это не влияет на баланс горазд соколов неа все ок у меня ничего не списало информация о файле практикум по бухгалтерскому учету самохвалова загружен в этом месяце скачан раз рейтинг средняя скорость скачивания похожих файлов original issue reported on code google com by kondense gmail com on dec at
1
4,412
2,610,093,649
IssuesEvent
2015-02-26 18:28:16
chrsmith/dsdsdaadf
https://api.github.com/repos/chrsmith/dsdsdaadf
opened
深圳韩方科颜多少钱
auto-migrated Priority-Medium Type-Defect
``` 深圳韩方科颜多少钱【深圳韩方科颜全国热线400-869-1818,24小 时QQ4008691818】深圳韩方科颜专业祛痘连锁机构,机构以韩国�� �方——韩方科颜这一国妆准字号治疗型权威,祛痘佳品,韩� ��科颜专业祛痘连锁机构,采用韩国秘方配合专业“不反弹” 健康祛痘技术并结合先进“先进豪华彩光”仪,开创国内专�� �治疗粉刺、痤疮签约包治先河,成功消除了许多顾客脸上的� ��痘。 ``` ----- Original issue reported on code.google.com by `szft...@163.com` on 14 May 2014 at 8:09
1.0
深圳韩方科颜多少钱 - ``` 深圳韩方科颜多少钱【深圳韩方科颜全国热线400-869-1818,24小 时QQ4008691818】深圳韩方科颜专业祛痘连锁机构,机构以韩国�� �方——韩方科颜这一国妆准字号治疗型权威,祛痘佳品,韩� ��科颜专业祛痘连锁机构,采用韩国秘方配合专业“不反弹” 健康祛痘技术并结合先进“先进豪华彩光”仪,开创国内专�� �治疗粉刺、痤疮签约包治先河,成功消除了许多顾客脸上的� ��痘。 ``` ----- Original issue reported on code.google.com by `szft...@163.com` on 14 May 2014 at 8:09
defect
深圳韩方科颜多少钱 深圳韩方科颜多少钱【 , 】深圳韩方科颜专业祛痘连锁机构,机构以韩国�� �方——韩方科颜这一国妆准字号治疗型权威,祛痘佳品,韩� ��科颜专业祛痘连锁机构,采用韩国秘方配合专业“不反弹” 健康祛痘技术并结合先进“先进豪华彩光”仪,开创国内专�� �治疗粉刺、痤疮签约包治先河,成功消除了许多顾客脸上的� ��痘。 original issue reported on code google com by szft com on may at
1
73,213
24,508,882,228
IssuesEvent
2022-10-10 19:11:44
Gogo1951/Groupie
https://api.github.com/repos/Gogo1951/Groupie
closed
Remove Distorted Screenshots for Certain Instances
Priority - 3 Average Type - Defect
These don't gel with the design, let's remove these. If we don't have a badge for an instance or group, we can just use a ? badge. I'll work on creating more badges. The squished & distorted images look awful.
1.0
Remove Distorted Screenshots for Certain Instances - These don't gel with the design, let's remove these. If we don't have a badge for an instance or group, we can just use a ? badge. I'll work on creating more badges. The squished & distorted images look awful.
defect
remove distorted screenshots for certain instances these don t gel with the design let s remove these if we don t have a badge for an instance or group we can just use a badge i ll work on creating more badges the squished distorted images look awful
1
10,362
8,026,584,477
IssuesEvent
2018-07-27 05:09:51
cockroachdb/cockroach
https://api.github.com/repos/cockroachdb/cockroach
closed
server: node communication issues using 3rd party certificates
A-core-security C-investigation O-community
Issue/Bug/Question Summary: We are using our own certificate authority to create certificates for our Cockroach cluster build. After creating the certificates, we are experiencing communication issues when attempting to start the cluster. Port communication on 26257 between the nodes does not seem to be an issues since we can telnet after starting the service. We also verified the node.crt and client.root.crt files against the ca.crt and they return valid. Steps to reproduce: Created node.crt and client.root.crt using a third party CA. Started cockroach on all 3 nodes Results Expected: Cluster communication between nodes to be successful. Results Occured: Cluster will not start. Following message is returned: WARNING: The server appears to be unable to contact the other nodes in the cluster. Logs: Logs are attached. [cockroach-10.log](https://github.com/cockroachdb/cockroach/files/2190368/cockroach-10.log) [cockroach-20.log](https://github.com/cockroachdb/cockroach/files/2190369/cockroach-20.log) [cockroach-30.log](https://github.com/cockroachdb/cockroach/files/2190370/cockroach-30.log) Version: Build Tag: v2.0.2 Build Time: 2018/05/21 14:55:20 Distribution: CCL Platform: linux amd64 (x86_64-unknown-linux-gnu) Go Version: go1.10 C Compiler: gcc 6.3.0 Build SHA-1: fa2b2bfd802ebe8150030a14b0a36c25fef90b91 Build Type: release Certificate Validation: openssl verify -CAfile ca.crt node.crt node.crt: OK openssl verify -CAfile ca.crt client.root.crt client.root.crt: OK
True
server: node communication issues using 3rd party certificates - Issue/Bug/Question Summary: We are using our own certificate authority to create certificates for our Cockroach cluster build. After creating the certificates, we are experiencing communication issues when attempting to start the cluster. Port communication on 26257 between the nodes does not seem to be an issues since we can telnet after starting the service. We also verified the node.crt and client.root.crt files against the ca.crt and they return valid. Steps to reproduce: Created node.crt and client.root.crt using a third party CA. Started cockroach on all 3 nodes Results Expected: Cluster communication between nodes to be successful. Results Occured: Cluster will not start. Following message is returned: WARNING: The server appears to be unable to contact the other nodes in the cluster. Logs: Logs are attached. [cockroach-10.log](https://github.com/cockroachdb/cockroach/files/2190368/cockroach-10.log) [cockroach-20.log](https://github.com/cockroachdb/cockroach/files/2190369/cockroach-20.log) [cockroach-30.log](https://github.com/cockroachdb/cockroach/files/2190370/cockroach-30.log) Version: Build Tag: v2.0.2 Build Time: 2018/05/21 14:55:20 Distribution: CCL Platform: linux amd64 (x86_64-unknown-linux-gnu) Go Version: go1.10 C Compiler: gcc 6.3.0 Build SHA-1: fa2b2bfd802ebe8150030a14b0a36c25fef90b91 Build Type: release Certificate Validation: openssl verify -CAfile ca.crt node.crt node.crt: OK openssl verify -CAfile ca.crt client.root.crt client.root.crt: OK
non_defect
server node communication issues using party certificates issue bug question summary we are using our own certificate authority to create certificates for our cockroach cluster build after creating the certificates we are experiencing communication issues when attempting to start the cluster port communication on between the nodes does not seem to be an issues since we can telnet after starting the service we also verified the node crt and client root crt files against the ca crt and they return valid steps to reproduce created node crt and client root crt using a third party ca started cockroach on all nodes results expected cluster communication between nodes to be successful results occured cluster will not start following message is returned warning the server appears to be unable to contact the other nodes in the cluster logs logs are attached version build tag build time distribution ccl platform linux unknown linux gnu go version c compiler gcc build sha build type release certificate validation openssl verify cafile ca crt node crt node crt ok openssl verify cafile ca crt client root crt client root crt ok
0
181,880
6,664,993,247
IssuesEvent
2017-10-02 22:25:13
classifiedz/classifiedz.github.io
https://api.github.com/repos/classifiedz/classifiedz.github.io
closed
[User Story] Post Ad Page
High Priority Post Ad Story
## Create a post ad page Users should should be able to create and ad post where all the details of their item can be given. The ad should appear on the main page once submitted. Users should also be able to access this option from the navbar. - [x] Post ad page template #37 - [x] Input fields for title #38 - [x] Input fields for description #39 - [x] Category specification #40 - [x] Upload image button #41 - [x] Contact preference #42 - [x] Price input #43 - [x] Submit/Cancel buttons #44 - [ ] Have the ads posted to the front page #45 - [x] Gain access to the page through the navbar #46 - [x] Functional image upload #52
1.0
[User Story] Post Ad Page - ## Create a post ad page Users should should be able to create and ad post where all the details of their item can be given. The ad should appear on the main page once submitted. Users should also be able to access this option from the navbar. - [x] Post ad page template #37 - [x] Input fields for title #38 - [x] Input fields for description #39 - [x] Category specification #40 - [x] Upload image button #41 - [x] Contact preference #42 - [x] Price input #43 - [x] Submit/Cancel buttons #44 - [ ] Have the ads posted to the front page #45 - [x] Gain access to the page through the navbar #46 - [x] Functional image upload #52
non_defect
post ad page create a post ad page users should should be able to create and ad post where all the details of their item can be given the ad should appear on the main page once submitted users should also be able to access this option from the navbar post ad page template input fields for title input fields for description category specification upload image button contact preference price input submit cancel buttons have the ads posted to the front page gain access to the page through the navbar functional image upload
0
38,513
8,870,054,705
IssuesEvent
2019-01-11 08:16:12
contao/contao
https://api.github.com/repos/contao/contao
closed
Throw distinct exceptions in the opt-in service
defect
The exceptions that can be thrown should be documented with `@throws` and ideally they should be special exceptions. E.g. `TokenAlreadyConfirmedException`. _Originally posted by @Toflar in https://github.com/contao/contao/pull/196#discussion_r243554813_
1.0
Throw distinct exceptions in the opt-in service - The exceptions that can be thrown should be documented with `@throws` and ideally they should be special exceptions. E.g. `TokenAlreadyConfirmedException`. _Originally posted by @Toflar in https://github.com/contao/contao/pull/196#discussion_r243554813_
defect
throw distinct exceptions in the opt in service the exceptions that can be thrown should be documented with throws and ideally they should be special exceptions e g tokenalreadyconfirmedexception originally posted by toflar in
1
616,456
19,303,136,786
IssuesEvent
2021-12-13 08:41:59
MaibornWolff/codecharta
https://api.github.com/repos/MaibornWolff/codecharta
reopened
Improve custom configs
pr-visualization feature priority:urgent
# Feature request ## Description As a user, I want custom configs to be easily understandable and easy to use so that I do not have to invest a lot of time using them. ## Acceptance criteria - [x] Remove notification when removing entries (just remove the entry by collapsing the list) - [ ] "AI" entries should not be kept in the local storage. They are recalculated as soon as the map is loaded anyway. Have a look here: #2435. - [ ] Do not show non-matching entries by default! Only list matching entries for the loaded maps. All others should be in a separate category. - [ ] Highlight matching entries for the currently loaded mode (single, multiple, diff) - [ ] More intuitive UI in general (TBD) - [ ] Mark custom configs as stable and remove download button (do not start before the other parts are resolved) - [ ] Resolve https://github.com/MaibornWolff/codecharta/issues/940 as cleanup after removing the download button
1.0
Improve custom configs - # Feature request ## Description As a user, I want custom configs to be easily understandable and easy to use so that I do not have to invest a lot of time using them. ## Acceptance criteria - [x] Remove notification when removing entries (just remove the entry by collapsing the list) - [ ] "AI" entries should not be kept in the local storage. They are recalculated as soon as the map is loaded anyway. Have a look here: #2435. - [ ] Do not show non-matching entries by default! Only list matching entries for the loaded maps. All others should be in a separate category. - [ ] Highlight matching entries for the currently loaded mode (single, multiple, diff) - [ ] More intuitive UI in general (TBD) - [ ] Mark custom configs as stable and remove download button (do not start before the other parts are resolved) - [ ] Resolve https://github.com/MaibornWolff/codecharta/issues/940 as cleanup after removing the download button
non_defect
improve custom configs feature request description as a user i want custom configs to be easily understandable and easy to use so that i do not have to invest a lot of time using them acceptance criteria remove notification when removing entries just remove the entry by collapsing the list ai entries should not be kept in the local storage they are recalculated as soon as the map is loaded anyway have a look here do not show non matching entries by default only list matching entries for the loaded maps all others should be in a separate category highlight matching entries for the currently loaded mode single multiple diff more intuitive ui in general tbd mark custom configs as stable and remove download button do not start before the other parts are resolved resolve as cleanup after removing the download button
0
23,057
3,755,593,135
IssuesEvent
2016-03-12 19:27:48
RomanGolovanov/aMetro
https://api.github.com/repos/RomanGolovanov/aMetro
closed
[FR] Расписание / timetable
auto-migrated Priority-Medium Type-Defect
``` было бы чудесно ещё иметь расписание поездов в программе. В качестве примера могу привести https://play.google.com/store/apps/details?id=com.witharts.metro ``` Original issue reported on code.google.com by `ildar.mulyukov` on 26 Sep 2014 at 5:11
1.0
[FR] Расписание / timetable - ``` было бы чудесно ещё иметь расписание поездов в программе. В качестве примера могу привести https://play.google.com/store/apps/details?id=com.witharts.metro ``` Original issue reported on code.google.com by `ildar.mulyukov` on 26 Sep 2014 at 5:11
defect
расписание timetable было бы чудесно ещё иметь расписание поездов в программе в качестве примера могу привести original issue reported on code google com by ildar mulyukov on sep at
1
23,396
3,812,039,801
IssuesEvent
2016-03-27 08:38:36
TrendBreaker/django-alchemy
https://api.github.com/repos/TrendBreaker/django-alchemy
closed
syncdb needs to support loading custom sql and fixtures
auto-migrated Component-Commands Priority-Medium Type-Defect
``` Currently syncdb is just passing off the creation of missing tables to SA. We need to also structure this is such a way that custom sql can be run for those tables that were created. This is going to be a bit challenging since we need to find a way to get the list of tables back out of SA. Additionally we are not loading in any fixtures which happens with syncdb. ``` Original issue reported on code.google.com by `mtr...@gmail.com` on 26 Mar 2008 at 1:26
1.0
syncdb needs to support loading custom sql and fixtures - ``` Currently syncdb is just passing off the creation of missing tables to SA. We need to also structure this is such a way that custom sql can be run for those tables that were created. This is going to be a bit challenging since we need to find a way to get the list of tables back out of SA. Additionally we are not loading in any fixtures which happens with syncdb. ``` Original issue reported on code.google.com by `mtr...@gmail.com` on 26 Mar 2008 at 1:26
defect
syncdb needs to support loading custom sql and fixtures currently syncdb is just passing off the creation of missing tables to sa we need to also structure this is such a way that custom sql can be run for those tables that were created this is going to be a bit challenging since we need to find a way to get the list of tables back out of sa additionally we are not loading in any fixtures which happens with syncdb original issue reported on code google com by mtr gmail com on mar at
1
52,997
13,781,959,899
IssuesEvent
2020-10-08 16:55:37
ioana-nicolae/first
https://api.github.com/repos/ioana-nicolae/first
opened
WS-2016-0039 (High) detected in shell-quote-0.0.1.tgz
security vulnerability
## WS-2016-0039 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>shell-quote-0.0.1.tgz</b></p></summary> <p>quote and parse shell commands</p> <p>Library home page: <a href="https://registry.npmjs.org/shell-quote/-/shell-quote-0.0.1.tgz">https://registry.npmjs.org/shell-quote/-/shell-quote-0.0.1.tgz</a></p> <p>Path to dependency file: first/angular.js-master/angular.js-master/yarn.lock</p> <p>Path to vulnerable library: first/angular.js-master/angular.js-master/yarn.lock</p> <p> Dependency Hierarchy: - angular-benchpress-0.2.2.tgz (Root Library) - browserify-7.0.3.tgz - :x: **shell-quote-0.0.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/ioana-nicolae/first/commit/6e040516f98074b37f69996b76c1c99015c1d685">6e040516f98074b37f69996b76c1c99015c1d685</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The npm module "shell-quote" cannot correctly escape "greater than" and "lower than" operator used for redirection in shell. This might be possible vulnerability for many application which depends on shell-quote. <p>Publish Date: 2016-05-20 <p>URL: <a href=https://github.com/substack/node-shell-quote/commit/70e9eb2a854eb56a3dfa255be12610a722bbe080>WS-2016-0039</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>8.4</b>)</summary> <p> Base Score Metrics not available</p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nodesecurity.io/advisories/117">https://nodesecurity.io/advisories/117</a></p> <p>Release Date: 2016-06-21</p> <p>Fix Resolution: Upgrade to at least version 1.6.1</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"shell-quote","packageVersion":"0.0.1","isTransitiveDependency":true,"dependencyTree":"angular-benchpress:0.2.2;browserify:7.0.3;shell-quote:0.0.1","isMinimumFixVersionAvailable":false}],"vulnerabilityIdentifier":"WS-2016-0039","vulnerabilityDetails":"The npm module \"shell-quote\" cannot correctly escape \"greater than\" and \"lower than\" operator used for redirection in shell. This might be possible vulnerability for many application which depends on shell-quote.","vulnerabilityUrl":"https://github.com/substack/node-shell-quote/commit/70e9eb2a854eb56a3dfa255be12610a722bbe080","cvss2Severity":"high","cvss2Score":"8.4","extraData":{}}</REMEDIATE> -->
True
WS-2016-0039 (High) detected in shell-quote-0.0.1.tgz - ## WS-2016-0039 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>shell-quote-0.0.1.tgz</b></p></summary> <p>quote and parse shell commands</p> <p>Library home page: <a href="https://registry.npmjs.org/shell-quote/-/shell-quote-0.0.1.tgz">https://registry.npmjs.org/shell-quote/-/shell-quote-0.0.1.tgz</a></p> <p>Path to dependency file: first/angular.js-master/angular.js-master/yarn.lock</p> <p>Path to vulnerable library: first/angular.js-master/angular.js-master/yarn.lock</p> <p> Dependency Hierarchy: - angular-benchpress-0.2.2.tgz (Root Library) - browserify-7.0.3.tgz - :x: **shell-quote-0.0.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/ioana-nicolae/first/commit/6e040516f98074b37f69996b76c1c99015c1d685">6e040516f98074b37f69996b76c1c99015c1d685</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The npm module "shell-quote" cannot correctly escape "greater than" and "lower than" operator used for redirection in shell. This might be possible vulnerability for many application which depends on shell-quote. <p>Publish Date: 2016-05-20 <p>URL: <a href=https://github.com/substack/node-shell-quote/commit/70e9eb2a854eb56a3dfa255be12610a722bbe080>WS-2016-0039</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>8.4</b>)</summary> <p> Base Score Metrics not available</p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nodesecurity.io/advisories/117">https://nodesecurity.io/advisories/117</a></p> <p>Release Date: 2016-06-21</p> <p>Fix Resolution: Upgrade to at least version 1.6.1</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"shell-quote","packageVersion":"0.0.1","isTransitiveDependency":true,"dependencyTree":"angular-benchpress:0.2.2;browserify:7.0.3;shell-quote:0.0.1","isMinimumFixVersionAvailable":false}],"vulnerabilityIdentifier":"WS-2016-0039","vulnerabilityDetails":"The npm module \"shell-quote\" cannot correctly escape \"greater than\" and \"lower than\" operator used for redirection in shell. This might be possible vulnerability for many application which depends on shell-quote.","vulnerabilityUrl":"https://github.com/substack/node-shell-quote/commit/70e9eb2a854eb56a3dfa255be12610a722bbe080","cvss2Severity":"high","cvss2Score":"8.4","extraData":{}}</REMEDIATE> -->
non_defect
ws high detected in shell quote tgz ws high severity vulnerability vulnerable library shell quote tgz quote and parse shell commands library home page a href path to dependency file first angular js master angular js master yarn lock path to vulnerable library first angular js master angular js master yarn lock dependency hierarchy angular benchpress tgz root library browserify tgz x shell quote tgz vulnerable library found in head commit a href found in base branch master vulnerability details the npm module shell quote cannot correctly escape greater than and lower than operator used for redirection in shell this might be possible vulnerability for many application which depends on shell quote publish date url a href cvss score details base score metrics not available suggested fix type upgrade version origin a href release date fix resolution upgrade to at least version isopenpronvulnerability false ispackagebased true isdefaultbranch true packages vulnerabilityidentifier ws vulnerabilitydetails the npm module shell quote cannot correctly escape greater than and lower than operator used for redirection in shell this might be possible vulnerability for many application which depends on shell quote vulnerabilityurl
0
47,228
13,056,065,160
IssuesEvent
2020-07-30 03:33:02
icecube-trac/tix2
https://api.github.com/repos/icecube-trac/tix2
closed
terst (Trac #165)
Migrated from Trac combo reconstruction defect
test test Migrated from https://code.icecube.wisc.edu/ticket/165 ```json { "status": "closed", "changetime": "2009-06-30T13:34:54", "description": "test test", "reporter": "cgils", "cc": "", "resolution": "fixed", "_ts": "1246368894000000", "component": "combo reconstruction", "summary": "terst", "priority": "normal", "keywords": "", "time": "2009-06-30T13:33:04", "milestone": "", "owner": "kislat", "type": "defect" } ```
1.0
terst (Trac #165) - test test Migrated from https://code.icecube.wisc.edu/ticket/165 ```json { "status": "closed", "changetime": "2009-06-30T13:34:54", "description": "test test", "reporter": "cgils", "cc": "", "resolution": "fixed", "_ts": "1246368894000000", "component": "combo reconstruction", "summary": "terst", "priority": "normal", "keywords": "", "time": "2009-06-30T13:33:04", "milestone": "", "owner": "kislat", "type": "defect" } ```
defect
terst trac test test migrated from json status closed changetime description test test reporter cgils cc resolution fixed ts component combo reconstruction summary terst priority normal keywords time milestone owner kislat type defect
1
43,930
11,882,314,378
IssuesEvent
2020-03-27 14:12:45
scipy/scipy
https://api.github.com/repos/scipy/scipy
closed
documentation of scipy.spatial.HalfspaceIntersection: wrong method to compute feasible point
Documentation defect scipy.spatial
I am reading the docs of: https://docs.scipy.org/doc/scipy/reference/generated/scipy.spatial.HalfspaceIntersection.html the example states an algorithm for computing a feasible point for the halfspace intersection algorithm by setting up a linear problem. However, the algorithm uses res = scipy.optimize.linprog(c, A_ub=A, b_ub=b) to solve the problem, which additionally adds an implicit constraint x>0. This works in the example as the solution indeed produces positive values only. But in the code example below, flipping the one constraint in the example around to produce negative x-values will result in the wrong solution. The correct way is to explicitly disable all box-constraints: res = scipy.optimize.linprog(c, A_ub=A, b_ub=b, bounds = (None,None)) #### Reproducing code example: ``` from scipy.spatial import HalfspaceIntersection from scipy.optimize import linprog import numpy as np halfspaces = np.array([[1, 0., 0.], # example uses -1 [0., -1., 0.], [2., 1., -4.], [-0.5, 1., -2.]]) norm_vector = np.reshape(np.linalg.norm(halfspaces[:, :-1], axis=1), (halfspaces.shape[0], 1)) c = np.zeros((halfspaces.shape[1],)) c[-1] = -1 A = np.hstack((halfspaces[:, :-1], norm_vector)) b = - halfspaces[:, -1:] #wrong: res = linprog(c, A_ub=A, b_ub=b) print(res.x) #correct res = linprog(c, A_ub=A, b_ub=b, bounds = (None,None)) print(res.x) ``` #### Scipy/Numpy/Python version information: 1.4.1 1.17.4 sys.version_info(major=3, minor=7, micro=0, releaselevel='final', serial=0)
1.0
documentation of scipy.spatial.HalfspaceIntersection: wrong method to compute feasible point - I am reading the docs of: https://docs.scipy.org/doc/scipy/reference/generated/scipy.spatial.HalfspaceIntersection.html the example states an algorithm for computing a feasible point for the halfspace intersection algorithm by setting up a linear problem. However, the algorithm uses res = scipy.optimize.linprog(c, A_ub=A, b_ub=b) to solve the problem, which additionally adds an implicit constraint x>0. This works in the example as the solution indeed produces positive values only. But in the code example below, flipping the one constraint in the example around to produce negative x-values will result in the wrong solution. The correct way is to explicitly disable all box-constraints: res = scipy.optimize.linprog(c, A_ub=A, b_ub=b, bounds = (None,None)) #### Reproducing code example: ``` from scipy.spatial import HalfspaceIntersection from scipy.optimize import linprog import numpy as np halfspaces = np.array([[1, 0., 0.], # example uses -1 [0., -1., 0.], [2., 1., -4.], [-0.5, 1., -2.]]) norm_vector = np.reshape(np.linalg.norm(halfspaces[:, :-1], axis=1), (halfspaces.shape[0], 1)) c = np.zeros((halfspaces.shape[1],)) c[-1] = -1 A = np.hstack((halfspaces[:, :-1], norm_vector)) b = - halfspaces[:, -1:] #wrong: res = linprog(c, A_ub=A, b_ub=b) print(res.x) #correct res = linprog(c, A_ub=A, b_ub=b, bounds = (None,None)) print(res.x) ``` #### Scipy/Numpy/Python version information: 1.4.1 1.17.4 sys.version_info(major=3, minor=7, micro=0, releaselevel='final', serial=0)
defect
documentation of scipy spatial halfspaceintersection wrong method to compute feasible point i am reading the docs of the example states an algorithm for computing a feasible point for the halfspace intersection algorithm by setting up a linear problem however the algorithm uses res scipy optimize linprog c a ub a b ub b to solve the problem which additionally adds an implicit constraint x this works in the example as the solution indeed produces positive values only but in the code example below flipping the one constraint in the example around to produce negative x values will result in the wrong solution the correct way is to explicitly disable all box constraints res scipy optimize linprog c a ub a b ub b bounds none none reproducing code example from scipy spatial import halfspaceintersection from scipy optimize import linprog import numpy as np halfspaces np array example uses norm vector np reshape np linalg norm halfspaces axis halfspaces shape c np zeros halfspaces shape c a np hstack halfspaces norm vector b halfspaces wrong res linprog c a ub a b ub b print res x correct res linprog c a ub a b ub b bounds none none print res x scipy numpy python version information sys version info major minor micro releaselevel final serial
1
431,766
30,250,191,279
IssuesEvent
2023-07-06 19:52:39
Xpra-org/xpra
https://api.github.com/repos/Xpra-org/xpra
closed
[Documentation / Examples / Screenshots] Could this be added as a link or something to the main README?
documentation enhancement help wanted
Hey xpra devs, I found this project via gosu ( a C++ and ruby engine). However, I am not entirely sure what is possible with xpra exactly. Would it be possible to add a few partial screenshots of what people do with it? This does not have to be all-inclusive, really just a few screenshots to see in one glance what can be done with it. Does not have to be listed in the main README per se (although that is also possible of course); could just be a separate page that keeps a few screenshots. While I am a ruby guy, I am fine with python examples too and even other languages - I am mostly interested in "what can be done with xrpa specifically". (If there was a screenshot page already as-is I may not have seen it; in that case perhaps the section on the README could be made longer in this regard.) Thank you for reading and potentially considering.
1.0
[Documentation / Examples / Screenshots] Could this be added as a link or something to the main README? - Hey xpra devs, I found this project via gosu ( a C++ and ruby engine). However, I am not entirely sure what is possible with xpra exactly. Would it be possible to add a few partial screenshots of what people do with it? This does not have to be all-inclusive, really just a few screenshots to see in one glance what can be done with it. Does not have to be listed in the main README per se (although that is also possible of course); could just be a separate page that keeps a few screenshots. While I am a ruby guy, I am fine with python examples too and even other languages - I am mostly interested in "what can be done with xrpa specifically". (If there was a screenshot page already as-is I may not have seen it; in that case perhaps the section on the README could be made longer in this regard.) Thank you for reading and potentially considering.
non_defect
could this be added as a link or something to the main readme hey xpra devs i found this project via gosu a c and ruby engine however i am not entirely sure what is possible with xpra exactly would it be possible to add a few partial screenshots of what people do with it this does not have to be all inclusive really just a few screenshots to see in one glance what can be done with it does not have to be listed in the main readme per se although that is also possible of course could just be a separate page that keeps a few screenshots while i am a ruby guy i am fine with python examples too and even other languages i am mostly interested in what can be done with xrpa specifically if there was a screenshot page already as is i may not have seen it in that case perhaps the section on the readme could be made longer in this regard thank you for reading and potentially considering
0
189,713
15,193,848,498
IssuesEvent
2021-02-16 01:54:57
livgust/macovidvaccines.com
https://api.github.com/repos/livgust/macovidvaccines.com
closed
Add CONTRIBUTING.md
documentation
It could be helpful, as the project matures, to include a markdown file that describes how people can contribute. I found [a nifty guide](https://opensource.guide/starting-a-project/#your-pre-launch-checklist) here. For now, it can probably be pretty simple.
1.0
Add CONTRIBUTING.md - It could be helpful, as the project matures, to include a markdown file that describes how people can contribute. I found [a nifty guide](https://opensource.guide/starting-a-project/#your-pre-launch-checklist) here. For now, it can probably be pretty simple.
non_defect
add contributing md it could be helpful as the project matures to include a markdown file that describes how people can contribute i found here for now it can probably be pretty simple
0
179,679
30,284,752,973
IssuesEvent
2023-07-08 14:26:09
hashgraph/hedera-json-rpc-relay
https://api.github.com/repos/hashgraph/hedera-json-rpc-relay
opened
[Design] Add monitoring and alerting rules
enhancement Epic P2 design
### Problem The relay publishes metrics uses prometheus, however, no rules are defined to enable relay operators to observe and support alerting. ### Solution Explore the design and necessary implementation steps to support this and update the relay. Create sub epic tasklist to capture the necessary work ### Alternatives _No response_
1.0
[Design] Add monitoring and alerting rules - ### Problem The relay publishes metrics uses prometheus, however, no rules are defined to enable relay operators to observe and support alerting. ### Solution Explore the design and necessary implementation steps to support this and update the relay. Create sub epic tasklist to capture the necessary work ### Alternatives _No response_
non_defect
add monitoring and alerting rules problem the relay publishes metrics uses prometheus however no rules are defined to enable relay operators to observe and support alerting solution explore the design and necessary implementation steps to support this and update the relay create sub epic tasklist to capture the necessary work alternatives no response
0
75,195
25,582,569,717
IssuesEvent
2022-12-01 06:20:27
martinrotter/rssguard
https://api.github.com/repos/martinrotter/rssguard
closed
[BUG]: Issue with duplicate feeds
Type-Defect Status-Invalid
![Screenshot_20221128_143005](https://user-images.githubusercontent.com/11242593/204579275-362a9c8f-c252-47e2-889f-bcd8cdc97a93.png) ### Brief description of the issue Experiencing duplicate feeds. ### How to reproduce the bug? 1. add filter. `function filterMessage() { if (msg.isAlreadyInDatabase(MessageObject.SameTitle)) { return MessageObject.Ignore; } else { return MessageObject.Accept; } }` 2. Add news feeds from similar sources. Ex. CTV. ### What was the expected result? Feeds without duplicated titles. ### What actually happened? Got duplicate feeds. ### Debug log NA ### Operating system and version * OS: KDE Neon * RSS Guard version: 4.2.5
1.0
[BUG]: Issue with duplicate feeds - ![Screenshot_20221128_143005](https://user-images.githubusercontent.com/11242593/204579275-362a9c8f-c252-47e2-889f-bcd8cdc97a93.png) ### Brief description of the issue Experiencing duplicate feeds. ### How to reproduce the bug? 1. add filter. `function filterMessage() { if (msg.isAlreadyInDatabase(MessageObject.SameTitle)) { return MessageObject.Ignore; } else { return MessageObject.Accept; } }` 2. Add news feeds from similar sources. Ex. CTV. ### What was the expected result? Feeds without duplicated titles. ### What actually happened? Got duplicate feeds. ### Debug log NA ### Operating system and version * OS: KDE Neon * RSS Guard version: 4.2.5
defect
issue with duplicate feeds brief description of the issue experiencing duplicate feeds how to reproduce the bug add filter function filtermessage if msg isalreadyindatabase messageobject sametitle return messageobject ignore else return messageobject accept add news feeds from similar sources ex ctv what was the expected result feeds without duplicated titles what actually happened got duplicate feeds debug log na operating system and version os kde neon rss guard version
1
13,888
5,486,752,750
IssuesEvent
2017-03-14 01:12:24
istio/manager
https://api.github.com/repos/istio/manager
closed
Use an uniform tagging system across all docker istio images (manager, mixer, proxy)
build & test infrastructure
Build system (jenkins/travis) applies: 1. "date+build#" , where date is YYYY-MM-DD-HH:SS ; required on all images - date is a must giving Bazel build produces incorrect date - build# - keep in mind that Mixer is on travis, manager + proxy + app (runtime) are on Jenkins 2. short SHA - required on all images github search repo with short SHA will find the commit directly, no need to go to the build system as an extra step 3. "latest": to be used only by the build system, only if we apply it explicitly and force it with any new push, otherwise we fall in this trap http://container-solutions.com/docker-latest-confusion/ only one image per repo will have this label 4. "alpha-XX.XX" optional, same label used for all repos, so we can select a matching set of images can become beta etc. 5. "release-XX.XX" for when time comes :) Private builds: 1. username + date , where date is YYYY-MM-DD-HH:SS - this will help clean up stale images For all types of builds, additional manual labels are permitted, for instance "demo", "featureX-working". There is virtually no penalty for using multiple labels on an image.
1.0
Use an uniform tagging system across all docker istio images (manager, mixer, proxy) - Build system (jenkins/travis) applies: 1. "date+build#" , where date is YYYY-MM-DD-HH:SS ; required on all images - date is a must giving Bazel build produces incorrect date - build# - keep in mind that Mixer is on travis, manager + proxy + app (runtime) are on Jenkins 2. short SHA - required on all images github search repo with short SHA will find the commit directly, no need to go to the build system as an extra step 3. "latest": to be used only by the build system, only if we apply it explicitly and force it with any new push, otherwise we fall in this trap http://container-solutions.com/docker-latest-confusion/ only one image per repo will have this label 4. "alpha-XX.XX" optional, same label used for all repos, so we can select a matching set of images can become beta etc. 5. "release-XX.XX" for when time comes :) Private builds: 1. username + date , where date is YYYY-MM-DD-HH:SS - this will help clean up stale images For all types of builds, additional manual labels are permitted, for instance "demo", "featureX-working". There is virtually no penalty for using multiple labels on an image.
non_defect
use an uniform tagging system across all docker istio images manager mixer proxy build system jenkins travis applies date build where date is yyyy mm dd hh ss required on all images date is a must giving bazel build produces incorrect date build keep in mind that mixer is on travis manager proxy app runtime are on jenkins short sha required on all images github search repo with short sha will find the commit directly no need to go to the build system as an extra step latest to be used only by the build system only if we apply it explicitly and force it with any new push otherwise we fall in this trap only one image per repo will have this label alpha xx xx optional same label used for all repos so we can select a matching set of images can become beta etc release xx xx for when time comes private builds username date where date is yyyy mm dd hh ss this will help clean up stale images for all types of builds additional manual labels are permitted for instance demo featurex working there is virtually no penalty for using multiple labels on an image
0
18,166
3,031,263,666
IssuesEvent
2015-08-04 21:49:24
dart-lang/sdk
https://api.github.com/repos/dart-lang/sdk
closed
library name when creating a new dart file doesn't respect the dart style guide
Area-Analyzer Fixed Priority-Medium Type-Defect
say i have this file in `lib/bar.dart`: ```dart library bar; import 'dir/foo.dart'; ``` If the import `dir/foo.dart` doesn't exist. I can use alt+enter in webstorm to create the file, and it gives the file the library name: `foo` which I think is very nice, but the style guide says to give `lib/dir/foo.dart` the library name `[packagename].dir.foo`, see: https://www.dartlang.org/articles/style-guide/
1.0
library name when creating a new dart file doesn't respect the dart style guide - say i have this file in `lib/bar.dart`: ```dart library bar; import 'dir/foo.dart'; ``` If the import `dir/foo.dart` doesn't exist. I can use alt+enter in webstorm to create the file, and it gives the file the library name: `foo` which I think is very nice, but the style guide says to give `lib/dir/foo.dart` the library name `[packagename].dir.foo`, see: https://www.dartlang.org/articles/style-guide/
defect
library name when creating a new dart file doesn t respect the dart style guide say i have this file in lib bar dart dart library bar import dir foo dart if the import dir foo dart doesn t exist i can use alt enter in webstorm to create the file and it gives the file the library name foo which i think is very nice but the style guide says to give lib dir foo dart the library name dir foo see
1
21,271
3,479,427,876
IssuesEvent
2015-12-28 20:13:33
innoventsolutions/birt-controls-lib
https://api.github.com/repos/innoventsolutions/birt-controls-lib
closed
How to embed the BIRT in eclip 3.2
auto-migrated Priority-Medium Type-Defect
``` Hi we r using the eclips 3.2 and for report we were using the jasper but now we are planning to use the birt for graphical representation so please do need a help for me how do i use that report in existing working eclips3.2 ``` Original issue reported on code.google.com by `mavinsoo...@gmail.com` on 6 Mar 2012 at 5:18
1.0
How to embed the BIRT in eclip 3.2 - ``` Hi we r using the eclips 3.2 and for report we were using the jasper but now we are planning to use the birt for graphical representation so please do need a help for me how do i use that report in existing working eclips3.2 ``` Original issue reported on code.google.com by `mavinsoo...@gmail.com` on 6 Mar 2012 at 5:18
defect
how to embed the birt in eclip hi we r using the eclips and for report we were using the jasper but now we are planning to use the birt for graphical representation so please do need a help for me how do i use that report in existing working original issue reported on code google com by mavinsoo gmail com on mar at
1