Unnamed: 0 int64 0 832k | id float64 2.49B 32.1B | type stringclasses 1 value | created_at stringlengths 19 19 | repo stringlengths 5 112 | repo_url stringlengths 34 141 | action stringclasses 3 values | title stringlengths 1 757 | labels stringlengths 4 664 | body stringlengths 3 261k | index stringclasses 10 values | text_combine stringlengths 96 261k | label stringclasses 2 values | text stringlengths 96 232k | binary_label int64 0 1 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
170,226 | 14,245,489,923 | IssuesEvent | 2020-11-19 08:44:54 | intelligent-environments-lab/bleed-orange-measure-purple | https://api.github.com/repos/intelligent-environments-lab/bleed-orange-measure-purple | opened | BOMP reliability | documentation enhancement | # Reliability of the BOMP network
A question came up in the poster session regarding how reliable the connectivity of sensors was versus the actual measurement. Another metric we should determine for our network is how reliable the sensors are in terms of staying connected to the Internet.
Assuming the UT IoT network remains online (need to check this somehow), we should be able to see if each sensor is reporting values at a somewhat regular interval. A few numbers we should know:
- percentage of time the sensors have been online (aggregate)
- percentage of time an individual sensor has been online (which PAs are behaving poorly
- the average time that sensors go down for i.e. how long until they reconnect
Other things we should know that aren't necessarily numeric:
- Do we see sensors going offline more often as they continue running?
- Are there any triggers that we can identify that cause our sensors to go offline?
- Were there times when all the sensors went offline? (IoT went down, firmware updates, etc.) | 1.0 | BOMP reliability - # Reliability of the BOMP network
A question came up in the poster session regarding how reliable the connectivity of sensors was versus the actual measurement. Another metric we should determine for our network is how reliable the sensors are in terms of staying connected to the Internet.
Assuming the UT IoT network remains online (need to check this somehow), we should be able to see if each sensor is reporting values at a somewhat regular interval. A few numbers we should know:
- percentage of time the sensors have been online (aggregate)
- percentage of time an individual sensor has been online (which PAs are behaving poorly
- the average time that sensors go down for i.e. how long until they reconnect
Other things we should know that aren't necessarily numeric:
- Do we see sensors going offline more often as they continue running?
- Are there any triggers that we can identify that cause our sensors to go offline?
- Were there times when all the sensors went offline? (IoT went down, firmware updates, etc.) | non_defect | bomp reliability reliability of the bomp network a question came up in the poster session regarding how reliable the connectivity of sensors was versus the actual measurement another metric we should determine for our network is how reliable the sensors are in terms of staying connected to the internet assuming the ut iot network remains online need to check this somehow we should be able to see if each sensor is reporting values at a somewhat regular interval a few numbers we should know percentage of time the sensors have been online aggregate percentage of time an individual sensor has been online which pas are behaving poorly the average time that sensors go down for i e how long until they reconnect other things we should know that aren t necessarily numeric do we see sensors going offline more often as they continue running are there any triggers that we can identify that cause our sensors to go offline were there times when all the sensors went offline iot went down firmware updates etc | 0 |
24,926 | 4,146,537,584 | IssuesEvent | 2016-06-15 00:38:01 | prettydiff/prettydiff | https://api.github.com/repos/prettydiff/prettydiff | closed | Strange behaviour with braces - Beautify JSX | Defect Parsing QA | Unsure if this is the expected behaviour or a bug?
Input:
```
import React from 'react';
import Vote from './Vote';
import Winner from './Winner';
import PureRenderMixin from 'react-addons-pure-render-mixin';
export default React.createClass({
mixins: [PureRenderMixin],
render: function() {
return (
<div>
{
this.props.winner
? <Winner ref='winner' winner={this.props.winner}/>
: <Vote {...this.props}/>
}
</div>
);
}
});
```
Output:
```
import React from 'react';
import Vote from './Vote';
import Winner from './Winner';
import PureRenderMixin from 'react-addons-pure-render-mixin';
export default React.createClass({
mixins: [PureRenderMixin],
render: function () {
return (
<div>
{this.props.winner
? <Winner ref='winner' winner={this.props.winner}/>
: <Vote {...this.props}/>;
} (<--this one)
</div>
);
}
});
```
The brace within the return JSX collapses to the start of the line if the line is empty | 1.0 | Strange behaviour with braces - Beautify JSX - Unsure if this is the expected behaviour or a bug?
Input:
```
import React from 'react';
import Vote from './Vote';
import Winner from './Winner';
import PureRenderMixin from 'react-addons-pure-render-mixin';
export default React.createClass({
mixins: [PureRenderMixin],
render: function() {
return (
<div>
{
this.props.winner
? <Winner ref='winner' winner={this.props.winner}/>
: <Vote {...this.props}/>
}
</div>
);
}
});
```
Output:
```
import React from 'react';
import Vote from './Vote';
import Winner from './Winner';
import PureRenderMixin from 'react-addons-pure-render-mixin';
export default React.createClass({
mixins: [PureRenderMixin],
render: function () {
return (
<div>
{this.props.winner
? <Winner ref='winner' winner={this.props.winner}/>
: <Vote {...this.props}/>;
} (<--this one)
</div>
);
}
});
```
The brace within the return JSX collapses to the start of the line if the line is empty | defect | strange behaviour with braces beautify jsx unsure if this is the expected behaviour or a bug input import react from react import vote from vote import winner from winner import purerendermixin from react addons pure render mixin export default react createclass mixins render function return this props winner output import react from react import vote from vote import winner from winner import purerendermixin from react addons pure render mixin export default react createclass mixins render function return this props winner this one the brace within the return jsx collapses to the start of the line if the line is empty | 1 |
40,319 | 9,955,628,334 | IssuesEvent | 2019-07-05 11:39:03 | vector-im/riot-web | https://api.github.com/repos/vector-im/riot-web | closed | Reactions can trigger stuck notifications if read receipt above own messages | bug defect feature:aggregations feature:reactions phase:2 | 1. Create a room with two people
2. Ensure room is set to noisy notifications
3. Alice sends several messages
4. For every reaction Bob sends, Alice gets a progressively incrementing notification count
* Viewing the room temporarily clears the notification badge, but the count will keep accumulating for the next reaction
5. Bob has to speak and be read by Alice (advancing Alice's read receipt) to clear Alice's notification count
---
We've decided to address this by default disabling notifications for reactions:
- [x] [Propose MSC defining a push rule to ignore reaction events](https://github.com/matrix-org/matrix-doc/pull/2153)
- [x] [Add push rule to Riot to make it available for early testing](https://github.com/matrix-org/matrix-js-sdk/pull/976)
- [x] [Add push rule to Synapse](https://github.com/matrix-org/synapse/pull/5623) | 1.0 | Reactions can trigger stuck notifications if read receipt above own messages - 1. Create a room with two people
2. Ensure room is set to noisy notifications
3. Alice sends several messages
4. For every reaction Bob sends, Alice gets a progressively incrementing notification count
* Viewing the room temporarily clears the notification badge, but the count will keep accumulating for the next reaction
5. Bob has to speak and be read by Alice (advancing Alice's read receipt) to clear Alice's notification count
---
We've decided to address this by default disabling notifications for reactions:
- [x] [Propose MSC defining a push rule to ignore reaction events](https://github.com/matrix-org/matrix-doc/pull/2153)
- [x] [Add push rule to Riot to make it available for early testing](https://github.com/matrix-org/matrix-js-sdk/pull/976)
- [x] [Add push rule to Synapse](https://github.com/matrix-org/synapse/pull/5623) | defect | reactions can trigger stuck notifications if read receipt above own messages create a room with two people ensure room is set to noisy notifications alice sends several messages for every reaction bob sends alice gets a progressively incrementing notification count viewing the room temporarily clears the notification badge but the count will keep accumulating for the next reaction bob has to speak and be read by alice advancing alice s read receipt to clear alice s notification count we ve decided to address this by default disabling notifications for reactions | 1 |
288,835 | 21,723,111,567 | IssuesEvent | 2022-05-11 03:48:26 | Vivipe28/BOG004-md-links | https://api.github.com/repos/Vivipe28/BOG004-md-links | closed | Estructurar el Plan de Acción teniendo en cuenta Milestones e Issues | Pre-work documentation | Crear el plan de acción que permitirá estructurar el proyecto en productos entregables para cada Sprint | 1.0 | Estructurar el Plan de Acción teniendo en cuenta Milestones e Issues - Crear el plan de acción que permitirá estructurar el proyecto en productos entregables para cada Sprint | non_defect | estructurar el plan de acción teniendo en cuenta milestones e issues crear el plan de acción que permitirá estructurar el proyecto en productos entregables para cada sprint | 0 |
644,470 | 20,978,608,370 | IssuesEvent | 2022-03-28 17:31:50 | AY2122S2-CS2103T-W15-3/tp | https://api.github.com/repos/AY2122S2-CS2103T-W15-3/tp | opened | Update content | priority.Medium | - group commands together/flow
- update some commands (w diagrams)
- hyperlink (to go back to content page)
- glossary
- separate section for invalid input and output (with hyperlink back to section)
- add a section to explain how index works under command (For features to refer to it with hyperlink) | 1.0 | Update content - - group commands together/flow
- update some commands (w diagrams)
- hyperlink (to go back to content page)
- glossary
- separate section for invalid input and output (with hyperlink back to section)
- add a section to explain how index works under command (For features to refer to it with hyperlink) | non_defect | update content group commands together flow update some commands w diagrams hyperlink to go back to content page glossary separate section for invalid input and output with hyperlink back to section add a section to explain how index works under command for features to refer to it with hyperlink | 0 |
713,915 | 24,543,357,515 | IssuesEvent | 2022-10-12 06:44:55 | Uninett/Argus-frontend | https://api.github.com/repos/Uninett/Argus-frontend | closed | Make phone number optional in notification profiles | priority: high usability size: small notifications | This issue was suggested by @hmpf and @johannaengland.
Making a phone number optional is necessary for backwards compatibility when api v.2 is in production. Per now it is necessary for error-free communication between backend and frontend. | 1.0 | Make phone number optional in notification profiles - This issue was suggested by @hmpf and @johannaengland.
Making a phone number optional is necessary for backwards compatibility when api v.2 is in production. Per now it is necessary for error-free communication between backend and frontend. | non_defect | make phone number optional in notification profiles this issue was suggested by hmpf and johannaengland making a phone number optional is necessary for backwards compatibility when api v is in production per now it is necessary for error free communication between backend and frontend | 0 |
14,664 | 2,831,387,721 | IssuesEvent | 2015-05-24 15:52:35 | nobodyguy/dslrdashboard | https://api.github.com/repos/nobodyguy/dslrdashboard | closed | Feature Request: Sequence of images | auto-migrated Priority-Medium Type-Defect | ```
Please provide any additional information below.
Hi, I'd like to be able to set up a sequence of images with different exposure
times & settings...
Is this achievable with the time lapse functionality? I don't have an Arduino
and I can't figure out what the LRTimelapse thing does at all!
```
Original issue reported on code.google.com by `dar...@darrenjehan.me.uk` on 24 Jun 2014 at 4:23 | 1.0 | Feature Request: Sequence of images - ```
Please provide any additional information below.
Hi, I'd like to be able to set up a sequence of images with different exposure
times & settings...
Is this achievable with the time lapse functionality? I don't have an Arduino
and I can't figure out what the LRTimelapse thing does at all!
```
Original issue reported on code.google.com by `dar...@darrenjehan.me.uk` on 24 Jun 2014 at 4:23 | defect | feature request sequence of images please provide any additional information below hi i d like to be able to set up a sequence of images with different exposure times settings is this achievable with the time lapse functionality i don t have an arduino and i can t figure out what the lrtimelapse thing does at all original issue reported on code google com by dar darrenjehan me uk on jun at | 1 |
198,977 | 6,979,665,553 | IssuesEvent | 2017-12-12 21:53:10 | PathwayCommons/factoid | https://api.github.com/repos/PathwayCommons/factoid | opened | Tell users that the text is being processed | 1-high-priority enhancement | When submitting a job (aka. text to be interpreted as a fact) there is no "loading wheel" --> The general feeling is: what's going on? Did I actually submit something or not? | 1.0 | Tell users that the text is being processed - When submitting a job (aka. text to be interpreted as a fact) there is no "loading wheel" --> The general feeling is: what's going on? Did I actually submit something or not? | non_defect | tell users that the text is being processed when submitting a job aka text to be interpreted as a fact there is no loading wheel the general feeling is what s going on did i actually submit something or not | 0 |
34,883 | 7,467,591,430 | IssuesEvent | 2018-04-02 15:52:04 | radioactivecricket/PostNukeRP | https://api.github.com/repos/radioactivecricket/PostNukeRP | closed | [Bug] Spelling Errors | Priority-Medium Type-Defect auto-migrated | ```
Unread postby [TBU] CrazyKid » Tue May 07, 2013 3:29 am
Hi,
I have compiled a list of spelling errors on the server.
F2 on personal locker:
Can't misspelled as cant in the "You can't pick this up" message
Community Menu Pending Actions:
Accept Button misspelled as Acept
The "Repair Complete" message when fixing an item:
Complete misspelled as Compleate
On HUD 2:
Experience misspelled as Experiance
Admin menu:
Charge misspelled as charg (x2)
Allow prop punting has two spaces between prop and punting
Under spawn settings, the resource list is misspelled as recource
Shop menu:
Ground-penetrating radar desc, resource-hoarding, hoarding misspelled as hording
Inventory menu:
Pet Raven description doesn't have a period at the end of "He said nevermore"
Pet Pigeon description has pegion spelled as pigion, also doesn't have a period
at the end
AFK chat message:
You may only go AFK every 15 minutes. Minutes misspelled as minuts.
Thanks,
CrazyKid
http://radioactivecricket.com/forums/viewtopic.php?f=15&t=1048
```
Original issue reported on code.google.com by `eldarst...@gmail.com` on 9 May 2013 at 6:16
| 1.0 | [Bug] Spelling Errors - ```
Unread postby [TBU] CrazyKid » Tue May 07, 2013 3:29 am
Hi,
I have compiled a list of spelling errors on the server.
F2 on personal locker:
Can't misspelled as cant in the "You can't pick this up" message
Community Menu Pending Actions:
Accept Button misspelled as Acept
The "Repair Complete" message when fixing an item:
Complete misspelled as Compleate
On HUD 2:
Experience misspelled as Experiance
Admin menu:
Charge misspelled as charg (x2)
Allow prop punting has two spaces between prop and punting
Under spawn settings, the resource list is misspelled as recource
Shop menu:
Ground-penetrating radar desc, resource-hoarding, hoarding misspelled as hording
Inventory menu:
Pet Raven description doesn't have a period at the end of "He said nevermore"
Pet Pigeon description has pegion spelled as pigion, also doesn't have a period
at the end
AFK chat message:
You may only go AFK every 15 minutes. Minutes misspelled as minuts.
Thanks,
CrazyKid
http://radioactivecricket.com/forums/viewtopic.php?f=15&t=1048
```
Original issue reported on code.google.com by `eldarst...@gmail.com` on 9 May 2013 at 6:16
| defect | spelling errors unread postby crazykid » tue may am hi i have compiled a list of spelling errors on the server on personal locker can t misspelled as cant in the you can t pick this up message community menu pending actions accept button misspelled as acept the repair complete message when fixing an item complete misspelled as compleate on hud experience misspelled as experiance admin menu charge misspelled as charg allow prop punting has two spaces between prop and punting under spawn settings the resource list is misspelled as recource shop menu ground penetrating radar desc resource hoarding hoarding misspelled as hording inventory menu pet raven description doesn t have a period at the end of he said nevermore pet pigeon description has pegion spelled as pigion also doesn t have a period at the end afk chat message you may only go afk every minutes minutes misspelled as minuts thanks crazykid original issue reported on code google com by eldarst gmail com on may at | 1 |
346,845 | 31,028,181,606 | IssuesEvent | 2023-08-10 10:33:54 | FlaschenbookProject/Flashenbook | https://api.github.com/repos/FlaschenbookProject/Flashenbook | closed | 책 평점, 리뷰 내용 스크래핑 테스트 | ✅ Test | ### Issue 타입 ('x' 로 표기)
- [ ] 🍕 Feature
- [ ] 🐛 Bug Fix
- [x] 📝 Documentation Update
- [ ] 🎨 Style
- [ ] 🧑💻 Code Refactor
- [ ] 🔥 Performance Improvements
- [ ] ✅ Test
- [ ] 🤖 Build
- [ ] 🔁 CI
- [x] 📦 Chore (Release)
- [ ] ⏩ Revert (Rollback)
### 상세 내용
- 스크래핑을 할 홈페이지에서 리뷰를 어떻게 스크래핑할지 정리합니다.
- 원하는 정보(평점, 리뷰 내용)을 모두 스크래핑 가능한지 테스트합니다.
### 예상 소요 시간
- [ ] `0.5h`
- [ ] `1h`
- [ ] `1.5h`
- [ ] `2h`
- [ ] `2.5h`
- [x] `3h`
### 참고사항
| 1.0 | 책 평점, 리뷰 내용 스크래핑 테스트 - ### Issue 타입 ('x' 로 표기)
- [ ] 🍕 Feature
- [ ] 🐛 Bug Fix
- [x] 📝 Documentation Update
- [ ] 🎨 Style
- [ ] 🧑💻 Code Refactor
- [ ] 🔥 Performance Improvements
- [ ] ✅ Test
- [ ] 🤖 Build
- [ ] 🔁 CI
- [x] 📦 Chore (Release)
- [ ] ⏩ Revert (Rollback)
### 상세 내용
- 스크래핑을 할 홈페이지에서 리뷰를 어떻게 스크래핑할지 정리합니다.
- 원하는 정보(평점, 리뷰 내용)을 모두 스크래핑 가능한지 테스트합니다.
### 예상 소요 시간
- [ ] `0.5h`
- [ ] `1h`
- [ ] `1.5h`
- [ ] `2h`
- [ ] `2.5h`
- [x] `3h`
### 참고사항
| non_defect | 책 평점 리뷰 내용 스크래핑 테스트 issue 타입 x 로 표기 🍕 feature 🐛 bug fix 📝 documentation update 🎨 style 🧑💻 code refactor 🔥 performance improvements ✅ test 🤖 build 🔁 ci 📦 chore release ⏩ revert rollback 상세 내용 스크래핑을 할 홈페이지에서 리뷰를 어떻게 스크래핑할지 정리합니다 원하는 정보 평점 리뷰 내용 을 모두 스크래핑 가능한지 테스트합니다 예상 소요 시간 참고사항 | 0 |
45,551 | 12,853,970,522 | IssuesEvent | 2020-07-09 00:23:31 | beefproject/beef | https://api.github.com/repos/beefproject/beef | closed | Check ruby version before installing `ruby-dev` | Defect Install Priority Low | I have a proposition rather than a real issue.
I have Ubuntu 16.04 and I used `snap` to install `ruby 2.6.1`. When beef install process is launched ( `./install`), it installs `ruby-dev` which will install `ruby2.3`. When checking ruby installed version, it will find `ruby2.3` instead of `ruby2.6.1` (because of the path priority). So `./install` will quit after showing this :
>[FATAL] Ruby version 2.3.1 is not supported. Please install Ruby 2.4 (or newer) and restart the installer.
Even if we add the repository `ppa:brightbox/ruby-ng` and install `ruby2.5-dev`, the installation process will fail.
So I think it would be better to check ruby installed version before installing `ruby-dev` package.
PS : `beef` rocks. | 1.0 | Check ruby version before installing `ruby-dev` - I have a proposition rather than a real issue.
I have Ubuntu 16.04 and I used `snap` to install `ruby 2.6.1`. When beef install process is launched ( `./install`), it installs `ruby-dev` which will install `ruby2.3`. When checking ruby installed version, it will find `ruby2.3` instead of `ruby2.6.1` (because of the path priority). So `./install` will quit after showing this :
>[FATAL] Ruby version 2.3.1 is not supported. Please install Ruby 2.4 (or newer) and restart the installer.
Even if we add the repository `ppa:brightbox/ruby-ng` and install `ruby2.5-dev`, the installation process will fail.
So I think it would be better to check ruby installed version before installing `ruby-dev` package.
PS : `beef` rocks. | defect | check ruby version before installing ruby dev i have a proposition rather than a real issue i have ubuntu and i used snap to install ruby when beef install process is launched install it installs ruby dev which will install when checking ruby installed version it will find instead of because of the path priority so install will quit after showing this ruby version is not supported please install ruby or newer and restart the installer even if we add the repository ppa brightbox ruby ng and install dev the installation process will fail so i think it would be better to check ruby installed version before installing ruby dev package ps beef rocks | 1 |
2,007 | 2,603,974,913 | IssuesEvent | 2015-02-24 19:01:16 | chrsmith/nishazi6 | https://api.github.com/repos/chrsmith/nishazi6 | opened | 沈阳特效治疗疱疹 | auto-migrated Priority-Medium Type-Defect | ```
沈阳特效治疗疱疹〓沈陽軍區政治部醫院性病〓TEL:024-3102330
8〓成立于1946年,68年專注于性傳播疾病的研究和治療。位于�
��陽市沈河區二緯路32號。是一所與新中國同建立共輝煌的歷�
��悠久、設備精良、技術權威、專家云集,是預防、保健、醫
療、科研康復為一體的綜合性醫院。是國家首批公立甲等部��
�醫院、全國首批醫療規范定點單位,是第四軍醫大學、東南�
��學等知名高等院校的教學醫院。曾被中國人民解放軍空軍后
勤部衛生部評為衛生工作先進單位,先后兩次榮立集體二等��
�。
```
-----
Original issue reported on code.google.com by `q964105...@gmail.com` on 4 Jun 2014 at 8:13 | 1.0 | 沈阳特效治疗疱疹 - ```
沈阳特效治疗疱疹〓沈陽軍區政治部醫院性病〓TEL:024-3102330
8〓成立于1946年,68年專注于性傳播疾病的研究和治療。位于�
��陽市沈河區二緯路32號。是一所與新中國同建立共輝煌的歷�
��悠久、設備精良、技術權威、專家云集,是預防、保健、醫
療、科研康復為一體的綜合性醫院。是國家首批公立甲等部��
�醫院、全國首批醫療規范定點單位,是第四軍醫大學、東南�
��學等知名高等院校的教學醫院。曾被中國人民解放軍空軍后
勤部衛生部評為衛生工作先進單位,先后兩次榮立集體二等��
�。
```
-----
Original issue reported on code.google.com by `q964105...@gmail.com` on 4 Jun 2014 at 8:13 | defect | 沈阳特效治疗疱疹 沈阳特效治疗疱疹〓沈陽軍區政治部醫院性病〓tel: 〓 , 。位于� �� 。是一所與新中國同建立共輝煌的歷� ��悠久、設備精良、技術權威、專家云集,是預防、保健、醫 療、科研康復為一體的綜合性醫院。是國家首批公立甲等部�� �醫院、全國首批醫療規范定點單位,是第四軍醫大學、東南� ��學等知名高等院校的教學醫院。曾被中國人民解放軍空軍后 勤部衛生部評為衛生工作先進單位,先后兩次榮立集體二等�� �。 original issue reported on code google com by gmail com on jun at | 1 |
730,686 | 25,185,413,880 | IssuesEvent | 2022-11-11 17:26:30 | craftercms/craftercms | https://api.github.com/repos/craftercms/craftercms | closed | [docs] Update the marketplace screenshots once the new marketplace is live | priority: medium quality validate | ### Duplicates
- [X] I have searched the existing issues
### Is your feature request related to a problem? Please describe.
The old Marketplace is being retired in favor of a new one.
### Describe the solution you'd like
Please update this article accordingly https://docs.craftercms.org/en/4.0/developers/extensions/craftercms-marketplace.html#create-extensions-for-the-craftercms-marketplace | 1.0 | [docs] Update the marketplace screenshots once the new marketplace is live - ### Duplicates
- [X] I have searched the existing issues
### Is your feature request related to a problem? Please describe.
The old Marketplace is being retired in favor of a new one.
### Describe the solution you'd like
Please update this article accordingly https://docs.craftercms.org/en/4.0/developers/extensions/craftercms-marketplace.html#create-extensions-for-the-craftercms-marketplace | non_defect | update the marketplace screenshots once the new marketplace is live duplicates i have searched the existing issues is your feature request related to a problem please describe the old marketplace is being retired in favor of a new one describe the solution you d like please update this article accordingly | 0 |
48,561 | 13,136,458,959 | IssuesEvent | 2020-08-07 06:09:43 | cakephp/cakephp | https://api.github.com/repos/cakephp/cakephp | closed | Asserting email subject in EmailTrait | defect testing | * [x] enhancement
* CakePHP Version: 4.1.1
Hello,
I'm looking for the possibility of asserting the email **subject** in EmailTrait.
In the docs https://book.cakephp.org/4/en/core-libraries/email.html#email-testing, there is stated: "We want to check that the **subject** and body contain the user’s name:" - but the example does not assert the subject, it only uses "assertMailContainsText".
I digged deeper and found another misleading line of code:
https://github.com/cakephp/cakephp/blob/ffa1fa5715e3569d30a4e07d0ff8e6c035ef3781/src/TestSuite/EmailTrait.php#L153
It assumes, that "subject" can be asserted with the "$parameter" argument - but as the assertMethod uses "MailSentWith" it cannot work.
So my question is:
Is there any way to assert the subject of an email? And if not, is such a feature planned? I would suggest a new class "MailSubject", extending "MailConstraintBase".
I could make a PR if you want.
| 1.0 | Asserting email subject in EmailTrait - * [x] enhancement
* CakePHP Version: 4.1.1
Hello,
I'm looking for the possibility of asserting the email **subject** in EmailTrait.
In the docs https://book.cakephp.org/4/en/core-libraries/email.html#email-testing, there is stated: "We want to check that the **subject** and body contain the user’s name:" - but the example does not assert the subject, it only uses "assertMailContainsText".
I digged deeper and found another misleading line of code:
https://github.com/cakephp/cakephp/blob/ffa1fa5715e3569d30a4e07d0ff8e6c035ef3781/src/TestSuite/EmailTrait.php#L153
It assumes, that "subject" can be asserted with the "$parameter" argument - but as the assertMethod uses "MailSentWith" it cannot work.
So my question is:
Is there any way to assert the subject of an email? And if not, is such a feature planned? I would suggest a new class "MailSubject", extending "MailConstraintBase".
I could make a PR if you want.
| defect | asserting email subject in emailtrait enhancement cakephp version hello i m looking for the possibility of asserting the email subject in emailtrait in the docs there is stated we want to check that the subject and body contain the user’s name but the example does not assert the subject it only uses assertmailcontainstext i digged deeper and found another misleading line of code it assumes that subject can be asserted with the parameter argument but as the assertmethod uses mailsentwith it cannot work so my question is is there any way to assert the subject of an email and if not is such a feature planned i would suggest a new class mailsubject extending mailconstraintbase i could make a pr if you want | 1 |
16,821 | 2,948,317,273 | IssuesEvent | 2015-07-06 01:25:13 | Winetricks/winetricks | https://api.github.com/repos/Winetricks/winetricks | closed | dotnet35sp1 refuses to run | auto-migrated Priority-Medium Type-Defect | ```
Running dotnet35sp1, after working around
http://bugs.winehq.org/show_bug.cgi?id=32156 works fine except for the
installation of dotnet35sp1 itself.
The application states that it will only run in Windows XP. It looks as if the
script sets the version to 2000 to run the other installers, but doesn't swap
back before launching the SP1 installer.
I don't know how to use svn, but the attached patch worked for me.
```
Original issue reported on code.google.com by `ImWellCu...@googlemail.com` on 7 Nov 2012 at 7:23
Attachments:
* [winetricks-dotnet35sp1.diff](https://storage.googleapis.com/google-code-attachments/winetricks/issue-286/comment-0/winetricks-dotnet35sp1.diff)
| 1.0 | dotnet35sp1 refuses to run - ```
Running dotnet35sp1, after working around
http://bugs.winehq.org/show_bug.cgi?id=32156 works fine except for the
installation of dotnet35sp1 itself.
The application states that it will only run in Windows XP. It looks as if the
script sets the version to 2000 to run the other installers, but doesn't swap
back before launching the SP1 installer.
I don't know how to use svn, but the attached patch worked for me.
```
Original issue reported on code.google.com by `ImWellCu...@googlemail.com` on 7 Nov 2012 at 7:23
Attachments:
* [winetricks-dotnet35sp1.diff](https://storage.googleapis.com/google-code-attachments/winetricks/issue-286/comment-0/winetricks-dotnet35sp1.diff)
| defect | refuses to run running after working around works fine except for the installation of itself the application states that it will only run in windows xp it looks as if the script sets the version to to run the other installers but doesn t swap back before launching the installer i don t know how to use svn but the attached patch worked for me original issue reported on code google com by imwellcu googlemail com on nov at attachments | 1 |
147,315 | 5,637,309,699 | IssuesEvent | 2017-04-06 08:50:20 | mantidproject/mslice | https://api.github.com/repos/mantidproject/mslice | closed | Set E/Q mininum bin size | bug duplicate High priority | E/Q bins should not be set smaller than in original data.
At present they can be set arbitrarily small, which can lead to memory problems, and also means the represented data is not accurate, because bins which have been subdivided will appear as a pixel with counts in the centre and `NAN`s outside.
Ideally, `mslice` should snap to smallest bin in the data file. | 1.0 | Set E/Q mininum bin size - E/Q bins should not be set smaller than in original data.
At present they can be set arbitrarily small, which can lead to memory problems, and also means the represented data is not accurate, because bins which have been subdivided will appear as a pixel with counts in the centre and `NAN`s outside.
Ideally, `mslice` should snap to smallest bin in the data file. | non_defect | set e q mininum bin size e q bins should not be set smaller than in original data at present they can be set arbitrarily small which can lead to memory problems and also means the represented data is not accurate because bins which have been subdivided will appear as a pixel with counts in the centre and nan s outside ideally mslice should snap to smallest bin in the data file | 0 |
60,274 | 17,023,385,518 | IssuesEvent | 2021-07-03 01:45:23 | tomhughes/trac-tickets | https://api.github.com/repos/tomhughes/trac-tickets | closed | mapnik not displaying ferry lines on reasonable zoom levels | Component: mapnik Priority: major Resolution: fixed Type: defect | **[Submitted to the original trac issue database at 10.33pm, Thursday, 16th April 2009]**
mapnik not displaying ferry lines on reasonable zoom levels
http://www.openstreetmap.org/?lat=41.762&lon=12.005&zoom=11&layers=B000FTF
they are displayed just from 11-18, but should at least be displayed until zoom 6. Look at the indicated place and zoom out (it's a problem in the whole mediterranian area) | 1.0 | mapnik not displaying ferry lines on reasonable zoom levels - **[Submitted to the original trac issue database at 10.33pm, Thursday, 16th April 2009]**
mapnik not displaying ferry lines on reasonable zoom levels
http://www.openstreetmap.org/?lat=41.762&lon=12.005&zoom=11&layers=B000FTF
they are displayed just from 11-18, but should at least be displayed until zoom 6. Look at the indicated place and zoom out (it's a problem in the whole mediterranian area) | defect | mapnik not displaying ferry lines on reasonable zoom levels mapnik not displaying ferry lines on reasonable zoom levels they are displayed just from but should at least be displayed until zoom look at the indicated place and zoom out it s a problem in the whole mediterranian area | 1 |
33,270 | 7,065,681,621 | IssuesEvent | 2018-01-06 23:15:29 | bridgedotnet/Bridge | https://api.github.com/repos/bridgedotnet/Bridge | closed | Wrong DateTime kind for DateTime.Date value | defect | A description of the issue.
### Steps To Reproduce
https://dev.deck.net/a151f2f3e3e7bb9cf47fbcd03f952221
dotnetfiddle is down.. so console application output (.Net 4.7):
```
01/01/2018 00:00:00
Utc
01/01/2018 00:00:00
Utc
Press any key to continue . . .
```
```csharp
public class Program
{
public static void Main()
{
DateTime time = new DateTime(2018, 1, 1, 0, 0, 0, DateTimeKind.Utc);
Console.WriteLine(time.ToString());
Console.WriteLine(time.Kind.ToString());
Console.WriteLine();
Console.WriteLine(time.Date.ToString());
Console.WriteLine(time.Date.Kind.ToString());
}
}
```
### Expected Result
```
01/01/2018 00:00:00
Utc
01/01/2018 00:00:00
Utc
```
### Actual Result
```
01/01/2018 00:00:00
Utc
12/31/2017 21:00:00
Utc
```
| 1.0 | Wrong DateTime kind for DateTime.Date value - A description of the issue.
### Steps To Reproduce
https://dev.deck.net/a151f2f3e3e7bb9cf47fbcd03f952221
dotnetfiddle is down.. so console application output (.Net 4.7):
```
01/01/2018 00:00:00
Utc
01/01/2018 00:00:00
Utc
Press any key to continue . . .
```
```csharp
public class Program
{
public static void Main()
{
DateTime time = new DateTime(2018, 1, 1, 0, 0, 0, DateTimeKind.Utc);
Console.WriteLine(time.ToString());
Console.WriteLine(time.Kind.ToString());
Console.WriteLine();
Console.WriteLine(time.Date.ToString());
Console.WriteLine(time.Date.Kind.ToString());
}
}
```
### Expected Result
```
01/01/2018 00:00:00
Utc
01/01/2018 00:00:00
Utc
```
### Actual Result
```
01/01/2018 00:00:00
Utc
12/31/2017 21:00:00
Utc
```
| defect | wrong datetime kind for datetime date value a description of the issue steps to reproduce dotnetfiddle is down so console application output net utc utc press any key to continue csharp public class program public static void main datetime time new datetime datetimekind utc console writeline time tostring console writeline time kind tostring console writeline console writeline time date tostring console writeline time date kind tostring expected result utc utc actual result utc utc | 1 |
255,618 | 8,125,827,789 | IssuesEvent | 2018-08-16 22:31:22 | aowen87/BAR | https://api.github.com/repos/aowen87/BAR | closed | Cannot use OnionPeel with Subset plot of AMR mesh. | Bug Likelihood: 2 - Rare Priority: Normal Severity: 4 - Crash / Wrong Results | Open samrai_test_data/mats-par3/dumps.visit
A default wireframe Subset plot will be created.
From picking, I discovered that Node 61 of level 0 has logical index 1, 4, 6
Open OnionPeel attributes window.
Select levels->level0 for category and set
Select Node for seed
Use 1 4 6 for index.
Apply
Draw.
Will get message:
ERROR: Subset: (LogicalIndexException)
viewer: A Logical Index can only be used with structured data.
Change index to '61' (single value suggests non-logical index).
Apply
Draw.
Will get message:
ERROR: Subset: (LogicalIndexException)
viewer: A logical index (i, j, [k]) is expected for this operation
-----------------------REDMINE MIGRATION-----------------------
This ticket was migrated from Redmine. As such, not all
information was able to be captured in the transition. Below is
a complete record of the original redmine ticket.
Ticket number: 2155
Status: Resolved
Project: VisIt
Tracker: Bug
Priority: Normal
Subject: Cannot use OnionPeel with Subset plot of AMR mesh.
Assigned to: Kathleen Biagas
Category:
Target version: 2.9.1
Author: Kathleen Biagas
Start: 02/19/2015
Due date:
% Done: 100
Estimated time: 4.0
Created: 02/19/2015 06:35 pm
Updated: 03/23/2015 08:35 pm
Likelihood: 2 - Rare
Severity: 4 - Crash / Wrong Results
Found in version: 2.8.2
Impact:
Expected Use:
OS: All
Support Group: Any
Description:
Open samrai_test_data/mats-par3/dumps.visit
A default wireframe Subset plot will be created.
From picking, I discovered that Node 61 of level 0 has logical index 1, 4, 6
Open OnionPeel attributes window.
Select levels->level0 for category and set
Select Node for seed
Use 1 4 6 for index.
Apply
Draw.
Will get message:
ERROR: Subset: (LogicalIndexException)
viewer: A Logical Index can only be used with structured data.
Change index to '61' (single value suggests non-logical index).
Apply
Draw.
Will get message:
ERROR: Subset: (LogicalIndexException)
viewer: A logical index (i, j, [k]) is expected for this operation
Comments:
Another note, I turn off the 'wireframe' and 'draw internal surfaces' options for the subset plot before applying Onion Peel.avtOnionPeelFilter::VerifyInput throws an exception if the category's SIL role is type SIL_BLOCK and the index is not considered logical.However, during ::ExecuteData, an exception is thrown if the index is logical and the dataset is neither a VTK_STRUCTURED_GRID nor VTK_RECTILINEAR_GRID.When I see this Logical-Index failure, the dataset type is Unstructured.If I first use 'patches' for category,'leve0,patch1' for set, and '1 4 1' for index, OnionPeel succeeds. I can then switch back to previous OnionPeel settings and get OnionPeel to succeed again.
For 'levels', can have OnionPeel request ghost zones (not nodes, zones gives better results) and StructuredIndices, and then it will work.For 'patches', still receiving unstructured grid as input (I believe conversion happens during ghost communication).
Modified OnionPeel filter to always request GhostZone data if logical index is used, but never GhostNode data (not really helpful). Also request StructuredIndices.2.9RC update 26057, trunk 26059M /src/operators/OnionPeel/avtOnionPeelFilter.C
| 1.0 | Cannot use OnionPeel with Subset plot of AMR mesh. - Open samrai_test_data/mats-par3/dumps.visit
A default wireframe Subset plot will be created.
From picking, I discovered that Node 61 of level 0 has logical index 1, 4, 6
Open OnionPeel attributes window.
Select levels->level0 for category and set
Select Node for seed
Use 1 4 6 for index.
Apply
Draw.
Will get message:
ERROR: Subset: (LogicalIndexException)
viewer: A Logical Index can only be used with structured data.
Change index to '61' (single value suggests non-logical index).
Apply
Draw.
Will get message:
ERROR: Subset: (LogicalIndexException)
viewer: A logical index (i, j, [k]) is expected for this operation
-----------------------REDMINE MIGRATION-----------------------
This ticket was migrated from Redmine. As such, not all
information was able to be captured in the transition. Below is
a complete record of the original redmine ticket.
Ticket number: 2155
Status: Resolved
Project: VisIt
Tracker: Bug
Priority: Normal
Subject: Cannot use OnionPeel with Subset plot of AMR mesh.
Assigned to: Kathleen Biagas
Category:
Target version: 2.9.1
Author: Kathleen Biagas
Start: 02/19/2015
Due date:
% Done: 100
Estimated time: 4.0
Created: 02/19/2015 06:35 pm
Updated: 03/23/2015 08:35 pm
Likelihood: 2 - Rare
Severity: 4 - Crash / Wrong Results
Found in version: 2.8.2
Impact:
Expected Use:
OS: All
Support Group: Any
Description:
Open samrai_test_data/mats-par3/dumps.visit
A default wireframe Subset plot will be created.
From picking, I discovered that Node 61 of level 0 has logical index 1, 4, 6
Open OnionPeel attributes window.
Select levels->level0 for category and set
Select Node for seed
Use 1 4 6 for index.
Apply
Draw.
Will get message:
ERROR: Subset: (LogicalIndexException)
viewer: A Logical Index can only be used with structured data.
Change index to '61' (single value suggests non-logical index).
Apply
Draw.
Will get message:
ERROR: Subset: (LogicalIndexException)
viewer: A logical index (i, j, [k]) is expected for this operation
Comments:
Another note, I turn off the 'wireframe' and 'draw internal surfaces' options for the subset plot before applying Onion Peel.avtOnionPeelFilter::VerifyInput throws an exception if the category's SIL role is type SIL_BLOCK and the index is not considered logical.However, during ::ExecuteData, an exception is thrown if the index is logical and the dataset is neither a VTK_STRUCTURED_GRID nor VTK_RECTILINEAR_GRID.When I see this Logical-Index failure, the dataset type is Unstructured.If I first use 'patches' for category,'leve0,patch1' for set, and '1 4 1' for index, OnionPeel succeeds. I can then switch back to previous OnionPeel settings and get OnionPeel to succeed again.
For 'levels', can have OnionPeel request ghost zones (not nodes, zones gives better results) and StructuredIndices, and then it will work.For 'patches', still receiving unstructured grid as input (I believe conversion happens during ghost communication).
Modified OnionPeel filter to always request GhostZone data if logical index is used, but never GhostNode data (not really helpful). Also request StructuredIndices.2.9RC update 26057, trunk 26059M /src/operators/OnionPeel/avtOnionPeelFilter.C
| non_defect | cannot use onionpeel with subset plot of amr mesh open samrai test data mats dumps visit a default wireframe subset plot will be created from picking i discovered that node of level has logical index open onionpeel attributes window select levels for category and set select node for seed use for index apply draw will get message error subset logicalindexexception viewer a logical index can only be used with structured data change index to single value suggests non logical index apply draw will get message error subset logicalindexexception viewer a logical index i j is expected for this operation redmine migration this ticket was migrated from redmine as such not all information was able to be captured in the transition below is a complete record of the original redmine ticket ticket number status resolved project visit tracker bug priority normal subject cannot use onionpeel with subset plot of amr mesh assigned to kathleen biagas category target version author kathleen biagas start due date done estimated time created pm updated pm likelihood rare severity crash wrong results found in version impact expected use os all support group any description open samrai test data mats dumps visit a default wireframe subset plot will be created from picking i discovered that node of level has logical index open onionpeel attributes window select levels for category and set select node for seed use for index apply draw will get message error subset logicalindexexception viewer a logical index can only be used with structured data change index to single value suggests non logical index apply draw will get message error subset logicalindexexception viewer a logical index i j is expected for this operation comments another note i turn off the wireframe and draw internal surfaces options for the subset plot before applying onion peel avtonionpeelfilter verifyinput throws an exception if the category s sil role is type sil block and the index is not considered logical however during executedata an exception is thrown if the index is logical and the dataset is neither a vtk structured grid nor vtk rectilinear grid when i see this logical index failure the dataset type is unstructured if i first use patches for category for set and for index onionpeel succeeds i can then switch back to previous onionpeel settings and get onionpeel to succeed again for levels can have onionpeel request ghost zones not nodes zones gives better results and structuredindices and then it will work for patches still receiving unstructured grid as input i believe conversion happens during ghost communication modified onionpeel filter to always request ghostzone data if logical index is used but never ghostnode data not really helpful also request structuredindices update trunk src operators onionpeel avtonionpeelfilter c | 0 |
52,378 | 13,224,707,144 | IssuesEvent | 2020-08-17 19:40:57 | icecube-trac/tix4 | https://api.github.com/repos/icecube-trac/tix4 | opened | [IceHive] - HiveCleaning::BuildLookUpTables segfaults with IceACT in geometry (Trac #2134) | Incomplete Migration Migrated from Trac combo reconstruction defect | <details>
<summary><em>Migrated from <a href="https://code.icecube.wisc.edu/projects/icecube/ticket/2134">https://code.icecube.wisc.edu/projects/icecube/ticket/2134</a>, reported by kjmeagherand owned by kkrings</em></summary>
<p>
```json
{
"status": "closed",
"changetime": "2019-02-13T14:15:13",
"_ts": "1550067313248429",
"description": "IceHive segfaults when IceACT is included in the geometry. It assumes the strings are >0 when calculating the hash function: http://code.icecube.wisc.edu/projects/icecube/browser/IceCube/projects/IceHive/trunk/public/IceHive/OMKeyHash.h#L64\n\nsee:\nhttps://icecube-spno.slack.com/archives/C02KQL9KN/p1518116966000686\n\n",
"reporter": "kjmeagher",
"cc": "mzoll",
"resolution": "fixed",
"time": "2018-02-08T19:42:57",
"component": "combo reconstruction",
"summary": "[IceHive] - HiveCleaning::BuildLookUpTables segfaults with IceACT in geometry",
"priority": "critical",
"keywords": "segfault icehive hivesplitter",
"milestone": "",
"owner": "kkrings",
"type": "defect"
}
```
</p>
</details>
| 1.0 | [IceHive] - HiveCleaning::BuildLookUpTables segfaults with IceACT in geometry (Trac #2134) - <details>
<summary><em>Migrated from <a href="https://code.icecube.wisc.edu/projects/icecube/ticket/2134">https://code.icecube.wisc.edu/projects/icecube/ticket/2134</a>, reported by kjmeagherand owned by kkrings</em></summary>
<p>
```json
{
"status": "closed",
"changetime": "2019-02-13T14:15:13",
"_ts": "1550067313248429",
"description": "IceHive segfaults when IceACT is included in the geometry. It assumes the strings are >0 when calculating the hash function: http://code.icecube.wisc.edu/projects/icecube/browser/IceCube/projects/IceHive/trunk/public/IceHive/OMKeyHash.h#L64\n\nsee:\nhttps://icecube-spno.slack.com/archives/C02KQL9KN/p1518116966000686\n\n",
"reporter": "kjmeagher",
"cc": "mzoll",
"resolution": "fixed",
"time": "2018-02-08T19:42:57",
"component": "combo reconstruction",
"summary": "[IceHive] - HiveCleaning::BuildLookUpTables segfaults with IceACT in geometry",
"priority": "critical",
"keywords": "segfault icehive hivesplitter",
"milestone": "",
"owner": "kkrings",
"type": "defect"
}
```
</p>
</details>
| defect | hivecleaning buildlookuptables segfaults with iceact in geometry trac migrated from json status closed changetime ts description icehive segfaults when iceact is included in the geometry it assumes the strings are when calculating the hash function reporter kjmeagher cc mzoll resolution fixed time component combo reconstruction summary hivecleaning buildlookuptables segfaults with iceact in geometry priority critical keywords segfault icehive hivesplitter milestone owner kkrings type defect | 1 |
530,372 | 15,421,828,160 | IssuesEvent | 2021-03-05 13:36:30 | Systems-Learning-and-Development-Lab/MMM | https://api.github.com/repos/Systems-Learning-and-Development-Lab/MMM | closed | Brush cursor should change icon to indicate what it is drawing/erasing | enhancement priority-high | There are currently a few entities that the brush can draw and erase, which include:
wall, ball, counter, halo, trace
The brush cursor should change shape depending on what the content is, and also indicate if it is drawing or erasing.
Instead of the pen icon as the cursor, it can become a halo shape when adding halos, and the color of the halo can indicate if it is adding or removing halos.
https://github.com/Systems-Learning-and-Development-Lab/MMM/issues/45#issue-821303683 | 1.0 | Brush cursor should change icon to indicate what it is drawing/erasing - There are currently a few entities that the brush can draw and erase, which include:
wall, ball, counter, halo, trace
The brush cursor should change shape depending on what the content is, and also indicate if it is drawing or erasing.
Instead of the pen icon as the cursor, it can become a halo shape when adding halos, and the color of the halo can indicate if it is adding or removing halos.
https://github.com/Systems-Learning-and-Development-Lab/MMM/issues/45#issue-821303683 | non_defect | brush cursor should change icon to indicate what it is drawing erasing there are currently a few entities that the brush can draw and erase which include wall ball counter halo trace the brush cursor should change shape depending on what the content is and also indicate if it is drawing or erasing instead of the pen icon as the cursor it can become a halo shape when adding halos and the color of the halo can indicate if it is adding or removing halos | 0 |
27,130 | 11,441,604,948 | IssuesEvent | 2020-02-05 12:03:41 | NixOS/nixpkgs | https://api.github.com/repos/NixOS/nixpkgs | closed | Vulnerability roundup 77: ghostscript-9.26: 2 advisories | 1.severity: security | [search](https://search.nix.gsc.io/?q=ghostscript&i=fosho&repos=NixOS-nixpkgs), [files](https://github.com/NixOS/nixpkgs/search?utf8=%E2%9C%93&q=ghostscript+in%3Apath&type=Code)
* [ ] [CVE-2019-3835](https://nvd.nist.gov/vuln/detail/CVE-2019-3835) (nixos-19.09)
* [ ] [CVE-2019-3838](https://nvd.nist.gov/vuln/detail/CVE-2019-3838) (nixos-19.09)
Scanned versions: nixos-19.09: 5f506b95f9f. May contain false positives.
| True | Vulnerability roundup 77: ghostscript-9.26: 2 advisories - [search](https://search.nix.gsc.io/?q=ghostscript&i=fosho&repos=NixOS-nixpkgs), [files](https://github.com/NixOS/nixpkgs/search?utf8=%E2%9C%93&q=ghostscript+in%3Apath&type=Code)
* [ ] [CVE-2019-3835](https://nvd.nist.gov/vuln/detail/CVE-2019-3835) (nixos-19.09)
* [ ] [CVE-2019-3838](https://nvd.nist.gov/vuln/detail/CVE-2019-3838) (nixos-19.09)
Scanned versions: nixos-19.09: 5f506b95f9f. May contain false positives.
| non_defect | vulnerability roundup ghostscript advisories nixos nixos scanned versions nixos may contain false positives | 0 |
74,999 | 25,474,854,145 | IssuesEvent | 2022-11-25 13:31:32 | hazelcast/hazelcast-cpp-client | https://api.github.com/repos/hazelcast/hazelcast-cpp-client | closed | Occasional assertion failure in hazelcast::cp::internal::session::proxy_session_manager::create_new_session() [API-1501] | Type: Defect Source: Community to-jira | C++ compiler version: g++ 7.3.1
Hazelcast Cpp client version: 5.0.0
OS version (Windows/Linux/OSX): Linux
```
/hazelcast-cpp-client-5.0.0/hazelcast/src/hazelcast/cp/cp_impl.cpp:73: std::unordered_map<hazelcast::cp::raft_group_id, hazelcast::cp::internal::session::proxy_session_manager::session_state>::iterator hazelcast::cp::internal::session::proxy_session_manager::create_new_session(const hazelcast::cp::raft_group_id&): Assertion `result.second' failed.
```
```
Thread 38 (Thread 0x7f42687f0700 (LWP 300907)):
#0 0x00007f428a35f1ff in select () from /lib64/libc.so.6
#1 0x00000000004630e3 in segv_handler (sig=6, info=<optimized out>)
#2 <signal handler called>
#3 0x00007f428a286a9f in raise () from /lib64/libc.so.6
#4 0x00007f428a259e05 in abort () from /lib64/libc.so.6
#5 0x00007f428a259cd9 in __assert_fail_base.cold.0 () from /lib64/libc.so.6
#6 0x00007f428a27f3f6 in __assert_fail () from /lib64/libc.so.6
#7 0x00007f428c11994c in hazelcast::cp::internal::session::proxy_session_manager::create_new_session(hazelcast::cp::raft_group_id const&) () from /home/user/app/lib/libhazelcast-cpp-client.so.5.0.0
#8 0x00007f428c1197a1 in hazelcast::cp::internal::session::proxy_session_manager::get_or_create_session(hazelcast::cp::raft_group_id const&) () from /home/user/app/lib/libhazelcast-cpp-client.so.5.0.0
#9 0x00007f428c1194c7 in hazelcast::cp::internal::session::proxy_session_manager::acquire_session(hazelcast::cp::raft_group_id const&) () from /home/user/app/lib/libhazelcast-cpp-client.so.5.0.0
#10 0x00007f428c0834e8 in hazelcast::cp::fenced_lock::lock_and_get_fence()::{lambda()#1}::operator()() const () from /home/user/app/lib/libhazelcast-cpp-client.so.5.0.0
#11 0x00007f428c0836b2 in hazelcast::cp::fenced_lock::lock_and_get_fence() () from /home/user/app/lib/libhazelcast-cpp-client.so.5.0.0
#12 0x00007f428c082eea in hazelcast::cp::fenced_lock::lock() () from /home/user/app/lib/libhazelcast-cpp-client.so.5.0.0
```
#### Expected behaviour
No asserts :)
Looking at the implementation, I suspect that the assert() itself is not actually valid here.
https://github.com/hazelcast/hazelcast-cpp-client/blob/5978dfa13c16954a72599e82bebca6883ed482fe/hazelcast/src/hazelcast/cp/cp_impl.cpp#L72-L73
The assert checks if a new sessions_ map entry has been created, however create_new_session() is called by get_or_create_session() also if an existing session entry is found but it is invalid. In that case the map entry already exists and the assert will fail.
https://github.com/hazelcast/hazelcast-cpp-client/blob/5978dfa13c16954a72599e82bebca6883ed482fe/hazelcast/src/hazelcast/cp/cp_impl.cpp#L61-L63
| 1.0 | Occasional assertion failure in hazelcast::cp::internal::session::proxy_session_manager::create_new_session() [API-1501] - C++ compiler version: g++ 7.3.1
Hazelcast Cpp client version: 5.0.0
OS version (Windows/Linux/OSX): Linux
```
/hazelcast-cpp-client-5.0.0/hazelcast/src/hazelcast/cp/cp_impl.cpp:73: std::unordered_map<hazelcast::cp::raft_group_id, hazelcast::cp::internal::session::proxy_session_manager::session_state>::iterator hazelcast::cp::internal::session::proxy_session_manager::create_new_session(const hazelcast::cp::raft_group_id&): Assertion `result.second' failed.
```
```
Thread 38 (Thread 0x7f42687f0700 (LWP 300907)):
#0 0x00007f428a35f1ff in select () from /lib64/libc.so.6
#1 0x00000000004630e3 in segv_handler (sig=6, info=<optimized out>)
#2 <signal handler called>
#3 0x00007f428a286a9f in raise () from /lib64/libc.so.6
#4 0x00007f428a259e05 in abort () from /lib64/libc.so.6
#5 0x00007f428a259cd9 in __assert_fail_base.cold.0 () from /lib64/libc.so.6
#6 0x00007f428a27f3f6 in __assert_fail () from /lib64/libc.so.6
#7 0x00007f428c11994c in hazelcast::cp::internal::session::proxy_session_manager::create_new_session(hazelcast::cp::raft_group_id const&) () from /home/user/app/lib/libhazelcast-cpp-client.so.5.0.0
#8 0x00007f428c1197a1 in hazelcast::cp::internal::session::proxy_session_manager::get_or_create_session(hazelcast::cp::raft_group_id const&) () from /home/user/app/lib/libhazelcast-cpp-client.so.5.0.0
#9 0x00007f428c1194c7 in hazelcast::cp::internal::session::proxy_session_manager::acquire_session(hazelcast::cp::raft_group_id const&) () from /home/user/app/lib/libhazelcast-cpp-client.so.5.0.0
#10 0x00007f428c0834e8 in hazelcast::cp::fenced_lock::lock_and_get_fence()::{lambda()#1}::operator()() const () from /home/user/app/lib/libhazelcast-cpp-client.so.5.0.0
#11 0x00007f428c0836b2 in hazelcast::cp::fenced_lock::lock_and_get_fence() () from /home/user/app/lib/libhazelcast-cpp-client.so.5.0.0
#12 0x00007f428c082eea in hazelcast::cp::fenced_lock::lock() () from /home/user/app/lib/libhazelcast-cpp-client.so.5.0.0
```
#### Expected behaviour
No asserts :)
Looking at the implementation, I suspect that the assert() itself is not actually valid here.
https://github.com/hazelcast/hazelcast-cpp-client/blob/5978dfa13c16954a72599e82bebca6883ed482fe/hazelcast/src/hazelcast/cp/cp_impl.cpp#L72-L73
The assert checks if a new sessions_ map entry has been created, however create_new_session() is called by get_or_create_session() also if an existing session entry is found but it is invalid. In that case the map entry already exists and the assert will fail.
https://github.com/hazelcast/hazelcast-cpp-client/blob/5978dfa13c16954a72599e82bebca6883ed482fe/hazelcast/src/hazelcast/cp/cp_impl.cpp#L61-L63
| defect | occasional assertion failure in hazelcast cp internal session proxy session manager create new session c compiler version g hazelcast cpp client version os version windows linux osx linux hazelcast cpp client hazelcast src hazelcast cp cp impl cpp std unordered map iterator hazelcast cp internal session proxy session manager create new session const hazelcast cp raft group id assertion result second failed thread thread lwp in select from libc so in segv handler sig info in raise from libc so in abort from libc so in assert fail base cold from libc so in assert fail from libc so in hazelcast cp internal session proxy session manager create new session hazelcast cp raft group id const from home user app lib libhazelcast cpp client so in hazelcast cp internal session proxy session manager get or create session hazelcast cp raft group id const from home user app lib libhazelcast cpp client so in hazelcast cp internal session proxy session manager acquire session hazelcast cp raft group id const from home user app lib libhazelcast cpp client so in hazelcast cp fenced lock lock and get fence lambda operator const from home user app lib libhazelcast cpp client so in hazelcast cp fenced lock lock and get fence from home user app lib libhazelcast cpp client so in hazelcast cp fenced lock lock from home user app lib libhazelcast cpp client so expected behaviour no asserts looking at the implementation i suspect that the assert itself is not actually valid here the assert checks if a new sessions map entry has been created however create new session is called by get or create session also if an existing session entry is found but it is invalid in that case the map entry already exists and the assert will fail | 1 |
119,830 | 12,043,918,247 | IssuesEvent | 2020-04-14 13:15:01 | vaadin/flow | https://api.github.com/repos/vaadin/flow | closed | Document Live Reload feature using HotswapAgent | DX documentation | Document all necessary steps to use Live Reload with HotswapAgent
| 1.0 | Document Live Reload feature using HotswapAgent - Document all necessary steps to use Live Reload with HotswapAgent
| non_defect | document live reload feature using hotswapagent document all necessary steps to use live reload with hotswapagent | 0 |
47,101 | 13,056,030,975 | IssuesEvent | 2020-07-30 03:26:40 | icecube-trac/tix2 | https://api.github.com/repos/icecube-trac/tix2 | opened | [clsim] I3CLSimLightSourceToStepConverterFlasher hangs (Trac #2426) | Incomplete Migration Migrated from Trac combo simulation defect | Migrated from https://code.icecube.wisc.edu/ticket/2426
```json
{
"status": "closed",
"changetime": "2020-06-24T12:32:17",
"description": "Steps to reproduce:\n\n{{{\nclsim/resources/scripts/flasher/generateTestFlashes.py\nclsim/resources/scripts/flasher/applyCLSim.py -i test_flashes.i3\n}}}\n\nand observe the second process not exiting, and also not using any CPU time.\n\nThis happens `I3CLSimLightSourceToStepConverterFlasher` can only run in the main thread, as it attempts to call `I3CLSimRandomValueIceCubeFlasherTimeProfile.SampleFromDistribution()` and waits forever trying to acquire the GIL that the main thread never releases. This clashes with its use within I3CLSimLightSourceToStepConverterAsync.\n\nThere are two solutions: either drop the GIL in `I3Tray::Execute()` (deja vu, anyone?) or port I3CLSimRandomValueIceCubeFlasherTimeProfile to C++. The latter is probably easier in the short term.",
"reporter": "jvansanten",
"cc": "fiedl",
"resolution": "fixed",
"_ts": "1593001937450890",
"component": "combo simulation",
"summary": "[clsim] I3CLSimLightSourceToStepConverterFlasher hangs",
"priority": "major",
"keywords": "",
"time": "2020-04-23T19:42:44",
"milestone": "Autumnal Equinox 2020",
"owner": "jvansanten",
"type": "defect"
}
```
| 1.0 | [clsim] I3CLSimLightSourceToStepConverterFlasher hangs (Trac #2426) - Migrated from https://code.icecube.wisc.edu/ticket/2426
```json
{
"status": "closed",
"changetime": "2020-06-24T12:32:17",
"description": "Steps to reproduce:\n\n{{{\nclsim/resources/scripts/flasher/generateTestFlashes.py\nclsim/resources/scripts/flasher/applyCLSim.py -i test_flashes.i3\n}}}\n\nand observe the second process not exiting, and also not using any CPU time.\n\nThis happens `I3CLSimLightSourceToStepConverterFlasher` can only run in the main thread, as it attempts to call `I3CLSimRandomValueIceCubeFlasherTimeProfile.SampleFromDistribution()` and waits forever trying to acquire the GIL that the main thread never releases. This clashes with its use within I3CLSimLightSourceToStepConverterAsync.\n\nThere are two solutions: either drop the GIL in `I3Tray::Execute()` (deja vu, anyone?) or port I3CLSimRandomValueIceCubeFlasherTimeProfile to C++. The latter is probably easier in the short term.",
"reporter": "jvansanten",
"cc": "fiedl",
"resolution": "fixed",
"_ts": "1593001937450890",
"component": "combo simulation",
"summary": "[clsim] I3CLSimLightSourceToStepConverterFlasher hangs",
"priority": "major",
"keywords": "",
"time": "2020-04-23T19:42:44",
"milestone": "Autumnal Equinox 2020",
"owner": "jvansanten",
"type": "defect"
}
```
| defect | hangs trac migrated from json status closed changetime description steps to reproduce n n nclsim resources scripts flasher generatetestflashes py nclsim resources scripts flasher applyclsim py i test flashes n n nand observe the second process not exiting and also not using any cpu time n nthis happens can only run in the main thread as it attempts to call samplefromdistribution and waits forever trying to acquire the gil that the main thread never releases this clashes with its use within n nthere are two solutions either drop the gil in execute deja vu anyone or port to c the latter is probably easier in the short term reporter jvansanten cc fiedl resolution fixed ts component combo simulation summary hangs priority major keywords time milestone autumnal equinox owner jvansanten type defect | 1 |
46,339 | 13,055,895,557 | IssuesEvent | 2020-07-30 03:03:05 | icecube-trac/tix2 | https://api.github.com/repos/icecube-trac/tix2 | opened | sandbox - Gen2_Simple_Recos.py syntax error (Trac #1023) | Incomplete Migration Migrated from Trac defect other | Migrated from https://code.icecube.wisc.edu/ticket/1023
```json
{
"status": "closed",
"changetime": "2015-06-18T21:00:17",
"description": "Located an issue when trying to run on Gen2_Simple_Recos.py on appropriate files.\n\nreceiving the following error:\nAttributeError: 'I3MCTree' object has no attribute 'most_energetic_muon'\n\nWe fixed locally for our purposes by changing this line:\nframe[\"MostEnergeticMuon\"] = frame[\"I3MCTree\"].most_energetic_muon\nto:\nframe[\"MostEnergeticMuon\u201d] = dataclasses.get_most_energetic_muon(frame[\u201cI3MCTree\u201d])\n\nThis appears to be working well with no abnormal behavior and it may be worth fixing in the sandbox as well (or if a more appropriate syntax exists, superb!)",
"reporter": "jdiercks",
"cc": "",
"resolution": "fixed",
"_ts": "1434661217957580",
"component": "other",
"summary": "sandbox - Gen2_Simple_Recos.py syntax error",
"priority": "minor",
"keywords": "Gen2-Scripts",
"time": "2015-06-18T18:14:43",
"milestone": "",
"owner": "chaack",
"type": "defect"
}
```
| 1.0 | sandbox - Gen2_Simple_Recos.py syntax error (Trac #1023) - Migrated from https://code.icecube.wisc.edu/ticket/1023
```json
{
"status": "closed",
"changetime": "2015-06-18T21:00:17",
"description": "Located an issue when trying to run on Gen2_Simple_Recos.py on appropriate files.\n\nreceiving the following error:\nAttributeError: 'I3MCTree' object has no attribute 'most_energetic_muon'\n\nWe fixed locally for our purposes by changing this line:\nframe[\"MostEnergeticMuon\"] = frame[\"I3MCTree\"].most_energetic_muon\nto:\nframe[\"MostEnergeticMuon\u201d] = dataclasses.get_most_energetic_muon(frame[\u201cI3MCTree\u201d])\n\nThis appears to be working well with no abnormal behavior and it may be worth fixing in the sandbox as well (or if a more appropriate syntax exists, superb!)",
"reporter": "jdiercks",
"cc": "",
"resolution": "fixed",
"_ts": "1434661217957580",
"component": "other",
"summary": "sandbox - Gen2_Simple_Recos.py syntax error",
"priority": "minor",
"keywords": "Gen2-Scripts",
"time": "2015-06-18T18:14:43",
"milestone": "",
"owner": "chaack",
"type": "defect"
}
```
| defect | sandbox simple recos py syntax error trac migrated from json status closed changetime description located an issue when trying to run on simple recos py on appropriate files n nreceiving the following error nattributeerror object has no attribute most energetic muon n nwe fixed locally for our purposes by changing this line nframe frame most energetic muon nto nframe dataclasses get most energetic muon frame n nthis appears to be working well with no abnormal behavior and it may be worth fixing in the sandbox as well or if a more appropriate syntax exists superb reporter jdiercks cc resolution fixed ts component other summary sandbox simple recos py syntax error priority minor keywords scripts time milestone owner chaack type defect | 1 |
248,081 | 26,781,981,654 | IssuesEvent | 2023-01-31 22:03:52 | MatBenfield/news | https://api.github.com/repos/MatBenfield/news | closed | [SecurityWeek] British Retailer JD Sports Discloses Data Breach Affecting 10 Million Customers | SecurityWeek Stale |
**British sports fashion retail firm JD Sports on Monday revealed that it has discovered a data breach impacting roughly 10 million of its customers.**
According to the company, the cyber incident affects information provided by customers who placed online orders between November 2018 and October 2020. The JD, Size, Millets, Blacks, Scotts and MilletSport brands are impacted.
Based on the company’s brief description of the incident, it’s possible that hackers stole names, billing addresses, delivery addresses, phone numbers, email addresses, order details, and last four digits of the customers’ payment cards.
There is no indication that full payment card data or account passwords were compromised.
The company has called in external cybersecurity experts to investigate the incident and authorities in the UK have been notified. The investigation is ongoing.
In its statement, JD Sports warned customers that they may be targeted in scams and phishing attacks.
**Related:** [Fashion Retailer Guess Notifies Users of Data Breach](https://www.securityweek.com/fashion-retailer-guess-notifies-users-data-breach/)
**Related:** [German Privacy Watchdog Investigates Clothing Retailer H&M](https://www.securityweek.com/german-privacy-watchdog-investigates-clothing-retailer-hm/)
**Related:** [Clothing Retailer Fallas Hit by Payment Card Breach](https://www.securityweek.com/clothing-retailer-fallas-hit-payment-card-breach/)
The post [British Retailer JD Sports Discloses Data Breach Affecting 10 Million Customers](https://www.securityweek.com/british-retailer-jd-sports-discloses-data-breach-affecting-10-million-customers/) appeared first on [SecurityWeek](https://www.securityweek.com).
<https://www.securityweek.com/british-retailer-jd-sports-discloses-data-breach-affecting-10-million-customers/>
| True | [SecurityWeek] British Retailer JD Sports Discloses Data Breach Affecting 10 Million Customers -
**British sports fashion retail firm JD Sports on Monday revealed that it has discovered a data breach impacting roughly 10 million of its customers.**
According to the company, the cyber incident affects information provided by customers who placed online orders between November 2018 and October 2020. The JD, Size, Millets, Blacks, Scotts and MilletSport brands are impacted.
Based on the company’s brief description of the incident, it’s possible that hackers stole names, billing addresses, delivery addresses, phone numbers, email addresses, order details, and last four digits of the customers’ payment cards.
There is no indication that full payment card data or account passwords were compromised.
The company has called in external cybersecurity experts to investigate the incident and authorities in the UK have been notified. The investigation is ongoing.
In its statement, JD Sports warned customers that they may be targeted in scams and phishing attacks.
**Related:** [Fashion Retailer Guess Notifies Users of Data Breach](https://www.securityweek.com/fashion-retailer-guess-notifies-users-data-breach/)
**Related:** [German Privacy Watchdog Investigates Clothing Retailer H&M](https://www.securityweek.com/german-privacy-watchdog-investigates-clothing-retailer-hm/)
**Related:** [Clothing Retailer Fallas Hit by Payment Card Breach](https://www.securityweek.com/clothing-retailer-fallas-hit-payment-card-breach/)
The post [British Retailer JD Sports Discloses Data Breach Affecting 10 Million Customers](https://www.securityweek.com/british-retailer-jd-sports-discloses-data-breach-affecting-10-million-customers/) appeared first on [SecurityWeek](https://www.securityweek.com).
<https://www.securityweek.com/british-retailer-jd-sports-discloses-data-breach-affecting-10-million-customers/>
| non_defect | british retailer jd sports discloses data breach affecting million customers british sports fashion retail firm jd sports on monday revealed that it has discovered a data breach impacting roughly million of its customers according to the company the cyber incident affects information provided by customers who placed online orders between november and october the jd size millets blacks scotts and milletsport brands are impacted based on the company’s brief description of the incident it’s possible that hackers stole names billing addresses delivery addresses phone numbers email addresses order details and last four digits of the customers’ payment cards there is no indication that full payment card data or account passwords were compromised the company has called in external cybersecurity experts to investigate the incident and authorities in the uk have been notified the investigation is ongoing in its statement jd sports warned customers that they may be targeted in scams and phishing attacks related related related the post appeared first on | 0 |
2,454 | 2,607,903,425 | IssuesEvent | 2015-02-26 00:14:36 | chrsmithdemos/zen-coding | https://api.github.com/repos/chrsmithdemos/zen-coding | opened | expand error in slickedit | auto-migrated Priority-Medium Type-Defect | ```
What steps will reproduce the problem?
1.use slickedit, and install related macros.
type div>p
2.expanded it, then get the result:
<div>
<p>
</div>
What is the expected output? What do you see instead?
expected to see:
<div>
<p></p>
</div>
I see:
<div>
<p>
</div>
What version of the product are you using? On what operating system?
slickedit14.02
windows
Please provide any additional information below.
```
-----
Original issue reported on code.google.com by `iamapla...@gmail.com` on 15 Apr 2010 at 2:58 | 1.0 | expand error in slickedit - ```
What steps will reproduce the problem?
1.use slickedit, and install related macros.
type div>p
2.expanded it, then get the result:
<div>
<p>
</div>
What is the expected output? What do you see instead?
expected to see:
<div>
<p></p>
</div>
I see:
<div>
<p>
</div>
What version of the product are you using? On what operating system?
slickedit14.02
windows
Please provide any additional information below.
```
-----
Original issue reported on code.google.com by `iamapla...@gmail.com` on 15 Apr 2010 at 2:58 | defect | expand error in slickedit what steps will reproduce the problem use slickedit and install related macros type div p expanded it then get the result what is the expected output what do you see instead expected to see i see what version of the product are you using on what operating system windows please provide any additional information below original issue reported on code google com by iamapla gmail com on apr at | 1 |
172,644 | 14,370,905,681 | IssuesEvent | 2020-12-01 11:46:40 | actool/eslint-plugin-actool | https://api.github.com/repos/actool/eslint-plugin-actool | closed | Добавить документацию по правилам | assignment documentation | ## Задача
- Реализовать общую документацию для всех правил по всем имеющимся (ниже) источникам
- Для каждого правила будет документация в отдельном `{rule}.md` файле ([пример](https://github.com/actool/eslint-plugin-actool/blob/master/docs/rules/max-tags-file.md))
- **ВАЖНО**: Я тут пересмотрел - скорее всего лучше действительно оставить 3 правила:
- `max-tags` (с доп.параметром scope: ["file", "project"])
- `relevant-comments` (с доп. параметром scope: ["line", "block", "module"])
- `no-commented-code`
- Остальные параметры для правил оставляем само собой - как указано расписанной доке (ссылка ниже). На кастомизации такое упрощение не сильно должно сказаться - зато удобнее пользоваться
## Ресурсы
- [Примеры текущих расписанных правил](https://github.com/actool/eslint-plugin-actool/tree/master/docs/rules)
- [Расписанные правила со старым неймингом (но с тем же принципом работы)](https://github.com/actool/actool-cli/blob/dev/rules.md)
- [Текущие правила (с актуальным неймингом)](https://github.com/actool/eslint-plugin-actool#supported-rules)
| 1.0 | Добавить документацию по правилам - ## Задача
- Реализовать общую документацию для всех правил по всем имеющимся (ниже) источникам
- Для каждого правила будет документация в отдельном `{rule}.md` файле ([пример](https://github.com/actool/eslint-plugin-actool/blob/master/docs/rules/max-tags-file.md))
- **ВАЖНО**: Я тут пересмотрел - скорее всего лучше действительно оставить 3 правила:
- `max-tags` (с доп.параметром scope: ["file", "project"])
- `relevant-comments` (с доп. параметром scope: ["line", "block", "module"])
- `no-commented-code`
- Остальные параметры для правил оставляем само собой - как указано расписанной доке (ссылка ниже). На кастомизации такое упрощение не сильно должно сказаться - зато удобнее пользоваться
## Ресурсы
- [Примеры текущих расписанных правил](https://github.com/actool/eslint-plugin-actool/tree/master/docs/rules)
- [Расписанные правила со старым неймингом (но с тем же принципом работы)](https://github.com/actool/actool-cli/blob/dev/rules.md)
- [Текущие правила (с актуальным неймингом)](https://github.com/actool/eslint-plugin-actool#supported-rules)
| non_defect | добавить документацию по правилам задача реализовать общую документацию для всех правил по всем имеющимся ниже источникам для каждого правила будет документация в отдельном rule md файле важно я тут пересмотрел скорее всего лучше действительно оставить правила max tags с доп параметром scope relevant comments с доп параметром scope no commented code остальные параметры для правил оставляем само собой как указано расписанной доке ссылка ниже на кастомизации такое упрощение не сильно должно сказаться зато удобнее пользоваться ресурсы | 0 |
81,913 | 31,809,799,688 | IssuesEvent | 2023-09-13 16:02:32 | department-of-veterans-affairs/va.gov-cms | https://api.github.com/repos/department-of-veterans-affairs/va.gov-cms | opened | Node 18 does not run on our ASGs due to OpenSSL errors | Defect Accelerated Publishing | ### What is the problem?
<!-- Describe the problem in a few sentences or less, focusing on the functional issue rather than the technical failure. -->
### Who is affected?
<!-- What is the user prevented from doing? About how many users are affected? -->
### How urgent is the issue?
Critical / Major / Minor
```[tasklist]
###
- [ ] The problem as described is fixed
- [ ] The repro steps result in 'expected result'
- [ ] An automated test is written to catch the problem, if appropriate
```
### How can we see the problem? (repro steps)
<!-- Please include environment, browser, operating system information if it is relevant. -->
1. Please include a set of steps that allows an independent tester to see the problem.
2. Write them so that after the defect is fixed, the steps will result in the expected result.
3. It is helpful to write the steps methodically so they can be the foundation of an automated test.
**Expected result:** What should be the outcome?<br />
**Actual result:** What currently happens?
### Is there any additional information?
Screenshots:
Log messages (please specify from where or what commands(s))
```
Log messages here
```
### Why is the problem happening and how do we fix it?
<!-- Provide any information about why the bug is happening. Links to tickets where the work was originally done are helpful. -->
<!-- This is the place for info about the technical failure. -->
<!-- This probably will not be filled out when the ticket is initially created. -->
| 1.0 | Node 18 does not run on our ASGs due to OpenSSL errors - ### What is the problem?
<!-- Describe the problem in a few sentences or less, focusing on the functional issue rather than the technical failure. -->
### Who is affected?
<!-- What is the user prevented from doing? About how many users are affected? -->
### How urgent is the issue?
Critical / Major / Minor
```[tasklist]
###
- [ ] The problem as described is fixed
- [ ] The repro steps result in 'expected result'
- [ ] An automated test is written to catch the problem, if appropriate
```
### How can we see the problem? (repro steps)
<!-- Please include environment, browser, operating system information if it is relevant. -->
1. Please include a set of steps that allows an independent tester to see the problem.
2. Write them so that after the defect is fixed, the steps will result in the expected result.
3. It is helpful to write the steps methodically so they can be the foundation of an automated test.
**Expected result:** What should be the outcome?<br />
**Actual result:** What currently happens?
### Is there any additional information?
Screenshots:
Log messages (please specify from where or what commands(s))
```
Log messages here
```
### Why is the problem happening and how do we fix it?
<!-- Provide any information about why the bug is happening. Links to tickets where the work was originally done are helpful. -->
<!-- This is the place for info about the technical failure. -->
<!-- This probably will not be filled out when the ticket is initially created. -->
| defect | node does not run on our asgs due to openssl errors what is the problem who is affected how urgent is the issue critical major minor the problem as described is fixed the repro steps result in expected result an automated test is written to catch the problem if appropriate how can we see the problem repro steps please include a set of steps that allows an independent tester to see the problem write them so that after the defect is fixed the steps will result in the expected result it is helpful to write the steps methodically so they can be the foundation of an automated test expected result what should be the outcome actual result what currently happens is there any additional information screenshots log messages please specify from where or what commands s log messages here why is the problem happening and how do we fix it | 1 |
20,757 | 6,926,212,437 | IssuesEvent | 2017-11-30 18:22:30 | dart-lang/build | https://api.github.com/repos/dart-lang/build | opened | clean up the generated directory when throwing away the asset graph | cla: no package:build_runner | If we successfully read the graph we can probably just delete the known outputs, otherwise we will have to bash away the entire thing. | 1.0 | clean up the generated directory when throwing away the asset graph - If we successfully read the graph we can probably just delete the known outputs, otherwise we will have to bash away the entire thing. | non_defect | clean up the generated directory when throwing away the asset graph if we successfully read the graph we can probably just delete the known outputs otherwise we will have to bash away the entire thing | 0 |
5,631 | 7,272,987,385 | IssuesEvent | 2018-02-21 02:02:45 | OpenLiberty/open-liberty | https://api.github.com/repos/OpenLiberty/open-liberty | opened | Warning running Liberty with Java 9 | in:Serviceability | Reported by Alasdair...
just accidentally ran liberty with Java 9 and got this:
```
WARNING: An illegal reflective access operation has occurred
WARNING: Illegal reflective access by com.ibm.ws.logging.internal.impl.IntrospectionLevelMember$2 (file:/Users/nottinga/Documents/github/cloud-native-examples/serviceA/target/liberty/wlp/lib/com.ibm.ws.logging_1.0.20.jar) to field java.util.concurrent.atomic.AtomicReference.serialVersionUID
WARNING: Please consider reporting this to the maintainers of com.ibm.ws.logging.internal.impl.IntrospectionLevelMember$2
WARNING: Use --illegal-access=warn to enable warnings of further illegal reflective access operations
WARNING: All illegal access operations will be denied in a future release
```
We need to clean up the code so that it doesn't cause this warning. | 1.0 | Warning running Liberty with Java 9 - Reported by Alasdair...
just accidentally ran liberty with Java 9 and got this:
```
WARNING: An illegal reflective access operation has occurred
WARNING: Illegal reflective access by com.ibm.ws.logging.internal.impl.IntrospectionLevelMember$2 (file:/Users/nottinga/Documents/github/cloud-native-examples/serviceA/target/liberty/wlp/lib/com.ibm.ws.logging_1.0.20.jar) to field java.util.concurrent.atomic.AtomicReference.serialVersionUID
WARNING: Please consider reporting this to the maintainers of com.ibm.ws.logging.internal.impl.IntrospectionLevelMember$2
WARNING: Use --illegal-access=warn to enable warnings of further illegal reflective access operations
WARNING: All illegal access operations will be denied in a future release
```
We need to clean up the code so that it doesn't cause this warning. | non_defect | warning running liberty with java reported by alasdair just accidentally ran liberty with java and got this warning an illegal reflective access operation has occurred warning illegal reflective access by com ibm ws logging internal impl introspectionlevelmember file users nottinga documents github cloud native examples servicea target liberty wlp lib com ibm ws logging jar to field java util concurrent atomic atomicreference serialversionuid warning please consider reporting this to the maintainers of com ibm ws logging internal impl introspectionlevelmember warning use illegal access warn to enable warnings of further illegal reflective access operations warning all illegal access operations will be denied in a future release we need to clean up the code so that it doesn t cause this warning | 0 |
2,755 | 3,006,501,172 | IssuesEvent | 2015-07-27 10:49:55 | Itseez/opencv | https://api.github.com/repos/Itseez/opencv | opened | Issues with shared library naming when using mangled paths | affected: master auto-transferred bug category: build/install priority: normal | Transferred from http://code.opencv.org/issues/3967
```
|| Gautier Minster on 2014-10-21 10:33
|| Priority: Normal
|| Affected: branch 'master' (3.0-dev)
|| Category: build/install
|| Tracker: Bug
|| Difficulty:
|| PR:
|| Platform: Any / Linux
```
Issues with shared library naming when using mangled paths
-----------
```
Hello,
When compiling OpenCV using mangled paths, using versions such as @3.0.0-dev@ or @3.0.0-alpha@, two problems arise:
1. The resulting pkg-config file (eg. @opencv-3.0.0-dev.pc@) refers to the shared libraries using the following format: <pre>libopencv_core.so.3.0.0-dev</pre>
This file does not exist however, the shared libraries are named without the "-dev": <pre>libopencv_core.so.3.0.0</pre>
This of course prevents pkg-config from working.
2. The namelinks of the shared libraries are set: on my system, with a working version of OpenCV 2.4.9, a symlink <pre>libopencv_core.so -> libopencv_core.so.2.4</pre> existed.
Upon installing OpenCV 3.0.0-dev, this symlink was replaced by <pre>libopencv_core.so -> libopencv_core.so.3.0</pre>, breaking OpenCV 2.4.9's pkg-config configuration.
Attached is a patch which:
- fixes the output name of the shared objects when using mangled paths, by adding the OPENCV_VERSION_STATUS to them
- adds the NAMELINK_SKIP flag to the CMake install of shared libraries when using mangled paths, so that already installed namelinks do not get overwritten
Do these 2 changes seem acceptable?
Kind regards,
--
Gautier
```
History
-------
##### Steven Puttemans on 2014-10-21 12:30
```
Personnally I would not change the use of the namelinks. Now it is fairly easy to build different OpenCV fixes, add a single `pkg-config opencv --libs` to your compiler settings and then just apply a `sudo make install` into the build folder you want to be running. This way you never have to adapt your OpenCV software projects to try out different installations.
```
##### Gautier Minster on 2014-10-23 06:17
```
You would not use mangled paths at all then, and simply install the specific build of OpenCV you want to use at this point? (since when using mangled paths, the pkg-config OpenCV configuration file has a mangled name too)
(note: i deleted the assignee, not sure if that was a mistake on my part or if it was auto-assigned at issue creation)
- Assignee deleted (Roman Donchenko)
``` | 1.0 | Issues with shared library naming when using mangled paths - Transferred from http://code.opencv.org/issues/3967
```
|| Gautier Minster on 2014-10-21 10:33
|| Priority: Normal
|| Affected: branch 'master' (3.0-dev)
|| Category: build/install
|| Tracker: Bug
|| Difficulty:
|| PR:
|| Platform: Any / Linux
```
Issues with shared library naming when using mangled paths
-----------
```
Hello,
When compiling OpenCV using mangled paths, using versions such as @3.0.0-dev@ or @3.0.0-alpha@, two problems arise:
1. The resulting pkg-config file (eg. @opencv-3.0.0-dev.pc@) refers to the shared libraries using the following format: <pre>libopencv_core.so.3.0.0-dev</pre>
This file does not exist however, the shared libraries are named without the "-dev": <pre>libopencv_core.so.3.0.0</pre>
This of course prevents pkg-config from working.
2. The namelinks of the shared libraries are set: on my system, with a working version of OpenCV 2.4.9, a symlink <pre>libopencv_core.so -> libopencv_core.so.2.4</pre> existed.
Upon installing OpenCV 3.0.0-dev, this symlink was replaced by <pre>libopencv_core.so -> libopencv_core.so.3.0</pre>, breaking OpenCV 2.4.9's pkg-config configuration.
Attached is a patch which:
- fixes the output name of the shared objects when using mangled paths, by adding the OPENCV_VERSION_STATUS to them
- adds the NAMELINK_SKIP flag to the CMake install of shared libraries when using mangled paths, so that already installed namelinks do not get overwritten
Do these 2 changes seem acceptable?
Kind regards,
--
Gautier
```
History
-------
##### Steven Puttemans on 2014-10-21 12:30
```
Personnally I would not change the use of the namelinks. Now it is fairly easy to build different OpenCV fixes, add a single `pkg-config opencv --libs` to your compiler settings and then just apply a `sudo make install` into the build folder you want to be running. This way you never have to adapt your OpenCV software projects to try out different installations.
```
##### Gautier Minster on 2014-10-23 06:17
```
You would not use mangled paths at all then, and simply install the specific build of OpenCV you want to use at this point? (since when using mangled paths, the pkg-config OpenCV configuration file has a mangled name too)
(note: i deleted the assignee, not sure if that was a mistake on my part or if it was auto-assigned at issue creation)
- Assignee deleted (Roman Donchenko)
``` | non_defect | issues with shared library naming when using mangled paths transferred from gautier minster on priority normal affected branch master dev category build install tracker bug difficulty pr platform any linux issues with shared library naming when using mangled paths hello when compiling opencv using mangled paths using versions such as dev or alpha two problems arise the resulting pkg config file eg opencv dev pc refers to the shared libraries using the following format libopencv core so dev this file does not exist however the shared libraries are named without the dev libopencv core so this of course prevents pkg config from working the namelinks of the shared libraries are set on my system with a working version of opencv a symlink libopencv core so libopencv core so existed upon installing opencv dev this symlink was replaced by libopencv core so libopencv core so breaking opencv s pkg config configuration attached is a patch which fixes the output name of the shared objects when using mangled paths by adding the opencv version status to them adds the namelink skip flag to the cmake install of shared libraries when using mangled paths so that already installed namelinks do not get overwritten do these changes seem acceptable kind regards gautier history steven puttemans on personnally i would not change the use of the namelinks now it is fairly easy to build different opencv fixes add a single pkg config opencv libs to your compiler settings and then just apply a sudo make install into the build folder you want to be running this way you never have to adapt your opencv software projects to try out different installations gautier minster on you would not use mangled paths at all then and simply install the specific build of opencv you want to use at this point since when using mangled paths the pkg config opencv configuration file has a mangled name too note i deleted the assignee not sure if that was a mistake on my part or if it was auto assigned at issue creation assignee deleted roman donchenko | 0 |
684,346 | 23,414,816,919 | IssuesEvent | 2022-08-12 22:27:20 | WebSoftDevs/MusicBot | https://api.github.com/repos/WebSoftDevs/MusicBot | closed | Replace ytdlwrap with something else | bug priority-urgent difficulty-medium | As above, bot is not working. I have checked their repo and the section with issues is hidden. | 1.0 | Replace ytdlwrap with something else - As above, bot is not working. I have checked their repo and the section with issues is hidden. | non_defect | replace ytdlwrap with something else as above bot is not working i have checked their repo and the section with issues is hidden | 0 |
53,376 | 13,261,478,304 | IssuesEvent | 2020-08-20 19:58:28 | icecube-trac/tix4 | https://api.github.com/repos/icecube-trac/tix4 | closed | [millipede] broken example (Trac #1253) | Migrated from Trac combo reconstruction defect | the example resources/examples/millipede-angular.py fails with this traceback:
Traceback (most recent call last):
File "millipede/resources/examples/millipede-angular.py", line 37, in <module>
StepAzimuth=5*I3Units.deg,
File "/home/hdembinski/Code/icecube/icerec/debug.trunk/lib/I3Tray.py", line 204, in AddSegment
return _segment(self, _name, **kwargs)
File "/home/hdembinski/Code/icecube/icerec/debug.trunk/lib/icecube/millipede/__init__.py", line 235, in MillipedeFit
tray.AddService('MillipedeLikelihoodFactory', likelihood, **millipede_config)
File "/home/hdembinski/Code/icecube/icerec/debug.trunk/lib/I3Tray.py", line 167, in AddService
super(I3Tray, self).SetParameter(_name, k, v)
RuntimeError: Attempt to set parameter ShowerSpacing that doesn't exist (in void I3ConfigurationImpl::Set(const string&, const boost::python::api::object&))
<details>
<summary><em>Migrated from <a href="https://code.icecube.wisc.edu/projects/icecube/ticket/1253">https://code.icecube.wisc.edu/projects/icecube/ticket/1253</a>, reported by hdembinskiand owned by jbraun</em></summary>
<p>
```json
{
"status": "closed",
"changetime": "2019-02-13T14:11:57",
"_ts": "1550067117911749",
"description": "the example resources/examples/millipede-angular.py fails with this traceback:\n\nTraceback (most recent call last):\n File \"millipede/resources/examples/millipede-angular.py\", line 37, in <module>\n StepAzimuth=5*I3Units.deg,\n File \"/home/hdembinski/Code/icecube/icerec/debug.trunk/lib/I3Tray.py\", line 204, in AddSegment\n return _segment(self, _name, **kwargs)\n File \"/home/hdembinski/Code/icecube/icerec/debug.trunk/lib/icecube/millipede/__init__.py\", line 235, in MillipedeFit\n tray.AddService('MillipedeLikelihoodFactory', likelihood, **millipede_config)\n File \"/home/hdembinski/Code/icecube/icerec/debug.trunk/lib/I3Tray.py\", line 167, in AddService\n super(I3Tray, self).SetParameter(_name, k, v)\nRuntimeError: Attempt to set parameter ShowerSpacing that doesn't exist (in void I3ConfigurationImpl::Set(const string&, const boost::python::api::object&))\n",
"reporter": "hdembinski",
"cc": "",
"resolution": "fixed",
"time": "2015-08-20T19:03:03",
"component": "combo reconstruction",
"summary": "[millipede] broken example",
"priority": "blocker",
"keywords": "",
"milestone": "",
"owner": "jbraun",
"type": "defect"
}
```
</p>
</details>
| 1.0 | [millipede] broken example (Trac #1253) - the example resources/examples/millipede-angular.py fails with this traceback:
Traceback (most recent call last):
File "millipede/resources/examples/millipede-angular.py", line 37, in <module>
StepAzimuth=5*I3Units.deg,
File "/home/hdembinski/Code/icecube/icerec/debug.trunk/lib/I3Tray.py", line 204, in AddSegment
return _segment(self, _name, **kwargs)
File "/home/hdembinski/Code/icecube/icerec/debug.trunk/lib/icecube/millipede/__init__.py", line 235, in MillipedeFit
tray.AddService('MillipedeLikelihoodFactory', likelihood, **millipede_config)
File "/home/hdembinski/Code/icecube/icerec/debug.trunk/lib/I3Tray.py", line 167, in AddService
super(I3Tray, self).SetParameter(_name, k, v)
RuntimeError: Attempt to set parameter ShowerSpacing that doesn't exist (in void I3ConfigurationImpl::Set(const string&, const boost::python::api::object&))
<details>
<summary><em>Migrated from <a href="https://code.icecube.wisc.edu/projects/icecube/ticket/1253">https://code.icecube.wisc.edu/projects/icecube/ticket/1253</a>, reported by hdembinskiand owned by jbraun</em></summary>
<p>
```json
{
"status": "closed",
"changetime": "2019-02-13T14:11:57",
"_ts": "1550067117911749",
"description": "the example resources/examples/millipede-angular.py fails with this traceback:\n\nTraceback (most recent call last):\n File \"millipede/resources/examples/millipede-angular.py\", line 37, in <module>\n StepAzimuth=5*I3Units.deg,\n File \"/home/hdembinski/Code/icecube/icerec/debug.trunk/lib/I3Tray.py\", line 204, in AddSegment\n return _segment(self, _name, **kwargs)\n File \"/home/hdembinski/Code/icecube/icerec/debug.trunk/lib/icecube/millipede/__init__.py\", line 235, in MillipedeFit\n tray.AddService('MillipedeLikelihoodFactory', likelihood, **millipede_config)\n File \"/home/hdembinski/Code/icecube/icerec/debug.trunk/lib/I3Tray.py\", line 167, in AddService\n super(I3Tray, self).SetParameter(_name, k, v)\nRuntimeError: Attempt to set parameter ShowerSpacing that doesn't exist (in void I3ConfigurationImpl::Set(const string&, const boost::python::api::object&))\n",
"reporter": "hdembinski",
"cc": "",
"resolution": "fixed",
"time": "2015-08-20T19:03:03",
"component": "combo reconstruction",
"summary": "[millipede] broken example",
"priority": "blocker",
"keywords": "",
"milestone": "",
"owner": "jbraun",
"type": "defect"
}
```
</p>
</details>
| defect | broken example trac the example resources examples millipede angular py fails with this traceback traceback most recent call last file millipede resources examples millipede angular py line in stepazimuth deg file home hdembinski code icecube icerec debug trunk lib py line in addsegment return segment self name kwargs file home hdembinski code icecube icerec debug trunk lib icecube millipede init py line in millipedefit tray addservice millipedelikelihoodfactory likelihood millipede config file home hdembinski code icecube icerec debug trunk lib py line in addservice super self setparameter name k v runtimeerror attempt to set parameter showerspacing that doesn t exist in void set const string const boost python api object migrated from json status closed changetime ts description the example resources examples millipede angular py fails with this traceback n ntraceback most recent call last n file millipede resources examples millipede angular py line in n stepazimuth deg n file home hdembinski code icecube icerec debug trunk lib py line in addsegment n return segment self name kwargs n file home hdembinski code icecube icerec debug trunk lib icecube millipede init py line in millipedefit n tray addservice millipedelikelihoodfactory likelihood millipede config n file home hdembinski code icecube icerec debug trunk lib py line in addservice n super self setparameter name k v nruntimeerror attempt to set parameter showerspacing that doesn t exist in void set const string const boost python api object n reporter hdembinski cc resolution fixed time component combo reconstruction summary broken example priority blocker keywords milestone owner jbraun type defect | 1 |
28,373 | 5,244,601,978 | IssuesEvent | 2017-02-01 00:09:05 | bridgedotnet/Bridge | https://api.github.com/repos/bridgedotnet/Bridge | opened | Incorrect String type name (expected System.String) | defect | ### Expected
```
System.String
System.String[]
System.Collections.Generic.List$1[[System.String]]
```
### Actual
```
String
String[]
System.Collections.Generic.List$1[[String]]
```
### Steps To Reproduce
http://deck.net/e19a394cd8dfd53116e02e9b613ac480
```c#
public class Program
{
enum Enum
{
Value
}
public static void Main()
{
var types = new object[]
{
"abc",
new[] { "Hello World" },
new List<string>()
};
var expected = new[]
{
"System.String",
"System.String[]",
"System.Collections.Generic.List$1[[System.String]]"
};
var actual = types.ToList().ConvertAll(v => v.GetType().FullName).ToArray();
Assert(expected, actual);
}
private static void Assert(string[] expected, string[] actual)
{
for (int i = 0; i < actual.Length; i++)
{
var exp = expected[i];
var act = actual[i];
var eq = exp == act;
Console.WriteLine("{0} Expected: {1} {2}", eq ? "Passed" : "Failed", exp, eq ? "" : ("Actual: " + act));
}
}
}
```
### Expected Result
```js
Expected result here
```
### Actual Result
```js
Actual result here
```
| 1.0 | Incorrect String type name (expected System.String) - ### Expected
```
System.String
System.String[]
System.Collections.Generic.List$1[[System.String]]
```
### Actual
```
String
String[]
System.Collections.Generic.List$1[[String]]
```
### Steps To Reproduce
http://deck.net/e19a394cd8dfd53116e02e9b613ac480
```c#
public class Program
{
enum Enum
{
Value
}
public static void Main()
{
var types = new object[]
{
"abc",
new[] { "Hello World" },
new List<string>()
};
var expected = new[]
{
"System.String",
"System.String[]",
"System.Collections.Generic.List$1[[System.String]]"
};
var actual = types.ToList().ConvertAll(v => v.GetType().FullName).ToArray();
Assert(expected, actual);
}
private static void Assert(string[] expected, string[] actual)
{
for (int i = 0; i < actual.Length; i++)
{
var exp = expected[i];
var act = actual[i];
var eq = exp == act;
Console.WriteLine("{0} Expected: {1} {2}", eq ? "Passed" : "Failed", exp, eq ? "" : ("Actual: " + act));
}
}
}
```
### Expected Result
```js
Expected result here
```
### Actual Result
```js
Actual result here
```
| defect | incorrect string type name expected system string expected system string system string system collections generic list actual string string system collections generic list steps to reproduce c public class program enum enum value public static void main var types new object abc new hello world new list var expected new system string system string system collections generic list var actual types tolist convertall v v gettype fullname toarray assert expected actual private static void assert string expected string actual for int i i actual length i var exp expected var act actual var eq exp act console writeline expected eq passed failed exp eq actual act expected result js expected result here actual result js actual result here | 1 |
270,242 | 8,453,565,298 | IssuesEvent | 2018-10-20 16:52:10 | NicholasNagy/Parent_Teacher_Web_App | https://api.github.com/repos/NicholasNagy/Parent_Teacher_Web_App | opened | End of Sprint Review | Low Priority | **Description:**
At the end of the sprint, we should all get together to:
* Create the initial architecture of the sprint.
* Recreate the database diagram.
* Make burndown chart for this sprint.
Points: 2 | 1.0 | End of Sprint Review - **Description:**
At the end of the sprint, we should all get together to:
* Create the initial architecture of the sprint.
* Recreate the database diagram.
* Make burndown chart for this sprint.
Points: 2 | non_defect | end of sprint review description at the end of the sprint we should all get together to create the initial architecture of the sprint recreate the database diagram make burndown chart for this sprint points | 0 |
152,263 | 5,843,349,640 | IssuesEvent | 2017-05-10 08:57:51 | healthlocker/healthlocker | https://api.github.com/repos/healthlocker/healthlocker | opened | Service user can see: Role/job title of the clinician in messaging and contacts list | 3. Messaging & connecting Carers priority-2 | As a service user I can see the name AND role/Job title of each member of the care team that I am connected to.
(pulled from ePJS staff table)
+ [ ] as a service user looking at Care team page, Contacts, I can see the '[full name], [role/job title]' of each member in my are team
+ [ ] as a service user messaging the care team I connected to, I see the '[full name], [role/job title]' of the member of the care team that send me each message | 1.0 | Service user can see: Role/job title of the clinician in messaging and contacts list - As a service user I can see the name AND role/Job title of each member of the care team that I am connected to.
(pulled from ePJS staff table)
+ [ ] as a service user looking at Care team page, Contacts, I can see the '[full name], [role/job title]' of each member in my are team
+ [ ] as a service user messaging the care team I connected to, I see the '[full name], [role/job title]' of the member of the care team that send me each message | non_defect | service user can see role job title of the clinician in messaging and contacts list as a service user i can see the name and role job title of each member of the care team that i am connected to pulled from epjs staff table as a service user looking at care team page contacts i can see the of each member in my are team as a service user messaging the care team i connected to i see the of the member of the care team that send me each message | 0 |
35,262 | 7,673,991,680 | IssuesEvent | 2018-05-15 01:11:58 | adamhope/testing-github-and-projects | https://api.github.com/repos/adamhope/testing-github-and-projects | closed | After reseting password an Installer is re-directed to the Okta home page | Defect campaign delivery | https://trello.com/c/J3s4zkM5/134-after-reseting-password-an-installer-is-re-directed-to-the-okta-home-page
When an external user (installer) goes through the reset password procedure, after reseting their password they are will be re-directed to the Okta home page. Our external users shouldn't be exposed to Okta, so in this case it should re-direct to the OTP home page. | 1.0 | After reseting password an Installer is re-directed to the Okta home page - https://trello.com/c/J3s4zkM5/134-after-reseting-password-an-installer-is-re-directed-to-the-okta-home-page
When an external user (installer) goes through the reset password procedure, after reseting their password they are will be re-directed to the Okta home page. Our external users shouldn't be exposed to Okta, so in this case it should re-direct to the OTP home page. | defect | after reseting password an installer is re directed to the okta home page when an external user installer goes through the reset password procedure after reseting their password they are will be re directed to the okta home page our external users shouldn t be exposed to okta so in this case it should re direct to the otp home page | 1 |
71,635 | 23,738,938,924 | IssuesEvent | 2022-08-31 10:36:53 | martinrotter/rssguard | https://api.github.com/repos/martinrotter/rssguard | closed | [BUG]: Columns in article list are reset to default when quitting RSSGuard | Type-Defect | ### Brief description of the issue
**Disclaimer: I cannot reproduce with a fresh profile, I have no idea what's going on with my config file.**
If I set a new column in the articles list panel (I'd like to have "Feed", which isn't enabled by default) and quit RSSGuard, then after re-launching the app, the columns are reset to default, i.e the "Feed" column is no longer displayed and I have to enable it again manually. Happens with any criteria.
I use `-d, --data /path/to/my/RSSGuard/directory` where my config.ini and my database are located, if that matters.
### How to reproduce the bug?
**Disclaimer: I cannot reproduce with a fresh profile, I have no idea what's going on with my config file.**
1. In the articles list, right click on the column bar and check for example "Feed" so that the displayed columns are as follows: Read / Important / Feed / Title / Date
2. Quit RSSGuard
3. Open RSSGuard again
4. Columns are reset to default (Read / Important / Title / Date)
### What was the expected result?
Columns are memorized after quitting RSSGuard.
### What actually happened?
Columns are reset to default after quitting RSSGuard.
### Debug log
<details>
<summary>log</summary>
```
time=" 0.052" type="debug" -> core: Initializing settings in '/home/xfzv/RSSGuard/config/config.ini' (custom way).
time=" 0.054" type="debug" -> database: File-based SQLite database connection 'DatabaseFactory' to file '/home/xfzv/RSSGuard/database/database.db' seems to be established.
time=" 0.054" type="debug" -> database: File-based SQLite database has version '2'.
time=" 0.054" type="debug" -> gui: Available icon theme paths: (/usr/share/icons, :/icons, :/graphics, /home/xfzv/RSSGuard/icons, /usr/bin/icons)
time=" 0.055" type="debug" -> gui: Icon theme 'Papirus-Dark' already loaded.
time=" 0.056" type="debug" -> gui: Found path of base skin: ':/skins/nudus-base'.
time=" 0.056" type="debug" -> gui: Local file ':/skins/nudus-dark/html_wrapper.html' exists, using it for the skin.
time=" 0.056" type="debug" -> gui: Local file ':/skins/nudus-dark/html_style.css' exists, using it for the skin.
time=" 0.056" type="debug" -> gui: Trying to load base file ':/skins/nudus-base/html_enclosure_image.html' for the skin.
time=" 0.056" type="debug" -> gui: Trying to load base file ':/skins/nudus-base/html_single_message.html' for the skin.
time=" 0.056" type="debug" -> gui: Trying to load base file ':/skins/nudus-base/html_enclosure_every.html' for the skin.
time=" 0.056" type="debug" -> gui: Local file ':/skins/nudus-dark/qt_style.qss' exists, using it for the skin.
time=" 0.056" type="debug" -> gui: Trying to load base file ':/skins/nudus-base/html_adblocked.html' for the skin.
time=" 0.056" type="debug" -> gui: Setting style: 'kvantum-dark'.
time=" 0.073" type="critical" -> gui: Skipped setting of application style and skin because there is already some style set.
time=" 0.073" type="debug" -> gui: Skin 'nudus-dark' loaded.
time=" 0.074" type="debug" -> network: Disabling application-wide proxy completely.
time=" 0.075" type="debug" -> core: OpenSSL version: 'OpenSSL 1.1.1q 5 Jul 2022'.
time=" 0.075" type="debug" -> core: OpenSSL supported: 'true'.
time=" 0.075" type="debug" -> core: Starting RSS Guard 4.2.3.
time=" 0.075" type="debug" -> core: Instantiated class 'Application'.
time=" 0.075" type="debug" -> core: Starting to load active localization. Desired localization is 'en_US'.
time=" 0.075" type="debug" -> core: Application localization 'en_US' loaded successfully, specifically sublocalization 'en_US' was loaded.
time=" 0.075" type="warning" -> core: Qt localization 'en_US' WAS NOT loaded successfully.
time=" 0.086" type="debug" -> database: SQLite database connection 'MessagesModel' to file '/home/xfzv/RSSGuard/database/database.db' seems to be established.
time=" 0.087" type="debug" -> message-model: Repopulated model, SQL statement is now:
'SELECT Messages.id, Messages.is_read, Messages.is_important, Messages.is_deleted, Messages.is_pdeleted, Messages.feed, Messages.title, Messages.url, Messages.author, Messages.date_created, Messages.contents, Messages.enclosures, Messages.score, Messages.account_id, Messages.custom_id, Messages.custom_hash, Feeds.title, CASE WHEN length(Messages.enclosures) > 10 THEN 'true' ELSE 'false' END AS has_enclosures FROM Messages LEFT JOIN Feeds ON Messages.feed = Feeds.custom_id AND Messages.account_id = Feeds.account_id WHERE 0 > 1;'.
time=" 0.087" type="debug" -> core: Auto-download timer started with interval 60000 ms.
time=" 0.088" type="debug" -> core: Creating FeedDownloader singleton.
time=" 0.088" type="debug" -> core: Requesting update for all feeds on application startup.
time=" 0.088" type="debug" -> gui: Creating main application form in thread: '0x7fe856f2a840'.
time=" 0.129" type="debug" -> gui: Current row changed - proxy 'QModelIndex(-1,-1,0x0,QObject(0x0))', source 'QModelIndex(-1,-1,0x0,QObject(0x0))'.
time=" 0.132" type="debug" -> network: Settings of BaseNetworkAccessManager loaded.
time=" 0.133" type="debug" -> network: Settings of BaseNetworkAccessManager loaded.
time=" 0.138" type="debug" -> network: Settings of BaseNetworkAccessManager loaded.
time=" 0.147" type="debug" -> gui: Creating tray icon menu.
time=" 0.148" type="debug" -> CTRL is NOT pressed while sorting articles - sorting with standard mode.
time=" 0.148" type="debug" -> message-model: Repopulated model, SQL statement is now:
'SELECT Messages.id, Messages.is_read, Messages.is_important, Messages.is_deleted, Messages.is_pdeleted, Messages.feed, Messages.title, Messages.url, Messages.author, Messages.date_created, Messages.contents, Messages.enclosures, Messages.score, Messages.account_id, Messages.custom_id, Messages.custom_hash, Feeds.title, CASE WHEN length(Messages.enclosures) > 10 THEN 'true' ELSE 'false' END AS has_enclosures FROM Messages LEFT JOIN Feeds ON Messages.feed = Feeds.custom_id AND Messages.account_id = Feeds.account_id WHERE 0 > 1 ORDER BY Messages.id DESC;'.
time=" 0.148" type="debug" -> gui: Reloading of msg selections took 0 miliseconds.
time=" 0.157" type="debug" -> CTRL is NOT pressed while sorting articles - sorting with standard mode.
time=" 0.158" type="debug" -> message-model: Repopulated model, SQL statement is now:
'SELECT Messages.id, Messages.is_read, Messages.is_important, Messages.is_deleted, Messages.is_pdeleted, Messages.feed, Messages.title, Messages.url, Messages.author, Messages.date_created, Messages.contents, Messages.enclosures, Messages.score, Messages.account_id, Messages.custom_id, Messages.custom_hash, Feeds.title, CASE WHEN length(Messages.enclosures) > 10 THEN 'true' ELSE 'false' END AS has_enclosures FROM Messages LEFT JOIN Feeds ON Messages.feed = Feeds.custom_id AND Messages.account_id = Feeds.account_id WHERE 0 > 1 ORDER BY Messages.date_created DESC, Messages.id DESC;'.
time=" 0.159" type="debug" -> core: Showing the main window when the application is starting.
time=" 0.188" type="debug" -> database: SQLite database connection 'FeedReader' to file '/home/xfzv/RSSGuard/database/database.db' seems to be established.
time=" 0.189" type="debug" -> database: SQLite database connection 'FeedlyEntryPoint' to file '/home/xfzv/RSSGuard/database/database.db' seems to be established.
time=" 0.189" type="debug" -> database: SQLite database connection 'GmailEntryPoint' to file '/home/xfzv/RSSGuard/database/database.db' seems to be established.
time=" 0.189" type="debug" -> database: SQLite database connection 'GreaderEntryPoint' to file '/home/xfzv/RSSGuard/database/database.db' seems to be established.
time=" 0.190" type="debug" -> database: SQLite database connection 'OwnCloudServiceEntryPoint' to file '/home/xfzv/RSSGuard/database/database.db' seems to be established.
time=" 0.190" type="debug" -> database: SQLite database connection 'NewsBlurEntryPoint' to file '/home/xfzv/RSSGuard/database/database.db' seems to be established.
time=" 0.190" type="debug" -> database: SQLite database connection 'RedditEntryPoint' to file '/home/xfzv/RSSGuard/database/database.db' seems to be established.
time=" 0.191" type="debug" -> database: SQLite database connection 'StandardServiceEntryPoint' to file '/home/xfzv/RSSGuard/database/database.db' seems to be established.
time=" 0.192" type="debug" -> core: Filter accepts row 'xfzv (RSS/ATOM/JSON)' and filter result is: 'true'.
time=" 0.192" type="debug" -> database: SQLite database connection 'StandardServiceRoot' to file '/home/xfzv/RSSGuard/database/database.db' seems to be established.
time=" 0.193" type="debug" -> core: Custom ID of feed when loading from DB is '1'.
time=" 0.193" type="debug" -> core: Custom ID of feed when loading from DB is '2'.
time=" 0.194" type="debug" -> core: Custom ID of feed when loading from DB is '3'.
time=" 0.194" type="debug" -> core: Custom ID of feed when loading from DB is '4'.
time=" 0.194" type="debug" -> core: Custom ID of feed when loading from DB is '5'.
time=" 0.194" type="debug" -> core: Custom ID of feed when loading from DB is '6'.
time=" 0.194" type="debug" -> core: Custom ID of feed when loading from DB is '7'.
time=" 0.215" type="warning" -> libpng warning: iCCP: known incorrect sRGB profile
time=" 0.240" type="debug" -> database: SQLite database connection 'RecycleBin' to file '/home/xfzv/RSSGuard/database/database.db' seems to be established.
time=" 0.245" type="debug" -> database: SQLite database connection 'ImportantNode' to file '/home/xfzv/RSSGuard/database/database.db' seems to be established.
time=" 0.250" type="debug" -> database: SQLite database connection 'RootItem' to file '/home/xfzv/RSSGuard/database/database.db' seems to be established.
time=" 0.254" type="debug" -> database: SQLite connection 'StandardServiceRoot' is already active.
time=" 0.254" type="debug" -> database: SQLite database connection 'StandardServiceRoot' to file '/home/xfzv/RSSGuard/database/database.db' seems to be established.
time=" 0.261" type="debug" -> database: SQLite database connection 'TtRssServiceEntryPoint' to file '/home/xfzv/RSSGuard/database/database.db' seems to be established.
time=" 0.262" type="debug" -> gui: Feed list item expanded - xfzv (RSS/ATOM/JSON)
time=" 0.262" type="debug" -> core: Filter accepts row 'Recycle bin' and filter result is: 'true'.
time=" 0.262" type="debug" -> core: Filter accepts row 'Important articles' and filter result is: 'true'.
time=" 0.262" type="debug" -> core: Filter accepts row 'Unread articles' and filter result is: 'true'.
time=" 0.262" type="debug" -> core: Filter accepts row 'Labels' and filter result is: 'true'.
time=" 0.264" type="debug" -> gui: Feed list item expanded - IT
time=" 0.264" type="debug" -> gui: Feed list item expanded - News
time=" 0.265" type="debug" -> core: No execution message received from other app instances.
time=" 0.292" type="debug" -> core: Filter accepts row 'xfzv (RSS/ATOM/JSON)' and filter result is: 'true'.
time=" 0.305" type="debug" -> gui: Message splitter moved.
time=" 1.092" type="debug" -> gui: Message list got focus with reason 'Qt::MouseFocusReason'.
time=" 4.863" type="debug" -> gui: Message list got focus with reason 'Qt::PopupFocusReason'.
time=" 5.238" type="debug" -> CTRL is NOT pressed while sorting articles - sorting with standard mode.
time=" 5.238" type="debug" -> Displaying messages from feeds IDs: ''1'' and URLs: 'https://www.kernel.org/feeds/all.atom.xml'.
time=" 5.250" type="debug" -> message-model: Repopulated model, SQL statement is now:
'SELECT Messages.id, Messages.is_read, Messages.is_important, Messages.is_deleted, Messages.is_pdeleted, Messages.feed, Messages.title, Messages.url, Messages.author, Messages.date_created, Messages.contents, Messages.enclosures, Messages.score, Messages.account_id, Messages.custom_id, Messages.custom_hash, Feeds.title, CASE WHEN length(Messages.enclosures) > 10 THEN 'true' ELSE 'false' END AS has_enclosures FROM Messages LEFT JOIN Feeds ON Messages.feed = Feeds.custom_id AND Messages.account_id = Feeds.account_id WHERE Feeds.custom_id IN ('90') AND Messages.is_deleted = 0 AND Messages.is_pdeleted = 0 AND Messages.account_id = 1 ORDER BY Messages.date_created DESC, Messages.id DESC;'.
time=" 8.973" type="debug" -> gui: Message list got focus with reason 'Qt::MouseFocusReason'.
time=" 9.408" type="debug" -> gui: Main window's close event
time=" 9.408" type="debug" -> gui: Main window's hide event
time=" 9.411" type="debug" -> core: Cleaning up resources and saving application state.
time=" 9.411" type="debug" -> core: Close lock was obtained safely.
time=" 9.411" type="debug" -> core: Stopping StandardServiceRoot instance.time=" 9.411" type="debug" -> feed-downloader: Destroying FeedDownloader instance.
time=" 9.411" type="debug" -> gui: Destroying FormMain instance.
time=" 9.412" type="debug" -> gui: Destroying TabWidget instance.
time=" 9.412" type="debug" -> gui: Destroying FeedMessageViewer instance.
time=" 9.412" type="debug" -> gui: Destroying BaseToolBar instance.
time=" 9.413" type="debug" -> network: Destroying Downloader instance.
time=" 9.413" type="debug" -> network: Destroying SilentNetworkAccessManager instance.
time=" 9.413" type="debug" -> network: Destroying Downloader instance.
time=" 9.413" type="debug" -> network: Destroying SilentNetworkAccessManager instance.
time=" 9.413" type="debug" -> gui: Destroying MessagesView instance.
time=" 9.413" type="debug" -> gui: Destroying BaseToolBar instance.
time=" 9.414" type="debug" -> gui: Destroying FeedsView instance.
time=" 9.414" type="debug" -> gui: Destroying TabBar instance.
time=" 9.414" type="debug" -> gui: Destroying StatusBar instance.
time=" 9.418" type="debug" -> core: Destroying Application instance.
time=" 9.418" type="debug" -> core: Destroying Mutex instance.
time=" 9.445" type="debug" -> gui: Destroying IconFactory instance.
time=" 9.445" type="debug" -> core: Destroying FeedReader instance.
time=" 9.445" type="debug" -> feed-model: Destroying FeedsModel instance.
time=" 9.446" type="debug" -> feed-model: Destroying FeedsProxyModel instance
time=" 9.446" type="debug" -> message-model: Destroying MessagesModel instance.
time=" 9.446" type="debug" -> message-model: Destroying MessagesProxyModel instance.
```
</details>
### Operating system and version
* OS: Gentoo
* RSS Guard version: 4.2.3
| 1.0 | [BUG]: Columns in article list are reset to default when quitting RSSGuard - ### Brief description of the issue
**Disclaimer: I cannot reproduce with a fresh profile, I have no idea what's going on with my config file.**
If I set a new column in the articles list panel (I'd like to have "Feed", which isn't enabled by default) and quit RSSGuard, then after re-launching the app, the columns are reset to default, i.e the "Feed" column is no longer displayed and I have to enable it again manually. Happens with any criteria.
I use `-d, --data /path/to/my/RSSGuard/directory` where my config.ini and my database are located, if that matters.
### How to reproduce the bug?
**Disclaimer: I cannot reproduce with a fresh profile, I have no idea what's going on with my config file.**
1. In the articles list, right click on the column bar and check for example "Feed" so that the displayed columns are as follows: Read / Important / Feed / Title / Date
2. Quit RSSGuard
3. Open RSSGuard again
4. Columns are reset to default (Read / Important / Title / Date)
### What was the expected result?
Columns are memorized after quitting RSSGuard.
### What actually happened?
Columns are reset to default after quitting RSSGuard.
### Debug log
<details>
<summary>log</summary>
```
time=" 0.052" type="debug" -> core: Initializing settings in '/home/xfzv/RSSGuard/config/config.ini' (custom way).
time=" 0.054" type="debug" -> database: File-based SQLite database connection 'DatabaseFactory' to file '/home/xfzv/RSSGuard/database/database.db' seems to be established.
time=" 0.054" type="debug" -> database: File-based SQLite database has version '2'.
time=" 0.054" type="debug" -> gui: Available icon theme paths: (/usr/share/icons, :/icons, :/graphics, /home/xfzv/RSSGuard/icons, /usr/bin/icons)
time=" 0.055" type="debug" -> gui: Icon theme 'Papirus-Dark' already loaded.
time=" 0.056" type="debug" -> gui: Found path of base skin: ':/skins/nudus-base'.
time=" 0.056" type="debug" -> gui: Local file ':/skins/nudus-dark/html_wrapper.html' exists, using it for the skin.
time=" 0.056" type="debug" -> gui: Local file ':/skins/nudus-dark/html_style.css' exists, using it for the skin.
time=" 0.056" type="debug" -> gui: Trying to load base file ':/skins/nudus-base/html_enclosure_image.html' for the skin.
time=" 0.056" type="debug" -> gui: Trying to load base file ':/skins/nudus-base/html_single_message.html' for the skin.
time=" 0.056" type="debug" -> gui: Trying to load base file ':/skins/nudus-base/html_enclosure_every.html' for the skin.
time=" 0.056" type="debug" -> gui: Local file ':/skins/nudus-dark/qt_style.qss' exists, using it for the skin.
time=" 0.056" type="debug" -> gui: Trying to load base file ':/skins/nudus-base/html_adblocked.html' for the skin.
time=" 0.056" type="debug" -> gui: Setting style: 'kvantum-dark'.
time=" 0.073" type="critical" -> gui: Skipped setting of application style and skin because there is already some style set.
time=" 0.073" type="debug" -> gui: Skin 'nudus-dark' loaded.
time=" 0.074" type="debug" -> network: Disabling application-wide proxy completely.
time=" 0.075" type="debug" -> core: OpenSSL version: 'OpenSSL 1.1.1q 5 Jul 2022'.
time=" 0.075" type="debug" -> core: OpenSSL supported: 'true'.
time=" 0.075" type="debug" -> core: Starting RSS Guard 4.2.3.
time=" 0.075" type="debug" -> core: Instantiated class 'Application'.
time=" 0.075" type="debug" -> core: Starting to load active localization. Desired localization is 'en_US'.
time=" 0.075" type="debug" -> core: Application localization 'en_US' loaded successfully, specifically sublocalization 'en_US' was loaded.
time=" 0.075" type="warning" -> core: Qt localization 'en_US' WAS NOT loaded successfully.
time=" 0.086" type="debug" -> database: SQLite database connection 'MessagesModel' to file '/home/xfzv/RSSGuard/database/database.db' seems to be established.
time=" 0.087" type="debug" -> message-model: Repopulated model, SQL statement is now:
'SELECT Messages.id, Messages.is_read, Messages.is_important, Messages.is_deleted, Messages.is_pdeleted, Messages.feed, Messages.title, Messages.url, Messages.author, Messages.date_created, Messages.contents, Messages.enclosures, Messages.score, Messages.account_id, Messages.custom_id, Messages.custom_hash, Feeds.title, CASE WHEN length(Messages.enclosures) > 10 THEN 'true' ELSE 'false' END AS has_enclosures FROM Messages LEFT JOIN Feeds ON Messages.feed = Feeds.custom_id AND Messages.account_id = Feeds.account_id WHERE 0 > 1;'.
time=" 0.087" type="debug" -> core: Auto-download timer started with interval 60000 ms.
time=" 0.088" type="debug" -> core: Creating FeedDownloader singleton.
time=" 0.088" type="debug" -> core: Requesting update for all feeds on application startup.
time=" 0.088" type="debug" -> gui: Creating main application form in thread: '0x7fe856f2a840'.
time=" 0.129" type="debug" -> gui: Current row changed - proxy 'QModelIndex(-1,-1,0x0,QObject(0x0))', source 'QModelIndex(-1,-1,0x0,QObject(0x0))'.
time=" 0.132" type="debug" -> network: Settings of BaseNetworkAccessManager loaded.
time=" 0.133" type="debug" -> network: Settings of BaseNetworkAccessManager loaded.
time=" 0.138" type="debug" -> network: Settings of BaseNetworkAccessManager loaded.
time=" 0.147" type="debug" -> gui: Creating tray icon menu.
time=" 0.148" type="debug" -> CTRL is NOT pressed while sorting articles - sorting with standard mode.
time=" 0.148" type="debug" -> message-model: Repopulated model, SQL statement is now:
'SELECT Messages.id, Messages.is_read, Messages.is_important, Messages.is_deleted, Messages.is_pdeleted, Messages.feed, Messages.title, Messages.url, Messages.author, Messages.date_created, Messages.contents, Messages.enclosures, Messages.score, Messages.account_id, Messages.custom_id, Messages.custom_hash, Feeds.title, CASE WHEN length(Messages.enclosures) > 10 THEN 'true' ELSE 'false' END AS has_enclosures FROM Messages LEFT JOIN Feeds ON Messages.feed = Feeds.custom_id AND Messages.account_id = Feeds.account_id WHERE 0 > 1 ORDER BY Messages.id DESC;'.
time=" 0.148" type="debug" -> gui: Reloading of msg selections took 0 miliseconds.
time=" 0.157" type="debug" -> CTRL is NOT pressed while sorting articles - sorting with standard mode.
time=" 0.158" type="debug" -> message-model: Repopulated model, SQL statement is now:
'SELECT Messages.id, Messages.is_read, Messages.is_important, Messages.is_deleted, Messages.is_pdeleted, Messages.feed, Messages.title, Messages.url, Messages.author, Messages.date_created, Messages.contents, Messages.enclosures, Messages.score, Messages.account_id, Messages.custom_id, Messages.custom_hash, Feeds.title, CASE WHEN length(Messages.enclosures) > 10 THEN 'true' ELSE 'false' END AS has_enclosures FROM Messages LEFT JOIN Feeds ON Messages.feed = Feeds.custom_id AND Messages.account_id = Feeds.account_id WHERE 0 > 1 ORDER BY Messages.date_created DESC, Messages.id DESC;'.
time=" 0.159" type="debug" -> core: Showing the main window when the application is starting.
time=" 0.188" type="debug" -> database: SQLite database connection 'FeedReader' to file '/home/xfzv/RSSGuard/database/database.db' seems to be established.
time=" 0.189" type="debug" -> database: SQLite database connection 'FeedlyEntryPoint' to file '/home/xfzv/RSSGuard/database/database.db' seems to be established.
time=" 0.189" type="debug" -> database: SQLite database connection 'GmailEntryPoint' to file '/home/xfzv/RSSGuard/database/database.db' seems to be established.
time=" 0.189" type="debug" -> database: SQLite database connection 'GreaderEntryPoint' to file '/home/xfzv/RSSGuard/database/database.db' seems to be established.
time=" 0.190" type="debug" -> database: SQLite database connection 'OwnCloudServiceEntryPoint' to file '/home/xfzv/RSSGuard/database/database.db' seems to be established.
time=" 0.190" type="debug" -> database: SQLite database connection 'NewsBlurEntryPoint' to file '/home/xfzv/RSSGuard/database/database.db' seems to be established.
time=" 0.190" type="debug" -> database: SQLite database connection 'RedditEntryPoint' to file '/home/xfzv/RSSGuard/database/database.db' seems to be established.
time=" 0.191" type="debug" -> database: SQLite database connection 'StandardServiceEntryPoint' to file '/home/xfzv/RSSGuard/database/database.db' seems to be established.
time=" 0.192" type="debug" -> core: Filter accepts row 'xfzv (RSS/ATOM/JSON)' and filter result is: 'true'.
time=" 0.192" type="debug" -> database: SQLite database connection 'StandardServiceRoot' to file '/home/xfzv/RSSGuard/database/database.db' seems to be established.
time=" 0.193" type="debug" -> core: Custom ID of feed when loading from DB is '1'.
time=" 0.193" type="debug" -> core: Custom ID of feed when loading from DB is '2'.
time=" 0.194" type="debug" -> core: Custom ID of feed when loading from DB is '3'.
time=" 0.194" type="debug" -> core: Custom ID of feed when loading from DB is '4'.
time=" 0.194" type="debug" -> core: Custom ID of feed when loading from DB is '5'.
time=" 0.194" type="debug" -> core: Custom ID of feed when loading from DB is '6'.
time=" 0.194" type="debug" -> core: Custom ID of feed when loading from DB is '7'.
time=" 0.215" type="warning" -> libpng warning: iCCP: known incorrect sRGB profile
time=" 0.240" type="debug" -> database: SQLite database connection 'RecycleBin' to file '/home/xfzv/RSSGuard/database/database.db' seems to be established.
time=" 0.245" type="debug" -> database: SQLite database connection 'ImportantNode' to file '/home/xfzv/RSSGuard/database/database.db' seems to be established.
time=" 0.250" type="debug" -> database: SQLite database connection 'RootItem' to file '/home/xfzv/RSSGuard/database/database.db' seems to be established.
time=" 0.254" type="debug" -> database: SQLite connection 'StandardServiceRoot' is already active.
time=" 0.254" type="debug" -> database: SQLite database connection 'StandardServiceRoot' to file '/home/xfzv/RSSGuard/database/database.db' seems to be established.
time=" 0.261" type="debug" -> database: SQLite database connection 'TtRssServiceEntryPoint' to file '/home/xfzv/RSSGuard/database/database.db' seems to be established.
time=" 0.262" type="debug" -> gui: Feed list item expanded - xfzv (RSS/ATOM/JSON)
time=" 0.262" type="debug" -> core: Filter accepts row 'Recycle bin' and filter result is: 'true'.
time=" 0.262" type="debug" -> core: Filter accepts row 'Important articles' and filter result is: 'true'.
time=" 0.262" type="debug" -> core: Filter accepts row 'Unread articles' and filter result is: 'true'.
time=" 0.262" type="debug" -> core: Filter accepts row 'Labels' and filter result is: 'true'.
time=" 0.264" type="debug" -> gui: Feed list item expanded - IT
time=" 0.264" type="debug" -> gui: Feed list item expanded - News
time=" 0.265" type="debug" -> core: No execution message received from other app instances.
time=" 0.292" type="debug" -> core: Filter accepts row 'xfzv (RSS/ATOM/JSON)' and filter result is: 'true'.
time=" 0.305" type="debug" -> gui: Message splitter moved.
time=" 1.092" type="debug" -> gui: Message list got focus with reason 'Qt::MouseFocusReason'.
time=" 4.863" type="debug" -> gui: Message list got focus with reason 'Qt::PopupFocusReason'.
time=" 5.238" type="debug" -> CTRL is NOT pressed while sorting articles - sorting with standard mode.
time=" 5.238" type="debug" -> Displaying messages from feeds IDs: ''1'' and URLs: 'https://www.kernel.org/feeds/all.atom.xml'.
time=" 5.250" type="debug" -> message-model: Repopulated model, SQL statement is now:
'SELECT Messages.id, Messages.is_read, Messages.is_important, Messages.is_deleted, Messages.is_pdeleted, Messages.feed, Messages.title, Messages.url, Messages.author, Messages.date_created, Messages.contents, Messages.enclosures, Messages.score, Messages.account_id, Messages.custom_id, Messages.custom_hash, Feeds.title, CASE WHEN length(Messages.enclosures) > 10 THEN 'true' ELSE 'false' END AS has_enclosures FROM Messages LEFT JOIN Feeds ON Messages.feed = Feeds.custom_id AND Messages.account_id = Feeds.account_id WHERE Feeds.custom_id IN ('90') AND Messages.is_deleted = 0 AND Messages.is_pdeleted = 0 AND Messages.account_id = 1 ORDER BY Messages.date_created DESC, Messages.id DESC;'.
time=" 8.973" type="debug" -> gui: Message list got focus with reason 'Qt::MouseFocusReason'.
time=" 9.408" type="debug" -> gui: Main window's close event
time=" 9.408" type="debug" -> gui: Main window's hide event
time=" 9.411" type="debug" -> core: Cleaning up resources and saving application state.
time=" 9.411" type="debug" -> core: Close lock was obtained safely.
time=" 9.411" type="debug" -> core: Stopping StandardServiceRoot instance.time=" 9.411" type="debug" -> feed-downloader: Destroying FeedDownloader instance.
time=" 9.411" type="debug" -> gui: Destroying FormMain instance.
time=" 9.412" type="debug" -> gui: Destroying TabWidget instance.
time=" 9.412" type="debug" -> gui: Destroying FeedMessageViewer instance.
time=" 9.412" type="debug" -> gui: Destroying BaseToolBar instance.
time=" 9.413" type="debug" -> network: Destroying Downloader instance.
time=" 9.413" type="debug" -> network: Destroying SilentNetworkAccessManager instance.
time=" 9.413" type="debug" -> network: Destroying Downloader instance.
time=" 9.413" type="debug" -> network: Destroying SilentNetworkAccessManager instance.
time=" 9.413" type="debug" -> gui: Destroying MessagesView instance.
time=" 9.413" type="debug" -> gui: Destroying BaseToolBar instance.
time=" 9.414" type="debug" -> gui: Destroying FeedsView instance.
time=" 9.414" type="debug" -> gui: Destroying TabBar instance.
time=" 9.414" type="debug" -> gui: Destroying StatusBar instance.
time=" 9.418" type="debug" -> core: Destroying Application instance.
time=" 9.418" type="debug" -> core: Destroying Mutex instance.
time=" 9.445" type="debug" -> gui: Destroying IconFactory instance.
time=" 9.445" type="debug" -> core: Destroying FeedReader instance.
time=" 9.445" type="debug" -> feed-model: Destroying FeedsModel instance.
time=" 9.446" type="debug" -> feed-model: Destroying FeedsProxyModel instance
time=" 9.446" type="debug" -> message-model: Destroying MessagesModel instance.
time=" 9.446" type="debug" -> message-model: Destroying MessagesProxyModel instance.
```
</details>
### Operating system and version
* OS: Gentoo
* RSS Guard version: 4.2.3
| defect | columns in article list are reset to default when quitting rssguard brief description of the issue disclaimer i cannot reproduce with a fresh profile i have no idea what s going on with my config file if i set a new column in the articles list panel i d like to have feed which isn t enabled by default and quit rssguard then after re launching the app the columns are reset to default i e the feed column is no longer displayed and i have to enable it again manually happens with any criteria i use d data path to my rssguard directory where my config ini and my database are located if that matters how to reproduce the bug disclaimer i cannot reproduce with a fresh profile i have no idea what s going on with my config file in the articles list right click on the column bar and check for example feed so that the displayed columns are as follows read important feed title date quit rssguard open rssguard again columns are reset to default read important title date what was the expected result columns are memorized after quitting rssguard what actually happened columns are reset to default after quitting rssguard debug log log time type debug core initializing settings in home xfzv rssguard config config ini custom way time type debug database file based sqlite database connection databasefactory to file home xfzv rssguard database database db seems to be established time type debug database file based sqlite database has version time type debug gui available icon theme paths usr share icons icons graphics home xfzv rssguard icons usr bin icons time type debug gui icon theme papirus dark already loaded time type debug gui found path of base skin skins nudus base time type debug gui local file skins nudus dark html wrapper html exists using it for the skin time type debug gui local file skins nudus dark html style css exists using it for the skin time type debug gui trying to load base file skins nudus base html enclosure image html for the skin time type debug gui trying to load base file skins nudus base html single message html for the skin time type debug gui trying to load base file skins nudus base html enclosure every html for the skin time type debug gui local file skins nudus dark qt style qss exists using it for the skin time type debug gui trying to load base file skins nudus base html adblocked html for the skin time type debug gui setting style kvantum dark time type critical gui skipped setting of application style and skin because there is already some style set time type debug gui skin nudus dark loaded time type debug network disabling application wide proxy completely time type debug core openssl version openssl jul time type debug core openssl supported true time type debug core starting rss guard time type debug core instantiated class application time type debug core starting to load active localization desired localization is en us time type debug core application localization en us loaded successfully specifically sublocalization en us was loaded time type warning core qt localization en us was not loaded successfully time type debug database sqlite database connection messagesmodel to file home xfzv rssguard database database db seems to be established time type debug message model repopulated model sql statement is now select messages id messages is read messages is important messages is deleted messages is pdeleted messages feed messages title messages url messages author messages date created messages contents messages enclosures messages score messages account id messages custom id messages custom hash feeds title case when length messages enclosures then true else false end as has enclosures from messages left join feeds on messages feed feeds custom id and messages account id feeds account id where time type debug core auto download timer started with interval ms time type debug core creating feeddownloader singleton time type debug core requesting update for all feeds on application startup time type debug gui creating main application form in thread time type debug gui current row changed proxy qmodelindex qobject source qmodelindex qobject time type debug network settings of basenetworkaccessmanager loaded time type debug network settings of basenetworkaccessmanager loaded time type debug network settings of basenetworkaccessmanager loaded time type debug gui creating tray icon menu time type debug ctrl is not pressed while sorting articles sorting with standard mode time type debug message model repopulated model sql statement is now select messages id messages is read messages is important messages is deleted messages is pdeleted messages feed messages title messages url messages author messages date created messages contents messages enclosures messages score messages account id messages custom id messages custom hash feeds title case when length messages enclosures then true else false end as has enclosures from messages left join feeds on messages feed feeds custom id and messages account id feeds account id where order by messages id desc time type debug gui reloading of msg selections took miliseconds time type debug ctrl is not pressed while sorting articles sorting with standard mode time type debug message model repopulated model sql statement is now select messages id messages is read messages is important messages is deleted messages is pdeleted messages feed messages title messages url messages author messages date created messages contents messages enclosures messages score messages account id messages custom id messages custom hash feeds title case when length messages enclosures then true else false end as has enclosures from messages left join feeds on messages feed feeds custom id and messages account id feeds account id where order by messages date created desc messages id desc time type debug core showing the main window when the application is starting time type debug database sqlite database connection feedreader to file home xfzv rssguard database database db seems to be established time type debug database sqlite database connection feedlyentrypoint to file home xfzv rssguard database database db seems to be established time type debug database sqlite database connection gmailentrypoint to file home xfzv rssguard database database db seems to be established time type debug database sqlite database connection greaderentrypoint to file home xfzv rssguard database database db seems to be established time type debug database sqlite database connection owncloudserviceentrypoint to file home xfzv rssguard database database db seems to be established time type debug database sqlite database connection newsblurentrypoint to file home xfzv rssguard database database db seems to be established time type debug database sqlite database connection redditentrypoint to file home xfzv rssguard database database db seems to be established time type debug database sqlite database connection standardserviceentrypoint to file home xfzv rssguard database database db seems to be established time type debug core filter accepts row xfzv rss atom json and filter result is true time type debug database sqlite database connection standardserviceroot to file home xfzv rssguard database database db seems to be established time type debug core custom id of feed when loading from db is time type debug core custom id of feed when loading from db is time type debug core custom id of feed when loading from db is time type debug core custom id of feed when loading from db is time type debug core custom id of feed when loading from db is time type debug core custom id of feed when loading from db is time type debug core custom id of feed when loading from db is time type warning libpng warning iccp known incorrect srgb profile time type debug database sqlite database connection recyclebin to file home xfzv rssguard database database db seems to be established time type debug database sqlite database connection importantnode to file home xfzv rssguard database database db seems to be established time type debug database sqlite database connection rootitem to file home xfzv rssguard database database db seems to be established time type debug database sqlite connection standardserviceroot is already active time type debug database sqlite database connection standardserviceroot to file home xfzv rssguard database database db seems to be established time type debug database sqlite database connection ttrssserviceentrypoint to file home xfzv rssguard database database db seems to be established time type debug gui feed list item expanded xfzv rss atom json time type debug core filter accepts row recycle bin and filter result is true time type debug core filter accepts row important articles and filter result is true time type debug core filter accepts row unread articles and filter result is true time type debug core filter accepts row labels and filter result is true time type debug gui feed list item expanded it time type debug gui feed list item expanded news time type debug core no execution message received from other app instances time type debug core filter accepts row xfzv rss atom json and filter result is true time type debug gui message splitter moved time type debug gui message list got focus with reason qt mousefocusreason time type debug gui message list got focus with reason qt popupfocusreason time type debug ctrl is not pressed while sorting articles sorting with standard mode time type debug displaying messages from feeds ids and urls time type debug message model repopulated model sql statement is now select messages id messages is read messages is important messages is deleted messages is pdeleted messages feed messages title messages url messages author messages date created messages contents messages enclosures messages score messages account id messages custom id messages custom hash feeds title case when length messages enclosures then true else false end as has enclosures from messages left join feeds on messages feed feeds custom id and messages account id feeds account id where feeds custom id in and messages is deleted and messages is pdeleted and messages account id order by messages date created desc messages id desc time type debug gui message list got focus with reason qt mousefocusreason time type debug gui main window s close event time type debug gui main window s hide event time type debug core cleaning up resources and saving application state time type debug core close lock was obtained safely time type debug core stopping standardserviceroot instance time type debug feed downloader destroying feeddownloader instance time type debug gui destroying formmain instance time type debug gui destroying tabwidget instance time type debug gui destroying feedmessageviewer instance time type debug gui destroying basetoolbar instance time type debug network destroying downloader instance time type debug network destroying silentnetworkaccessmanager instance time type debug network destroying downloader instance time type debug network destroying silentnetworkaccessmanager instance time type debug gui destroying messagesview instance time type debug gui destroying basetoolbar instance time type debug gui destroying feedsview instance time type debug gui destroying tabbar instance time type debug gui destroying statusbar instance time type debug core destroying application instance time type debug core destroying mutex instance time type debug gui destroying iconfactory instance time type debug core destroying feedreader instance time type debug feed model destroying feedsmodel instance time type debug feed model destroying feedsproxymodel instance time type debug message model destroying messagesmodel instance time type debug message model destroying messagesproxymodel instance operating system and version os gentoo rss guard version | 1 |
15,358 | 2,850,657,865 | IssuesEvent | 2015-05-31 19:18:39 | damonkohler/sl4a | https://api.github.com/repos/damonkohler/sl4a | opened | Sensor event time stamp errors | auto-migrated Priority-Medium Type-Defect | _From @GoogleCodeExporter on May 31, 2015 11:28_
```
Sensor events entered into the event queue have a time stamp which 'sticks' for
between 4 and 6 entries before updating. Run the following script:
import android, time
droid = android.Android()
t = time.time()
droid.startSensing()
time.sleep(2)
e = droid.eventPoll(60).result
for i in range(17,55):
print e[i]['data']['time'] - t
droid.stopSensing()
You will get someting like:
0.763589143753
0.763589143753
0.764589071274
0.765588998795
0.765588998795
0.979588985443
0.980589151382
0.980589151382
0.983589172363
0.984589099884
0.986589193344
1.19458913803
1.19658899307
1.19658899307
1.19758915901
1.41658902168
1.41758918762
1.41758918762
1.41858911514
1.41958904266
1.42158913612
1.63858914375
1.63858914375
1.63858914375
1.63958907127
1.86158919334
1.86258912086
1.86258912086
1.86358904839
1.86458921432
1.86558914185
2.08958911896
2.09158921242
2.09158921242
2.09158921242
2.31058907509
2.31158900261
2.31258916855
This makes it impossible to relate readings to given points in time.
```
Original issue reported on code.google.com by `joka...@gmail.com` on 22 Feb 2011 at 10:36
_Copied from original issue: damonkohler/android-scripting#522_ | 1.0 | Sensor event time stamp errors - _From @GoogleCodeExporter on May 31, 2015 11:28_
```
Sensor events entered into the event queue have a time stamp which 'sticks' for
between 4 and 6 entries before updating. Run the following script:
import android, time
droid = android.Android()
t = time.time()
droid.startSensing()
time.sleep(2)
e = droid.eventPoll(60).result
for i in range(17,55):
print e[i]['data']['time'] - t
droid.stopSensing()
You will get someting like:
0.763589143753
0.763589143753
0.764589071274
0.765588998795
0.765588998795
0.979588985443
0.980589151382
0.980589151382
0.983589172363
0.984589099884
0.986589193344
1.19458913803
1.19658899307
1.19658899307
1.19758915901
1.41658902168
1.41758918762
1.41758918762
1.41858911514
1.41958904266
1.42158913612
1.63858914375
1.63858914375
1.63858914375
1.63958907127
1.86158919334
1.86258912086
1.86258912086
1.86358904839
1.86458921432
1.86558914185
2.08958911896
2.09158921242
2.09158921242
2.09158921242
2.31058907509
2.31158900261
2.31258916855
This makes it impossible to relate readings to given points in time.
```
Original issue reported on code.google.com by `joka...@gmail.com` on 22 Feb 2011 at 10:36
_Copied from original issue: damonkohler/android-scripting#522_ | defect | sensor event time stamp errors from googlecodeexporter on may sensor events entered into the event queue have a time stamp which sticks for between and entries before updating run the following script import android time droid android android t time time droid startsensing time sleep e droid eventpoll result for i in range print e t droid stopsensing you will get someting like this makes it impossible to relate readings to given points in time original issue reported on code google com by joka gmail com on feb at copied from original issue damonkohler android scripting | 1 |
24,964 | 4,156,404,559 | IssuesEvent | 2016-06-16 17:51:39 | django-mptt/django-mptt | https://api.github.com/repos/django-mptt/django-mptt | closed | django 1.10 'Options' object has no attribute 'concrete_managers' | Defect | Hi,
I am getting 'Options' object has no attribute 'concrete_managers' error when i try to run my project.
Note:
I have modified models.py as said in issue #469
Error is as:
... cls = meta.register(cls)
File "/Users/burakk/BurakWorks/Web/VIRTUAL_ENVIRONMENTS/python3.5.0_pikto_web_dj_1_10/lib/python3.5/site-packages/mptt/models.py", line 348, in register
cls_managers = cls._meta.concrete_managers + cls._meta.abstract_managers
AttributeError: 'Options' object has no attribute 'concrete_managers' | 1.0 | django 1.10 'Options' object has no attribute 'concrete_managers' - Hi,
I am getting 'Options' object has no attribute 'concrete_managers' error when i try to run my project.
Note:
I have modified models.py as said in issue #469
Error is as:
... cls = meta.register(cls)
File "/Users/burakk/BurakWorks/Web/VIRTUAL_ENVIRONMENTS/python3.5.0_pikto_web_dj_1_10/lib/python3.5/site-packages/mptt/models.py", line 348, in register
cls_managers = cls._meta.concrete_managers + cls._meta.abstract_managers
AttributeError: 'Options' object has no attribute 'concrete_managers' | defect | django options object has no attribute concrete managers hi i am getting options object has no attribute concrete managers error when i try to run my project note i have modified models py as said in issue error is as cls meta register cls file users burakk burakworks web virtual environments pikto web dj lib site packages mptt models py line in register cls managers cls meta concrete managers cls meta abstract managers attributeerror options object has no attribute concrete managers | 1 |
2,145 | 3,051,802,790 | IssuesEvent | 2015-08-12 11:01:55 | lionheart/openradar-mirror | https://api.github.com/repos/lionheart/openradar-mirror | opened | 15391357: UITableView scrollRectToVisible:animated: doesn't work while table is scrolling | classification:ui/usability reproducible:always status:open | #### Description
Summary:
scrollRectToVisible:animated:, inherited by UITableView from UIScrollView, doesn't work if the table view is already scrolling.
Steps to Reproduce:
1. Create an UITableView with UITextFields in the cells, one above where the keyboard's top will appear, one below
2. Add a footer to the table
3. Set the UITableView's contentInsets so you can scroll the whole thing properly while the keyboard is on screen
4. Configure the first UITextField's return button to call becomeFirstResponder on the second field
5. Make the second UITextField's UIControlEventEditingDidBegin call scrollRectToVisible:animated: on the footer's frame
6. Focus the first UITextField while the second one is off-screen
7. Press return to move to focus to the next UITextField
Expected Results:
The footer should become visible when the focus moves to the second text field.
Actual Results:
Only the second text field becomes visible.
Notes:
This does not occur if the second text field is already visible when becomeFirstResponder is called. So if becomeFirstResponder doesn't cause scrolling, the explicit scrolling works. If you add dispatch_async(dispatch_get_main_queue() ^{}) around the scrollRectToVisible:animated:, the scrolling works regardless of the visibility of the fields.
-
Product Version: 7.0.3
Created: 2013-11-05T08:20:02.682577
Originated: 2013-11-05T10:19:00
Open Radar Link: http://www.openradar.me/15391357 | True | 15391357: UITableView scrollRectToVisible:animated: doesn't work while table is scrolling - #### Description
Summary:
scrollRectToVisible:animated:, inherited by UITableView from UIScrollView, doesn't work if the table view is already scrolling.
Steps to Reproduce:
1. Create an UITableView with UITextFields in the cells, one above where the keyboard's top will appear, one below
2. Add a footer to the table
3. Set the UITableView's contentInsets so you can scroll the whole thing properly while the keyboard is on screen
4. Configure the first UITextField's return button to call becomeFirstResponder on the second field
5. Make the second UITextField's UIControlEventEditingDidBegin call scrollRectToVisible:animated: on the footer's frame
6. Focus the first UITextField while the second one is off-screen
7. Press return to move to focus to the next UITextField
Expected Results:
The footer should become visible when the focus moves to the second text field.
Actual Results:
Only the second text field becomes visible.
Notes:
This does not occur if the second text field is already visible when becomeFirstResponder is called. So if becomeFirstResponder doesn't cause scrolling, the explicit scrolling works. If you add dispatch_async(dispatch_get_main_queue() ^{}) around the scrollRectToVisible:animated:, the scrolling works regardless of the visibility of the fields.
-
Product Version: 7.0.3
Created: 2013-11-05T08:20:02.682577
Originated: 2013-11-05T10:19:00
Open Radar Link: http://www.openradar.me/15391357 | non_defect | uitableview scrollrecttovisible animated doesn t work while table is scrolling description summary scrollrecttovisible animated inherited by uitableview from uiscrollview doesn t work if the table view is already scrolling steps to reproduce create an uitableview with uitextfields in the cells one above where the keyboard s top will appear one below add a footer to the table set the uitableview s contentinsets so you can scroll the whole thing properly while the keyboard is on screen configure the first uitextfield s return button to call becomefirstresponder on the second field make the second uitextfield s uicontroleventeditingdidbegin call scrollrecttovisible animated on the footer s frame focus the first uitextfield while the second one is off screen press return to move to focus to the next uitextfield expected results the footer should become visible when the focus moves to the second text field actual results only the second text field becomes visible notes this does not occur if the second text field is already visible when becomefirstresponder is called so if becomefirstresponder doesn t cause scrolling the explicit scrolling works if you add dispatch async dispatch get main queue around the scrollrecttovisible animated the scrolling works regardless of the visibility of the fields product version created originated open radar link | 0 |
14,759 | 2,831,389,399 | IssuesEvent | 2015-05-24 15:54:16 | nobodyguy/dslrdashboard | https://api.github.com/repos/nobodyguy/dslrdashboard | closed | LV doesn't work with Nexus 5 or Nexus 7 (Android 4.4.2) | auto-migrated Priority-Medium Type-Defect | ```
What steps will reproduce the problem?
1. App freezes when LV button is pressed. Problem is version of OpenCV that
ships with app (and Play Store updates).
2. OpenCV_2.4.6_Manager_2.9_armv7a_neon.apk works properly.
3.
What is the expected output? What do you see instead?
What version of the product are you using? On what operating system?
0.30.30
Android 4.4.2
Please provide any additional information below.
```
Original issue reported on code.google.com by `Harmon2...@gmail.com` on 30 Dec 2013 at 1:45 | 1.0 | LV doesn't work with Nexus 5 or Nexus 7 (Android 4.4.2) - ```
What steps will reproduce the problem?
1. App freezes when LV button is pressed. Problem is version of OpenCV that
ships with app (and Play Store updates).
2. OpenCV_2.4.6_Manager_2.9_armv7a_neon.apk works properly.
3.
What is the expected output? What do you see instead?
What version of the product are you using? On what operating system?
0.30.30
Android 4.4.2
Please provide any additional information below.
```
Original issue reported on code.google.com by `Harmon2...@gmail.com` on 30 Dec 2013 at 1:45 | defect | lv doesn t work with nexus or nexus android what steps will reproduce the problem app freezes when lv button is pressed problem is version of opencv that ships with app and play store updates opencv manager neon apk works properly what is the expected output what do you see instead what version of the product are you using on what operating system android please provide any additional information below original issue reported on code google com by gmail com on dec at | 1 |
27,107 | 4,875,488,546 | IssuesEvent | 2016-11-16 09:45:04 | TNGSB/eWallet | https://api.github.com/repos/TNGSB/eWallet | closed | eWallet_MobileApp_The First FAQ section is incomplete # 64 | Defect - Medium (Sev-3) | The FAQ section’s first FAQ “1. What’s Touch ’n Go Wallet” does not have any sensible information upon clicking the question for the FAQ answer | 1.0 | eWallet_MobileApp_The First FAQ section is incomplete # 64 - The FAQ section’s first FAQ “1. What’s Touch ’n Go Wallet” does not have any sensible information upon clicking the question for the FAQ answer | defect | ewallet mobileapp the first faq section is incomplete the faq section’s first faq “ what’s touch ’n go wallet” does not have any sensible information upon clicking the question for the faq answer | 1 |
52,097 | 13,211,388,569 | IssuesEvent | 2020-08-15 22:47:05 | icecube-trac/tix4 | https://api.github.com/repos/icecube-trac/tix4 | opened | Hessian can not be evaluated using Python in photonics-service (Trac #1684) | Incomplete Migration Migrated from Trac combo reconstruction defect | <details>
<summary><em>Migrated from <a href="https://code.icecube.wisc.edu/projects/icecube/ticket/1684">https://code.icecube.wisc.edu/projects/icecube/ticket/1684</a>, reported by icecubeand owned by andrii.terliuk</em></summary>
<p>
```json
{
"status": "closed",
"changetime": "2019-02-13T14:13:10",
"_ts": "1550067190995086",
"description": "Calling the Hessian from python gives random values for the hessian matrix (for both the Quantiles and MeanExpectedCharge). The Gradient works. \n\nOnly sometimes (maybe once out of 10 times), the hessian matrix seems to be what is really returned by the corresponding c function, given the fact that it is similar in these cases. However, it is not symmetric, which speaks for a wrong matrix from the beginning.",
"reporter": "icecube",
"cc": "gluesenkamp",
"resolution": "fixed",
"time": "2016-05-03T11:31:13",
"component": "combo reconstruction",
"summary": "Hessian can not be evaluated using Python in photonics-service",
"priority": "normal",
"keywords": "",
"milestone": "",
"owner": "andrii.terliuk",
"type": "defect"
}
```
</p>
</details>
| 1.0 | Hessian can not be evaluated using Python in photonics-service (Trac #1684) - <details>
<summary><em>Migrated from <a href="https://code.icecube.wisc.edu/projects/icecube/ticket/1684">https://code.icecube.wisc.edu/projects/icecube/ticket/1684</a>, reported by icecubeand owned by andrii.terliuk</em></summary>
<p>
```json
{
"status": "closed",
"changetime": "2019-02-13T14:13:10",
"_ts": "1550067190995086",
"description": "Calling the Hessian from python gives random values for the hessian matrix (for both the Quantiles and MeanExpectedCharge). The Gradient works. \n\nOnly sometimes (maybe once out of 10 times), the hessian matrix seems to be what is really returned by the corresponding c function, given the fact that it is similar in these cases. However, it is not symmetric, which speaks for a wrong matrix from the beginning.",
"reporter": "icecube",
"cc": "gluesenkamp",
"resolution": "fixed",
"time": "2016-05-03T11:31:13",
"component": "combo reconstruction",
"summary": "Hessian can not be evaluated using Python in photonics-service",
"priority": "normal",
"keywords": "",
"milestone": "",
"owner": "andrii.terliuk",
"type": "defect"
}
```
</p>
</details>
| defect | hessian can not be evaluated using python in photonics service trac migrated from json status closed changetime ts description calling the hessian from python gives random values for the hessian matrix for both the quantiles and meanexpectedcharge the gradient works n nonly sometimes maybe once out of times the hessian matrix seems to be what is really returned by the corresponding c function given the fact that it is similar in these cases however it is not symmetric which speaks for a wrong matrix from the beginning reporter icecube cc gluesenkamp resolution fixed time component combo reconstruction summary hessian can not be evaluated using python in photonics service priority normal keywords milestone owner andrii terliuk type defect | 1 |
21,248 | 3,477,596,468 | IssuesEvent | 2015-12-28 02:17:38 | hackdefendr/gps-gimp-paint-studio | https://api.github.com/repos/hackdefendr/gps-gimp-paint-studio | closed | Brushes don't work. | auto-migrated Priority-Medium Type-Defect | ```
I've just installed GPS 1.5 in my GIMP 2.6.10 as I did some time ago. It worked
flawlessly before, but now, even if I change the brush, the brush settings
don't change, for example, if I change to the brush GPS Rocket Fire, nothing
changes, the brush size, shape, color, nothing changes :/
I'm using it in Ubuntu 10.10, it also doesn't work in Windows 7 Ultimate 64-bit.
What should I do?
```
Original issue reported on code.google.com by `thebighe...@gmail.com` on 23 Jun 2011 at 3:28 | 1.0 | Brushes don't work. - ```
I've just installed GPS 1.5 in my GIMP 2.6.10 as I did some time ago. It worked
flawlessly before, but now, even if I change the brush, the brush settings
don't change, for example, if I change to the brush GPS Rocket Fire, nothing
changes, the brush size, shape, color, nothing changes :/
I'm using it in Ubuntu 10.10, it also doesn't work in Windows 7 Ultimate 64-bit.
What should I do?
```
Original issue reported on code.google.com by `thebighe...@gmail.com` on 23 Jun 2011 at 3:28 | defect | brushes don t work i ve just installed gps in my gimp as i did some time ago it worked flawlessly before but now even if i change the brush the brush settings don t change for example if i change to the brush gps rocket fire nothing changes the brush size shape color nothing changes i m using it in ubuntu it also doesn t work in windows ultimate bit what should i do original issue reported on code google com by thebighe gmail com on jun at | 1 |
193,907 | 14,664,878,662 | IssuesEvent | 2020-12-29 13:02:21 | Thy-Vipe/BeastsOfBermuda-issues | https://api.github.com/repos/Thy-Vipe/BeastsOfBermuda-issues | opened | [Bug] Arrows in setting disappearing | UI bug tester-team | _Originally written by **TripTrap | 76561198378851871**_
Game Version: 1.1.1098
*===== System Specs =====
CPU Brand: Intel(R) Core(TM) i7-8700K CPU @ 3.70GHz
Vendor: GenuineIntel
GPU Brand: NVIDIA GeForce GTX 1070 Ti
GPU Driver Info: Unknown
Num CPU Cores: 6
===================*
Context: **Option/Setting Menu**
Map: Islatitania
*Expected Results:* Arrows appearing again after cancelling out of the setting drop down menu.
*Actual Results:* The arrow disappears and reappears only after selecting an option.
*Replication:* Go into settings. Click on one of the arrows on a graphic option. Note that the arrow will now disappear when the drop down menu opens. Click on an option in the drop down menu and the arrow reappears. Now click on the arrow again and instead of clicking on an option click in the empty space. The drop down menu closes but the arrow does not reappear. | 1.0 | [Bug] Arrows in setting disappearing - _Originally written by **TripTrap | 76561198378851871**_
Game Version: 1.1.1098
*===== System Specs =====
CPU Brand: Intel(R) Core(TM) i7-8700K CPU @ 3.70GHz
Vendor: GenuineIntel
GPU Brand: NVIDIA GeForce GTX 1070 Ti
GPU Driver Info: Unknown
Num CPU Cores: 6
===================*
Context: **Option/Setting Menu**
Map: Islatitania
*Expected Results:* Arrows appearing again after cancelling out of the setting drop down menu.
*Actual Results:* The arrow disappears and reappears only after selecting an option.
*Replication:* Go into settings. Click on one of the arrows on a graphic option. Note that the arrow will now disappear when the drop down menu opens. Click on an option in the drop down menu and the arrow reappears. Now click on the arrow again and instead of clicking on an option click in the empty space. The drop down menu closes but the arrow does not reappear. | non_defect | arrows in setting disappearing originally written by triptrap game version system specs cpu brand intel r core tm cpu vendor genuineintel gpu brand nvidia geforce gtx ti gpu driver info unknown num cpu cores context option setting menu map islatitania expected results arrows appearing again after cancelling out of the setting drop down menu actual results the arrow disappears and reappears only after selecting an option replication go into settings click on one of the arrows on a graphic option note that the arrow will now disappear when the drop down menu opens click on an option in the drop down menu and the arrow reappears now click on the arrow again and instead of clicking on an option click in the empty space the drop down menu closes but the arrow does not reappear | 0 |
81,892 | 31,802,529,768 | IssuesEvent | 2023-09-13 12:06:08 | vector-im/element-x-android | https://api.github.com/repos/vector-im/element-x-android | opened | New DM created on Desktop does not show on EX | T-Defect | ### Steps to reproduce
1. Go to desktop app
2. Create a new DM
3. Send a first message
4. Read a reply
5. Go to EAX
6. Try to find the DM
### Outcome
#### What did you expect?
DM should be there
#### What happened instead?
DM cannot be found
### Your phone model
Pixel 5
### Operating system version
Android 13
### Application version and app store
0.1.7-nightly
### Homeserver
element.io
### Will you send logs?
Yes
### Are you willing to provide a PR?
No | 1.0 | New DM created on Desktop does not show on EX - ### Steps to reproduce
1. Go to desktop app
2. Create a new DM
3. Send a first message
4. Read a reply
5. Go to EAX
6. Try to find the DM
### Outcome
#### What did you expect?
DM should be there
#### What happened instead?
DM cannot be found
### Your phone model
Pixel 5
### Operating system version
Android 13
### Application version and app store
0.1.7-nightly
### Homeserver
element.io
### Will you send logs?
Yes
### Are you willing to provide a PR?
No | defect | new dm created on desktop does not show on ex steps to reproduce go to desktop app create a new dm send a first message read a reply go to eax try to find the dm outcome what did you expect dm should be there what happened instead dm cannot be found your phone model pixel operating system version android application version and app store nightly homeserver element io will you send logs yes are you willing to provide a pr no | 1 |
42,579 | 9,255,536,866 | IssuesEvent | 2019-03-16 11:09:13 | joomla/joomla-cms | https://api.github.com/repos/joomla/joomla-cms | closed | Registration.Activation Problem Strange Message And No Redirection 3.X | No Code Attached Yet | ### Steps to reproduce the issue
Hello Everyone,
I need help with these 2 kinds of problem:
1. I have two languages which are Italian and English and I created two menus for each (register & login) to get the alias in URL.
https://www.ingrossoborseonline.com/it/registrati
https://www.ingrossoborseonline.com/en/register
...
When I registered on the website in the Italian version of the webpage which is [](https://www.ingrossoborseonline.com/it/), I will get the confirmation email and receive something like "https://www.ingrossoborseonline.com/it/component/users/?task=registration.activate&token=f5d455188e4d75c6c21f98f783e35ce8&Itemid=122", the URL will redirect to https://www.ingrossoborseonline.com/it/registratilayout?=complete, so okay, everything going right (a problem will discuss to the part 2), But if I registered with the English version, giving the confirmation URL is "https://www.ingrossoborseonline.com/en/component/users/?task=registration.activate&token=a01453557b8f775895e5cb19576bd781&Itemid=123" with /en which is great, but it will redirect to "https://www.ingrossoborseonline.com/en/registrati" (no sense... Italian and English), so it will get a 404 error, for now, I did a manual redirection to https://www.ingrossoborseonline.com/en/register for resolving this problem and surprisingly get a no English message...

2. The normal redirection is to https://www.ingrossoborseonline.com/it/ ... t=complete[/b] which I get a JSON message I think it is... same as https://www.ingrossoborseonline.com/en/ ... t-complete

Menu structure:

Thank you to everyone, if it can resolve this big problem...
### Expected result
Normal Redirection and normal message with the actual language message.
No white screen.
### System information (as much as possible)
PHP | Linux webd014.cluster023.gra.hosting.ovh.net 4.14.66-ovh-vps-grsec-zfs-classid #1 SMP Thu Aug 23 15:15:40 CEST 2018 x86_64
Database Type | mysql
Versione database | 5.6.39-log
Collation database | latin1_swedish_ci
Collation connessione database | utf8mb4_general_ci
Versione PHP | 7.2.14
Web Server | Apache
WebServer interfaccia PHP | fpm-fcgi
Versione di Joomla! | Joomla! 3.9.4 Stable [ Amani ] 12-March-2019 15:00 GMT
Versione piattaforma Joomla! | Joomla Platform 13.1.0 Stable [ Curiosity ] 24-Apr-2013 00:00 GMT
User Agent | Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/73.0.3683.75 Safari/537.36
PHP:
Safe Mode | No
Open basedir | Nessuno
Display Errors | No
Short Open Tags | Sì
Caricamento file | Sì
Magic Quotes | No
Register Globals | No
Output Buffering | Sì
Percorso salvataggio sessione | /tmp
Auto start sessione | 0
XML abilitato | Sì
Zlib abilitato | Sì
ZIP nativo abilitato | Sì
Funzioni disabilitate | _dyuweyrj4,_dyuweyrj4r,dl
Mbstring abilitato | Sì
Iconv disponibile | Sì
Maximum Input Variables | 16000
=============
FOLDER PERMISSSIONS
=============
administrator/components: writable
administrator/language: writable
administrator/language/it-IT: writable
administrator/language/ru-RU: writable
administrator/language/en-GB: writable
administrator/language/de-DE: writable
administrator/language/overrides: writable
administrator/manifests/files: writable
administrator/manifests/libraries: writable
administrator/manifests/packages: writable
administrator/modules: writable
administrator/templates: writable
components: writable
images: writable
images/swmenufree: writable
images/sampledata: writable
images/slider: writable
images/phocadownload: writable
images/slidereng: writable
images/ArtFeatureCarousel2: writable
images/ArtFeatureCarousel: writable
images/jch_optimize_backup_images: writable
images/headers: writable
images/jch-optimize: writable
images/icethumbs: writable
images/aricloudcarousel: writable
images/banners: writable
language: writable
language/it-IT: writable
language/overrides: writable
language/en-GB: writable
libraries: writable
media: writable
modules: writable
plugins: writable
plugins/search: writable
plugins/sampledata: writable
plugins/community: writable
plugins/acymailing: writable
plugins/fields: writable
plugins/xmap: writable
plugins/twofactorauth: writable
plugins/everything_in_everyway: writable
plugins/editors: writable
plugins/system: writable
plugins/jshoppingcheckout: writable
plugins/privacy: writable
plugins/actionlog: writable
plugins/solidres: writable
plugins/finder: writable
plugins/editors-xtd: writable
plugins/extension: writable
plugins/jshoppingmenu: writable
plugins/jshoppingadmin: writable
plugins/jshoppingrouter: writable
plugins/jshopping: writable
plugins/installer: writable
plugins/user: writable
plugins/quickicons: writable
plugins/jshoppingproducts: writable
plugins/ajax: writable
plugins/mijopolls: writable
plugins/jmonitoring: writable
plugins/authentication: writable
plugins/quickicon: writable
plugins/captcha: writable
plugins/content: writable
templates: writable
configuration.php: NOT writable
xxxxxx/cache: writable
log: writable
tmp: writable
| 1.0 | Registration.Activation Problem Strange Message And No Redirection 3.X - ### Steps to reproduce the issue
Hello Everyone,
I need help with these 2 kinds of problem:
1. I have two languages which are Italian and English and I created two menus for each (register & login) to get the alias in URL.
https://www.ingrossoborseonline.com/it/registrati
https://www.ingrossoborseonline.com/en/register
...
When I registered on the website in the Italian version of the webpage which is [](https://www.ingrossoborseonline.com/it/), I will get the confirmation email and receive something like "https://www.ingrossoborseonline.com/it/component/users/?task=registration.activate&token=f5d455188e4d75c6c21f98f783e35ce8&Itemid=122", the URL will redirect to https://www.ingrossoborseonline.com/it/registratilayout?=complete, so okay, everything going right (a problem will discuss to the part 2), But if I registered with the English version, giving the confirmation URL is "https://www.ingrossoborseonline.com/en/component/users/?task=registration.activate&token=a01453557b8f775895e5cb19576bd781&Itemid=123" with /en which is great, but it will redirect to "https://www.ingrossoborseonline.com/en/registrati" (no sense... Italian and English), so it will get a 404 error, for now, I did a manual redirection to https://www.ingrossoborseonline.com/en/register for resolving this problem and surprisingly get a no English message...

2. The normal redirection is to https://www.ingrossoborseonline.com/it/ ... t=complete[/b] which I get a JSON message I think it is... same as https://www.ingrossoborseonline.com/en/ ... t-complete

Menu structure:

Thank you to everyone, if it can resolve this big problem...
### Expected result
Normal Redirection and normal message with the actual language message.
No white screen.
### System information (as much as possible)
PHP | Linux webd014.cluster023.gra.hosting.ovh.net 4.14.66-ovh-vps-grsec-zfs-classid #1 SMP Thu Aug 23 15:15:40 CEST 2018 x86_64
Database Type | mysql
Versione database | 5.6.39-log
Collation database | latin1_swedish_ci
Collation connessione database | utf8mb4_general_ci
Versione PHP | 7.2.14
Web Server | Apache
WebServer interfaccia PHP | fpm-fcgi
Versione di Joomla! | Joomla! 3.9.4 Stable [ Amani ] 12-March-2019 15:00 GMT
Versione piattaforma Joomla! | Joomla Platform 13.1.0 Stable [ Curiosity ] 24-Apr-2013 00:00 GMT
User Agent | Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/73.0.3683.75 Safari/537.36
PHP:
Safe Mode | No
Open basedir | Nessuno
Display Errors | No
Short Open Tags | Sì
Caricamento file | Sì
Magic Quotes | No
Register Globals | No
Output Buffering | Sì
Percorso salvataggio sessione | /tmp
Auto start sessione | 0
XML abilitato | Sì
Zlib abilitato | Sì
ZIP nativo abilitato | Sì
Funzioni disabilitate | _dyuweyrj4,_dyuweyrj4r,dl
Mbstring abilitato | Sì
Iconv disponibile | Sì
Maximum Input Variables | 16000
=============
FOLDER PERMISSSIONS
=============
administrator/components: writable
administrator/language: writable
administrator/language/it-IT: writable
administrator/language/ru-RU: writable
administrator/language/en-GB: writable
administrator/language/de-DE: writable
administrator/language/overrides: writable
administrator/manifests/files: writable
administrator/manifests/libraries: writable
administrator/manifests/packages: writable
administrator/modules: writable
administrator/templates: writable
components: writable
images: writable
images/swmenufree: writable
images/sampledata: writable
images/slider: writable
images/phocadownload: writable
images/slidereng: writable
images/ArtFeatureCarousel2: writable
images/ArtFeatureCarousel: writable
images/jch_optimize_backup_images: writable
images/headers: writable
images/jch-optimize: writable
images/icethumbs: writable
images/aricloudcarousel: writable
images/banners: writable
language: writable
language/it-IT: writable
language/overrides: writable
language/en-GB: writable
libraries: writable
media: writable
modules: writable
plugins: writable
plugins/search: writable
plugins/sampledata: writable
plugins/community: writable
plugins/acymailing: writable
plugins/fields: writable
plugins/xmap: writable
plugins/twofactorauth: writable
plugins/everything_in_everyway: writable
plugins/editors: writable
plugins/system: writable
plugins/jshoppingcheckout: writable
plugins/privacy: writable
plugins/actionlog: writable
plugins/solidres: writable
plugins/finder: writable
plugins/editors-xtd: writable
plugins/extension: writable
plugins/jshoppingmenu: writable
plugins/jshoppingadmin: writable
plugins/jshoppingrouter: writable
plugins/jshopping: writable
plugins/installer: writable
plugins/user: writable
plugins/quickicons: writable
plugins/jshoppingproducts: writable
plugins/ajax: writable
plugins/mijopolls: writable
plugins/jmonitoring: writable
plugins/authentication: writable
plugins/quickicon: writable
plugins/captcha: writable
plugins/content: writable
templates: writable
configuration.php: NOT writable
xxxxxx/cache: writable
log: writable
tmp: writable
| non_defect | registration activation problem strange message and no redirection x steps to reproduce the issue hello everyone i need help with these kinds of problem i have two languages which are italian and english and i created two menus for each register login to get the alias in url when i registered on the website in the italian version of the webpage which is i will get the confirmation email and receive something like the url will redirect to so okay everything going right a problem will discuss to the part but if i registered with the english version giving the confirmation url is with en which is great but it will redirect to no sense italian and english so it will get a error for now i did a manual redirection to for resolving this problem and surprisingly get a no english message the normal redirection is to t complete which i get a json message i think it is same as t complete menu structure thank you to everyone if it can resolve this big problem expected result normal redirection and normal message with the actual language message no white screen system information as much as possible php linux gra hosting ovh net ovh vps grsec zfs classid smp thu aug cest database type mysql versione database log collation database swedish ci collation connessione database general ci versione php web server apache webserver interfaccia php fpm fcgi versione di joomla joomla stable march gmt versione piattaforma joomla joomla platform stable apr gmt user agent mozilla windows nt applewebkit khtml like gecko chrome safari php safe mode no open basedir nessuno display errors no short open tags sì caricamento file sì magic quotes no register globals no output buffering sì percorso salvataggio sessione tmp auto start sessione xml abilitato sì zlib abilitato sì zip nativo abilitato sì funzioni disabilitate dl mbstring abilitato sì iconv disponibile sì maximum input variables folder permisssions administrator components writable administrator language writable administrator language it it writable administrator language ru ru writable administrator language en gb writable administrator language de de writable administrator language overrides writable administrator manifests files writable administrator manifests libraries writable administrator manifests packages writable administrator modules writable administrator templates writable components writable images writable images swmenufree writable images sampledata writable images slider writable images phocadownload writable images slidereng writable images writable images artfeaturecarousel writable images jch optimize backup images writable images headers writable images jch optimize writable images icethumbs writable images aricloudcarousel writable images banners writable language writable language it it writable language overrides writable language en gb writable libraries writable media writable modules writable plugins writable plugins search writable plugins sampledata writable plugins community writable plugins acymailing writable plugins fields writable plugins xmap writable plugins twofactorauth writable plugins everything in everyway writable plugins editors writable plugins system writable plugins jshoppingcheckout writable plugins privacy writable plugins actionlog writable plugins solidres writable plugins finder writable plugins editors xtd writable plugins extension writable plugins jshoppingmenu writable plugins jshoppingadmin writable plugins jshoppingrouter writable plugins jshopping writable plugins installer writable plugins user writable plugins quickicons writable plugins jshoppingproducts writable plugins ajax writable plugins mijopolls writable plugins jmonitoring writable plugins authentication writable plugins quickicon writable plugins captcha writable plugins content writable templates writable configuration php not writable xxxxxx cache writable log writable tmp writable | 0 |
76,433 | 14,622,361,013 | IssuesEvent | 2020-12-23 00:02:07 | Torkin1/pokemon_goose_game | https://api.github.com/repos/Torkin1/pokemon_goose_game | closed | Rename drawable with lowercase | CorrectiveCode | -cell_bg_BlueCell.png -> -cell_bg_bluecell.png
-cell_bg_Cell.png -> -cell_bg_cell.png
-cell_bg_YellowCell.png -> -cell_bg_yellowcell.png | 1.0 | Rename drawable with lowercase - -cell_bg_BlueCell.png -> -cell_bg_bluecell.png
-cell_bg_Cell.png -> -cell_bg_cell.png
-cell_bg_YellowCell.png -> -cell_bg_yellowcell.png | non_defect | rename drawable with lowercase cell bg bluecell png cell bg bluecell png cell bg cell png cell bg cell png cell bg yellowcell png cell bg yellowcell png | 0 |
3,149 | 2,607,985,704 | IssuesEvent | 2015-02-26 00:51:36 | chrsmithdemos/zen-coding | https://api.github.com/repos/chrsmithdemos/zen-coding | closed | For textarea v0.7.1 - not working?? | auto-migrated Priority-Medium Type-Defect | ```
Tryed Chrome, IE 7, and Firefox.
None of these browsers reacted to Zen Coding basics: Ctrl+E.
Javascript log: No errors.
Some other keys worked like select/delete: Ctrl+L, Ctrl+K.
Ctrl+Shift+A evoked the input form, but after inputting anything and ENTER, it
didn't wrap the selected text.
Any idea what's the issue?
```
-----
Original issue reported on code.google.com by `mzva...@gmail.com` on 6 Apr 2012 at 11:15 | 1.0 | For textarea v0.7.1 - not working?? - ```
Tryed Chrome, IE 7, and Firefox.
None of these browsers reacted to Zen Coding basics: Ctrl+E.
Javascript log: No errors.
Some other keys worked like select/delete: Ctrl+L, Ctrl+K.
Ctrl+Shift+A evoked the input form, but after inputting anything and ENTER, it
didn't wrap the selected text.
Any idea what's the issue?
```
-----
Original issue reported on code.google.com by `mzva...@gmail.com` on 6 Apr 2012 at 11:15 | defect | for textarea not working tryed chrome ie and firefox none of these browsers reacted to zen coding basics ctrl e javascript log no errors some other keys worked like select delete ctrl l ctrl k ctrl shift a evoked the input form but after inputting anything and enter it didn t wrap the selected text any idea what s the issue original issue reported on code google com by mzva gmail com on apr at | 1 |
147,125 | 19,500,433,817 | IssuesEvent | 2021-12-28 01:31:35 | talevy013/TestTal | https://api.github.com/repos/talevy013/TestTal | opened | CVE-2020-10969 (High) detected in jackson-databind-2.6.7.1.jar | security vulnerability | ## CVE-2020-10969 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.6.7.1.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /m2/repository/com/fasterxml/jackson/core/jackson-databind/2.6.7.1/jackson-databind-2.6.7.1.jar</p>
<p>
Dependency Hierarchy:
- :x: **jackson-databind-2.6.7.1.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/talevy013/TestTal/commit/f001f7f069d9289dded859e738eb111a8fd2e984">f001f7f069d9289dded859e738eb111a8fd2e984</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to javax.swing.JEditorPane.
<p>Publish Date: 2020-03-26
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-10969>CVE-2020-10969</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10969">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10969</a></p>
<p>Release Date: 2020-03-26</p>
<p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.8.11.6;com.fasterxml.jackson.core:jackson-databind:2.7.9.7</p>
</p>
</details>
<p></p>
| True | CVE-2020-10969 (High) detected in jackson-databind-2.6.7.1.jar - ## CVE-2020-10969 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.6.7.1.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /m2/repository/com/fasterxml/jackson/core/jackson-databind/2.6.7.1/jackson-databind-2.6.7.1.jar</p>
<p>
Dependency Hierarchy:
- :x: **jackson-databind-2.6.7.1.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/talevy013/TestTal/commit/f001f7f069d9289dded859e738eb111a8fd2e984">f001f7f069d9289dded859e738eb111a8fd2e984</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to javax.swing.JEditorPane.
<p>Publish Date: 2020-03-26
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-10969>CVE-2020-10969</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10969">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10969</a></p>
<p>Release Date: 2020-03-26</p>
<p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.8.11.6;com.fasterxml.jackson.core:jackson-databind:2.7.9.7</p>
</p>
</details>
<p></p>
| non_defect | cve high detected in jackson databind jar cve high severity vulnerability vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file pom xml path to vulnerable library repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy x jackson databind jar vulnerable library found in head commit a href vulnerability details fasterxml jackson databind x before mishandles the interaction between serialization gadgets and typing related to javax swing jeditorpane publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson core jackson databind com fasterxml jackson core jackson databind | 0 |
188,809 | 22,046,921,527 | IssuesEvent | 2022-05-30 03:32:53 | panasalap/linux-4.19.72_1 | https://api.github.com/repos/panasalap/linux-4.19.72_1 | closed | CVE-2021-26932 (Medium) detected in multiple libraries - autoclosed | security vulnerability | ## CVE-2021-26932 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>linux-yoctov5.4.51</b>, <b>linux-yoctov5.4.51</b>, <b>linuxlinux-4.19.224</b></p></summary>
<p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
An issue was discovered in the Linux kernel 3.2 through 5.10.16, as used by Xen. Grant mapping operations often occur in batch hypercalls, where a number of operations are done in a single hypercall, the success or failure of each one is reported to the backend driver, and the backend driver then loops over the results, performing follow-up actions based on the success or failure of each operation. Unfortunately, when running in PV mode, the Linux backend drivers mishandle this: Some errors are ignored, effectively implying their success from the success of related batch elements. In other cases, errors resulting from one batch element lead to further batch elements not being inspected, and hence successful ones to not be possible to properly unmap upon error recovery. Only systems with Linux backends running in PV mode are vulnerable. Linux backends run in HVM / PVH modes are not vulnerable. This affects arch/*/xen/p2m.c and drivers/xen/gntdev.c.
<p>Publish Date: 2021-02-17
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-26932>CVE-2021-26932</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-26932">https://nvd.nist.gov/vuln/detail/CVE-2021-26932</a></p>
<p>Release Date: 2021-02-17</p>
<p>Fix Resolution: linux-libc-headers - 5.13;linux-yocto - 5.4.20+gitAUTOINC+c11911d4d1_f4d7dbafb1,4.8.26+gitAUTOINC+1c60e003c7_27efc3ba68</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2021-26932 (Medium) detected in multiple libraries - autoclosed - ## CVE-2021-26932 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>linux-yoctov5.4.51</b>, <b>linux-yoctov5.4.51</b>, <b>linuxlinux-4.19.224</b></p></summary>
<p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
An issue was discovered in the Linux kernel 3.2 through 5.10.16, as used by Xen. Grant mapping operations often occur in batch hypercalls, where a number of operations are done in a single hypercall, the success or failure of each one is reported to the backend driver, and the backend driver then loops over the results, performing follow-up actions based on the success or failure of each operation. Unfortunately, when running in PV mode, the Linux backend drivers mishandle this: Some errors are ignored, effectively implying their success from the success of related batch elements. In other cases, errors resulting from one batch element lead to further batch elements not being inspected, and hence successful ones to not be possible to properly unmap upon error recovery. Only systems with Linux backends running in PV mode are vulnerable. Linux backends run in HVM / PVH modes are not vulnerable. This affects arch/*/xen/p2m.c and drivers/xen/gntdev.c.
<p>Publish Date: 2021-02-17
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-26932>CVE-2021-26932</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-26932">https://nvd.nist.gov/vuln/detail/CVE-2021-26932</a></p>
<p>Release Date: 2021-02-17</p>
<p>Fix Resolution: linux-libc-headers - 5.13;linux-yocto - 5.4.20+gitAUTOINC+c11911d4d1_f4d7dbafb1,4.8.26+gitAUTOINC+1c60e003c7_27efc3ba68</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_defect | cve medium detected in multiple libraries autoclosed cve medium severity vulnerability vulnerable libraries linux linux linuxlinux vulnerability details an issue was discovered in the linux kernel through as used by xen grant mapping operations often occur in batch hypercalls where a number of operations are done in a single hypercall the success or failure of each one is reported to the backend driver and the backend driver then loops over the results performing follow up actions based on the success or failure of each operation unfortunately when running in pv mode the linux backend drivers mishandle this some errors are ignored effectively implying their success from the success of related batch elements in other cases errors resulting from one batch element lead to further batch elements not being inspected and hence successful ones to not be possible to properly unmap upon error recovery only systems with linux backends running in pv mode are vulnerable linux backends run in hvm pvh modes are not vulnerable this affects arch xen c and drivers xen gntdev c publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution linux libc headers linux yocto gitautoinc gitautoinc step up your open source security game with whitesource | 0 |
227,109 | 25,031,162,554 | IssuesEvent | 2022-11-04 12:30:43 | sast-automation-dev/easybuggy4sb-46 | https://api.github.com/repos/sast-automation-dev/easybuggy4sb-46 | opened | esapi-2.1.0.1.jar: 14 vulnerabilities (highest severity is: 9.8) | security vulnerability | <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>esapi-2.1.0.1.jar</b></p></summary>
<p></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/xalan/xalan/2.7.0/xalan-2.7.0.jar</p>
<p>
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/easybuggy4sb-46/commit/dde0eed02d400b37a04af5942650dfa77c0fb6d2">dde0eed02d400b37a04af5942650dfa77c0fb6d2</a></p></details>
## Vulnerabilities
| CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (esapi version) | Remediation Available |
| ------------- | ------------- | ----- | ----- | ----- | ------------- | --- |
| [CVE-2016-1000031](https://www.mend.io/vulnerability-database/CVE-2016-1000031) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | commons-fileupload-1.3.1.jar | Transitive | 2.2.0.0 | ✅ |
| [CVE-2016-2510](https://www.mend.io/vulnerability-database/CVE-2016-2510) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | bsh-core-2.0b4.jar | Transitive | N/A* | ❌ |
| [CVE-2016-3092](https://www.mend.io/vulnerability-database/CVE-2016-3092) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | commons-fileupload-1.3.1.jar | Transitive | 2.2.0.0 | ✅ |
| [CVE-2012-0881](https://www.mend.io/vulnerability-database/CVE-2012-0881) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | xercesImpl-2.8.0.jar | Transitive | N/A* | ❌ |
| [WS-2014-0034](https://commons.apache.org/proper/commons-fileupload/changes-report.html) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | commons-fileupload-1.3.1.jar | Transitive | 2.2.0.0 | ✅ |
| [CVE-2014-0107](https://www.mend.io/vulnerability-database/CVE-2014-0107) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.3 | xalan-2.7.0.jar | Transitive | 2.5.0.0 | ✅ |
| [CVE-2019-10086](https://www.mend.io/vulnerability-database/CVE-2019-10086) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.3 | commons-beanutils-core-1.8.3.jar | Transitive | 2.2.0.0 | ✅ |
| [CVE-2014-0114](https://www.mend.io/vulnerability-database/CVE-2014-0114) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.3 | commons-beanutils-core-1.8.3.jar | Transitive | N/A* | ❌ |
| [CVE-2016-10006](https://www.mend.io/vulnerability-database/CVE-2016-10006) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | antisamy-1.5.3.jar | Transitive | 2.2.0.0 | ✅ |
| [CVE-2017-14735](https://www.mend.io/vulnerability-database/CVE-2017-14735) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | antisamy-1.5.3.jar | Transitive | 2.2.0.0 | ✅ |
| [CVE-2013-4002](https://www.mend.io/vulnerability-database/CVE-2013-4002) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.9 | xercesImpl-2.8.0.jar | Transitive | N/A* | ❌ |
| [CVE-2009-2625](https://www.mend.io/vulnerability-database/CVE-2009-2625) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.3 | xercesImpl-2.8.0.jar | Transitive | N/A* | ❌ |
| [CVE-2012-5783](https://www.mend.io/vulnerability-database/CVE-2012-5783) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 4.8 | commons-httpclient-3.1.jar | Transitive | 2.2.0.0 | ✅ |
| [CVE-2021-29425](https://www.mend.io/vulnerability-database/CVE-2021-29425) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 4.8 | commons-io-2.2.jar | Transitive | N/A* | ❌ |
<p>*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the section "Details" below to see if there is a version of transitive dependency where vulnerability is fixed.</p>
## Details
<details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2016-1000031</summary>
### Vulnerable Library - <b>commons-fileupload-1.3.1.jar</b></p>
<p>The Apache Commons FileUpload component provides a simple yet flexible means of adding support for multipart
file upload functionality to servlets and web applications.</p>
<p>Library home page: <a href="http://commons.apache.org/proper/commons-fileupload/">http://commons.apache.org/proper/commons-fileupload/</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/commons-fileupload/commons-fileupload/1.3.1/commons-fileupload-1.3.1.jar</p>
<p>
Dependency Hierarchy:
- esapi-2.1.0.1.jar (Root Library)
- :x: **commons-fileupload-1.3.1.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/easybuggy4sb-46/commit/dde0eed02d400b37a04af5942650dfa77c0fb6d2">dde0eed02d400b37a04af5942650dfa77c0fb6d2</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Apache Commons FileUpload before 1.3.3 DiskFileItem File Manipulation Remote Code Execution
<p>Publish Date: 2016-10-25
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2016-1000031>CVE-2016-1000031</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000031">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000031</a></p>
<p>Release Date: 2016-10-25</p>
<p>Fix Resolution (commons-fileupload:commons-fileupload): 1.3.1-jenkins-1</p>
<p>Direct dependency fix Resolution (org.owasp.esapi:esapi): 2.2.0.0</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2016-2510</summary>
### Vulnerable Library - <b>bsh-core-2.0b4.jar</b></p>
<p>BeanShell core</p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/beanshell/bsh-core/2.0b4/bsh-core-2.0b4.jar</p>
<p>
Dependency Hierarchy:
- esapi-2.1.0.1.jar (Root Library)
- :x: **bsh-core-2.0b4.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/easybuggy4sb-46/commit/dde0eed02d400b37a04af5942650dfa77c0fb6d2">dde0eed02d400b37a04af5942650dfa77c0fb6d2</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
BeanShell (bsh) before 2.0b6, when included on the classpath by an application that uses Java serialization or XStream, allows remote attackers to execute arbitrary code via crafted serialized data, related to XThis.Handler.
<p>Publish Date: 2016-04-07
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2016-2510>CVE-2016-2510</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>8.1</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2016-2510">https://nvd.nist.gov/vuln/detail/CVE-2016-2510</a></p>
<p>Release Date: 2016-04-07</p>
<p>Fix Resolution: 2.0b6</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2016-3092</summary>
### Vulnerable Library - <b>commons-fileupload-1.3.1.jar</b></p>
<p>The Apache Commons FileUpload component provides a simple yet flexible means of adding support for multipart
file upload functionality to servlets and web applications.</p>
<p>Library home page: <a href="http://commons.apache.org/proper/commons-fileupload/">http://commons.apache.org/proper/commons-fileupload/</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/commons-fileupload/commons-fileupload/1.3.1/commons-fileupload-1.3.1.jar</p>
<p>
Dependency Hierarchy:
- esapi-2.1.0.1.jar (Root Library)
- :x: **commons-fileupload-1.3.1.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/easybuggy4sb-46/commit/dde0eed02d400b37a04af5942650dfa77c0fb6d2">dde0eed02d400b37a04af5942650dfa77c0fb6d2</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
The MultipartStream class in Apache Commons Fileupload before 1.3.2, as used in Apache Tomcat 7.x before 7.0.70, 8.x before 8.0.36, 8.5.x before 8.5.3, and 9.x before 9.0.0.M7 and other products, allows remote attackers to cause a denial of service (CPU consumption) via a long boundary string.
<p>Publish Date: 2016-07-04
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2016-3092>CVE-2016-3092</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3092">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3092</a></p>
<p>Release Date: 2016-07-04</p>
<p>Fix Resolution (commons-fileupload:commons-fileupload): 1.3.1-jenkins-1</p>
<p>Direct dependency fix Resolution (org.owasp.esapi:esapi): 2.2.0.0</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2012-0881</summary>
### Vulnerable Library - <b>xercesImpl-2.8.0.jar</b></p>
<p>Xerces2 is the next generation of high performance, fully compliant XML parsers in the
Apache Xerces family. This new version of Xerces introduces the Xerces Native Interface (XNI),
a complete framework for building parser components and configurations that is extremely
modular and easy to program.</p>
<p>Library home page: <a href="http://xerces.apache.org/xerces2-j">http://xerces.apache.org/xerces2-j</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/xerces/xercesImpl/2.8.0/xercesImpl-2.8.0.jar</p>
<p>
Dependency Hierarchy:
- esapi-2.1.0.1.jar (Root Library)
- xom-1.2.5.jar
- :x: **xercesImpl-2.8.0.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/easybuggy4sb-46/commit/dde0eed02d400b37a04af5942650dfa77c0fb6d2">dde0eed02d400b37a04af5942650dfa77c0fb6d2</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Apache Xerces2 Java Parser before 2.12.0 allows remote attackers to cause a denial of service (CPU consumption) via a crafted message to an XML service, which triggers hash table collisions.
<p>Publish Date: 2017-10-30
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2012-0881>CVE-2012-0881</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0881">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0881</a></p>
<p>Release Date: 2017-10-30</p>
<p>Fix Resolution: 2.12.0</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> WS-2014-0034</summary>
### Vulnerable Library - <b>commons-fileupload-1.3.1.jar</b></p>
<p>The Apache Commons FileUpload component provides a simple yet flexible means of adding support for multipart
file upload functionality to servlets and web applications.</p>
<p>Library home page: <a href="http://commons.apache.org/proper/commons-fileupload/">http://commons.apache.org/proper/commons-fileupload/</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/commons-fileupload/commons-fileupload/1.3.1/commons-fileupload-1.3.1.jar</p>
<p>
Dependency Hierarchy:
- esapi-2.1.0.1.jar (Root Library)
- :x: **commons-fileupload-1.3.1.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/easybuggy4sb-46/commit/dde0eed02d400b37a04af5942650dfa77c0fb6d2">dde0eed02d400b37a04af5942650dfa77c0fb6d2</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
The class FileUploadBase in Apache Commons Fileupload before 1.4 has potential resource leak - InputStream not closed on exception.
<p>Publish Date: 2014-02-17
<p>URL: <a href=https://commons.apache.org/proper/commons-fileupload/changes-report.html>WS-2014-0034</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2014-02-17</p>
<p>Fix Resolution (commons-fileupload:commons-fileupload): 1.3.1-jenkins-1</p>
<p>Direct dependency fix Resolution (org.owasp.esapi:esapi): 2.2.0.0</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2014-0107</summary>
### Vulnerable Library - <b>xalan-2.7.0.jar</b></p>
<p></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/xalan/xalan/2.7.0/xalan-2.7.0.jar</p>
<p>
Dependency Hierarchy:
- esapi-2.1.0.1.jar (Root Library)
- xom-1.2.5.jar
- :x: **xalan-2.7.0.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/easybuggy4sb-46/commit/dde0eed02d400b37a04af5942650dfa77c0fb6d2">dde0eed02d400b37a04af5942650dfa77c0fb6d2</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
The TransformerFactory in Apache Xalan-Java before 2.7.2 does not properly restrict access to certain properties when FEATURE_SECURE_PROCESSING is enabled, which allows remote attackers to bypass expected restrictions and load arbitrary classes or access external resources via a crafted (1) xalan:content-header, (2) xalan:entities, (3) xslt:content-header, or (4) xslt:entities property, or a Java property that is bound to the XSLT 1.0 system-property function.
<p>Publish Date: 2014-04-15
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2014-0107>CVE-2014-0107</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.3</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: Low
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0107">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0107</a></p>
<p>Release Date: 2014-04-15</p>
<p>Fix Resolution (xalan:xalan): 2.7.1-NODEP</p>
<p>Direct dependency fix Resolution (org.owasp.esapi:esapi): 2.5.0.0</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-10086</summary>
### Vulnerable Library - <b>commons-beanutils-core-1.8.3.jar</b></p>
<p>The Apache Software Foundation provides support for the Apache community of open-source software projects.
The Apache projects are characterized by a collaborative, consensus based development process, an open and
pragmatic software license, and a desire to create high quality software that leads the way in its field.
We consider ourselves not simply a group of projects sharing a server, but rather a community of developers
and users.</p>
<p>Library home page: <a href="http://commons.apache.org/beanutils/">http://commons.apache.org/beanutils/</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/commons-beanutils/commons-beanutils-core/1.8.3/commons-beanutils-core-1.8.3.jar</p>
<p>
Dependency Hierarchy:
- esapi-2.1.0.1.jar (Root Library)
- :x: **commons-beanutils-core-1.8.3.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/easybuggy4sb-46/commit/dde0eed02d400b37a04af5942650dfa77c0fb6d2">dde0eed02d400b37a04af5942650dfa77c0fb6d2</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
In Apache Commons Beanutils 1.9.2, a special BeanIntrospector class was added which allows suppressing the ability for an attacker to access the classloader via the class property available on all Java objects. We, however were not using this by default characteristic of the PropertyUtilsBean.
<p>Publish Date: 2019-08-20
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-10086>CVE-2019-10086</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.3</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: Low
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2019-08-20</p>
<p>Fix Resolution (commons-beanutils:commons-beanutils-core): 1.8.3-SONATYPE</p>
<p>Direct dependency fix Resolution (org.owasp.esapi:esapi): 2.2.0.0</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2014-0114</summary>
### Vulnerable Library - <b>commons-beanutils-core-1.8.3.jar</b></p>
<p>The Apache Software Foundation provides support for the Apache community of open-source software projects.
The Apache projects are characterized by a collaborative, consensus based development process, an open and
pragmatic software license, and a desire to create high quality software that leads the way in its field.
We consider ourselves not simply a group of projects sharing a server, but rather a community of developers
and users.</p>
<p>Library home page: <a href="http://commons.apache.org/beanutils/">http://commons.apache.org/beanutils/</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/commons-beanutils/commons-beanutils-core/1.8.3/commons-beanutils-core-1.8.3.jar</p>
<p>
Dependency Hierarchy:
- esapi-2.1.0.1.jar (Root Library)
- :x: **commons-beanutils-core-1.8.3.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/easybuggy4sb-46/commit/dde0eed02d400b37a04af5942650dfa77c0fb6d2">dde0eed02d400b37a04af5942650dfa77c0fb6d2</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Apache Commons BeanUtils, as distributed in lib/commons-beanutils-1.8.0.jar in Apache Struts 1.x through 1.3.10 and in other products requiring commons-beanutils through 1.9.2, does not suppress the class property, which allows remote attackers to "manipulate" the ClassLoader and execute arbitrary code via the class parameter, as demonstrated by the passing of this parameter to the getClass method of the ActionForm object in Struts 1.
<p>Publish Date: 2014-04-30
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2014-0114>CVE-2014-0114</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.3</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: Low
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0114">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0114</a></p>
<p>Release Date: 2014-04-30</p>
<p>Fix Resolution: commons-beanutils:commons-beanutils:1.9.4;org.apache.struts:struts2-core:2.0.5</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2016-10006</summary>
### Vulnerable Library - <b>antisamy-1.5.3.jar</b></p>
<p>The OWASP AntiSamy project is a collection of APIs for safely allowing users to supply their own HTML
and CSS without exposing the site to XSS vulnerabilities.</p>
<p>Library home page: <a href="http://www.owasp.org/index.php/Category:OWASP_AntiSamy_Project">http://www.owasp.org/index.php/Category:OWASP_AntiSamy_Project</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/owasp/antisamy/antisamy/1.5.3/antisamy-1.5.3.jar</p>
<p>
Dependency Hierarchy:
- esapi-2.1.0.1.jar (Root Library)
- :x: **antisamy-1.5.3.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/easybuggy4sb-46/commit/dde0eed02d400b37a04af5942650dfa77c0fb6d2">dde0eed02d400b37a04af5942650dfa77c0fb6d2</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
In OWASP AntiSamy before 1.5.5, by submitting a specially crafted input (a tag that supports style with active content), you could bypass the library protections and supply executable code. The impact is XSS.
<p>Publish Date: 2016-12-24
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2016-10006>CVE-2016-10006</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>6.1</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10006">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10006</a></p>
<p>Release Date: 2016-12-24</p>
<p>Fix Resolution (org.owasp.antisamy:antisamy): 1.5.5</p>
<p>Direct dependency fix Resolution (org.owasp.esapi:esapi): 2.2.0.0</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2017-14735</summary>
### Vulnerable Library - <b>antisamy-1.5.3.jar</b></p>
<p>The OWASP AntiSamy project is a collection of APIs for safely allowing users to supply their own HTML
and CSS without exposing the site to XSS vulnerabilities.</p>
<p>Library home page: <a href="http://www.owasp.org/index.php/Category:OWASP_AntiSamy_Project">http://www.owasp.org/index.php/Category:OWASP_AntiSamy_Project</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/owasp/antisamy/antisamy/1.5.3/antisamy-1.5.3.jar</p>
<p>
Dependency Hierarchy:
- esapi-2.1.0.1.jar (Root Library)
- :x: **antisamy-1.5.3.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/easybuggy4sb-46/commit/dde0eed02d400b37a04af5942650dfa77c0fb6d2">dde0eed02d400b37a04af5942650dfa77c0fb6d2</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
OWASP AntiSamy before 1.5.7 allows XSS via HTML5 entities, as demonstrated by use of : to construct a javascript: URL.
<p>Publish Date: 2017-09-25
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2017-14735>CVE-2017-14735</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>6.1</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14735">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14735</a></p>
<p>Release Date: 2017-09-25</p>
<p>Fix Resolution (org.owasp.antisamy:antisamy): 1.5.7</p>
<p>Direct dependency fix Resolution (org.owasp.esapi:esapi): 2.2.0.0</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2013-4002</summary>
### Vulnerable Library - <b>xercesImpl-2.8.0.jar</b></p>
<p>Xerces2 is the next generation of high performance, fully compliant XML parsers in the
Apache Xerces family. This new version of Xerces introduces the Xerces Native Interface (XNI),
a complete framework for building parser components and configurations that is extremely
modular and easy to program.</p>
<p>Library home page: <a href="http://xerces.apache.org/xerces2-j">http://xerces.apache.org/xerces2-j</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/xerces/xercesImpl/2.8.0/xercesImpl-2.8.0.jar</p>
<p>
Dependency Hierarchy:
- esapi-2.1.0.1.jar (Root Library)
- xom-1.2.5.jar
- :x: **xercesImpl-2.8.0.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/easybuggy4sb-46/commit/dde0eed02d400b37a04af5942650dfa77c0fb6d2">dde0eed02d400b37a04af5942650dfa77c0fb6d2</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
XMLscanner.java in Apache Xerces2 Java Parser before 2.12.0, as used in the Java Runtime Environment (JRE) in IBM Java 5.0 before 5.0 SR16-FP3, 6 before 6 SR14, 6.0.1 before 6.0.1 SR6, and 7 before 7 SR5 as well as Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, Java SE Embedded 7u40 and earlier, and possibly other products allows remote attackers to cause a denial of service via vectors related to XML attribute names.
<p>Publish Date: 2013-07-23
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2013-4002>CVE-2013-4002</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>5.9</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4002">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4002</a></p>
<p>Release Date: 2013-07-23</p>
<p>Fix Resolution: xerces:xercesImpl:Xerces-J_2_12_0</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2009-2625</summary>
### Vulnerable Library - <b>xercesImpl-2.8.0.jar</b></p>
<p>Xerces2 is the next generation of high performance, fully compliant XML parsers in the
Apache Xerces family. This new version of Xerces introduces the Xerces Native Interface (XNI),
a complete framework for building parser components and configurations that is extremely
modular and easy to program.</p>
<p>Library home page: <a href="http://xerces.apache.org/xerces2-j">http://xerces.apache.org/xerces2-j</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/xerces/xercesImpl/2.8.0/xercesImpl-2.8.0.jar</p>
<p>
Dependency Hierarchy:
- esapi-2.1.0.1.jar (Root Library)
- xom-1.2.5.jar
- :x: **xercesImpl-2.8.0.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/easybuggy4sb-46/commit/dde0eed02d400b37a04af5942650dfa77c0fb6d2">dde0eed02d400b37a04af5942650dfa77c0fb6d2</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.
<p>Publish Date: 2009-08-06
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2009-2625>CVE-2009-2625</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>5.3</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: Low
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2009-2625">https://nvd.nist.gov/vuln/detail/CVE-2009-2625</a></p>
<p>Release Date: 2009-08-06</p>
<p>Fix Resolution: apache-xerces:xercesImpl - 2.9.1;xerces:xercesImpl - 2.9.1-NODEP,2.3.0,2.9.0;org.apache.servicemix.bundles:org.apache.servicemix.bundles.xerces - 2.10.0_1</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2012-5783</summary>
### Vulnerable Library - <b>commons-httpclient-3.1.jar</b></p>
<p>The HttpClient component supports the client-side of RFC 1945 (HTTP/1.0) and RFC 2616 (HTTP/1.1) , several related specifications (RFC 2109 (Cookies) , RFC 2617 (HTTP Authentication) , etc.), and provides a framework by which new request types (methods) or HTTP extensions can be created easily.</p>
<p>Library home page: <a href="http://jakarta.apache.org/httpcomponents/httpclient-3.x/">http://jakarta.apache.org/httpcomponents/httpclient-3.x/</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/commons-httpclient/commons-httpclient/3.1/commons-httpclient-3.1.jar</p>
<p>
Dependency Hierarchy:
- esapi-2.1.0.1.jar (Root Library)
- antisamy-1.5.3.jar
- :x: **commons-httpclient-3.1.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/easybuggy4sb-46/commit/dde0eed02d400b37a04af5942650dfa77c0fb6d2">dde0eed02d400b37a04af5942650dfa77c0fb6d2</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Apache Commons HttpClient 3.x, as used in Amazon Flexible Payments Service (FPS) merchant Java SDK and other products, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
<p>Publish Date: 2012-11-04
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2012-5783>CVE-2012-5783</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>4.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2012-5783">https://nvd.nist.gov/vuln/detail/CVE-2012-5783</a></p>
<p>Release Date: 2012-11-04</p>
<p>Fix Resolution (commons-httpclient:commons-httpclient): 3.1-HTTPCLIENT-1265</p>
<p>Direct dependency fix Resolution (org.owasp.esapi:esapi): 2.2.0.0</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2021-29425</summary>
### Vulnerable Library - <b>commons-io-2.2.jar</b></p>
<p>The Commons IO library contains utility classes, stream implementations, file filters,
file comparators, endian transformation classes, and much more.</p>
<p>Library home page: <a href="http://commons.apache.org/io/">http://commons.apache.org/io/</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/commons-io/commons-io/2.2/commons-io-2.2.jar</p>
<p>
Dependency Hierarchy:
- esapi-2.1.0.1.jar (Root Library)
- commons-fileupload-1.3.1.jar
- :x: **commons-io-2.2.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/easybuggy4sb-46/commit/dde0eed02d400b37a04af5942650dfa77c0fb6d2">dde0eed02d400b37a04af5942650dfa77c0fb6d2</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
In Apache Commons IO before 2.7, When invoking the method FileNameUtils.normalize with an improper input string, like "//../foo", or "\\..\foo", the result would be the same value, thus possibly providing access to files in the parent directory, but not further above (thus "limited" path traversal), if the calling code would use the result to construct a path value.
<p>Publish Date: 2021-04-13
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-29425>CVE-2021-29425</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>4.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29425">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29425</a></p>
<p>Release Date: 2021-04-13</p>
<p>Fix Resolution: commons-io:commons-io:2.7</p>
</p>
<p></p>
</details>
***
<p>:rescue_worker_helmet: Automatic Remediation is available for this issue.</p> | True | esapi-2.1.0.1.jar: 14 vulnerabilities (highest severity is: 9.8) - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>esapi-2.1.0.1.jar</b></p></summary>
<p></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/xalan/xalan/2.7.0/xalan-2.7.0.jar</p>
<p>
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/easybuggy4sb-46/commit/dde0eed02d400b37a04af5942650dfa77c0fb6d2">dde0eed02d400b37a04af5942650dfa77c0fb6d2</a></p></details>
## Vulnerabilities
| CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (esapi version) | Remediation Available |
| ------------- | ------------- | ----- | ----- | ----- | ------------- | --- |
| [CVE-2016-1000031](https://www.mend.io/vulnerability-database/CVE-2016-1000031) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | commons-fileupload-1.3.1.jar | Transitive | 2.2.0.0 | ✅ |
| [CVE-2016-2510](https://www.mend.io/vulnerability-database/CVE-2016-2510) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | bsh-core-2.0b4.jar | Transitive | N/A* | ❌ |
| [CVE-2016-3092](https://www.mend.io/vulnerability-database/CVE-2016-3092) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | commons-fileupload-1.3.1.jar | Transitive | 2.2.0.0 | ✅ |
| [CVE-2012-0881](https://www.mend.io/vulnerability-database/CVE-2012-0881) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | xercesImpl-2.8.0.jar | Transitive | N/A* | ❌ |
| [WS-2014-0034](https://commons.apache.org/proper/commons-fileupload/changes-report.html) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | commons-fileupload-1.3.1.jar | Transitive | 2.2.0.0 | ✅ |
| [CVE-2014-0107](https://www.mend.io/vulnerability-database/CVE-2014-0107) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.3 | xalan-2.7.0.jar | Transitive | 2.5.0.0 | ✅ |
| [CVE-2019-10086](https://www.mend.io/vulnerability-database/CVE-2019-10086) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.3 | commons-beanutils-core-1.8.3.jar | Transitive | 2.2.0.0 | ✅ |
| [CVE-2014-0114](https://www.mend.io/vulnerability-database/CVE-2014-0114) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.3 | commons-beanutils-core-1.8.3.jar | Transitive | N/A* | ❌ |
| [CVE-2016-10006](https://www.mend.io/vulnerability-database/CVE-2016-10006) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | antisamy-1.5.3.jar | Transitive | 2.2.0.0 | ✅ |
| [CVE-2017-14735](https://www.mend.io/vulnerability-database/CVE-2017-14735) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | antisamy-1.5.3.jar | Transitive | 2.2.0.0 | ✅ |
| [CVE-2013-4002](https://www.mend.io/vulnerability-database/CVE-2013-4002) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.9 | xercesImpl-2.8.0.jar | Transitive | N/A* | ❌ |
| [CVE-2009-2625](https://www.mend.io/vulnerability-database/CVE-2009-2625) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.3 | xercesImpl-2.8.0.jar | Transitive | N/A* | ❌ |
| [CVE-2012-5783](https://www.mend.io/vulnerability-database/CVE-2012-5783) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 4.8 | commons-httpclient-3.1.jar | Transitive | 2.2.0.0 | ✅ |
| [CVE-2021-29425](https://www.mend.io/vulnerability-database/CVE-2021-29425) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 4.8 | commons-io-2.2.jar | Transitive | N/A* | ❌ |
<p>*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the section "Details" below to see if there is a version of transitive dependency where vulnerability is fixed.</p>
## Details
<details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2016-1000031</summary>
### Vulnerable Library - <b>commons-fileupload-1.3.1.jar</b></p>
<p>The Apache Commons FileUpload component provides a simple yet flexible means of adding support for multipart
file upload functionality to servlets and web applications.</p>
<p>Library home page: <a href="http://commons.apache.org/proper/commons-fileupload/">http://commons.apache.org/proper/commons-fileupload/</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/commons-fileupload/commons-fileupload/1.3.1/commons-fileupload-1.3.1.jar</p>
<p>
Dependency Hierarchy:
- esapi-2.1.0.1.jar (Root Library)
- :x: **commons-fileupload-1.3.1.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/easybuggy4sb-46/commit/dde0eed02d400b37a04af5942650dfa77c0fb6d2">dde0eed02d400b37a04af5942650dfa77c0fb6d2</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Apache Commons FileUpload before 1.3.3 DiskFileItem File Manipulation Remote Code Execution
<p>Publish Date: 2016-10-25
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2016-1000031>CVE-2016-1000031</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000031">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000031</a></p>
<p>Release Date: 2016-10-25</p>
<p>Fix Resolution (commons-fileupload:commons-fileupload): 1.3.1-jenkins-1</p>
<p>Direct dependency fix Resolution (org.owasp.esapi:esapi): 2.2.0.0</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2016-2510</summary>
### Vulnerable Library - <b>bsh-core-2.0b4.jar</b></p>
<p>BeanShell core</p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/beanshell/bsh-core/2.0b4/bsh-core-2.0b4.jar</p>
<p>
Dependency Hierarchy:
- esapi-2.1.0.1.jar (Root Library)
- :x: **bsh-core-2.0b4.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/easybuggy4sb-46/commit/dde0eed02d400b37a04af5942650dfa77c0fb6d2">dde0eed02d400b37a04af5942650dfa77c0fb6d2</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
BeanShell (bsh) before 2.0b6, when included on the classpath by an application that uses Java serialization or XStream, allows remote attackers to execute arbitrary code via crafted serialized data, related to XThis.Handler.
<p>Publish Date: 2016-04-07
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2016-2510>CVE-2016-2510</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>8.1</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2016-2510">https://nvd.nist.gov/vuln/detail/CVE-2016-2510</a></p>
<p>Release Date: 2016-04-07</p>
<p>Fix Resolution: 2.0b6</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2016-3092</summary>
### Vulnerable Library - <b>commons-fileupload-1.3.1.jar</b></p>
<p>The Apache Commons FileUpload component provides a simple yet flexible means of adding support for multipart
file upload functionality to servlets and web applications.</p>
<p>Library home page: <a href="http://commons.apache.org/proper/commons-fileupload/">http://commons.apache.org/proper/commons-fileupload/</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/commons-fileupload/commons-fileupload/1.3.1/commons-fileupload-1.3.1.jar</p>
<p>
Dependency Hierarchy:
- esapi-2.1.0.1.jar (Root Library)
- :x: **commons-fileupload-1.3.1.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/easybuggy4sb-46/commit/dde0eed02d400b37a04af5942650dfa77c0fb6d2">dde0eed02d400b37a04af5942650dfa77c0fb6d2</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
The MultipartStream class in Apache Commons Fileupload before 1.3.2, as used in Apache Tomcat 7.x before 7.0.70, 8.x before 8.0.36, 8.5.x before 8.5.3, and 9.x before 9.0.0.M7 and other products, allows remote attackers to cause a denial of service (CPU consumption) via a long boundary string.
<p>Publish Date: 2016-07-04
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2016-3092>CVE-2016-3092</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3092">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3092</a></p>
<p>Release Date: 2016-07-04</p>
<p>Fix Resolution (commons-fileupload:commons-fileupload): 1.3.1-jenkins-1</p>
<p>Direct dependency fix Resolution (org.owasp.esapi:esapi): 2.2.0.0</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2012-0881</summary>
### Vulnerable Library - <b>xercesImpl-2.8.0.jar</b></p>
<p>Xerces2 is the next generation of high performance, fully compliant XML parsers in the
Apache Xerces family. This new version of Xerces introduces the Xerces Native Interface (XNI),
a complete framework for building parser components and configurations that is extremely
modular and easy to program.</p>
<p>Library home page: <a href="http://xerces.apache.org/xerces2-j">http://xerces.apache.org/xerces2-j</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/xerces/xercesImpl/2.8.0/xercesImpl-2.8.0.jar</p>
<p>
Dependency Hierarchy:
- esapi-2.1.0.1.jar (Root Library)
- xom-1.2.5.jar
- :x: **xercesImpl-2.8.0.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/easybuggy4sb-46/commit/dde0eed02d400b37a04af5942650dfa77c0fb6d2">dde0eed02d400b37a04af5942650dfa77c0fb6d2</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Apache Xerces2 Java Parser before 2.12.0 allows remote attackers to cause a denial of service (CPU consumption) via a crafted message to an XML service, which triggers hash table collisions.
<p>Publish Date: 2017-10-30
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2012-0881>CVE-2012-0881</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0881">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0881</a></p>
<p>Release Date: 2017-10-30</p>
<p>Fix Resolution: 2.12.0</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> WS-2014-0034</summary>
### Vulnerable Library - <b>commons-fileupload-1.3.1.jar</b></p>
<p>The Apache Commons FileUpload component provides a simple yet flexible means of adding support for multipart
file upload functionality to servlets and web applications.</p>
<p>Library home page: <a href="http://commons.apache.org/proper/commons-fileupload/">http://commons.apache.org/proper/commons-fileupload/</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/commons-fileupload/commons-fileupload/1.3.1/commons-fileupload-1.3.1.jar</p>
<p>
Dependency Hierarchy:
- esapi-2.1.0.1.jar (Root Library)
- :x: **commons-fileupload-1.3.1.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/easybuggy4sb-46/commit/dde0eed02d400b37a04af5942650dfa77c0fb6d2">dde0eed02d400b37a04af5942650dfa77c0fb6d2</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
The class FileUploadBase in Apache Commons Fileupload before 1.4 has potential resource leak - InputStream not closed on exception.
<p>Publish Date: 2014-02-17
<p>URL: <a href=https://commons.apache.org/proper/commons-fileupload/changes-report.html>WS-2014-0034</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2014-02-17</p>
<p>Fix Resolution (commons-fileupload:commons-fileupload): 1.3.1-jenkins-1</p>
<p>Direct dependency fix Resolution (org.owasp.esapi:esapi): 2.2.0.0</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2014-0107</summary>
### Vulnerable Library - <b>xalan-2.7.0.jar</b></p>
<p></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/xalan/xalan/2.7.0/xalan-2.7.0.jar</p>
<p>
Dependency Hierarchy:
- esapi-2.1.0.1.jar (Root Library)
- xom-1.2.5.jar
- :x: **xalan-2.7.0.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/easybuggy4sb-46/commit/dde0eed02d400b37a04af5942650dfa77c0fb6d2">dde0eed02d400b37a04af5942650dfa77c0fb6d2</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
The TransformerFactory in Apache Xalan-Java before 2.7.2 does not properly restrict access to certain properties when FEATURE_SECURE_PROCESSING is enabled, which allows remote attackers to bypass expected restrictions and load arbitrary classes or access external resources via a crafted (1) xalan:content-header, (2) xalan:entities, (3) xslt:content-header, or (4) xslt:entities property, or a Java property that is bound to the XSLT 1.0 system-property function.
<p>Publish Date: 2014-04-15
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2014-0107>CVE-2014-0107</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.3</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: Low
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0107">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0107</a></p>
<p>Release Date: 2014-04-15</p>
<p>Fix Resolution (xalan:xalan): 2.7.1-NODEP</p>
<p>Direct dependency fix Resolution (org.owasp.esapi:esapi): 2.5.0.0</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-10086</summary>
### Vulnerable Library - <b>commons-beanutils-core-1.8.3.jar</b></p>
<p>The Apache Software Foundation provides support for the Apache community of open-source software projects.
The Apache projects are characterized by a collaborative, consensus based development process, an open and
pragmatic software license, and a desire to create high quality software that leads the way in its field.
We consider ourselves not simply a group of projects sharing a server, but rather a community of developers
and users.</p>
<p>Library home page: <a href="http://commons.apache.org/beanutils/">http://commons.apache.org/beanutils/</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/commons-beanutils/commons-beanutils-core/1.8.3/commons-beanutils-core-1.8.3.jar</p>
<p>
Dependency Hierarchy:
- esapi-2.1.0.1.jar (Root Library)
- :x: **commons-beanutils-core-1.8.3.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/easybuggy4sb-46/commit/dde0eed02d400b37a04af5942650dfa77c0fb6d2">dde0eed02d400b37a04af5942650dfa77c0fb6d2</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
In Apache Commons Beanutils 1.9.2, a special BeanIntrospector class was added which allows suppressing the ability for an attacker to access the classloader via the class property available on all Java objects. We, however were not using this by default characteristic of the PropertyUtilsBean.
<p>Publish Date: 2019-08-20
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-10086>CVE-2019-10086</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.3</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: Low
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2019-08-20</p>
<p>Fix Resolution (commons-beanutils:commons-beanutils-core): 1.8.3-SONATYPE</p>
<p>Direct dependency fix Resolution (org.owasp.esapi:esapi): 2.2.0.0</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2014-0114</summary>
### Vulnerable Library - <b>commons-beanutils-core-1.8.3.jar</b></p>
<p>The Apache Software Foundation provides support for the Apache community of open-source software projects.
The Apache projects are characterized by a collaborative, consensus based development process, an open and
pragmatic software license, and a desire to create high quality software that leads the way in its field.
We consider ourselves not simply a group of projects sharing a server, but rather a community of developers
and users.</p>
<p>Library home page: <a href="http://commons.apache.org/beanutils/">http://commons.apache.org/beanutils/</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/commons-beanutils/commons-beanutils-core/1.8.3/commons-beanutils-core-1.8.3.jar</p>
<p>
Dependency Hierarchy:
- esapi-2.1.0.1.jar (Root Library)
- :x: **commons-beanutils-core-1.8.3.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/easybuggy4sb-46/commit/dde0eed02d400b37a04af5942650dfa77c0fb6d2">dde0eed02d400b37a04af5942650dfa77c0fb6d2</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Apache Commons BeanUtils, as distributed in lib/commons-beanutils-1.8.0.jar in Apache Struts 1.x through 1.3.10 and in other products requiring commons-beanutils through 1.9.2, does not suppress the class property, which allows remote attackers to "manipulate" the ClassLoader and execute arbitrary code via the class parameter, as demonstrated by the passing of this parameter to the getClass method of the ActionForm object in Struts 1.
<p>Publish Date: 2014-04-30
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2014-0114>CVE-2014-0114</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.3</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: Low
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0114">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0114</a></p>
<p>Release Date: 2014-04-30</p>
<p>Fix Resolution: commons-beanutils:commons-beanutils:1.9.4;org.apache.struts:struts2-core:2.0.5</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2016-10006</summary>
### Vulnerable Library - <b>antisamy-1.5.3.jar</b></p>
<p>The OWASP AntiSamy project is a collection of APIs for safely allowing users to supply their own HTML
and CSS without exposing the site to XSS vulnerabilities.</p>
<p>Library home page: <a href="http://www.owasp.org/index.php/Category:OWASP_AntiSamy_Project">http://www.owasp.org/index.php/Category:OWASP_AntiSamy_Project</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/owasp/antisamy/antisamy/1.5.3/antisamy-1.5.3.jar</p>
<p>
Dependency Hierarchy:
- esapi-2.1.0.1.jar (Root Library)
- :x: **antisamy-1.5.3.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/easybuggy4sb-46/commit/dde0eed02d400b37a04af5942650dfa77c0fb6d2">dde0eed02d400b37a04af5942650dfa77c0fb6d2</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
In OWASP AntiSamy before 1.5.5, by submitting a specially crafted input (a tag that supports style with active content), you could bypass the library protections and supply executable code. The impact is XSS.
<p>Publish Date: 2016-12-24
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2016-10006>CVE-2016-10006</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>6.1</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10006">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10006</a></p>
<p>Release Date: 2016-12-24</p>
<p>Fix Resolution (org.owasp.antisamy:antisamy): 1.5.5</p>
<p>Direct dependency fix Resolution (org.owasp.esapi:esapi): 2.2.0.0</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2017-14735</summary>
### Vulnerable Library - <b>antisamy-1.5.3.jar</b></p>
<p>The OWASP AntiSamy project is a collection of APIs for safely allowing users to supply their own HTML
and CSS without exposing the site to XSS vulnerabilities.</p>
<p>Library home page: <a href="http://www.owasp.org/index.php/Category:OWASP_AntiSamy_Project">http://www.owasp.org/index.php/Category:OWASP_AntiSamy_Project</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/owasp/antisamy/antisamy/1.5.3/antisamy-1.5.3.jar</p>
<p>
Dependency Hierarchy:
- esapi-2.1.0.1.jar (Root Library)
- :x: **antisamy-1.5.3.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/easybuggy4sb-46/commit/dde0eed02d400b37a04af5942650dfa77c0fb6d2">dde0eed02d400b37a04af5942650dfa77c0fb6d2</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
OWASP AntiSamy before 1.5.7 allows XSS via HTML5 entities, as demonstrated by use of : to construct a javascript: URL.
<p>Publish Date: 2017-09-25
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2017-14735>CVE-2017-14735</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>6.1</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14735">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14735</a></p>
<p>Release Date: 2017-09-25</p>
<p>Fix Resolution (org.owasp.antisamy:antisamy): 1.5.7</p>
<p>Direct dependency fix Resolution (org.owasp.esapi:esapi): 2.2.0.0</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2013-4002</summary>
### Vulnerable Library - <b>xercesImpl-2.8.0.jar</b></p>
<p>Xerces2 is the next generation of high performance, fully compliant XML parsers in the
Apache Xerces family. This new version of Xerces introduces the Xerces Native Interface (XNI),
a complete framework for building parser components and configurations that is extremely
modular and easy to program.</p>
<p>Library home page: <a href="http://xerces.apache.org/xerces2-j">http://xerces.apache.org/xerces2-j</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/xerces/xercesImpl/2.8.0/xercesImpl-2.8.0.jar</p>
<p>
Dependency Hierarchy:
- esapi-2.1.0.1.jar (Root Library)
- xom-1.2.5.jar
- :x: **xercesImpl-2.8.0.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/easybuggy4sb-46/commit/dde0eed02d400b37a04af5942650dfa77c0fb6d2">dde0eed02d400b37a04af5942650dfa77c0fb6d2</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
XMLscanner.java in Apache Xerces2 Java Parser before 2.12.0, as used in the Java Runtime Environment (JRE) in IBM Java 5.0 before 5.0 SR16-FP3, 6 before 6 SR14, 6.0.1 before 6.0.1 SR6, and 7 before 7 SR5 as well as Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, Java SE Embedded 7u40 and earlier, and possibly other products allows remote attackers to cause a denial of service via vectors related to XML attribute names.
<p>Publish Date: 2013-07-23
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2013-4002>CVE-2013-4002</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>5.9</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4002">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4002</a></p>
<p>Release Date: 2013-07-23</p>
<p>Fix Resolution: xerces:xercesImpl:Xerces-J_2_12_0</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2009-2625</summary>
### Vulnerable Library - <b>xercesImpl-2.8.0.jar</b></p>
<p>Xerces2 is the next generation of high performance, fully compliant XML parsers in the
Apache Xerces family. This new version of Xerces introduces the Xerces Native Interface (XNI),
a complete framework for building parser components and configurations that is extremely
modular and easy to program.</p>
<p>Library home page: <a href="http://xerces.apache.org/xerces2-j">http://xerces.apache.org/xerces2-j</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/xerces/xercesImpl/2.8.0/xercesImpl-2.8.0.jar</p>
<p>
Dependency Hierarchy:
- esapi-2.1.0.1.jar (Root Library)
- xom-1.2.5.jar
- :x: **xercesImpl-2.8.0.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/easybuggy4sb-46/commit/dde0eed02d400b37a04af5942650dfa77c0fb6d2">dde0eed02d400b37a04af5942650dfa77c0fb6d2</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.
<p>Publish Date: 2009-08-06
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2009-2625>CVE-2009-2625</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>5.3</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: Low
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2009-2625">https://nvd.nist.gov/vuln/detail/CVE-2009-2625</a></p>
<p>Release Date: 2009-08-06</p>
<p>Fix Resolution: apache-xerces:xercesImpl - 2.9.1;xerces:xercesImpl - 2.9.1-NODEP,2.3.0,2.9.0;org.apache.servicemix.bundles:org.apache.servicemix.bundles.xerces - 2.10.0_1</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2012-5783</summary>
### Vulnerable Library - <b>commons-httpclient-3.1.jar</b></p>
<p>The HttpClient component supports the client-side of RFC 1945 (HTTP/1.0) and RFC 2616 (HTTP/1.1) , several related specifications (RFC 2109 (Cookies) , RFC 2617 (HTTP Authentication) , etc.), and provides a framework by which new request types (methods) or HTTP extensions can be created easily.</p>
<p>Library home page: <a href="http://jakarta.apache.org/httpcomponents/httpclient-3.x/">http://jakarta.apache.org/httpcomponents/httpclient-3.x/</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/commons-httpclient/commons-httpclient/3.1/commons-httpclient-3.1.jar</p>
<p>
Dependency Hierarchy:
- esapi-2.1.0.1.jar (Root Library)
- antisamy-1.5.3.jar
- :x: **commons-httpclient-3.1.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/easybuggy4sb-46/commit/dde0eed02d400b37a04af5942650dfa77c0fb6d2">dde0eed02d400b37a04af5942650dfa77c0fb6d2</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Apache Commons HttpClient 3.x, as used in Amazon Flexible Payments Service (FPS) merchant Java SDK and other products, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
<p>Publish Date: 2012-11-04
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2012-5783>CVE-2012-5783</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>4.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2012-5783">https://nvd.nist.gov/vuln/detail/CVE-2012-5783</a></p>
<p>Release Date: 2012-11-04</p>
<p>Fix Resolution (commons-httpclient:commons-httpclient): 3.1-HTTPCLIENT-1265</p>
<p>Direct dependency fix Resolution (org.owasp.esapi:esapi): 2.2.0.0</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2021-29425</summary>
### Vulnerable Library - <b>commons-io-2.2.jar</b></p>
<p>The Commons IO library contains utility classes, stream implementations, file filters,
file comparators, endian transformation classes, and much more.</p>
<p>Library home page: <a href="http://commons.apache.org/io/">http://commons.apache.org/io/</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/commons-io/commons-io/2.2/commons-io-2.2.jar</p>
<p>
Dependency Hierarchy:
- esapi-2.1.0.1.jar (Root Library)
- commons-fileupload-1.3.1.jar
- :x: **commons-io-2.2.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/easybuggy4sb-46/commit/dde0eed02d400b37a04af5942650dfa77c0fb6d2">dde0eed02d400b37a04af5942650dfa77c0fb6d2</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
In Apache Commons IO before 2.7, When invoking the method FileNameUtils.normalize with an improper input string, like "//../foo", or "\\..\foo", the result would be the same value, thus possibly providing access to files in the parent directory, but not further above (thus "limited" path traversal), if the calling code would use the result to construct a path value.
<p>Publish Date: 2021-04-13
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-29425>CVE-2021-29425</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>4.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29425">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29425</a></p>
<p>Release Date: 2021-04-13</p>
<p>Fix Resolution: commons-io:commons-io:2.7</p>
</p>
<p></p>
</details>
***
<p>:rescue_worker_helmet: Automatic Remediation is available for this issue.</p> | non_defect | esapi jar vulnerabilities highest severity is vulnerable library esapi jar path to dependency file pom xml path to vulnerable library home wss scanner repository xalan xalan xalan jar found in head commit a href vulnerabilities cve severity cvss dependency type fixed in esapi version remediation available high commons fileupload jar transitive high bsh core jar transitive n a high commons fileupload jar transitive high xercesimpl jar transitive n a high commons fileupload jar transitive high xalan jar transitive high commons beanutils core jar transitive high commons beanutils core jar transitive n a medium antisamy jar transitive medium antisamy jar transitive medium xercesimpl jar transitive n a medium xercesimpl jar transitive n a medium commons httpclient jar transitive medium commons io jar transitive n a for some transitive vulnerabilities there is no version of direct dependency with a fix check the section details below to see if there is a version of transitive dependency where vulnerability is fixed details cve vulnerable library commons fileupload jar the apache commons fileupload component provides a simple yet flexible means of adding support for multipart file upload functionality to servlets and web applications library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository commons fileupload commons fileupload commons fileupload jar dependency hierarchy esapi jar root library x commons fileupload jar vulnerable library found in head commit a href found in base branch master vulnerability details apache commons fileupload before diskfileitem file manipulation remote code execution publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution commons fileupload commons fileupload jenkins direct dependency fix resolution org owasp esapi esapi rescue worker helmet automatic remediation is available for this issue cve vulnerable library bsh core jar beanshell core path to dependency file pom xml path to vulnerable library home wss scanner repository org beanshell bsh core bsh core jar dependency hierarchy esapi jar root library x bsh core jar vulnerable library found in head commit a href found in base branch master vulnerability details beanshell bsh before when included on the classpath by an application that uses java serialization or xstream allows remote attackers to execute arbitrary code via crafted serialized data related to xthis handler publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution cve vulnerable library commons fileupload jar the apache commons fileupload component provides a simple yet flexible means of adding support for multipart file upload functionality to servlets and web applications library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository commons fileupload commons fileupload commons fileupload jar dependency hierarchy esapi jar root library x commons fileupload jar vulnerable library found in head commit a href found in base branch master vulnerability details the multipartstream class in apache commons fileupload before as used in apache tomcat x before x before x before and x before and other products allows remote attackers to cause a denial of service cpu consumption via a long boundary string publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution commons fileupload commons fileupload jenkins direct dependency fix resolution org owasp esapi esapi rescue worker helmet automatic remediation is available for this issue cve vulnerable library xercesimpl jar is the next generation of high performance fully compliant xml parsers in the apache xerces family this new version of xerces introduces the xerces native interface xni a complete framework for building parser components and configurations that is extremely modular and easy to program library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository xerces xercesimpl xercesimpl jar dependency hierarchy esapi jar root library xom jar x xercesimpl jar vulnerable library found in head commit a href found in base branch master vulnerability details apache java parser before allows remote attackers to cause a denial of service cpu consumption via a crafted message to an xml service which triggers hash table collisions publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution ws vulnerable library commons fileupload jar the apache commons fileupload component provides a simple yet flexible means of adding support for multipart file upload functionality to servlets and web applications library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository commons fileupload commons fileupload commons fileupload jar dependency hierarchy esapi jar root library x commons fileupload jar vulnerable library found in head commit a href found in base branch master vulnerability details the class fileuploadbase in apache commons fileupload before has potential resource leak inputstream not closed on exception publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version release date fix resolution commons fileupload commons fileupload jenkins direct dependency fix resolution org owasp esapi esapi rescue worker helmet automatic remediation is available for this issue cve vulnerable library xalan jar path to dependency file pom xml path to vulnerable library home wss scanner repository xalan xalan xalan jar dependency hierarchy esapi jar root library xom jar x xalan jar vulnerable library found in head commit a href found in base branch master vulnerability details the transformerfactory in apache xalan java before does not properly restrict access to certain properties when feature secure processing is enabled which allows remote attackers to bypass expected restrictions and load arbitrary classes or access external resources via a crafted xalan content header xalan entities xslt content header or xslt entities property or a java property that is bound to the xslt system property function publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact low availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution xalan xalan nodep direct dependency fix resolution org owasp esapi esapi rescue worker helmet automatic remediation is available for this issue cve vulnerable library commons beanutils core jar the apache software foundation provides support for the apache community of open source software projects the apache projects are characterized by a collaborative consensus based development process an open and pragmatic software license and a desire to create high quality software that leads the way in its field we consider ourselves not simply a group of projects sharing a server but rather a community of developers and users library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository commons beanutils commons beanutils core commons beanutils core jar dependency hierarchy esapi jar root library x commons beanutils core jar vulnerable library found in head commit a href found in base branch master vulnerability details in apache commons beanutils a special beanintrospector class was added which allows suppressing the ability for an attacker to access the classloader via the class property available on all java objects we however were not using this by default characteristic of the propertyutilsbean publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact low availability impact low for more information on scores click a href suggested fix type upgrade version release date fix resolution commons beanutils commons beanutils core sonatype direct dependency fix resolution org owasp esapi esapi rescue worker helmet automatic remediation is available for this issue cve vulnerable library commons beanutils core jar the apache software foundation provides support for the apache community of open source software projects the apache projects are characterized by a collaborative consensus based development process an open and pragmatic software license and a desire to create high quality software that leads the way in its field we consider ourselves not simply a group of projects sharing a server but rather a community of developers and users library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository commons beanutils commons beanutils core commons beanutils core jar dependency hierarchy esapi jar root library x commons beanutils core jar vulnerable library found in head commit a href found in base branch master vulnerability details apache commons beanutils as distributed in lib commons beanutils jar in apache struts x through and in other products requiring commons beanutils through does not suppress the class property which allows remote attackers to manipulate the classloader and execute arbitrary code via the class parameter as demonstrated by the passing of this parameter to the getclass method of the actionform object in struts publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact low availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution commons beanutils commons beanutils org apache struts core cve vulnerable library antisamy jar the owasp antisamy project is a collection of apis for safely allowing users to supply their own html and css without exposing the site to xss vulnerabilities library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository org owasp antisamy antisamy antisamy jar dependency hierarchy esapi jar root library x antisamy jar vulnerable library found in head commit a href found in base branch master vulnerability details in owasp antisamy before by submitting a specially crafted input a tag that supports style with active content you could bypass the library protections and supply executable code the impact is xss publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org owasp antisamy antisamy direct dependency fix resolution org owasp esapi esapi rescue worker helmet automatic remediation is available for this issue cve vulnerable library antisamy jar the owasp antisamy project is a collection of apis for safely allowing users to supply their own html and css without exposing the site to xss vulnerabilities library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository org owasp antisamy antisamy antisamy jar dependency hierarchy esapi jar root library x antisamy jar vulnerable library found in head commit a href found in base branch master vulnerability details owasp antisamy before allows xss via entities as demonstrated by use of colon to construct a javascript url publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org owasp antisamy antisamy direct dependency fix resolution org owasp esapi esapi rescue worker helmet automatic remediation is available for this issue cve vulnerable library xercesimpl jar is the next generation of high performance fully compliant xml parsers in the apache xerces family this new version of xerces introduces the xerces native interface xni a complete framework for building parser components and configurations that is extremely modular and easy to program library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository xerces xercesimpl xercesimpl jar dependency hierarchy esapi jar root library xom jar x xercesimpl jar vulnerable library found in head commit a href found in base branch master vulnerability details xmlscanner java in apache java parser before as used in the java runtime environment jre in ibm java before before before and before as well as oracle java se and earlier java se and earlier java se and earlier jrockit and earlier jrockit and earlier java se embedded and earlier and possibly other products allows remote attackers to cause a denial of service via vectors related to xml attribute names publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution xerces xercesimpl xerces j cve vulnerable library xercesimpl jar is the next generation of high performance fully compliant xml parsers in the apache xerces family this new version of xerces introduces the xerces native interface xni a complete framework for building parser components and configurations that is extremely modular and easy to program library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository xerces xercesimpl xercesimpl jar dependency hierarchy esapi jar root library xom jar x xercesimpl jar vulnerable library found in head commit a href found in base branch master vulnerability details xmlscanner java in apache java as used in sun java runtime environment jre in jdk and jre before update and jdk and jre before update and in other products allows remote attackers to cause a denial of service infinite loop and application hang via malformed xml input as demonstrated by the codenomicon xml fuzzing framework publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution apache xerces xercesimpl xerces xercesimpl nodep org apache servicemix bundles org apache servicemix bundles xerces cve vulnerable library commons httpclient jar the httpclient component supports the client side of rfc http and rfc http several related specifications rfc cookies rfc http authentication etc and provides a framework by which new request types methods or http extensions can be created easily library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository commons httpclient commons httpclient commons httpclient jar dependency hierarchy esapi jar root library antisamy jar x commons httpclient jar vulnerable library found in head commit a href found in base branch master vulnerability details apache commons httpclient x as used in amazon flexible payments service fps merchant java sdk and other products does not verify that the server hostname matches a domain name in the subject s common name cn or subjectaltname field of the x certificate which allows man in the middle attackers to spoof ssl servers via an arbitrary valid certificate publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution commons httpclient commons httpclient httpclient direct dependency fix resolution org owasp esapi esapi rescue worker helmet automatic remediation is available for this issue cve vulnerable library commons io jar the commons io library contains utility classes stream implementations file filters file comparators endian transformation classes and much more library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository commons io commons io commons io jar dependency hierarchy esapi jar root library commons fileupload jar x commons io jar vulnerable library found in head commit a href found in base branch master vulnerability details in apache commons io before when invoking the method filenameutils normalize with an improper input string like foo or foo the result would be the same value thus possibly providing access to files in the parent directory but not further above thus limited path traversal if the calling code would use the result to construct a path value publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution commons io commons io rescue worker helmet automatic remediation is available for this issue | 0 |
61,811 | 17,023,783,669 | IssuesEvent | 2021-07-03 03:50:02 | tomhughes/trac-tickets | https://api.github.com/repos/tomhughes/trac-tickets | closed | Revoke OAuth key page broken | Component: api Priority: trivial Resolution: fixed Type: defect | **[Submitted to the original trac issue database at 12.37pm, Wednesday, 14th March 2012]**
steps:
open http://www.openstreetmap.org/user/%username%/oauth_clients
press revoke (redirects to http://www.openstreetmap.org/oauth/revoke)
see
```
File not found
Couldn't find a file/directory/API operation by that name on the OpenStreetMap server (HTTP 404)
```
| 1.0 | Revoke OAuth key page broken - **[Submitted to the original trac issue database at 12.37pm, Wednesday, 14th March 2012]**
steps:
open http://www.openstreetmap.org/user/%username%/oauth_clients
press revoke (redirects to http://www.openstreetmap.org/oauth/revoke)
see
```
File not found
Couldn't find a file/directory/API operation by that name on the OpenStreetMap server (HTTP 404)
```
| defect | revoke oauth key page broken steps open press revoke redirects to see file not found couldn t find a file directory api operation by that name on the openstreetmap server http | 1 |
131,079 | 18,214,649,749 | IssuesEvent | 2021-09-30 01:38:16 | ghuangsnl/spring-boot | https://api.github.com/repos/ghuangsnl/spring-boot | opened | CVE-2021-37136 (High) detected in netty-codec-4.1.50.Final.jar | security vulnerability | ## CVE-2021-37136 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>netty-codec-4.1.50.Final.jar</b></p></summary>
<p>Netty is an asynchronous event-driven network application framework for
rapid development of maintainable high performance protocol servers and
clients.</p>
<p>Path to dependency file: spring-boot/spring-boot-tests/spring-boot-smoke-tests/spring-boot-smoke-test-jta-bitronix/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/io.netty/netty-codec/4.1.50.Final/cbcb646c9380c6cdc3f56603ae6418a11418ce0f/netty-codec-4.1.50.Final.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/io.netty/netty-codec/4.1.50.Final/cbcb646c9380c6cdc3f56603ae6418a11418ce0f/netty-codec-4.1.50.Final.jar</p>
<p>
Dependency Hierarchy:
- netty-bom-4.1.50.Final (Root Library)
- :x: **netty-codec-4.1.50.Final.jar** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The Bzip2 decompression decoder function doesn't allow setting size restrictions on the decompressed output data (which affects the allocation size used during decompression).
All users of Bzip2Decoder are affected. The malicious input can trigger an OOME and so a DoS attack
<p>Publish Date: 2021-07-21
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-37136>CVE-2021-37136</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/advisories/GHSA-grg4-wf29-r9vv">https://github.com/advisories/GHSA-grg4-wf29-r9vv</a></p>
<p>Release Date: 2021-07-21</p>
<p>Fix Resolution: io.netty:netty-codec:4.1.68.Final</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2021-37136 (High) detected in netty-codec-4.1.50.Final.jar - ## CVE-2021-37136 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>netty-codec-4.1.50.Final.jar</b></p></summary>
<p>Netty is an asynchronous event-driven network application framework for
rapid development of maintainable high performance protocol servers and
clients.</p>
<p>Path to dependency file: spring-boot/spring-boot-tests/spring-boot-smoke-tests/spring-boot-smoke-test-jta-bitronix/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/io.netty/netty-codec/4.1.50.Final/cbcb646c9380c6cdc3f56603ae6418a11418ce0f/netty-codec-4.1.50.Final.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/io.netty/netty-codec/4.1.50.Final/cbcb646c9380c6cdc3f56603ae6418a11418ce0f/netty-codec-4.1.50.Final.jar</p>
<p>
Dependency Hierarchy:
- netty-bom-4.1.50.Final (Root Library)
- :x: **netty-codec-4.1.50.Final.jar** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The Bzip2 decompression decoder function doesn't allow setting size restrictions on the decompressed output data (which affects the allocation size used during decompression).
All users of Bzip2Decoder are affected. The malicious input can trigger an OOME and so a DoS attack
<p>Publish Date: 2021-07-21
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-37136>CVE-2021-37136</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/advisories/GHSA-grg4-wf29-r9vv">https://github.com/advisories/GHSA-grg4-wf29-r9vv</a></p>
<p>Release Date: 2021-07-21</p>
<p>Fix Resolution: io.netty:netty-codec:4.1.68.Final</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_defect | cve high detected in netty codec final jar cve high severity vulnerability vulnerable library netty codec final jar netty is an asynchronous event driven network application framework for rapid development of maintainable high performance protocol servers and clients path to dependency file spring boot spring boot tests spring boot smoke tests spring boot smoke test jta bitronix build gradle path to vulnerable library home wss scanner gradle caches modules files io netty netty codec final netty codec final jar home wss scanner gradle caches modules files io netty netty codec final netty codec final jar dependency hierarchy netty bom final root library x netty codec final jar vulnerable library vulnerability details the decompression decoder function doesn t allow setting size restrictions on the decompressed output data which affects the allocation size used during decompression all users of are affected the malicious input can trigger an oome and so a dos attack publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution io netty netty codec final step up your open source security game with whitesource | 0 |
13,804 | 23,729,025,199 | IssuesEvent | 2022-08-30 22:53:51 | microsoft/component-detection | https://api.github.com/repos/microsoft/component-detection | closed | Publish container image | status:requirements type:ci | To make Component Detection easier to consume and use, we should start publishing container images.
Two open questions are:
1. What should we use as a base image?
2. Where should we publish our image?
## 1. What should we use as a base image?
For our base image, we can use a one of dotnet's runtime-deps images[^1] once #37 is merged. These images don't have any dotnet runtime installed, which makes them a lot smaller than the standard runtime images.
These are currently the .NET Core 3.1 tags available:
<details>
<summary>Tags</summary>
3.1
3.1-alpine
3.1-alpine-arm64v8
3.1-alpine3.12
3.1-alpine3.12-arm64v8
3.1-alpine3.13
3.1-alpine3.13-arm64v8
3.1-alpine3.14
3.1-alpine3.14-arm64v8
3.1-bionic
3.1-bionic-arm32v7
3.1-bionic-arm64v8
3.1-bullseye-slim
3.1-bullseye-slim-arm32v7
3.1-bullseye-slim-arm64v8
3.1-buster-slim
3.1-buster-slim-arm32v7
3.1-buster-slim-arm64v8
3.1-cbl-mariner1.0
3.1-focal
3.1-focal-arm32v7
3.1-focal-arm64v8
</details>
For simplicity, we may want to use `3.1-bullseye-slim`, but `3.1-cbl-mariner1.0` and `3.1-alpine3.14` may also be considered
## 2. Where should we publish our image?
We should push to the Microsoft Container Registry[^2], but we might also want to push to the GitHub Container Registry as well.
[^1]: https://github.com/dotnet/dotnet-docker/tree/main/src/runtime-deps/3.1
[^2]: https://github.com/microsoft/containerregistry | 1.0 | Publish container image - To make Component Detection easier to consume and use, we should start publishing container images.
Two open questions are:
1. What should we use as a base image?
2. Where should we publish our image?
## 1. What should we use as a base image?
For our base image, we can use a one of dotnet's runtime-deps images[^1] once #37 is merged. These images don't have any dotnet runtime installed, which makes them a lot smaller than the standard runtime images.
These are currently the .NET Core 3.1 tags available:
<details>
<summary>Tags</summary>
3.1
3.1-alpine
3.1-alpine-arm64v8
3.1-alpine3.12
3.1-alpine3.12-arm64v8
3.1-alpine3.13
3.1-alpine3.13-arm64v8
3.1-alpine3.14
3.1-alpine3.14-arm64v8
3.1-bionic
3.1-bionic-arm32v7
3.1-bionic-arm64v8
3.1-bullseye-slim
3.1-bullseye-slim-arm32v7
3.1-bullseye-slim-arm64v8
3.1-buster-slim
3.1-buster-slim-arm32v7
3.1-buster-slim-arm64v8
3.1-cbl-mariner1.0
3.1-focal
3.1-focal-arm32v7
3.1-focal-arm64v8
</details>
For simplicity, we may want to use `3.1-bullseye-slim`, but `3.1-cbl-mariner1.0` and `3.1-alpine3.14` may also be considered
## 2. Where should we publish our image?
We should push to the Microsoft Container Registry[^2], but we might also want to push to the GitHub Container Registry as well.
[^1]: https://github.com/dotnet/dotnet-docker/tree/main/src/runtime-deps/3.1
[^2]: https://github.com/microsoft/containerregistry | non_defect | publish container image to make component detection easier to consume and use we should start publishing container images two open questions are what should we use as a base image where should we publish our image what should we use as a base image for our base image we can use a one of dotnet s runtime deps images once is merged these images don t have any dotnet runtime installed which makes them a lot smaller than the standard runtime images these are currently the net core tags available tags alpine alpine bionic bionic bionic bullseye slim bullseye slim bullseye slim buster slim buster slim buster slim cbl focal focal focal for simplicity we may want to use bullseye slim but cbl and may also be considered where should we publish our image we should push to the microsoft container registry but we might also want to push to the github container registry as well | 0 |
40,316 | 9,954,645,230 | IssuesEvent | 2019-07-05 08:57:01 | panoply/vscode-liquid | https://api.github.com/repos/panoply/vscode-liquid | closed | Code within Comments Breaks Highlighting | Syntax Defect | <img width="674" alt="liquid_page-builder-alg liquid++site+2019-07-04+13-09-57" src="https://user-images.githubusercontent.com/34731936/60686391-4c413600-9e5d-11e9-974e-96ee4b44aa13.png">
Not sure whether it's the use of {{ block.type }} or possibly the double forward slashes.
| 1.0 | Code within Comments Breaks Highlighting - <img width="674" alt="liquid_page-builder-alg liquid++site+2019-07-04+13-09-57" src="https://user-images.githubusercontent.com/34731936/60686391-4c413600-9e5d-11e9-974e-96ee4b44aa13.png">
Not sure whether it's the use of {{ block.type }} or possibly the double forward slashes.
| defect | code within comments breaks highlighting img width alt liquid page builder alg liquid site src not sure whether it s the use of block type or possibly the double forward slashes | 1 |
123,989 | 17,772,427,954 | IssuesEvent | 2021-08-30 15:04:10 | kapseliboi/nuxt-client | https://api.github.com/repos/kapseliboi/nuxt-client | opened | CVE-2020-28469 (High) detected in multiple libraries | security vulnerability | ## CVE-2020-28469 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>glob-parent-5.1.0.tgz</b>, <b>glob-parent-2.0.0.tgz</b>, <b>glob-parent-3.1.0.tgz</b></p></summary>
<p>
<details><summary><b>glob-parent-5.1.0.tgz</b></p></summary>
<p>Extract the non-magic parent path from a glob string.</p>
<p>Library home page: <a href="https://registry.npmjs.org/glob-parent/-/glob-parent-5.1.0.tgz">https://registry.npmjs.org/glob-parent/-/glob-parent-5.1.0.tgz</a></p>
<p>Path to dependency file: nuxt-client/package.json</p>
<p>Path to vulnerable library: nuxt-client/node_modules/glob-parent/package.json</p>
<p>
Dependency Hierarchy:
- eslint-6.8.0.tgz (Root Library)
- :x: **glob-parent-5.1.0.tgz** (Vulnerable Library)
</details>
<details><summary><b>glob-parent-2.0.0.tgz</b></p></summary>
<p>Strips glob magic from a string to provide the parent path</p>
<p>Library home page: <a href="https://registry.npmjs.org/glob-parent/-/glob-parent-2.0.0.tgz">https://registry.npmjs.org/glob-parent/-/glob-parent-2.0.0.tgz</a></p>
<p>Path to dependency file: nuxt-client/package.json</p>
<p>Path to vulnerable library: nuxt-client/node_modules/glob-base/node_modules/glob-parent/package.json</p>
<p>
Dependency Hierarchy:
- vue-5.3.19.tgz (Root Library)
- core-5.3.19.tgz
- glob-base-0.3.0.tgz
- :x: **glob-parent-2.0.0.tgz** (Vulnerable Library)
</details>
<details><summary><b>glob-parent-3.1.0.tgz</b></p></summary>
<p>Strips glob magic from a string to provide the parent directory path</p>
<p>Library home page: <a href="https://registry.npmjs.org/glob-parent/-/glob-parent-3.1.0.tgz">https://registry.npmjs.org/glob-parent/-/glob-parent-3.1.0.tgz</a></p>
<p>Path to dependency file: nuxt-client/package.json</p>
<p>Path to vulnerable library: nuxt-client/node_modules/copy-webpack-plugin/node_modules/glob-parent/package.json,nuxt-client/node_modules/webpack-dev-server/node_modules/glob-parent/package.json,nuxt-client/node_modules/react-dev-utils/node_modules/glob-parent/package.json,nuxt-client/node_modules/@vuepress/core/node_modules/glob-parent/package.json,nuxt-client/node_modules/fast-glob/node_modules/glob-parent/package.json,nuxt-client/node_modules/watchpack-chokidar2/node_modules/glob-parent/package.json</p>
<p>
Dependency Hierarchy:
- vue-5.3.19.tgz (Root Library)
- core-5.3.19.tgz
- react-dev-utils-9.1.0.tgz
- fork-ts-checker-webpack-plugin-1.5.0.tgz
- chokidar-2.1.8.tgz
- :x: **glob-parent-3.1.0.tgz** (Vulnerable Library)
</details>
<p>Found in HEAD commit: <a href="https://github.com/kapseliboi/nuxt-client/commit/554beeea1c9adbc89fa96b47029ccd9d81aa99b1">554beeea1c9adbc89fa96b47029ccd9d81aa99b1</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
This affects the package glob-parent before 5.1.2. The enclosure regex used to check for strings ending in enclosure containing path separator.
<p>Publish Date: 2021-06-03
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-28469>CVE-2020-28469</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28469">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28469</a></p>
<p>Release Date: 2021-06-03</p>
<p>Fix Resolution: glob-parent - 5.1.2</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2020-28469 (High) detected in multiple libraries - ## CVE-2020-28469 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>glob-parent-5.1.0.tgz</b>, <b>glob-parent-2.0.0.tgz</b>, <b>glob-parent-3.1.0.tgz</b></p></summary>
<p>
<details><summary><b>glob-parent-5.1.0.tgz</b></p></summary>
<p>Extract the non-magic parent path from a glob string.</p>
<p>Library home page: <a href="https://registry.npmjs.org/glob-parent/-/glob-parent-5.1.0.tgz">https://registry.npmjs.org/glob-parent/-/glob-parent-5.1.0.tgz</a></p>
<p>Path to dependency file: nuxt-client/package.json</p>
<p>Path to vulnerable library: nuxt-client/node_modules/glob-parent/package.json</p>
<p>
Dependency Hierarchy:
- eslint-6.8.0.tgz (Root Library)
- :x: **glob-parent-5.1.0.tgz** (Vulnerable Library)
</details>
<details><summary><b>glob-parent-2.0.0.tgz</b></p></summary>
<p>Strips glob magic from a string to provide the parent path</p>
<p>Library home page: <a href="https://registry.npmjs.org/glob-parent/-/glob-parent-2.0.0.tgz">https://registry.npmjs.org/glob-parent/-/glob-parent-2.0.0.tgz</a></p>
<p>Path to dependency file: nuxt-client/package.json</p>
<p>Path to vulnerable library: nuxt-client/node_modules/glob-base/node_modules/glob-parent/package.json</p>
<p>
Dependency Hierarchy:
- vue-5.3.19.tgz (Root Library)
- core-5.3.19.tgz
- glob-base-0.3.0.tgz
- :x: **glob-parent-2.0.0.tgz** (Vulnerable Library)
</details>
<details><summary><b>glob-parent-3.1.0.tgz</b></p></summary>
<p>Strips glob magic from a string to provide the parent directory path</p>
<p>Library home page: <a href="https://registry.npmjs.org/glob-parent/-/glob-parent-3.1.0.tgz">https://registry.npmjs.org/glob-parent/-/glob-parent-3.1.0.tgz</a></p>
<p>Path to dependency file: nuxt-client/package.json</p>
<p>Path to vulnerable library: nuxt-client/node_modules/copy-webpack-plugin/node_modules/glob-parent/package.json,nuxt-client/node_modules/webpack-dev-server/node_modules/glob-parent/package.json,nuxt-client/node_modules/react-dev-utils/node_modules/glob-parent/package.json,nuxt-client/node_modules/@vuepress/core/node_modules/glob-parent/package.json,nuxt-client/node_modules/fast-glob/node_modules/glob-parent/package.json,nuxt-client/node_modules/watchpack-chokidar2/node_modules/glob-parent/package.json</p>
<p>
Dependency Hierarchy:
- vue-5.3.19.tgz (Root Library)
- core-5.3.19.tgz
- react-dev-utils-9.1.0.tgz
- fork-ts-checker-webpack-plugin-1.5.0.tgz
- chokidar-2.1.8.tgz
- :x: **glob-parent-3.1.0.tgz** (Vulnerable Library)
</details>
<p>Found in HEAD commit: <a href="https://github.com/kapseliboi/nuxt-client/commit/554beeea1c9adbc89fa96b47029ccd9d81aa99b1">554beeea1c9adbc89fa96b47029ccd9d81aa99b1</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
This affects the package glob-parent before 5.1.2. The enclosure regex used to check for strings ending in enclosure containing path separator.
<p>Publish Date: 2021-06-03
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-28469>CVE-2020-28469</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28469">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28469</a></p>
<p>Release Date: 2021-06-03</p>
<p>Fix Resolution: glob-parent - 5.1.2</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_defect | cve high detected in multiple libraries cve high severity vulnerability vulnerable libraries glob parent tgz glob parent tgz glob parent tgz glob parent tgz extract the non magic parent path from a glob string library home page a href path to dependency file nuxt client package json path to vulnerable library nuxt client node modules glob parent package json dependency hierarchy eslint tgz root library x glob parent tgz vulnerable library glob parent tgz strips glob magic from a string to provide the parent path library home page a href path to dependency file nuxt client package json path to vulnerable library nuxt client node modules glob base node modules glob parent package json dependency hierarchy vue tgz root library core tgz glob base tgz x glob parent tgz vulnerable library glob parent tgz strips glob magic from a string to provide the parent directory path library home page a href path to dependency file nuxt client package json path to vulnerable library nuxt client node modules copy webpack plugin node modules glob parent package json nuxt client node modules webpack dev server node modules glob parent package json nuxt client node modules react dev utils node modules glob parent package json nuxt client node modules vuepress core node modules glob parent package json nuxt client node modules fast glob node modules glob parent package json nuxt client node modules watchpack node modules glob parent package json dependency hierarchy vue tgz root library core tgz react dev utils tgz fork ts checker webpack plugin tgz chokidar tgz x glob parent tgz vulnerable library found in head commit a href found in base branch main vulnerability details this affects the package glob parent before the enclosure regex used to check for strings ending in enclosure containing path separator publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution glob parent step up your open source security game with whitesource | 0 |
76,609 | 26,509,684,788 | IssuesEvent | 2023-01-18 16:11:51 | department-of-veterans-affairs/va.gov-cms | https://api.github.com/repos/department-of-veterans-affairs/va.gov-cms | closed | Change colors of title text in CMS to Hex #212121 | ⭐️ Sitewide CMS 508/Accessibility 508-defect-1 | ## Description
This is an implementation ticket for https://github.com/department-of-veterans-affairs/va.gov-cms/issues/10071.
In the CMS on the view screen, there are read only blocks of text. Some blocks have titles as seen in "FAQs" and "Title" in the images below. These titles are currently `#757576` which does not pass WCAG 2.0 AA color contrast requirements against the light gray `#f1f1f1` background of the surrounding block or the red background `#f9dede` if the content is set to draft.
To ensure that this text is ADA compliant against all background colors that we use, the color of this text will need to be changed to `#212121`.


## Acceptance Criteria
- [ ] Colors of title text are changed to `#212121`
- [ ] Requires design review
- [ ] Accessibility Review
### CMS Team
Please check the team(s) that will do this work.
- [ ] `Program`
- [ ] `Platform CMS Team`
- [ ] `Sitewide Crew`
- [x] `⭐️ Sitewide CMS`
- [ ] `⭐️ Public Websites`
- [ ] `⭐️ Facilities`
- [ ] `⭐️ User support`
| 1.0 | Change colors of title text in CMS to Hex #212121 - ## Description
This is an implementation ticket for https://github.com/department-of-veterans-affairs/va.gov-cms/issues/10071.
In the CMS on the view screen, there are read only blocks of text. Some blocks have titles as seen in "FAQs" and "Title" in the images below. These titles are currently `#757576` which does not pass WCAG 2.0 AA color contrast requirements against the light gray `#f1f1f1` background of the surrounding block or the red background `#f9dede` if the content is set to draft.
To ensure that this text is ADA compliant against all background colors that we use, the color of this text will need to be changed to `#212121`.


## Acceptance Criteria
- [ ] Colors of title text are changed to `#212121`
- [ ] Requires design review
- [ ] Accessibility Review
### CMS Team
Please check the team(s) that will do this work.
- [ ] `Program`
- [ ] `Platform CMS Team`
- [ ] `Sitewide Crew`
- [x] `⭐️ Sitewide CMS`
- [ ] `⭐️ Public Websites`
- [ ] `⭐️ Facilities`
- [ ] `⭐️ User support`
| defect | change colors of title text in cms to hex description this is an implementation ticket for in the cms on the view screen there are read only blocks of text some blocks have titles as seen in faqs and title in the images below these titles are currently which does not pass wcag aa color contrast requirements against the light gray background of the surrounding block or the red background if the content is set to draft to ensure that this text is ada compliant against all background colors that we use the color of this text will need to be changed to acceptance criteria colors of title text are changed to requires design review accessibility review cms team please check the team s that will do this work program platform cms team sitewide crew ⭐️ sitewide cms ⭐️ public websites ⭐️ facilities ⭐️ user support | 1 |
43,143 | 11,499,584,446 | IssuesEvent | 2020-02-12 14:12:08 | mozilla/blurts-server | https://api.github.com/repos/mozilla/blurts-server | closed | Verification email: only text within blue button is click-able | defect front-end | Reported at https://bugzilla.mozilla.org/show_bug.cgi?id=1612989
Steps to reproduce:
1. Login to Firefox Monitor
2. Add a second email address.
* A verification email is sent to the primary address. In my email app (Gmail), open the verification email from Firefox Monitor.
3. Click the blue area of the "Verify Email" button (not the text).
Actual results:
Nothing happens.
Expected results:
Link should open when clicking anywhere on the blue button | 1.0 | Verification email: only text within blue button is click-able - Reported at https://bugzilla.mozilla.org/show_bug.cgi?id=1612989
Steps to reproduce:
1. Login to Firefox Monitor
2. Add a second email address.
* A verification email is sent to the primary address. In my email app (Gmail), open the verification email from Firefox Monitor.
3. Click the blue area of the "Verify Email" button (not the text).
Actual results:
Nothing happens.
Expected results:
Link should open when clicking anywhere on the blue button | defect | verification email only text within blue button is click able reported at steps to reproduce login to firefox monitor add a second email address a verification email is sent to the primary address in my email app gmail open the verification email from firefox monitor click the blue area of the verify email button not the text actual results nothing happens expected results link should open when clicking anywhere on the blue button | 1 |
21,648 | 3,535,719,809 | IssuesEvent | 2016-01-16 18:47:40 | jfabry/LiveRobotProgramming | https://api.github.com/repos/jfabry/LiveRobotProgramming | closed | LRPProgramEditor>>processTextUpdate insert space optimisation is broken | Component-UI Priority-Medium Type-Defect | For the inserting a space in well-formed text optimization, LRPProgramEditor>>processTextUpdate is manipulating the ```wellformed``` local var but never actually using this value.
This optimization should be revised, refactored in some separate logic and tested. | 1.0 | LRPProgramEditor>>processTextUpdate insert space optimisation is broken - For the inserting a space in well-formed text optimization, LRPProgramEditor>>processTextUpdate is manipulating the ```wellformed``` local var but never actually using this value.
This optimization should be revised, refactored in some separate logic and tested. | defect | lrpprogrameditor processtextupdate insert space optimisation is broken for the inserting a space in well formed text optimization lrpprogrameditor processtextupdate is manipulating the wellformed local var but never actually using this value this optimization should be revised refactored in some separate logic and tested | 1 |
52,695 | 13,224,938,895 | IssuesEvent | 2020-08-17 20:09:30 | icecube-trac/tix4 | https://api.github.com/repos/icecube-trac/tix4 | closed | Lacking a working test script for cramer-rao (Trac #168) | Migrated from Trac combo reconstruction defect | The test script in cramer-rao does not work, yet, because it depends on some command line parameters. This needs to be fixed, or a new script must be written.
Even better: write some unit tests.
<details>
<summary><em>Migrated from <a href="https://code.icecube.wisc.edu/projects/icecube/ticket/168">https://code.icecube.wisc.edu/projects/icecube/ticket/168</a>, reported by kislatand owned by lunemann</em></summary>
<p>
```json
{
"status": "closed",
"changetime": "2009-10-16T13:45:16",
"_ts": "1255700716000000",
"description": "The test script in cramer-rao does not work, yet, because it depends on some command line parameters. This needs to be fixed, or a new script must be written.\n\nEven better: write some unit tests.",
"reporter": "kislat",
"cc": "",
"resolution": "fixed",
"time": "2009-10-16T13:19:00",
"component": "combo reconstruction",
"summary": "Lacking a working test script for cramer-rao",
"priority": "normal",
"keywords": "",
"milestone": "",
"owner": "lunemann",
"type": "defect"
}
```
</p>
</details>
| 1.0 | Lacking a working test script for cramer-rao (Trac #168) - The test script in cramer-rao does not work, yet, because it depends on some command line parameters. This needs to be fixed, or a new script must be written.
Even better: write some unit tests.
<details>
<summary><em>Migrated from <a href="https://code.icecube.wisc.edu/projects/icecube/ticket/168">https://code.icecube.wisc.edu/projects/icecube/ticket/168</a>, reported by kislatand owned by lunemann</em></summary>
<p>
```json
{
"status": "closed",
"changetime": "2009-10-16T13:45:16",
"_ts": "1255700716000000",
"description": "The test script in cramer-rao does not work, yet, because it depends on some command line parameters. This needs to be fixed, or a new script must be written.\n\nEven better: write some unit tests.",
"reporter": "kislat",
"cc": "",
"resolution": "fixed",
"time": "2009-10-16T13:19:00",
"component": "combo reconstruction",
"summary": "Lacking a working test script for cramer-rao",
"priority": "normal",
"keywords": "",
"milestone": "",
"owner": "lunemann",
"type": "defect"
}
```
</p>
</details>
| defect | lacking a working test script for cramer rao trac the test script in cramer rao does not work yet because it depends on some command line parameters this needs to be fixed or a new script must be written even better write some unit tests migrated from json status closed changetime ts description the test script in cramer rao does not work yet because it depends on some command line parameters this needs to be fixed or a new script must be written n neven better write some unit tests reporter kislat cc resolution fixed time component combo reconstruction summary lacking a working test script for cramer rao priority normal keywords milestone owner lunemann type defect | 1 |
55,685 | 14,631,892,751 | IssuesEvent | 2020-12-23 20:58:14 | openzfs/zfs | https://api.github.com/repos/openzfs/zfs | closed | zpool list shows vdev of same size as 127GB and sometime 128GB | Type: Defect | $ sudo lvs --units b # I realize that putting ZFS/LVM is discouraged.
```
LV VG Attr LSize Pool Origin Data% Meta% Move Log Cpy%Sync Convert
...
zfs2 data -wi-ao---- 137438953472B
zfs3 data -wi-ao---- 137438953472B
```
$ sudo zpool list -
```
NAME SIZE ALLOC FREE CKPOINT EXPANDSZ FRAG CAP DEDUP HEALTH ALTROOT
zfs 254G 134G 121G - - 16% 52% 1.00x ONLINE -
zfs2 127G 81.8G 45.2G - - 13% 64.4% - ONLINE
zfs3 128G 52.2G 75.3G - - 20% 40.9% - ONLINE
```
=> Two vdevs of same size shown as different sizes.
### System information
Type | Version/Name
--- | ---
Distribution Name | Centos7
Distribution Version | 7
Linux Kernel | 3.10.0-1062.el7
Architecture | x86_64
ZFS Version | zfs-dkms-2.0.0-1.el7.noarch
SPL Version | 2.0.0-1
| 1.0 | zpool list shows vdev of same size as 127GB and sometime 128GB - $ sudo lvs --units b # I realize that putting ZFS/LVM is discouraged.
```
LV VG Attr LSize Pool Origin Data% Meta% Move Log Cpy%Sync Convert
...
zfs2 data -wi-ao---- 137438953472B
zfs3 data -wi-ao---- 137438953472B
```
$ sudo zpool list -
```
NAME SIZE ALLOC FREE CKPOINT EXPANDSZ FRAG CAP DEDUP HEALTH ALTROOT
zfs 254G 134G 121G - - 16% 52% 1.00x ONLINE -
zfs2 127G 81.8G 45.2G - - 13% 64.4% - ONLINE
zfs3 128G 52.2G 75.3G - - 20% 40.9% - ONLINE
```
=> Two vdevs of same size shown as different sizes.
### System information
Type | Version/Name
--- | ---
Distribution Name | Centos7
Distribution Version | 7
Linux Kernel | 3.10.0-1062.el7
Architecture | x86_64
ZFS Version | zfs-dkms-2.0.0-1.el7.noarch
SPL Version | 2.0.0-1
| defect | zpool list shows vdev of same size as and sometime sudo lvs units b i realize that putting zfs lvm is discouraged lv vg attr lsize pool origin data meta move log cpy sync convert data wi ao data wi ao sudo zpool list name size alloc free ckpoint expandsz frag cap dedup health altroot zfs online online online two vdevs of same size shown as different sizes system information type version name distribution name distribution version linux kernel architecture zfs version zfs dkms noarch spl version | 1 |
20,715 | 3,409,330,518 | IssuesEvent | 2015-12-04 15:20:14 | PowerDNS/pdns | https://api.github.com/repos/PowerDNS/pdns | closed | HINFO with quoted values | auth defect | When I ran the example.com zone file from the regression tests through zone2sql the result for the HINFO record's content was '"abc" "def"' whereas I expected it to be 'abc def'. It seems this is allowed by the spec but it is contrary to how the documentation indicates the HINFO should be stored. I'm not sure how PowerDNS reacts to this data but it may not like it. | 1.0 | HINFO with quoted values - When I ran the example.com zone file from the regression tests through zone2sql the result for the HINFO record's content was '"abc" "def"' whereas I expected it to be 'abc def'. It seems this is allowed by the spec but it is contrary to how the documentation indicates the HINFO should be stored. I'm not sure how PowerDNS reacts to this data but it may not like it. | defect | hinfo with quoted values when i ran the example com zone file from the regression tests through the result for the hinfo record s content was abc def whereas i expected it to be abc def it seems this is allowed by the spec but it is contrary to how the documentation indicates the hinfo should be stored i m not sure how powerdns reacts to this data but it may not like it | 1 |
266,513 | 20,156,118,013 | IssuesEvent | 2022-02-09 16:36:24 | lascellesabercrombie/SquareGame | https://api.github.com/repos/lascellesabercrombie/SquareGame | opened | mobile environment test | documentation | I'd like to check it in the mobile environment as well.
If you'd like to create the page within GitHub then, can you please add the page link in the about section in [Repo](https://github.com/lascellesabercrombie/SquareGame) or Readme.md ? | 1.0 | mobile environment test - I'd like to check it in the mobile environment as well.
If you'd like to create the page within GitHub then, can you please add the page link in the about section in [Repo](https://github.com/lascellesabercrombie/SquareGame) or Readme.md ? | non_defect | mobile environment test i d like to check it in the mobile environment as well if you d like to create the page within github then can you please add the page link in the about section in or readme md | 0 |
19,567 | 3,226,792,330 | IssuesEvent | 2015-10-10 16:11:53 | scipy/scipy | https://api.github.com/repos/scipy/scipy | closed | BUG: cluster: The `color_list` argument of `dendrogram` is undocumented and ignored. | defect scipy.cluster | The function `scipy.cluster.hierarchy.dendrogram` has an argument `color_list`, but this argument is not documented in the docstring, and is not used in the code. In fact, the first use of `color_list` in the `dendrogram` code is
color_list = []
| 1.0 | BUG: cluster: The `color_list` argument of `dendrogram` is undocumented and ignored. - The function `scipy.cluster.hierarchy.dendrogram` has an argument `color_list`, but this argument is not documented in the docstring, and is not used in the code. In fact, the first use of `color_list` in the `dendrogram` code is
color_list = []
| defect | bug cluster the color list argument of dendrogram is undocumented and ignored the function scipy cluster hierarchy dendrogram has an argument color list but this argument is not documented in the docstring and is not used in the code in fact the first use of color list in the dendrogram code is color list | 1 |
36,560 | 12,417,751,664 | IssuesEvent | 2020-05-22 21:34:21 | wrbejar/Nova8HML | https://api.github.com/repos/wrbejar/Nova8HML | opened | CVE-2017-3589 (Low) detected in mysql-connector-java-5.1.26.jar | security vulnerability | ## CVE-2017-3589 - Low Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>mysql-connector-java-5.1.26.jar</b></p></summary>
<p>MySQL JDBC Type 4 driver</p>
<p>Library home page: <a href="http://dev.mysql.com/doc/connector-j/en/">http://dev.mysql.com/doc/connector-j/en/</a></p>
<p>Path to vulnerable library: _depth_0/Nova8HML/target/JavaVulnerableLab/WEB-INF/lib/mysql-connector-java-5.1.26.jar,epository/mysql/mysql-connector-java/5.1.26/mysql-connector-java-5.1.26.jar,_depth_0/Nova8HML/target/JavaVulnerableLab/META-INF/maven/org.cysecurity/JavaVulnerableLab/target/JavaVulnerableLab/WEB-INF/lib/mysql-connector-java-5.1.26.jar,epository/mysql/mysql-connector-java/5.1.26/mysql-connector-java-5.1.26.jar,/Nova8HML/target/JavaVulnerableLab/WEB-INF/lib/mysql-connector-java-5.1.26.jar</p>
<p>
Dependency Hierarchy:
- :x: **mysql-connector-java-5.1.26.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/wrbejar/Nova8HML/commit/49383a19997b2f011b7df4de75ab96508aa18e9a">49383a19997b2f011b7df4de75ab96508aa18e9a</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Vulnerability in the MySQL Connectors component of Oracle MySQL (subcomponent: Connector/J). Supported versions that are affected are 5.1.41 and earlier. Easily "exploitable" vulnerability allows low privileged attacker with logon to the infrastructure where MySQL Connectors executes to compromise MySQL Connectors. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Connectors accessible data. CVSS 3.0 Base Score 3.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N).
<p>Publish Date: 2017-04-24
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-3589>CVE-2017-3589</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>3.3</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3589">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3589</a></p>
<p>Release Date: 2017-04-24</p>
<p>Fix Resolution: 5.1.42</p>
</p>
</details>
<p></p>
***
<!-- REMEDIATE-OPEN-PR-START -->
- [ ] Check this box to open an automated fix PR
<!-- REMEDIATE-OPEN-PR-END -->
<!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"mysql","packageName":"mysql-connector-java","packageVersion":"5.1.26","isTransitiveDependency":false,"dependencyTree":"mysql:mysql-connector-java:5.1.26","isMinimumFixVersionAvailable":true,"minimumFixVersion":"5.1.42"}],"vulnerabilityIdentifier":"CVE-2017-3589","vulnerabilityDetails":"Vulnerability in the MySQL Connectors component of Oracle MySQL (subcomponent: Connector/J). Supported versions that are affected are 5.1.41 and earlier. Easily \"exploitable\" vulnerability allows low privileged attacker with logon to the infrastructure where MySQL Connectors executes to compromise MySQL Connectors. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Connectors accessible data. CVSS 3.0 Base Score 3.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N).","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-3589","cvss3Severity":"low","cvss3Score":"3.3","cvss3Metrics":{"A":"None","AC":"Low","PR":"Low","S":"Unchanged","C":"None","UI":"None","AV":"Local","I":"Low"},"extraData":{}}</REMEDIATE> --> | True | CVE-2017-3589 (Low) detected in mysql-connector-java-5.1.26.jar - ## CVE-2017-3589 - Low Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>mysql-connector-java-5.1.26.jar</b></p></summary>
<p>MySQL JDBC Type 4 driver</p>
<p>Library home page: <a href="http://dev.mysql.com/doc/connector-j/en/">http://dev.mysql.com/doc/connector-j/en/</a></p>
<p>Path to vulnerable library: _depth_0/Nova8HML/target/JavaVulnerableLab/WEB-INF/lib/mysql-connector-java-5.1.26.jar,epository/mysql/mysql-connector-java/5.1.26/mysql-connector-java-5.1.26.jar,_depth_0/Nova8HML/target/JavaVulnerableLab/META-INF/maven/org.cysecurity/JavaVulnerableLab/target/JavaVulnerableLab/WEB-INF/lib/mysql-connector-java-5.1.26.jar,epository/mysql/mysql-connector-java/5.1.26/mysql-connector-java-5.1.26.jar,/Nova8HML/target/JavaVulnerableLab/WEB-INF/lib/mysql-connector-java-5.1.26.jar</p>
<p>
Dependency Hierarchy:
- :x: **mysql-connector-java-5.1.26.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/wrbejar/Nova8HML/commit/49383a19997b2f011b7df4de75ab96508aa18e9a">49383a19997b2f011b7df4de75ab96508aa18e9a</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Vulnerability in the MySQL Connectors component of Oracle MySQL (subcomponent: Connector/J). Supported versions that are affected are 5.1.41 and earlier. Easily "exploitable" vulnerability allows low privileged attacker with logon to the infrastructure where MySQL Connectors executes to compromise MySQL Connectors. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Connectors accessible data. CVSS 3.0 Base Score 3.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N).
<p>Publish Date: 2017-04-24
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-3589>CVE-2017-3589</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>3.3</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3589">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3589</a></p>
<p>Release Date: 2017-04-24</p>
<p>Fix Resolution: 5.1.42</p>
</p>
</details>
<p></p>
***
<!-- REMEDIATE-OPEN-PR-START -->
- [ ] Check this box to open an automated fix PR
<!-- REMEDIATE-OPEN-PR-END -->
<!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"mysql","packageName":"mysql-connector-java","packageVersion":"5.1.26","isTransitiveDependency":false,"dependencyTree":"mysql:mysql-connector-java:5.1.26","isMinimumFixVersionAvailable":true,"minimumFixVersion":"5.1.42"}],"vulnerabilityIdentifier":"CVE-2017-3589","vulnerabilityDetails":"Vulnerability in the MySQL Connectors component of Oracle MySQL (subcomponent: Connector/J). Supported versions that are affected are 5.1.41 and earlier. Easily \"exploitable\" vulnerability allows low privileged attacker with logon to the infrastructure where MySQL Connectors executes to compromise MySQL Connectors. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Connectors accessible data. CVSS 3.0 Base Score 3.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N).","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-3589","cvss3Severity":"low","cvss3Score":"3.3","cvss3Metrics":{"A":"None","AC":"Low","PR":"Low","S":"Unchanged","C":"None","UI":"None","AV":"Local","I":"Low"},"extraData":{}}</REMEDIATE> --> | non_defect | cve low detected in mysql connector java jar cve low severity vulnerability vulnerable library mysql connector java jar mysql jdbc type driver library home page a href path to vulnerable library depth target javavulnerablelab web inf lib mysql connector java jar epository mysql mysql connector java mysql connector java jar depth target javavulnerablelab meta inf maven org cysecurity javavulnerablelab target javavulnerablelab web inf lib mysql connector java jar epository mysql mysql connector java mysql connector java jar target javavulnerablelab web inf lib mysql connector java jar dependency hierarchy x mysql connector java jar vulnerable library found in head commit a href vulnerability details vulnerability in the mysql connectors component of oracle mysql subcomponent connector j supported versions that are affected are and earlier easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where mysql connectors executes to compromise mysql connectors successful attacks of this vulnerability can result in unauthorized update insert or delete access to some of mysql connectors accessible data cvss base score integrity impacts cvss vector cvss av l ac l pr l ui n s u c n i l a n publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact none integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution check this box to open an automated fix pr isopenpronvulnerability false ispackagebased true isdefaultbranch true packages vulnerabilityidentifier cve vulnerabilitydetails vulnerability in the mysql connectors component of oracle mysql subcomponent connector j supported versions that are affected are and earlier easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where mysql connectors executes to compromise mysql connectors successful attacks of this vulnerability can result in unauthorized update insert or delete access to some of mysql connectors accessible data cvss base score integrity impacts cvss vector cvss av l ac l pr l ui n s u c n i l a n vulnerabilityurl | 0 |
158,791 | 6,035,432,441 | IssuesEvent | 2017-06-09 13:53:40 | GeekyAnts/NativeBase | https://api.github.com/repos/GeekyAnts/NativeBase | closed | Extracted theme scripts fail to be imported when "color" 1.x package is used in app. | 2 bug high priority question | My project uses [color](https://www.npmjs.com/package/color) package as a dependency, the version is 1.0.3.
When I extract NB theme to customize it and then import into my app scripts, it fails.
The reason is that NB uses old version of color package which uses methods removed in 1.x, so when I extract theme and it starts using color module from my dependencies, it calls undefined functions.
Example [here](https://github.com/GeekyAnts/NativeBase/blob/master/src/theme/variables/material.js#L173): `hexString` exists in 0.11 but it's renamed to `hex` in 1.x.
The solution would be updating your dependency or adding some info about this situation to docs.
- react-native 0.42, react 15.4.1 and native-base 2.0.11
- expected behaviour: no errors after importing e.g. `variables\material.js` from extracted theme
- actual behaviour: error `undefined is not a function (evaluating '(0, _color2.default)(this.toolbarDefaultBg).darken(0.2).hexString()')` on [this](https://github.com/GeekyAnts/NativeBase/blob/master/src/theme/variables/material.js#L173) line
- Steps to reproduce (code snippet or screenshot):
- extract theme
- install npm package `color` as dependency for app
- import `%theme_location%/variables/material.js`
| 1.0 | Extracted theme scripts fail to be imported when "color" 1.x package is used in app. - My project uses [color](https://www.npmjs.com/package/color) package as a dependency, the version is 1.0.3.
When I extract NB theme to customize it and then import into my app scripts, it fails.
The reason is that NB uses old version of color package which uses methods removed in 1.x, so when I extract theme and it starts using color module from my dependencies, it calls undefined functions.
Example [here](https://github.com/GeekyAnts/NativeBase/blob/master/src/theme/variables/material.js#L173): `hexString` exists in 0.11 but it's renamed to `hex` in 1.x.
The solution would be updating your dependency or adding some info about this situation to docs.
- react-native 0.42, react 15.4.1 and native-base 2.0.11
- expected behaviour: no errors after importing e.g. `variables\material.js` from extracted theme
- actual behaviour: error `undefined is not a function (evaluating '(0, _color2.default)(this.toolbarDefaultBg).darken(0.2).hexString()')` on [this](https://github.com/GeekyAnts/NativeBase/blob/master/src/theme/variables/material.js#L173) line
- Steps to reproduce (code snippet or screenshot):
- extract theme
- install npm package `color` as dependency for app
- import `%theme_location%/variables/material.js`
| non_defect | extracted theme scripts fail to be imported when color x package is used in app my project uses package as a dependency the version is when i extract nb theme to customize it and then import into my app scripts it fails the reason is that nb uses old version of color package which uses methods removed in x so when i extract theme and it starts using color module from my dependencies it calls undefined functions example hexstring exists in but it s renamed to hex in x the solution would be updating your dependency or adding some info about this situation to docs react native react and native base expected behaviour no errors after importing e g variables material js from extracted theme actual behaviour error undefined is not a function evaluating default this toolbardefaultbg darken hexstring on line steps to reproduce code snippet or screenshot extract theme install npm package color as dependency for app import theme location variables material js | 0 |
220,367 | 24,564,957,528 | IssuesEvent | 2022-10-13 01:29:13 | akivamprager/Sheilta | https://api.github.com/repos/akivamprager/Sheilta | opened | CVE-2022-37599 (Medium) detected in loader-utils-1.2.3.tgz, loader-utils-1.4.0.tgz | security vulnerability | ## CVE-2022-37599 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>loader-utils-1.2.3.tgz</b>, <b>loader-utils-1.4.0.tgz</b></p></summary>
<p>
<details><summary><b>loader-utils-1.2.3.tgz</b></p></summary>
<p>utils for webpack loaders</p>
<p>Library home page: <a href="https://registry.npmjs.org/loader-utils/-/loader-utils-1.2.3.tgz">https://registry.npmjs.org/loader-utils/-/loader-utils-1.2.3.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/react-dev-utils/node_modules/loader-utils/package.json</p>
<p>
Dependency Hierarchy:
- react-scripts-3.4.3.tgz (Root Library)
- resolve-url-loader-3.1.1.tgz
- :x: **loader-utils-1.2.3.tgz** (Vulnerable Library)
</details>
<details><summary><b>loader-utils-1.4.0.tgz</b></p></summary>
<p>utils for webpack loaders</p>
<p>Library home page: <a href="https://registry.npmjs.org/loader-utils/-/loader-utils-1.4.0.tgz">https://registry.npmjs.org/loader-utils/-/loader-utils-1.4.0.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/loader-utils/package.json</p>
<p>
Dependency Hierarchy:
- react-scripts-3.4.3.tgz (Root Library)
- webpack-4.3.3.tgz
- :x: **loader-utils-1.4.0.tgz** (Vulnerable Library)
</details>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
A Regular expression denial of service (ReDoS) flaw was found in Function interpolateName in interpolateName.js in webpack loader-utils 2.0.0 via the resourcePath variable in interpolateName.js.
<p>Publish Date: 2022-10-11
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-37599>CVE-2022-37599</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2022-37599 (Medium) detected in loader-utils-1.2.3.tgz, loader-utils-1.4.0.tgz - ## CVE-2022-37599 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>loader-utils-1.2.3.tgz</b>, <b>loader-utils-1.4.0.tgz</b></p></summary>
<p>
<details><summary><b>loader-utils-1.2.3.tgz</b></p></summary>
<p>utils for webpack loaders</p>
<p>Library home page: <a href="https://registry.npmjs.org/loader-utils/-/loader-utils-1.2.3.tgz">https://registry.npmjs.org/loader-utils/-/loader-utils-1.2.3.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/react-dev-utils/node_modules/loader-utils/package.json</p>
<p>
Dependency Hierarchy:
- react-scripts-3.4.3.tgz (Root Library)
- resolve-url-loader-3.1.1.tgz
- :x: **loader-utils-1.2.3.tgz** (Vulnerable Library)
</details>
<details><summary><b>loader-utils-1.4.0.tgz</b></p></summary>
<p>utils for webpack loaders</p>
<p>Library home page: <a href="https://registry.npmjs.org/loader-utils/-/loader-utils-1.4.0.tgz">https://registry.npmjs.org/loader-utils/-/loader-utils-1.4.0.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/loader-utils/package.json</p>
<p>
Dependency Hierarchy:
- react-scripts-3.4.3.tgz (Root Library)
- webpack-4.3.3.tgz
- :x: **loader-utils-1.4.0.tgz** (Vulnerable Library)
</details>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
A Regular expression denial of service (ReDoS) flaw was found in Function interpolateName in interpolateName.js in webpack loader-utils 2.0.0 via the resourcePath variable in interpolateName.js.
<p>Publish Date: 2022-10-11
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-37599>CVE-2022-37599</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_defect | cve medium detected in loader utils tgz loader utils tgz cve medium severity vulnerability vulnerable libraries loader utils tgz loader utils tgz loader utils tgz utils for webpack loaders library home page a href path to dependency file package json path to vulnerable library node modules react dev utils node modules loader utils package json dependency hierarchy react scripts tgz root library resolve url loader tgz x loader utils tgz vulnerable library loader utils tgz utils for webpack loaders library home page a href path to dependency file package json path to vulnerable library node modules loader utils package json dependency hierarchy react scripts tgz root library webpack tgz x loader utils tgz vulnerable library found in base branch master vulnerability details a regular expression denial of service redos flaw was found in function interpolatename in interpolatename js in webpack loader utils via the resourcepath variable in interpolatename js publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href step up your open source security game with mend | 0 |
16,364 | 2,889,799,354 | IssuesEvent | 2015-06-13 19:27:51 | damonkohler/android-scripting | https://api.github.com/repos/damonkohler/android-scripting | closed | Bluetooth Crash | auto-migrated Priority-Medium Type-Defect | ```
The following program will reportedly cause the Terminal to seize up after
calling droid.bluetoothWrite(result + '\n').
import android
import time
print 'print works at this point'
droid = android.Android()
droid.toggleBluetoothState(True)
droid.dialogCreateAlert('Be a server?')
droid.dialogSetPositiveButtonText('Yes')
droid.dialogSetNegativeButtonText('No')
droid.dialogShow()
result = droid.dialogGetResponse()
is_server = result.result['which'] == 'positive'
if is_server:
droid.bluetoothMakeDiscoverable()
droid.bluetoothAccept()
else:
droid.bluetoothConnect('00001101-0000-1000-8000-00805F9B34FB')
if is_server:
result = droid.getInput('Chat', 'Enter a message').result
if result is None:
droid.exit()
droid.bluetoothWrite(result + '\n')
print 'print stops working at this point, printing one character then
nothing ever again'
while True:
droid.makeToast("attempting read")
if droid.bluetoothReadReady():
print droid.bluetoothRead()
result = droid.getInput('Chat', 'Enter a message').result
if result is None:
break
droid.bluetoothWrite(result + '\r' + '\n')
droid.exit()
```
Original issue reported on code.google.com by `damonkoh...@gmail.com` on 6 Sep 2010 at 7:42 | 1.0 | Bluetooth Crash - ```
The following program will reportedly cause the Terminal to seize up after
calling droid.bluetoothWrite(result + '\n').
import android
import time
print 'print works at this point'
droid = android.Android()
droid.toggleBluetoothState(True)
droid.dialogCreateAlert('Be a server?')
droid.dialogSetPositiveButtonText('Yes')
droid.dialogSetNegativeButtonText('No')
droid.dialogShow()
result = droid.dialogGetResponse()
is_server = result.result['which'] == 'positive'
if is_server:
droid.bluetoothMakeDiscoverable()
droid.bluetoothAccept()
else:
droid.bluetoothConnect('00001101-0000-1000-8000-00805F9B34FB')
if is_server:
result = droid.getInput('Chat', 'Enter a message').result
if result is None:
droid.exit()
droid.bluetoothWrite(result + '\n')
print 'print stops working at this point, printing one character then
nothing ever again'
while True:
droid.makeToast("attempting read")
if droid.bluetoothReadReady():
print droid.bluetoothRead()
result = droid.getInput('Chat', 'Enter a message').result
if result is None:
break
droid.bluetoothWrite(result + '\r' + '\n')
droid.exit()
```
Original issue reported on code.google.com by `damonkoh...@gmail.com` on 6 Sep 2010 at 7:42 | defect | bluetooth crash the following program will reportedly cause the terminal to seize up after calling droid bluetoothwrite result n import android import time print print works at this point droid android android droid togglebluetoothstate true droid dialogcreatealert be a server droid dialogsetpositivebuttontext yes droid dialogsetnegativebuttontext no droid dialogshow result droid dialoggetresponse is server result result positive if is server droid bluetoothmakediscoverable droid bluetoothaccept else droid bluetoothconnect if is server result droid getinput chat enter a message result if result is none droid exit droid bluetoothwrite result n print print stops working at this point printing one character then nothing ever again while true droid maketoast attempting read if droid bluetoothreadready print droid bluetoothread result droid getinput chat enter a message result if result is none break droid bluetoothwrite result r n droid exit original issue reported on code google com by damonkoh gmail com on sep at | 1 |
65,598 | 19,588,505,674 | IssuesEvent | 2022-01-05 10:07:05 | vector-im/element-web | https://api.github.com/repos/vector-im/element-web | closed | Ctrl-K should not expand the room list | T-Defect S-Minor O-Occasional Z-Labs A-Spotlight-Search | ### Steps to reproduce
1. Enable spotlight search
2. Minimize the room list
3. Press Ctrl-K to open spotlight search
### Outcome
#### What did you expect?
The spotlight search dialog should open, but nothing else should happen.
#### What happened instead?
The room list became maximized as well. Before spotlight search, this was necessary to be able to see the search interface, but now that search just happens in a dialog, there is no reason to change the app layout on Ctrl-K.
### Operating system
NixOS unstable
### Browser information
Firefox 95.0.2
### URL for webapp
develop.element.io
### Application version
Element version: 211f48002759-react-00feb248778a-js-f30be8787934 Olm version: 3.2.8
### Homeserver
townsendandsmith.ml
### Will you send logs?
No | 1.0 | Ctrl-K should not expand the room list - ### Steps to reproduce
1. Enable spotlight search
2. Minimize the room list
3. Press Ctrl-K to open spotlight search
### Outcome
#### What did you expect?
The spotlight search dialog should open, but nothing else should happen.
#### What happened instead?
The room list became maximized as well. Before spotlight search, this was necessary to be able to see the search interface, but now that search just happens in a dialog, there is no reason to change the app layout on Ctrl-K.
### Operating system
NixOS unstable
### Browser information
Firefox 95.0.2
### URL for webapp
develop.element.io
### Application version
Element version: 211f48002759-react-00feb248778a-js-f30be8787934 Olm version: 3.2.8
### Homeserver
townsendandsmith.ml
### Will you send logs?
No | defect | ctrl k should not expand the room list steps to reproduce enable spotlight search minimize the room list press ctrl k to open spotlight search outcome what did you expect the spotlight search dialog should open but nothing else should happen what happened instead the room list became maximized as well before spotlight search this was necessary to be able to see the search interface but now that search just happens in a dialog there is no reason to change the app layout on ctrl k operating system nixos unstable browser information firefox url for webapp develop element io application version element version react js olm version homeserver townsendandsmith ml will you send logs no | 1 |
6,254 | 2,610,224,160 | IssuesEvent | 2015-02-26 19:11:04 | chrsmith/somefinders | https://api.github.com/repos/chrsmith/somefinders | opened | должностная инструкция заместителя начальника производства | auto-migrated Priority-Medium Type-Defect | ```
'''Андрон Игнатов'''
Привет всем не подскажите где можно найти
.должностная инструкция заместителя
начальника производства. где то видел уже
'''Альвин Игнатьев'''
Вот хороший сайт где можно скачать
http://bit.ly/1iyi8aw
'''Влад Гордеев'''
Спасибо вроде то но просит телефон вводить
'''Глеб Соболев'''
Неа все ок у меня ничего не списало
'''Винцент Петухов'''
Неа все ок у меня ничего не списало
Информация о файле: должностная инструкция
заместителя начальника производства
Загружен: В этом месяце
Скачан раз: 757
Рейтинг: 704
Средняя скорость скачивания: 446
Похожих файлов: 33
```
-----
Original issue reported on code.google.com by `kondense...@gmail.com` on 18 Dec 2013 at 9:12 | 1.0 | должностная инструкция заместителя начальника производства - ```
'''Андрон Игнатов'''
Привет всем не подскажите где можно найти
.должностная инструкция заместителя
начальника производства. где то видел уже
'''Альвин Игнатьев'''
Вот хороший сайт где можно скачать
http://bit.ly/1iyi8aw
'''Влад Гордеев'''
Спасибо вроде то но просит телефон вводить
'''Глеб Соболев'''
Неа все ок у меня ничего не списало
'''Винцент Петухов'''
Неа все ок у меня ничего не списало
Информация о файле: должностная инструкция
заместителя начальника производства
Загружен: В этом месяце
Скачан раз: 757
Рейтинг: 704
Средняя скорость скачивания: 446
Похожих файлов: 33
```
-----
Original issue reported on code.google.com by `kondense...@gmail.com` on 18 Dec 2013 at 9:12 | defect | должностная инструкция заместителя начальника производства андрон игнатов привет всем не подскажите где можно найти должностная инструкция заместителя начальника производства где то видел уже альвин игнатьев вот хороший сайт где можно скачать влад гордеев спасибо вроде то но просит телефон вводить глеб соболев неа все ок у меня ничего не списало винцент петухов неа все ок у меня ничего не списало информация о файле должностная инструкция заместителя начальника производства загружен в этом месяце скачан раз рейтинг средняя скорость скачивания похожих файлов original issue reported on code google com by kondense gmail com on dec at | 1 |
145,721 | 5,580,512,308 | IssuesEvent | 2017-03-28 16:46:20 | bluecherrydvr/bluecherry-client | https://api.github.com/repos/bluecherrydvr/bluecherry-client | opened | Crash on liveview resize in v2.2.6 | Bug Priority - High | Affects client version 2.2.6,
steps to reproduce:
1) open many cameras in liveview,
2) try to resize liveview area to smaller size my quickly moving sliders

gdb output
```
[New Thread 0x7fff3f7fe700 (LWP 28635)]
EventsLoader: Parsed event data into 16 events
[swscaler @ 0x7fff380875e0] 416x240 -> 0x0 is invalid scaling dimension
ASSERT: "m_avFrame" in file /home/build/bluecherry-client-scripts/package/bluecherry-client-2.2.6/src/rtsp-stream/RtspStreamFrame.cpp, line 27
EventsLoader: Parsed event data into 50 events
Thread 11 "QThread" received signal SIGABRT, Aborted.
[Switching to Thread 0x7fff3ffff700 (LWP 28610)]
0x00007ffff1c3b428 in __GI_raise (sig=sig@entry=6) at ../sysdeps/unix/sysv/linux/raise.c:54
54 ../sysdeps/unix/sysv/linux/raise.c: No such file or directory.
(gdb) bt
#0 0x00007ffff1c3b428 in __GI_raise (sig=sig@entry=6) at ../sysdeps/unix/sysv/linux/raise.c:54
#1 0x00007ffff1c3d02a in __GI_abort () at abort.c:89
#2 0x00007ffff3bd3f15 in qt_message_output(QtMsgType, char const*) () from /usr/lib/x86_64-linux-gnu/libQtCore.so.4
#3 0x00007ffff3bd4371 in ?? () from /usr/lib/x86_64-linux-gnu/libQtCore.so.4
#4 0x00007ffff3bd4c91 in qFatal(char const*, ...) () from /usr/lib/x86_64-linux-gnu/libQtCore.so.4
#5 0x00000000004cd479 in RtspStreamFrame::RtspStreamFrame (this=0x7fff382515c0, avFrame=0x0, width=416, height=240)
at /home/build/bluecherry-client-scripts/package/bluecherry-client-2.2.6/src/rtsp-stream/RtspStreamFrame.cpp:27
#6 0x00000000004cd688 in RtspStreamFrameFormatter::formatFrame (this=0x7fff380013d0, avFrame=0x7fff38097d00, width=0, height=0)
at /home/build/bluecherry-client-scripts/package/bluecherry-client-2.2.6/src/rtsp-stream/RtspStreamFrameFormatter.cpp:69
#7 0x00000000004d0fe0 in RtspStreamWorker::processVideoFrame (this=0x10a6240, rawFrame=0x7fff38097d00)
at /home/build/bluecherry-client-scripts/package/bluecherry-client-2.2.6/src/rtsp-stream/RtspStreamWorker.cpp:277
#8 0x00000000004d0c05 in RtspStreamWorker::processPacket (this=0x10a6240, packet=...) at /home/build/bluecherry-client-scripts/package/bluecherry-client-2.2.6/src/rtsp-stream/RtspStreamWorker.cpp:185
#9 0x00000000004d0943 in RtspStreamWorker::processStream (this=0x10a6240) at /home/build/bluecherry-client-scripts/package/bluecherry-client-2.2.6/src/rtsp-stream/RtspStreamWorker.cpp:131
#10 0x00000000004d08be in RtspStreamWorker::processStreamLoop (this=0x10a6240) at /home/build/bluecherry-client-scripts/package/bluecherry-client-2.2.6/src/rtsp-stream/RtspStreamWorker.cpp:120
#11 0x00000000004d085a in RtspStreamWorker::run (this=0x10a6240) at /home/build/bluecherry-client-scripts/package/bluecherry-client-2.2.6/src/rtsp-stream/RtspStreamWorker.cpp:108
#12 0x0000000000554c4f in RtspStreamWorker::qt_static_metacall (_o=0x10a6240, _c=QMetaObject::InvokeMetaMethod, _id=6, _a=0x7fff3fffecd0)
at /home/build/bluecherry-client-scripts/package/bluecherry-client-2.2.6/obj-x86_64-linux-gnu/src/rtsp-stream/moc_RtspStreamWorker.cxx:68
#13 0x00007ffff3d03010 in QMetaObject::activate(QObject*, QMetaObject const*, int, void**) () from /usr/lib/x86_64-linux-gnu/libQtCore.so.4
#14 0x00007ffff3bdee25 in ?? () from /usr/lib/x86_64-linux-gnu/libQtCore.so.4
#15 0x00007ffff28776ba in start_thread (arg=0x7fff3ffff700) at pthread_create.c:333
#16 0x00007ffff1d0c82d in clone () at ../sysdeps/unix/sysv/linux/x86_64/clone.S:109
(gdb)
```
Frame size should be checked for 0 before passing to sws_scale | 1.0 | Crash on liveview resize in v2.2.6 - Affects client version 2.2.6,
steps to reproduce:
1) open many cameras in liveview,
2) try to resize liveview area to smaller size my quickly moving sliders

gdb output
```
[New Thread 0x7fff3f7fe700 (LWP 28635)]
EventsLoader: Parsed event data into 16 events
[swscaler @ 0x7fff380875e0] 416x240 -> 0x0 is invalid scaling dimension
ASSERT: "m_avFrame" in file /home/build/bluecherry-client-scripts/package/bluecherry-client-2.2.6/src/rtsp-stream/RtspStreamFrame.cpp, line 27
EventsLoader: Parsed event data into 50 events
Thread 11 "QThread" received signal SIGABRT, Aborted.
[Switching to Thread 0x7fff3ffff700 (LWP 28610)]
0x00007ffff1c3b428 in __GI_raise (sig=sig@entry=6) at ../sysdeps/unix/sysv/linux/raise.c:54
54 ../sysdeps/unix/sysv/linux/raise.c: No such file or directory.
(gdb) bt
#0 0x00007ffff1c3b428 in __GI_raise (sig=sig@entry=6) at ../sysdeps/unix/sysv/linux/raise.c:54
#1 0x00007ffff1c3d02a in __GI_abort () at abort.c:89
#2 0x00007ffff3bd3f15 in qt_message_output(QtMsgType, char const*) () from /usr/lib/x86_64-linux-gnu/libQtCore.so.4
#3 0x00007ffff3bd4371 in ?? () from /usr/lib/x86_64-linux-gnu/libQtCore.so.4
#4 0x00007ffff3bd4c91 in qFatal(char const*, ...) () from /usr/lib/x86_64-linux-gnu/libQtCore.so.4
#5 0x00000000004cd479 in RtspStreamFrame::RtspStreamFrame (this=0x7fff382515c0, avFrame=0x0, width=416, height=240)
at /home/build/bluecherry-client-scripts/package/bluecherry-client-2.2.6/src/rtsp-stream/RtspStreamFrame.cpp:27
#6 0x00000000004cd688 in RtspStreamFrameFormatter::formatFrame (this=0x7fff380013d0, avFrame=0x7fff38097d00, width=0, height=0)
at /home/build/bluecherry-client-scripts/package/bluecherry-client-2.2.6/src/rtsp-stream/RtspStreamFrameFormatter.cpp:69
#7 0x00000000004d0fe0 in RtspStreamWorker::processVideoFrame (this=0x10a6240, rawFrame=0x7fff38097d00)
at /home/build/bluecherry-client-scripts/package/bluecherry-client-2.2.6/src/rtsp-stream/RtspStreamWorker.cpp:277
#8 0x00000000004d0c05 in RtspStreamWorker::processPacket (this=0x10a6240, packet=...) at /home/build/bluecherry-client-scripts/package/bluecherry-client-2.2.6/src/rtsp-stream/RtspStreamWorker.cpp:185
#9 0x00000000004d0943 in RtspStreamWorker::processStream (this=0x10a6240) at /home/build/bluecherry-client-scripts/package/bluecherry-client-2.2.6/src/rtsp-stream/RtspStreamWorker.cpp:131
#10 0x00000000004d08be in RtspStreamWorker::processStreamLoop (this=0x10a6240) at /home/build/bluecherry-client-scripts/package/bluecherry-client-2.2.6/src/rtsp-stream/RtspStreamWorker.cpp:120
#11 0x00000000004d085a in RtspStreamWorker::run (this=0x10a6240) at /home/build/bluecherry-client-scripts/package/bluecherry-client-2.2.6/src/rtsp-stream/RtspStreamWorker.cpp:108
#12 0x0000000000554c4f in RtspStreamWorker::qt_static_metacall (_o=0x10a6240, _c=QMetaObject::InvokeMetaMethod, _id=6, _a=0x7fff3fffecd0)
at /home/build/bluecherry-client-scripts/package/bluecherry-client-2.2.6/obj-x86_64-linux-gnu/src/rtsp-stream/moc_RtspStreamWorker.cxx:68
#13 0x00007ffff3d03010 in QMetaObject::activate(QObject*, QMetaObject const*, int, void**) () from /usr/lib/x86_64-linux-gnu/libQtCore.so.4
#14 0x00007ffff3bdee25 in ?? () from /usr/lib/x86_64-linux-gnu/libQtCore.so.4
#15 0x00007ffff28776ba in start_thread (arg=0x7fff3ffff700) at pthread_create.c:333
#16 0x00007ffff1d0c82d in clone () at ../sysdeps/unix/sysv/linux/x86_64/clone.S:109
(gdb)
```
Frame size should be checked for 0 before passing to sws_scale | non_defect | crash on liveview resize in affects client version steps to reproduce open many cameras in liveview try to resize liveview area to smaller size my quickly moving sliders gdb output eventsloader parsed event data into events is invalid scaling dimension assert m avframe in file home build bluecherry client scripts package bluecherry client src rtsp stream rtspstreamframe cpp line eventsloader parsed event data into events thread qthread received signal sigabrt aborted in gi raise sig sig entry at sysdeps unix sysv linux raise c sysdeps unix sysv linux raise c no such file or directory gdb bt in gi raise sig sig entry at sysdeps unix sysv linux raise c in gi abort at abort c in qt message output qtmsgtype char const from usr lib linux gnu libqtcore so in from usr lib linux gnu libqtcore so in qfatal char const from usr lib linux gnu libqtcore so in rtspstreamframe rtspstreamframe this avframe width height at home build bluecherry client scripts package bluecherry client src rtsp stream rtspstreamframe cpp in rtspstreamframeformatter formatframe this avframe width height at home build bluecherry client scripts package bluecherry client src rtsp stream rtspstreamframeformatter cpp in rtspstreamworker processvideoframe this rawframe at home build bluecherry client scripts package bluecherry client src rtsp stream rtspstreamworker cpp in rtspstreamworker processpacket this packet at home build bluecherry client scripts package bluecherry client src rtsp stream rtspstreamworker cpp in rtspstreamworker processstream this at home build bluecherry client scripts package bluecherry client src rtsp stream rtspstreamworker cpp in rtspstreamworker processstreamloop this at home build bluecherry client scripts package bluecherry client src rtsp stream rtspstreamworker cpp in rtspstreamworker run this at home build bluecherry client scripts package bluecherry client src rtsp stream rtspstreamworker cpp in rtspstreamworker qt static metacall o c qmetaobject invokemetamethod id a at home build bluecherry client scripts package bluecherry client obj linux gnu src rtsp stream moc rtspstreamworker cxx in qmetaobject activate qobject qmetaobject const int void from usr lib linux gnu libqtcore so in from usr lib linux gnu libqtcore so in start thread arg at pthread create c in clone at sysdeps unix sysv linux clone s gdb frame size should be checked for before passing to sws scale | 0 |
9,584 | 2,615,163,105 | IssuesEvent | 2015-03-01 06:42:37 | chrsmith/reaver-wps | https://api.github.com/repos/chrsmith/reaver-wps | opened | 802.11g | auto-migrated Priority-Triage Type-Defect | ```
A few things to consider before submitting an issue:
0. We write documentation for a reason, if you have not read it and are
having problems with Reaver these pages are required reading before
submitting an issue:
http://code.google.com/p/reaver-wps/wiki/HintsAndTips
http://code.google.com/p/reaver-wps/wiki/README
http://code.google.com/p/reaver-wps/wiki/FAQ
http://code.google.com/p/reaver-wps/wiki/SupportedWirelessDrivers
1. Reaver will only work if your card is in monitor mode. If you do not
know what monitor mode is then you should learn more about 802.11 hacking
in linux before using Reaver.
2. Using Reaver against access points you do not own or have permission to
attack is illegal. If you cannot answer basic questions (i.e. model
number, distance away, etc) about the device you are attacking then do not
post your issue here. We will not help you break the law.
3. Please look through issues that have already been posted and make sure
your question has not already been asked here: http://code.google.com/p
/reaver-wps/issues/list
4. Often times we need packet captures of mon0 while Reaver is running to
troubleshoot the issue (tcpdump -i mon0 -s0 -w broken_reaver.pcap). Issue
reports with pcap files attached will receive more serious consideration.
Answer the following questions for every issue submitted:
0. What version of Reaver are you using? (Only defects against the latest
version will be considered.)
1.4
1. What operating system are you using (Linux is the only supported OS)?
Backtrack r5
2. Is your wireless card in monitor mode (yes/no)?
yes
3. What is the signal strength of the Access Point you are trying to crack?
I dont know how to detect that while using the program, can you teach me how?
4. What is the manufacturer and model # of the device you are trying to
crack?
I don't know, it says the name of the wifi not its model!
5. What is the entire command line string you are supplying to reaver?
reaver -i mon0 -f -c (number) -b "the channel number" -vv -x 60
6. Please describe what you think the issue is.
the issue of what I am trying to know the reason is why channels with radio
signal "802.11.g" shows up when I type the command "wash -i mon0"
it only shows "802.11n"
the command I type for reaver is good? or shall I change it?
" "
PS I cracked few AP and it worked great! but the "802.11g" is not showing on
"wash -i mon0"
thanks a lot
7. Paste the output from Reaver below.
```
Original issue reported on code.google.com by `Powerofg...@hotmail.com` on 22 Jun 2012 at 10:16 | 1.0 | 802.11g - ```
A few things to consider before submitting an issue:
0. We write documentation for a reason, if you have not read it and are
having problems with Reaver these pages are required reading before
submitting an issue:
http://code.google.com/p/reaver-wps/wiki/HintsAndTips
http://code.google.com/p/reaver-wps/wiki/README
http://code.google.com/p/reaver-wps/wiki/FAQ
http://code.google.com/p/reaver-wps/wiki/SupportedWirelessDrivers
1. Reaver will only work if your card is in monitor mode. If you do not
know what monitor mode is then you should learn more about 802.11 hacking
in linux before using Reaver.
2. Using Reaver against access points you do not own or have permission to
attack is illegal. If you cannot answer basic questions (i.e. model
number, distance away, etc) about the device you are attacking then do not
post your issue here. We will not help you break the law.
3. Please look through issues that have already been posted and make sure
your question has not already been asked here: http://code.google.com/p
/reaver-wps/issues/list
4. Often times we need packet captures of mon0 while Reaver is running to
troubleshoot the issue (tcpdump -i mon0 -s0 -w broken_reaver.pcap). Issue
reports with pcap files attached will receive more serious consideration.
Answer the following questions for every issue submitted:
0. What version of Reaver are you using? (Only defects against the latest
version will be considered.)
1.4
1. What operating system are you using (Linux is the only supported OS)?
Backtrack r5
2. Is your wireless card in monitor mode (yes/no)?
yes
3. What is the signal strength of the Access Point you are trying to crack?
I dont know how to detect that while using the program, can you teach me how?
4. What is the manufacturer and model # of the device you are trying to
crack?
I don't know, it says the name of the wifi not its model!
5. What is the entire command line string you are supplying to reaver?
reaver -i mon0 -f -c (number) -b "the channel number" -vv -x 60
6. Please describe what you think the issue is.
the issue of what I am trying to know the reason is why channels with radio
signal "802.11.g" shows up when I type the command "wash -i mon0"
it only shows "802.11n"
the command I type for reaver is good? or shall I change it?
" "
PS I cracked few AP and it worked great! but the "802.11g" is not showing on
"wash -i mon0"
thanks a lot
7. Paste the output from Reaver below.
```
Original issue reported on code.google.com by `Powerofg...@hotmail.com` on 22 Jun 2012 at 10:16 | defect | a few things to consider before submitting an issue we write documentation for a reason if you have not read it and are having problems with reaver these pages are required reading before submitting an issue reaver will only work if your card is in monitor mode if you do not know what monitor mode is then you should learn more about hacking in linux before using reaver using reaver against access points you do not own or have permission to attack is illegal if you cannot answer basic questions i e model number distance away etc about the device you are attacking then do not post your issue here we will not help you break the law please look through issues that have already been posted and make sure your question has not already been asked here reaver wps issues list often times we need packet captures of while reaver is running to troubleshoot the issue tcpdump i w broken reaver pcap issue reports with pcap files attached will receive more serious consideration answer the following questions for every issue submitted what version of reaver are you using only defects against the latest version will be considered what operating system are you using linux is the only supported os backtrack is your wireless card in monitor mode yes no yes what is the signal strength of the access point you are trying to crack i dont know how to detect that while using the program can you teach me how what is the manufacturer and model of the device you are trying to crack i don t know it says the name of the wifi not its model what is the entire command line string you are supplying to reaver reaver i f c number b the channel number vv x please describe what you think the issue is the issue of what i am trying to know the reason is why channels with radio signal g shows up when i type the command wash i it only shows the command i type for reaver is good or shall i change it ps i cracked few ap and it worked great but the is not showing on wash i thanks a lot paste the output from reaver below original issue reported on code google com by powerofg hotmail com on jun at | 1 |
82,113 | 32,006,845,493 | IssuesEvent | 2023-09-21 15:19:07 | nats-io/nsc | https://api.github.com/repos/nats-io/nsc | closed | nsc pull shows incorrect message when a newer account is present locally | defect | ### What version were you using?
nsc version 2.8.0
nats-server version 2.9.22
### What environment was the server running in?
Linux VM, arm64, docker images:
- nats:2.9.22-scratch
- natsio/nats-box:0.13.9
### Is this defect reproducible?
Yes.
1. run `nsc pull -A`
2. update an account programmatically or on a different host
3. run `nsc pull -A` again
### Given the capability you are leveraging, describe your expectation?
```
$ nsc pull -A
[ERR ] pulled "SYS" from the account server:
[ OK ] stored account "tnt-default"
[ OK ] stored account "SYS"
[ERR ] local jwt for "tnt-default" is newer than remote version - specify --force to overwrite
Usage:
nsc pull [flags]
…
```
I would expect `nsc pull -A --force` to work
### Given the expectation, what is the defect you are observing?
```
$ nsc pull -A --force
Error: unknown flag: --force
Usage:
nsc pull [flags]
Flags:
-a, --account string account name
-A, --all operator and all accounts under the operator
-h, --help help for pull
-F, --overwrite-newer overwrite local JWTs that are newer than remote
...
``` | 1.0 | nsc pull shows incorrect message when a newer account is present locally - ### What version were you using?
nsc version 2.8.0
nats-server version 2.9.22
### What environment was the server running in?
Linux VM, arm64, docker images:
- nats:2.9.22-scratch
- natsio/nats-box:0.13.9
### Is this defect reproducible?
Yes.
1. run `nsc pull -A`
2. update an account programmatically or on a different host
3. run `nsc pull -A` again
### Given the capability you are leveraging, describe your expectation?
```
$ nsc pull -A
[ERR ] pulled "SYS" from the account server:
[ OK ] stored account "tnt-default"
[ OK ] stored account "SYS"
[ERR ] local jwt for "tnt-default" is newer than remote version - specify --force to overwrite
Usage:
nsc pull [flags]
…
```
I would expect `nsc pull -A --force` to work
### Given the expectation, what is the defect you are observing?
```
$ nsc pull -A --force
Error: unknown flag: --force
Usage:
nsc pull [flags]
Flags:
-a, --account string account name
-A, --all operator and all accounts under the operator
-h, --help help for pull
-F, --overwrite-newer overwrite local JWTs that are newer than remote
...
``` | defect | nsc pull shows incorrect message when a newer account is present locally what version were you using nsc version nats server version what environment was the server running in linux vm docker images nats scratch natsio nats box is this defect reproducible yes run nsc pull a update an account programmatically or on a different host run nsc pull a again given the capability you are leveraging describe your expectation nsc pull a pulled sys from the account server stored account tnt default stored account sys local jwt for tnt default is newer than remote version specify force to overwrite usage nsc pull … i would expect nsc pull a force to work given the expectation what is the defect you are observing nsc pull a force error unknown flag force usage nsc pull flags a account string account name a all operator and all accounts under the operator h help help for pull f overwrite newer overwrite local jwts that are newer than remote | 1 |
227,550 | 7,534,878,479 | IssuesEvent | 2018-04-16 09:28:07 | wso2/product-is | https://api.github.com/repos/wso2/product-is | opened | Error while SSO consent management in federated scenarios when the username is in email format | Affected/5.5.0 Component/Consent Priority/High Type/Bug | This is due to authorization error when attempting to retrieve the federated user's existing receipt.
At [1], when the username is an email, and the EmailUsename is not enabled in the carbon.xml, the email domain name will be stripped, hence the authorization fails.
[1] - https://github.com/wso2/carbon-consent-management/blob/master/components/org.wso2.carbon.consent.mgt.core/src/main/java/org/wso2/carbon/consent/mgt/core/InterceptingConsentManager.java#L685 | 1.0 | Error while SSO consent management in federated scenarios when the username is in email format - This is due to authorization error when attempting to retrieve the federated user's existing receipt.
At [1], when the username is an email, and the EmailUsename is not enabled in the carbon.xml, the email domain name will be stripped, hence the authorization fails.
[1] - https://github.com/wso2/carbon-consent-management/blob/master/components/org.wso2.carbon.consent.mgt.core/src/main/java/org/wso2/carbon/consent/mgt/core/InterceptingConsentManager.java#L685 | non_defect | error while sso consent management in federated scenarios when the username is in email format this is due to authorization error when attempting to retrieve the federated user s existing receipt at when the username is an email and the emailusename is not enabled in the carbon xml the email domain name will be stripped hence the authorization fails | 0 |
27,597 | 5,052,231,321 | IssuesEvent | 2016-12-21 01:05:56 | jccastillo0007/eFacturaT | https://api.github.com/repos/jccastillo0007/eFacturaT | opened | Complemento de Nomina1.2 - No se envia correctamente la clave del régimen | bug defect | Se está enviando 2 en lugar de 02, por ejemplo | 1.0 | Complemento de Nomina1.2 - No se envia correctamente la clave del régimen - Se está enviando 2 en lugar de 02, por ejemplo | defect | complemento de no se envia correctamente la clave del régimen se está enviando en lugar de por ejemplo | 1 |
280,638 | 8,684,389,117 | IssuesEvent | 2018-12-03 01:59:38 | MoonIlluminates/here | https://api.github.com/repos/MoonIlluminates/here | closed | Migrate to new kotlin multi platform structure | priority:low status:proposal type:refactor | Experimental coroutines can be removed as they have been included with kotlin 1.3
https://blog.jetbrains.com/kotlin/2018/09/kotlin-1-3-rc-is-here-migrate-your-coroutines/ | 1.0 | Migrate to new kotlin multi platform structure - Experimental coroutines can be removed as they have been included with kotlin 1.3
https://blog.jetbrains.com/kotlin/2018/09/kotlin-1-3-rc-is-here-migrate-your-coroutines/ | non_defect | migrate to new kotlin multi platform structure experimental coroutines can be removed as they have been included with kotlin | 0 |
269,229 | 20,377,543,570 | IssuesEvent | 2022-02-21 17:07:50 | smarthomej/addons | https://api.github.com/repos/smarthomej/addons | closed | [tuya] not discovering ip address | documentation | I tried adding several of my tuya devices then started a trace log. It seems that 2 of my devices continuously do udp broadcast, readily advertising their ip addresses. The others don't seem to be doing much. Out of the 2 that I added, 1 finally figured out its ip address after a long time, and 1 is still in CONFIG_PENDING Waiting for IP Address state.
| 1.0 | [tuya] not discovering ip address - I tried adding several of my tuya devices then started a trace log. It seems that 2 of my devices continuously do udp broadcast, readily advertising their ip addresses. The others don't seem to be doing much. Out of the 2 that I added, 1 finally figured out its ip address after a long time, and 1 is still in CONFIG_PENDING Waiting for IP Address state.
| non_defect | not discovering ip address i tried adding several of my tuya devices then started a trace log it seems that of my devices continuously do udp broadcast readily advertising their ip addresses the others don t seem to be doing much out of the that i added finally figured out its ip address after a long time and is still in config pending waiting for ip address state | 0 |
3,901 | 2,610,083,719 | IssuesEvent | 2015-02-26 18:25:33 | chrsmith/dsdsdaadf | https://api.github.com/repos/chrsmith/dsdsdaadf | opened | 深圳宝安祛痘 | auto-migrated Priority-Medium Type-Defect | ```
深圳宝安祛痘【深圳韩方科颜全国热线400-869-1818,24小时QQ4008
691818】深圳韩方科颜专业祛痘连锁机构,机构以韩国秘方—��
�韩方科颜这一国妆准字号治疗型权威,祛痘佳品,韩方科颜�
��业祛痘连锁机构,采用韩国秘方配合专业“不反弹”健康祛
痘技术并结合先进“先进豪华彩光”仪,开创国内专业治疗��
�刺、痤疮签约包治先河,成功消除了许多顾客脸上的痘痘。
```
-----
Original issue reported on code.google.com by `szft...@163.com` on 14 May 2014 at 6:51 | 1.0 | 深圳宝安祛痘 - ```
深圳宝安祛痘【深圳韩方科颜全国热线400-869-1818,24小时QQ4008
691818】深圳韩方科颜专业祛痘连锁机构,机构以韩国秘方—��
�韩方科颜这一国妆准字号治疗型权威,祛痘佳品,韩方科颜�
��业祛痘连锁机构,采用韩国秘方配合专业“不反弹”健康祛
痘技术并结合先进“先进豪华彩光”仪,开创国内专业治疗��
�刺、痤疮签约包治先河,成功消除了许多顾客脸上的痘痘。
```
-----
Original issue reported on code.google.com by `szft...@163.com` on 14 May 2014 at 6:51 | defect | 深圳宝安祛痘 深圳宝安祛痘【 , 】深圳韩方科颜专业祛痘连锁机构,机构以韩国秘方—�� �韩方科颜这一国妆准字号治疗型权威,祛痘佳品,韩方科颜� ��业祛痘连锁机构,采用韩国秘方配合专业“不反弹”健康祛 痘技术并结合先进“先进豪华彩光”仪,开创国内专业治疗�� �刺、痤疮签约包治先河,成功消除了许多顾客脸上的痘痘。 original issue reported on code google com by szft com on may at | 1 |
19,119 | 3,143,919,888 | IssuesEvent | 2015-09-14 10:13:31 | tvrenamer/tvrenamer | https://api.github.com/repos/tvrenamer/tvrenamer | closed | Error " Downloading show listings failed. Check internet connection" | Component - Provider OS - All Priority - High Status - To Be Released Type - Defect | I get this error on multiple computers from multiple locations. | 1.0 | Error " Downloading show listings failed. Check internet connection" - I get this error on multiple computers from multiple locations. | defect | error downloading show listings failed check internet connection i get this error on multiple computers from multiple locations | 1 |
54,872 | 11,339,592,820 | IssuesEvent | 2020-01-23 02:39:01 | flutter/flutter | https://api.github.com/repos/flutter/flutter | closed | Flutter run hangs on "Running XCode build" | severe: crash t: xcode tool ⌺ platform-ios | I am unable to build for iOS.
`flutter run --debug` always hangs on "Running XCode build".
This is the last output when I ran `flutter --verbose run --debug`
```bash
[ +6 ms] Running Xcode build...
[ ] executing: [/Users/aryan/Projects/open_con/ios/] /usr/bin/env xcrun xcodebuild
-configuration Debug VERBOSE_SCRIPT_LOGGING=YES -workspace Runner.xcworkspace -scheme
Runner BUILD_DIR=/Users/aryan/Projects/open_con/build/ios -sdk iphoneos
ONLY_ACTIVE_ARCH=YES ARCHS=arm64
SCRIPT_OUTPUT_STREAM_FILE=/var/folders/vj/3bhykqjd2dz6cg8yqxr5y3rh0000gp/T/flutter_build_l
og_pipe.K5fv11/pipe_to_stdout FLUTTER_SUPPRESS_ANALYTICS=true
COMPILER_INDEX_STORE_ENABLE=NO
```
It seems to get stuck at this step.
| 1.0 | Flutter run hangs on "Running XCode build" - I am unable to build for iOS.
`flutter run --debug` always hangs on "Running XCode build".
This is the last output when I ran `flutter --verbose run --debug`
```bash
[ +6 ms] Running Xcode build...
[ ] executing: [/Users/aryan/Projects/open_con/ios/] /usr/bin/env xcrun xcodebuild
-configuration Debug VERBOSE_SCRIPT_LOGGING=YES -workspace Runner.xcworkspace -scheme
Runner BUILD_DIR=/Users/aryan/Projects/open_con/build/ios -sdk iphoneos
ONLY_ACTIVE_ARCH=YES ARCHS=arm64
SCRIPT_OUTPUT_STREAM_FILE=/var/folders/vj/3bhykqjd2dz6cg8yqxr5y3rh0000gp/T/flutter_build_l
og_pipe.K5fv11/pipe_to_stdout FLUTTER_SUPPRESS_ANALYTICS=true
COMPILER_INDEX_STORE_ENABLE=NO
```
It seems to get stuck at this step.
| non_defect | flutter run hangs on running xcode build i am unable to build for ios flutter run debug always hangs on running xcode build this is the last output when i ran flutter verbose run debug bash running xcode build executing usr bin env xcrun xcodebuild configuration debug verbose script logging yes workspace runner xcworkspace scheme runner build dir users aryan projects open con build ios sdk iphoneos only active arch yes archs script output stream file var folders vj t flutter build l og pipe pipe to stdout flutter suppress analytics true compiler index store enable no it seems to get stuck at this step | 0 |
70,639 | 23,269,803,767 | IssuesEvent | 2022-08-04 21:24:50 | primefaces/primefaces | https://api.github.com/repos/primefaces/primefaces | closed | DatePicker: Clear button does not close the calendar popup | :lady_beetle: defect | ### Describe the bug
The clear button (which is displayed via the showButtonBar attribute) from the datePicker component does not close the popup calendar.
### Reproducer
1. Go to the showcase https://www.primefaces.org/showcase/ui/input/datepicker/datePicker.xhtml
2. Enter a date into the field below the "Button bar" text
3. Click on the input to open the calendar popup
4. Click on the clear button
### Expected behavior
The calendar popup should be closed after clicking the clear button
### PrimeFaces edition
_No response_
### PrimeFaces version
11.0 12.0.0-SNAPSHOT
### Theme
All
### JSF implementation
Mojarra
### JSF version
2.3
### Browser(s)
All | 1.0 | DatePicker: Clear button does not close the calendar popup - ### Describe the bug
The clear button (which is displayed via the showButtonBar attribute) from the datePicker component does not close the popup calendar.
### Reproducer
1. Go to the showcase https://www.primefaces.org/showcase/ui/input/datepicker/datePicker.xhtml
2. Enter a date into the field below the "Button bar" text
3. Click on the input to open the calendar popup
4. Click on the clear button
### Expected behavior
The calendar popup should be closed after clicking the clear button
### PrimeFaces edition
_No response_
### PrimeFaces version
11.0 12.0.0-SNAPSHOT
### Theme
All
### JSF implementation
Mojarra
### JSF version
2.3
### Browser(s)
All | defect | datepicker clear button does not close the calendar popup describe the bug the clear button which is displayed via the showbuttonbar attribute from the datepicker component does not close the popup calendar reproducer go to the showcase enter a date into the field below the button bar text click on the input to open the calendar popup click on the clear button expected behavior the calendar popup should be closed after clicking the clear button primefaces edition no response primefaces version snapshot theme all jsf implementation mojarra jsf version browser s all | 1 |
17,521 | 3,011,118,816 | IssuesEvent | 2015-07-28 16:18:28 | KasaiDot/codejam-commandline | https://api.github.com/repos/KasaiDot/codejam-commandline | closed | The solved time is blank if there are 2 large inputs | auto-migrated Priority-Medium Type-Defect | ```
What steps will reproduce the problem?
1. Participate in a contest with some problem having 2 large (or small) inputs
like Problem C of Qualification Round of 2013
2. Run gcj_get_status.py.
3. The solved time of the second large input is blank.
I tracked the running process, and found that the input_id field of
UserSubmission of large2 in HTTP response is 1. However, 2 is correct.
```
Original issue reported on code.google.com by `wentao....@gmail.com` on 23 Apr 2013 at 3:06 | 1.0 | The solved time is blank if there are 2 large inputs - ```
What steps will reproduce the problem?
1. Participate in a contest with some problem having 2 large (or small) inputs
like Problem C of Qualification Round of 2013
2. Run gcj_get_status.py.
3. The solved time of the second large input is blank.
I tracked the running process, and found that the input_id field of
UserSubmission of large2 in HTTP response is 1. However, 2 is correct.
```
Original issue reported on code.google.com by `wentao....@gmail.com` on 23 Apr 2013 at 3:06 | defect | the solved time is blank if there are large inputs what steps will reproduce the problem participate in a contest with some problem having large or small inputs like problem c of qualification round of run gcj get status py the solved time of the second large input is blank i tracked the running process and found that the input id field of usersubmission of in http response is however is correct original issue reported on code google com by wentao gmail com on apr at | 1 |
49,199 | 10,328,981,649 | IssuesEvent | 2019-09-02 10:56:23 | atomist/automation-client | https://api.github.com/repos/atomist/automation-client | closed | Code Inspection: npm audit on update-code-gen | code-inspection | ### marked:>=0.3.14 <0.6.2
- _(warn)_ [Regular Expression Denial of Service](https://npmjs.com/advisories/812) _Upgrade to version 0.6.2 or later._
- `marked:0.4.0`:
- `typedoc>marked`
[atomist:code-inspection:update-code-gen=@atomist/atomist-sdm] | 1.0 | Code Inspection: npm audit on update-code-gen - ### marked:>=0.3.14 <0.6.2
- _(warn)_ [Regular Expression Denial of Service](https://npmjs.com/advisories/812) _Upgrade to version 0.6.2 or later._
- `marked:0.4.0`:
- `typedoc>marked`
[atomist:code-inspection:update-code-gen=@atomist/atomist-sdm] | non_defect | code inspection npm audit on update code gen marked warn upgrade to version or later marked typedoc marked | 0 |
10,468 | 2,622,165,210 | IssuesEvent | 2015-03-04 00:12:00 | byzhang/graphchi | https://api.github.com/repos/byzhang/graphchi | opened | Running pagerank with a simple input file in adjacency list format causes an assertion | auto-migrated Priority-Medium Type-Defect | ```
What steps will reproduce the problem?
1. bin/exampleapps/pagerank file pagerank2.txt
2.
3.
What is the expected output? What do you see instead?
top vertices
What version of the product are you using? On what operating system?
Using 0.1b of graphchi on Mac OSX 10.5.6
Please provide any additional information below.
```
Original issue reported on code.google.com by `moizr...@gmail.com` on 2 Aug 2012 at 1:01
Attachments:
* [pagerank2.txt](https://storage.googleapis.com/google-code-attachments/graphchi/issue-18/comment-0/pagerank2.txt)
| 1.0 | Running pagerank with a simple input file in adjacency list format causes an assertion - ```
What steps will reproduce the problem?
1. bin/exampleapps/pagerank file pagerank2.txt
2.
3.
What is the expected output? What do you see instead?
top vertices
What version of the product are you using? On what operating system?
Using 0.1b of graphchi on Mac OSX 10.5.6
Please provide any additional information below.
```
Original issue reported on code.google.com by `moizr...@gmail.com` on 2 Aug 2012 at 1:01
Attachments:
* [pagerank2.txt](https://storage.googleapis.com/google-code-attachments/graphchi/issue-18/comment-0/pagerank2.txt)
| defect | running pagerank with a simple input file in adjacency list format causes an assertion what steps will reproduce the problem bin exampleapps pagerank file txt what is the expected output what do you see instead top vertices what version of the product are you using on what operating system using of graphchi on mac osx please provide any additional information below original issue reported on code google com by moizr gmail com on aug at attachments | 1 |
114,306 | 4,628,574,991 | IssuesEvent | 2016-09-28 05:26:29 | code-corps/code-corps-ember | https://api.github.com/repos/code-corps/code-corps-ember | closed | Closed posts should show different information when there are open posts and no closed posts | high priority | The closed posts shows the wrong information in the posts area. We need to write some other copy and put something different there.  | 1.0 | Closed posts should show different information when there are open posts and no closed posts - The closed posts shows the wrong information in the posts area. We need to write some other copy and put something different there.  | non_defect | closed posts should show different information when there are open posts and no closed posts the closed posts shows the wrong information in the posts area we need to write some other copy and put something different there | 0 |
67,971 | 21,367,689,196 | IssuesEvent | 2022-04-20 04:48:12 | SeleniumHQ/selenium | https://api.github.com/repos/SeleniumHQ/selenium | opened | [🐛 Bug]: Selenium 4.1.3 org.openqa.selenium.devtools.DevToolsException: Unable to create DevTools connection | I-defect needs-triaging | ### What happened?
org.openqa.selenium.devtools.DevToolsException: Unable to create DevTools connection
is the error message.
Stack trace:
Driver info: DevTools Connection
20:35:31 at org.openqa.selenium.devtools.HasDevTools.lambda$getDevTools$0(HasDevTools.java:25)
20:35:31 at java.base/java.util.Optional.orElseThrow(Optional.java:401)
20:35:31 at org.openqa.selenium.devtools.HasDevTools.getDevTools(HasDevTools.java:25)
20:35:31 at org.openqa.selenium.remote.RemoteWebDriver$ByteBuddy$WfZIZ2kE.getDevTools(Unknown Source)
20:35:31 at com.logmein.piranha.webdriver.selenoidtests.SelenoidGridTest.testSelenoidChrome(SelenoidGridTest.java:38)
We're facing this issue when trying to create a session on Selenoid setup on a remote machine, whereas on local machine it works.
we're also getting the warning message:
Apr 12, 2022 8:05:30 AM org.openqa.selenium.devtools.CdpVersionFinder findNearestMatch
20:35:31 WARNING: Unable to find an exact match for CDP version 100, so returning the closest version found: 99
20:35:31 Apr 12, 2022 8:05:30 AM org.openqa.selenium.devtools.CdpVersionFinder findNearestMatch
20:35:31 INFO: Found CDP implementation for version 100 of 99
20:35:31 Apr 12, 2022 8:05:30 AM org.openqa.selenium.devtools.CdpEndpointFinder getCdpEndPoint
20:35:31 WARNING: Unable to connect to determine websocket url: java.net.ConnectException: Connection refused: localhost/127.0.0.1:37575
### How can we reproduce the issue?
```shell
WebDriver webDriver = driver.webDriver();
webDriver = new Augmenter().augment(webDriver);
DevTools devTools = ((HasDevTools) webDriver).getDevTools();
devTools.createSession();
```
### Relevant log output
```shell
Apr 12, 2022 8:05:30 AM org.openqa.selenium.devtools.CdpVersionFinder findNearestMatch
20:35:31 WARNING: Unable to find an exact match for CDP version 100, so returning the closest version found: 99
20:35:31 Apr 12, 2022 8:05:30 AM org.openqa.selenium.devtools.CdpVersionFinder findNearestMatch
20:35:31 INFO: Found CDP implementation for version 100 of 99
20:35:31 Apr 12, 2022 8:05:30 AM org.openqa.selenium.devtools.CdpEndpointFinder getCdpEndPoint
20:35:31 WARNING: Unable to connect to determine websocket url: java.net.ConnectException: Connection refused: localhost/127.0.0.1:37575
20:35:31 08:05:30,955 [main] INFO PiranhaInvokedMethodListener -
20:35:31 --------------------------------------------------------------------------------
20:35:31 #### Ending Test :: com.logmein.piranha.webdriver.selenoidtests.SelenoidGridTest.testSelenoidChrome ####
20:35:31 --------------------------------------------------------------------------------
20:35:31
20:35:31 08:05:30,956 [main] WARN PiranhaScreenshotResultListener - Exception is not an instance of PiranhaTestException, so not taking screen shots.
20:35:31 08:05:30,957 [main] ERROR PiranhaTestListenerAdapter - FAILED
20:35:31 org.openqa.selenium.devtools.DevToolsException: Unable to create DevTools connection
20:35:31 Build info: version: '4.1.3', revision: '7b1ebf28ef'
20:35:31 System info: host: 'ip-10-34-132-181.ec2.getgotools.net', ip: '10.34.132.181', os.name: 'Linux', os.arch: 'amd64', os.version: '5.10.68-62.173.amzn2.x86_64', java.version: '13'
20:35:31 Driver info: DevTools Connection
20:35:31 at org.openqa.selenium.devtools.HasDevTools.lambda$getDevTools$0(HasDevTools.java:25)
20:35:31 at java.base/java.util.Optional.orElseThrow(Optional.java:401)
20:35:31 at org.openqa.selenium.devtools.HasDevTools.getDevTools(HasDevTools.java:25)
20:35:31 at org.openqa.selenium.remote.RemoteWebDriver$ByteBuddy$WfZIZ2kE.getDevTools(Unknown Source)
20:35:31 at com.logmein.piranha.webdriver.selenoidtests.SelenoidGridTest.testSelenoidChrome(SelenoidGridTest.java:38)
```
### Operating System
macOSBigsur, Linux
### Selenium version
Java Selenium 4.1.3
### What are the browser(s) and version(s) where you see this issue?
Chrome 100
### What are the browser driver(s) and version(s) where you see this issue?
ChromeDriver 100
### Are you using Selenium Grid?
_No response_ | 1.0 | [🐛 Bug]: Selenium 4.1.3 org.openqa.selenium.devtools.DevToolsException: Unable to create DevTools connection - ### What happened?
org.openqa.selenium.devtools.DevToolsException: Unable to create DevTools connection
is the error message.
Stack trace:
Driver info: DevTools Connection
20:35:31 at org.openqa.selenium.devtools.HasDevTools.lambda$getDevTools$0(HasDevTools.java:25)
20:35:31 at java.base/java.util.Optional.orElseThrow(Optional.java:401)
20:35:31 at org.openqa.selenium.devtools.HasDevTools.getDevTools(HasDevTools.java:25)
20:35:31 at org.openqa.selenium.remote.RemoteWebDriver$ByteBuddy$WfZIZ2kE.getDevTools(Unknown Source)
20:35:31 at com.logmein.piranha.webdriver.selenoidtests.SelenoidGridTest.testSelenoidChrome(SelenoidGridTest.java:38)
We're facing this issue when trying to create a session on Selenoid setup on a remote machine, whereas on local machine it works.
we're also getting the warning message:
Apr 12, 2022 8:05:30 AM org.openqa.selenium.devtools.CdpVersionFinder findNearestMatch
20:35:31 WARNING: Unable to find an exact match for CDP version 100, so returning the closest version found: 99
20:35:31 Apr 12, 2022 8:05:30 AM org.openqa.selenium.devtools.CdpVersionFinder findNearestMatch
20:35:31 INFO: Found CDP implementation for version 100 of 99
20:35:31 Apr 12, 2022 8:05:30 AM org.openqa.selenium.devtools.CdpEndpointFinder getCdpEndPoint
20:35:31 WARNING: Unable to connect to determine websocket url: java.net.ConnectException: Connection refused: localhost/127.0.0.1:37575
### How can we reproduce the issue?
```shell
WebDriver webDriver = driver.webDriver();
webDriver = new Augmenter().augment(webDriver);
DevTools devTools = ((HasDevTools) webDriver).getDevTools();
devTools.createSession();
```
### Relevant log output
```shell
Apr 12, 2022 8:05:30 AM org.openqa.selenium.devtools.CdpVersionFinder findNearestMatch
20:35:31 WARNING: Unable to find an exact match for CDP version 100, so returning the closest version found: 99
20:35:31 Apr 12, 2022 8:05:30 AM org.openqa.selenium.devtools.CdpVersionFinder findNearestMatch
20:35:31 INFO: Found CDP implementation for version 100 of 99
20:35:31 Apr 12, 2022 8:05:30 AM org.openqa.selenium.devtools.CdpEndpointFinder getCdpEndPoint
20:35:31 WARNING: Unable to connect to determine websocket url: java.net.ConnectException: Connection refused: localhost/127.0.0.1:37575
20:35:31 08:05:30,955 [main] INFO PiranhaInvokedMethodListener -
20:35:31 --------------------------------------------------------------------------------
20:35:31 #### Ending Test :: com.logmein.piranha.webdriver.selenoidtests.SelenoidGridTest.testSelenoidChrome ####
20:35:31 --------------------------------------------------------------------------------
20:35:31
20:35:31 08:05:30,956 [main] WARN PiranhaScreenshotResultListener - Exception is not an instance of PiranhaTestException, so not taking screen shots.
20:35:31 08:05:30,957 [main] ERROR PiranhaTestListenerAdapter - FAILED
20:35:31 org.openqa.selenium.devtools.DevToolsException: Unable to create DevTools connection
20:35:31 Build info: version: '4.1.3', revision: '7b1ebf28ef'
20:35:31 System info: host: 'ip-10-34-132-181.ec2.getgotools.net', ip: '10.34.132.181', os.name: 'Linux', os.arch: 'amd64', os.version: '5.10.68-62.173.amzn2.x86_64', java.version: '13'
20:35:31 Driver info: DevTools Connection
20:35:31 at org.openqa.selenium.devtools.HasDevTools.lambda$getDevTools$0(HasDevTools.java:25)
20:35:31 at java.base/java.util.Optional.orElseThrow(Optional.java:401)
20:35:31 at org.openqa.selenium.devtools.HasDevTools.getDevTools(HasDevTools.java:25)
20:35:31 at org.openqa.selenium.remote.RemoteWebDriver$ByteBuddy$WfZIZ2kE.getDevTools(Unknown Source)
20:35:31 at com.logmein.piranha.webdriver.selenoidtests.SelenoidGridTest.testSelenoidChrome(SelenoidGridTest.java:38)
```
### Operating System
macOSBigsur, Linux
### Selenium version
Java Selenium 4.1.3
### What are the browser(s) and version(s) where you see this issue?
Chrome 100
### What are the browser driver(s) and version(s) where you see this issue?
ChromeDriver 100
### Are you using Selenium Grid?
_No response_ | defect | selenium org openqa selenium devtools devtoolsexception unable to create devtools connection what happened org openqa selenium devtools devtoolsexception unable to create devtools connection is the error message stack trace driver info devtools connection at org openqa selenium devtools hasdevtools lambda getdevtools hasdevtools java at java base java util optional orelsethrow optional java at org openqa selenium devtools hasdevtools getdevtools hasdevtools java at org openqa selenium remote remotewebdriver bytebuddy getdevtools unknown source at com logmein piranha webdriver selenoidtests selenoidgridtest testselenoidchrome selenoidgridtest java we re facing this issue when trying to create a session on selenoid setup on a remote machine whereas on local machine it works we re also getting the warning message apr am org openqa selenium devtools cdpversionfinder findnearestmatch warning unable to find an exact match for cdp version so returning the closest version found apr am org openqa selenium devtools cdpversionfinder findnearestmatch info found cdp implementation for version of apr am org openqa selenium devtools cdpendpointfinder getcdpendpoint warning unable to connect to determine websocket url java net connectexception connection refused localhost how can we reproduce the issue shell webdriver webdriver driver webdriver webdriver new augmenter augment webdriver devtools devtools hasdevtools webdriver getdevtools devtools createsession relevant log output shell apr am org openqa selenium devtools cdpversionfinder findnearestmatch warning unable to find an exact match for cdp version so returning the closest version found apr am org openqa selenium devtools cdpversionfinder findnearestmatch info found cdp implementation for version of apr am org openqa selenium devtools cdpendpointfinder getcdpendpoint warning unable to connect to determine websocket url java net connectexception connection refused localhost info piranhainvokedmethodlistener ending test com logmein piranha webdriver selenoidtests selenoidgridtest testselenoidchrome warn piranhascreenshotresultlistener exception is not an instance of piranhatestexception so not taking screen shots error piranhatestlisteneradapter failed org openqa selenium devtools devtoolsexception unable to create devtools connection build info version revision system info host ip getgotools net ip os name linux os arch os version java version driver info devtools connection at org openqa selenium devtools hasdevtools lambda getdevtools hasdevtools java at java base java util optional orelsethrow optional java at org openqa selenium devtools hasdevtools getdevtools hasdevtools java at org openqa selenium remote remotewebdriver bytebuddy getdevtools unknown source at com logmein piranha webdriver selenoidtests selenoidgridtest testselenoidchrome selenoidgridtest java operating system macosbigsur linux selenium version java selenium what are the browser s and version s where you see this issue chrome what are the browser driver s and version s where you see this issue chromedriver are you using selenium grid no response | 1 |
15,238 | 2,850,435,676 | IssuesEvent | 2015-05-31 15:40:06 | damonkohler/android-scripting | https://api.github.com/repos/damonkohler/android-scripting | closed | programmaticaly select text of a multiline EditText | auto-migrated Priority-Medium Type-Defect | ```
it would be great if one could select/ deselect text programmatically.
It should be possible to select parts of a given text
```
Original issue reported on code.google.com by `stefan.krecher` on 20 Aug 2012 at 10:08 | 1.0 | programmaticaly select text of a multiline EditText - ```
it would be great if one could select/ deselect text programmatically.
It should be possible to select parts of a given text
```
Original issue reported on code.google.com by `stefan.krecher` on 20 Aug 2012 at 10:08 | defect | programmaticaly select text of a multiline edittext it would be great if one could select deselect text programmatically it should be possible to select parts of a given text original issue reported on code google com by stefan krecher on aug at | 1 |
7,169 | 24,343,076,746 | IssuesEvent | 2022-10-02 00:14:07 | KILTprotocol/sdk-js | https://api.github.com/repos/KILTprotocol/sdk-js | closed | SDK no longer compatible with latest dependencies | bug incompatible dependencies automation | ## Incompatibilities detected
A [scheduled test workflow](https://github.com/KILTprotocol/sdk-js/actions/runs/3120263098) using the latest available dependencies matching our semver ranges has failed.
We may need to constrain dependency ranges in our `package.json` or introduce fixes to recover compatibility.
Below you can find a summary of dependency versions against which these tests were run.
_Note: This issue was **automatically created** as a result of scheduled CI tests on 2022-09-25._
<details>
<summary>Dependency versions</summary>
"@commitlint/cli@npm:9.1.2"
"@commitlint/config-conventional@npm:9.1.2"
"@kiltprotocol/augment-api@workspace:packages/augment-api"
"@kiltprotocol/chain-helpers@workspace:packages/chain-helpers"
"@kiltprotocol/config@workspace:packages/config"
"@kiltprotocol/core@workspace:packages/core"
"@kiltprotocol/did@workspace:packages/did"
"@kiltprotocol/messaging@workspace:packages/messaging"
"@kiltprotocol/sdk-js@workspace:packages/sdk-js"
"@kiltprotocol/testing@workspace:packages/testing"
"@kiltprotocol/types@workspace:packages/types"
"@kiltprotocol/utils@workspace:packages/utils"
"@kiltprotocol/vc-export@workspace:packages/vc-export"
"@playwright/test@npm:1.26.0"
"@polkadot/api@npm:9.4.2"
"@polkadot/keyring@npm:10.1.9"
"@polkadot/typegen@npm:9.4.2"
"@polkadot/types@npm:9.4.2"
"@polkadot/util-crypto@npm:10.1.9"
"@polkadot/util@npm:10.1.9"
"@types/jest@npm:27.5.2"
"@types/jsonld@npm:1.5.1"
"@types/uuid@npm:8.3.4"
"@types/websocket@npm:1.0.5"
"@typescript-eslint/eslint-plugin@npm:5.38.0"
"@typescript-eslint/parser@npm:5.38.0"
"buffer@npm:6.0.3"
"cbor@npm:8.1.0"
"crypto-browserify@npm:3.12.0"
"eslint-config-airbnb-base@npm:14.2.1"
"eslint-config-prettier@npm:6.15.0"
"eslint-plugin-import@npm:2.26.0"
"eslint-plugin-jsdoc@npm:37.9.7"
"eslint-plugin-license-header@npm:0.2.1"
"eslint-plugin-prettier@npm:3.4.1"
"eslint@npm:7.32.0"
"glob@npm:7.2.3"
"husky@npm:4.3.8"
"jest-docblock@npm:27.5.1"
"jest-runner-groups@npm:2.2.0"
"jest-runner@npm:27.5.1"
"jest@npm:27.5.1"
"jsonld-signatures@npm:5.2.0"
"jsonld@npm:2.0.2"
"prettier@npm:2.7.1"
"process@npm:0.11.10"
"rimraf@npm:3.0.2"
"root-workspace-0b6124@workspace:."
"stream-browserify@npm:3.0.0"
"terser-webpack-plugin@npm:5.3.6"
"testcontainers@npm:8.14.0"
"ts-jest-resolver@npm:2.0.0"
"ts-jest@npm:27.1.5"
"ts-node@npm:10.9.1"
"tweetnacl@npm:1.0.3"
"typedoc@npm:0.22.18"
"typescript-logging@npm:0.6.4"
"typescript@patch:typescript@npm%3A4.8.3#~builtin<compat/typescript>::version=4.8.3&hash=32657b"
"url@npm:0.11.0"
"util@npm:0.12.4"
"uuid@npm:9.0.0"
"vc-js@npm:0.6.4"
"webpack-cli@npm:4.10.0"
"webpack@npm:5.74.0"
"websocket@npm:1.0.34"
"yargs@npm:16.2.0"
</details> | 1.0 | SDK no longer compatible with latest dependencies - ## Incompatibilities detected
A [scheduled test workflow](https://github.com/KILTprotocol/sdk-js/actions/runs/3120263098) using the latest available dependencies matching our semver ranges has failed.
We may need to constrain dependency ranges in our `package.json` or introduce fixes to recover compatibility.
Below you can find a summary of dependency versions against which these tests were run.
_Note: This issue was **automatically created** as a result of scheduled CI tests on 2022-09-25._
<details>
<summary>Dependency versions</summary>
"@commitlint/cli@npm:9.1.2"
"@commitlint/config-conventional@npm:9.1.2"
"@kiltprotocol/augment-api@workspace:packages/augment-api"
"@kiltprotocol/chain-helpers@workspace:packages/chain-helpers"
"@kiltprotocol/config@workspace:packages/config"
"@kiltprotocol/core@workspace:packages/core"
"@kiltprotocol/did@workspace:packages/did"
"@kiltprotocol/messaging@workspace:packages/messaging"
"@kiltprotocol/sdk-js@workspace:packages/sdk-js"
"@kiltprotocol/testing@workspace:packages/testing"
"@kiltprotocol/types@workspace:packages/types"
"@kiltprotocol/utils@workspace:packages/utils"
"@kiltprotocol/vc-export@workspace:packages/vc-export"
"@playwright/test@npm:1.26.0"
"@polkadot/api@npm:9.4.2"
"@polkadot/keyring@npm:10.1.9"
"@polkadot/typegen@npm:9.4.2"
"@polkadot/types@npm:9.4.2"
"@polkadot/util-crypto@npm:10.1.9"
"@polkadot/util@npm:10.1.9"
"@types/jest@npm:27.5.2"
"@types/jsonld@npm:1.5.1"
"@types/uuid@npm:8.3.4"
"@types/websocket@npm:1.0.5"
"@typescript-eslint/eslint-plugin@npm:5.38.0"
"@typescript-eslint/parser@npm:5.38.0"
"buffer@npm:6.0.3"
"cbor@npm:8.1.0"
"crypto-browserify@npm:3.12.0"
"eslint-config-airbnb-base@npm:14.2.1"
"eslint-config-prettier@npm:6.15.0"
"eslint-plugin-import@npm:2.26.0"
"eslint-plugin-jsdoc@npm:37.9.7"
"eslint-plugin-license-header@npm:0.2.1"
"eslint-plugin-prettier@npm:3.4.1"
"eslint@npm:7.32.0"
"glob@npm:7.2.3"
"husky@npm:4.3.8"
"jest-docblock@npm:27.5.1"
"jest-runner-groups@npm:2.2.0"
"jest-runner@npm:27.5.1"
"jest@npm:27.5.1"
"jsonld-signatures@npm:5.2.0"
"jsonld@npm:2.0.2"
"prettier@npm:2.7.1"
"process@npm:0.11.10"
"rimraf@npm:3.0.2"
"root-workspace-0b6124@workspace:."
"stream-browserify@npm:3.0.0"
"terser-webpack-plugin@npm:5.3.6"
"testcontainers@npm:8.14.0"
"ts-jest-resolver@npm:2.0.0"
"ts-jest@npm:27.1.5"
"ts-node@npm:10.9.1"
"tweetnacl@npm:1.0.3"
"typedoc@npm:0.22.18"
"typescript-logging@npm:0.6.4"
"typescript@patch:typescript@npm%3A4.8.3#~builtin<compat/typescript>::version=4.8.3&hash=32657b"
"url@npm:0.11.0"
"util@npm:0.12.4"
"uuid@npm:9.0.0"
"vc-js@npm:0.6.4"
"webpack-cli@npm:4.10.0"
"webpack@npm:5.74.0"
"websocket@npm:1.0.34"
"yargs@npm:16.2.0"
</details> | non_defect | sdk no longer compatible with latest dependencies incompatibilities detected a using the latest available dependencies matching our semver ranges has failed we may need to constrain dependency ranges in our package json or introduce fixes to recover compatibility below you can find a summary of dependency versions against which these tests were run note this issue was automatically created as a result of scheduled ci tests on dependency versions commitlint cli npm commitlint config conventional npm kiltprotocol augment api workspace packages augment api kiltprotocol chain helpers workspace packages chain helpers kiltprotocol config workspace packages config kiltprotocol core workspace packages core kiltprotocol did workspace packages did kiltprotocol messaging workspace packages messaging kiltprotocol sdk js workspace packages sdk js kiltprotocol testing workspace packages testing kiltprotocol types workspace packages types kiltprotocol utils workspace packages utils kiltprotocol vc export workspace packages vc export playwright test npm polkadot api npm polkadot keyring npm polkadot typegen npm polkadot types npm polkadot util crypto npm polkadot util npm types jest npm types jsonld npm types uuid npm types websocket npm typescript eslint eslint plugin npm typescript eslint parser npm buffer npm cbor npm crypto browserify npm eslint config airbnb base npm eslint config prettier npm eslint plugin import npm eslint plugin jsdoc npm eslint plugin license header npm eslint plugin prettier npm eslint npm glob npm husky npm jest docblock npm jest runner groups npm jest runner npm jest npm jsonld signatures npm jsonld npm prettier npm process npm rimraf npm root workspace workspace stream browserify npm terser webpack plugin npm testcontainers npm ts jest resolver npm ts jest npm ts node npm tweetnacl npm typedoc npm typescript logging npm typescript patch typescript npm builtin version hash url npm util npm uuid npm vc js npm webpack cli npm webpack npm websocket npm yargs npm | 0 |
67,801 | 13,033,504,663 | IssuesEvent | 2020-07-28 07:03:44 | PlaidWeb/Publ | https://api.github.com/repos/PlaidWeb/Publ | opened | utils.strip_single_paragraph should use HTMLTransform | code quality | ## Expected Behavior
<!--- If you're describing a bug, tell us what should happen -->
<!--- If you're suggesting a change/improvement, tell us how it should work -->
<!--- Either way, please set the appropriate labels on the item -->
Don't parse HTML with a regex, please
## Current Behavior
<!--- If describing a bug, tell us what happens instead of the expected behavior -->
<!--- If suggesting a change/improvement, explain the difference from current behavior,
and how using it would look in an entry or template as appropriate -->
## Possible Solution
<!--- Not obligatory, but suggest a fix/reason for the bug, -->
<!--- or ideas how to implement the addition or change -->
## Steps to Reproduce (for bugs)
<!--- Provide a link to a live example, or an unambiguous set of steps to -->
<!--- reproduce this bug. Include code to reproduce, if relevant -->
1.
2.
3.
4.
## Context
<!--- How has this issue affected you? What are you trying to accomplish? -->
<!--- Providing context helps us come up with a solution that is most useful in the real world -->
https://stackoverflow.com/questions/1732348/regex-match-open-tags-except-xhtml-self-contained-tags/1732454#1732454 | 1.0 | utils.strip_single_paragraph should use HTMLTransform - ## Expected Behavior
<!--- If you're describing a bug, tell us what should happen -->
<!--- If you're suggesting a change/improvement, tell us how it should work -->
<!--- Either way, please set the appropriate labels on the item -->
Don't parse HTML with a regex, please
## Current Behavior
<!--- If describing a bug, tell us what happens instead of the expected behavior -->
<!--- If suggesting a change/improvement, explain the difference from current behavior,
and how using it would look in an entry or template as appropriate -->
## Possible Solution
<!--- Not obligatory, but suggest a fix/reason for the bug, -->
<!--- or ideas how to implement the addition or change -->
## Steps to Reproduce (for bugs)
<!--- Provide a link to a live example, or an unambiguous set of steps to -->
<!--- reproduce this bug. Include code to reproduce, if relevant -->
1.
2.
3.
4.
## Context
<!--- How has this issue affected you? What are you trying to accomplish? -->
<!--- Providing context helps us come up with a solution that is most useful in the real world -->
https://stackoverflow.com/questions/1732348/regex-match-open-tags-except-xhtml-self-contained-tags/1732454#1732454 | non_defect | utils strip single paragraph should use htmltransform expected behavior don t parse html with a regex please current behavior if suggesting a change improvement explain the difference from current behavior and how using it would look in an entry or template as appropriate possible solution steps to reproduce for bugs context | 0 |
162,801 | 6,176,061,696 | IssuesEvent | 2017-07-01 09:39:01 | gama-platform/gama | https://api.github.com/repos/gama-platform/gama | opened | Unexpected warning with inheritance and key of map | Concerns Modeling OS All Priority Low Version 1.7 RC2 | ### Steps to reproduce
1. Consider a map with as key agent of a parent species.
2. When adding an agent of a child species as a key, an unexpected compilation warning appears:
The type of the index of my_m (parentSpecies) does not match
with the type of self (childSpecies). The latter will be casted
to parentSpecies
3. Here is a simple illustrating model (I tested also on list, but without this issue):
global {
map<parentSpecies,float> my_m <- map<parentSpecies,float>([]);
list<parentSpecies> l <- [];
init {
create parentSpecies {
add 1.0 at: self to: my_m;
add self to: l;
}
create childSpecies {
add 1.0 at: self to: my_m;
add 1.0 at: parentSpecies(self) to: my_m;
add self to: l;
}
}
}
species parentSpecies {}
species childSpecies parent: parentSpecies {}
experiment testMapInheritance type: gui {
/** Insert here the definition of the input and output of the model */
output {
}
}
### System and version
GAMA 1.7 RC2, MacOsX
| 1.0 | Unexpected warning with inheritance and key of map - ### Steps to reproduce
1. Consider a map with as key agent of a parent species.
2. When adding an agent of a child species as a key, an unexpected compilation warning appears:
The type of the index of my_m (parentSpecies) does not match
with the type of self (childSpecies). The latter will be casted
to parentSpecies
3. Here is a simple illustrating model (I tested also on list, but without this issue):
global {
map<parentSpecies,float> my_m <- map<parentSpecies,float>([]);
list<parentSpecies> l <- [];
init {
create parentSpecies {
add 1.0 at: self to: my_m;
add self to: l;
}
create childSpecies {
add 1.0 at: self to: my_m;
add 1.0 at: parentSpecies(self) to: my_m;
add self to: l;
}
}
}
species parentSpecies {}
species childSpecies parent: parentSpecies {}
experiment testMapInheritance type: gui {
/** Insert here the definition of the input and output of the model */
output {
}
}
### System and version
GAMA 1.7 RC2, MacOsX
| non_defect | unexpected warning with inheritance and key of map steps to reproduce consider a map with as key agent of a parent species when adding an agent of a child species as a key an unexpected compilation warning appears the type of the index of my m parentspecies does not match with the type of self childspecies the latter will be casted to parentspecies here is a simple illustrating model i tested also on list but without this issue global map my m list l init create parentspecies add at self to my m add self to l create childspecies add at self to my m add at parentspecies self to my m add self to l species parentspecies species childspecies parent parentspecies experiment testmapinheritance type gui insert here the definition of the input and output of the model output system and version gama macosx | 0 |
481,430 | 13,886,091,303 | IssuesEvent | 2020-10-18 23:01:39 | OpenMined/PySyft | https://api.github.com/repos/OpenMined/PySyft | opened | Introduce Logging Library | Priority: 4 - Low :sunglasses: Type: Improvement :chart_with_upwards_trend: syft 0.3 | ## Description
Introduce a logging library like this:
https://github.com/Delgan/loguru
We want to to introduce a logging system so we can have meaningful messages while debugging without flooding users screens with too much verbose information.
The first goal should be to replace sy.VERBOSE and have a default setting of verbose off. Logging should be easy to configure a default level decided and set for testing as well.
If possible any existing syft library print statements or exceptions can be updated to include the new logging system.
## Definition of Done
- sy.VERBOSE is replaced and all references to it have been updated.
- logging levels are introduced for our pretty printing vs other types of messages
- Exceptions are logged
| 1.0 | Introduce Logging Library - ## Description
Introduce a logging library like this:
https://github.com/Delgan/loguru
We want to to introduce a logging system so we can have meaningful messages while debugging without flooding users screens with too much verbose information.
The first goal should be to replace sy.VERBOSE and have a default setting of verbose off. Logging should be easy to configure a default level decided and set for testing as well.
If possible any existing syft library print statements or exceptions can be updated to include the new logging system.
## Definition of Done
- sy.VERBOSE is replaced and all references to it have been updated.
- logging levels are introduced for our pretty printing vs other types of messages
- Exceptions are logged
| non_defect | introduce logging library description introduce a logging library like this we want to to introduce a logging system so we can have meaningful messages while debugging without flooding users screens with too much verbose information the first goal should be to replace sy verbose and have a default setting of verbose off logging should be easy to configure a default level decided and set for testing as well if possible any existing syft library print statements or exceptions can be updated to include the new logging system definition of done sy verbose is replaced and all references to it have been updated logging levels are introduced for our pretty printing vs other types of messages exceptions are logged | 0 |
56,505 | 13,864,641,847 | IssuesEvent | 2020-10-16 02:03:40 | kubevirt/containerized-data-importer | https://api.github.com/repos/kubevirt/containerized-data-importer | closed | [Flaky CI] Upload tests [test_id:1985] Upload datavolume should succeed on retry after failure | kind/bug triage/build-watcher | <!-- This form is for bug reports and feature requests ONLY!
Also make sure that you visit our User Guide at https://kubevirt.io/user-guide/
-->
**Is this a BUG REPORT or FEATURE REQUEST?**:
> Uncomment only one, leave it on its own line:
>
/kind bug
> /kind enhancement
**What happened**:
Upload tests [test_id:1985] Upload datavolume should succeed on retry after failure - failed on
```
/root/go/src/kubevirt.io/containerized-data-importer/tests/upload_test.go:881
Unexpected error:
<*errors.errorString | 0xc0008aaa50>: {
s: "Unexpected return value 503 expected 200, Response: {}",
}
Unexpected return value 503 expected 200, Response: {}
occurred
/root/go/src/kubevirt.io/containerized-data-importer/tests/upload_test.go:925
```
Link to the prow job- https://prow.apps.ovirt.org/view/gcs/kubevirt-prow/pr-logs/pull/kubevirt_containerized-data-importer/1426/pull-containerized-data-importer-e2e-k8s-1.17-ceph/1315677117916123136
**What you expected to happen**:
Should pass
**How to reproduce it (as minimally and precisely as possible)**:
**Anything else we need to know?**:
**Environment**:
- CDI version (use `kubectl get deployments cdi-deployment -o yaml`):
- Kubernetes version (use `kubectl version`):
- Cloud provider or hardware configuration:
- Install tools:
- Others:
| 1.0 | [Flaky CI] Upload tests [test_id:1985] Upload datavolume should succeed on retry after failure - <!-- This form is for bug reports and feature requests ONLY!
Also make sure that you visit our User Guide at https://kubevirt.io/user-guide/
-->
**Is this a BUG REPORT or FEATURE REQUEST?**:
> Uncomment only one, leave it on its own line:
>
/kind bug
> /kind enhancement
**What happened**:
Upload tests [test_id:1985] Upload datavolume should succeed on retry after failure - failed on
```
/root/go/src/kubevirt.io/containerized-data-importer/tests/upload_test.go:881
Unexpected error:
<*errors.errorString | 0xc0008aaa50>: {
s: "Unexpected return value 503 expected 200, Response: {}",
}
Unexpected return value 503 expected 200, Response: {}
occurred
/root/go/src/kubevirt.io/containerized-data-importer/tests/upload_test.go:925
```
Link to the prow job- https://prow.apps.ovirt.org/view/gcs/kubevirt-prow/pr-logs/pull/kubevirt_containerized-data-importer/1426/pull-containerized-data-importer-e2e-k8s-1.17-ceph/1315677117916123136
**What you expected to happen**:
Should pass
**How to reproduce it (as minimally and precisely as possible)**:
**Anything else we need to know?**:
**Environment**:
- CDI version (use `kubectl get deployments cdi-deployment -o yaml`):
- Kubernetes version (use `kubectl version`):
- Cloud provider or hardware configuration:
- Install tools:
- Others:
| non_defect | upload tests upload datavolume should succeed on retry after failure this form is for bug reports and feature requests only also make sure that you visit our user guide at is this a bug report or feature request uncomment only one leave it on its own line kind bug kind enhancement what happened upload tests upload datavolume should succeed on retry after failure failed on root go src kubevirt io containerized data importer tests upload test go unexpected error s unexpected return value expected response unexpected return value expected response occurred root go src kubevirt io containerized data importer tests upload test go link to the prow job what you expected to happen should pass how to reproduce it as minimally and precisely as possible anything else we need to know environment cdi version use kubectl get deployments cdi deployment o yaml kubernetes version use kubectl version cloud provider or hardware configuration install tools others | 0 |
206,642 | 7,114,436,946 | IssuesEvent | 2018-01-18 00:42:45 | Fourdee/DietPi | https://api.github.com/repos/Fourdee/DietPi | closed | DietPi-Software | NextCloud Webdav is nonfunctional | Priority Low | I've spent the last three days trying to make NextCloud Webdav work. I really could use some help. Some of these errors aren't related but may be useful. Clients can't discover Webdav Service.
Mobile app
[Davdroid](https://davdroid.bitfire.at/)via [F-Droid](https://f-droid.org/)
Overall I think Dietpi does not set up the Web servers with .well-known urls.
[Troubleshooting webdav](https://docs.nextcloud.com/server/9/admin_manual/issues/general_troubleshooting.html)
[litmus - Test webdav](http://www.webdav.org/neon/litmus/)
**Hardware**
Odroid c2
**Configuration**
Dietpi 141
A let's encrypt certificate forcing http to https
'always_populate_raw_post_data' to '-1' in php.ini
I removed special characters from MyUser passwords as apparently in my research discovered that Webdav cannot parse them but the rest of NextCloud can through the main login.
NextCloud log data
- Warning core Login failed: 'admin' (Remote IP: '192.168.1.1')
I'm a little confused why this exists as '192.168.1.1' is my router. Which shouldn't be trying to login anything.
- Sabre\DAV\Exception\Conflict: HTTP/1.1 409 Parent node does not exist
A Webdav error -I've googled this extensively and have not found a solution.
https://github.com/stackd/SabreDAV/blob/master/lib/Sabre/DAV/Exception/Conflict.php
` /var/www/nextcloud/3rdparty/sabre/dav/lib/DAV/CorePlugin.php - line 590: Sabre\DAV\Server->createCollection('InstantUpload/2...', Object(Sabre\DAV\MkCol))
[internal function] Sabre\DAV\CorePlugin->httpMkcol(Object(Sabre\HTTP\Request), Object(Sabre\HTTP\Response))
/var/www/nextcloud/3rdparty/sabre/event/lib/EventEmitterTrait.php - line 105: call_user_func_array(Array, Array)
/var/www/nextcloud/3rdparty/sabre/dav/lib/DAV/Server.php - line 479: Sabre\Event\EventEmitter->emit('method MKCOL', Array)
/var/www/nextcloud/3rdparty/sabre/dav/lib/DAV/Server.php - line 254: Sabre\DAV\Server->invokeMethod(Object(Sabre\HTTP\Request), Object(Sabre\HTTP\Response))
/var/www/nextcloud/apps/dav/appinfo/v1/webdav.php - line 60: Sabre\DAV\Server->exec()
/var/www/nextcloud/remote.php - line 165: require_once('/var/www/nextcl...')
{main}`
- Error no app in context InvalidArgumentException: The given object name is invalid
` /var/www/nextcloud/apps/activity/lib/FilesHooks.php - line 892: OC\Activity\Event->setObject('files', 48, false)
/var/www/nextcloud/apps/activity/lib/FilesHooks.php - line 184: OCA\Activity\FilesHooks->addNotificationsForUser('MyUser', 'created_self', Array, 48, false, true, true, 0, 'file_created')
/var/www/nextcloud/apps/activity/lib/FilesHooks.php - line 111: OCA\Activity\FilesHooks->addNotificationsForFileAction('/', 'file_created', 'created_self', 'created_by')
/var/www/nextcloud/apps/activity/lib/FilesHooksStatic.php - line 45: OCA\Activity\FilesHooks->fileCreate('/')
[internal function] OCA\Activity\FilesHooksStatic fileCreate(Array)
/var/www/nextcloud/lib/private/legacy/hook.php - line 106: call_user_func(Array, Array)
/var/www/nextcloud/lib/private/Files/View.php - line 1237: OC_Hook emit('OC_Filesystem', 'post_create', Array)
/var/www/nextcloud/lib/private/Files/View.php - line 1163: OC\Files\View->runHooks(Array, '/MyUser/files', true)
/var/www/nextcloud/lib/private/Files/View.php - line 266: OC\Files\View->basicOperation('mkdir', '/MyUser/files', Array)
/var/www/nextcloud/lib/private/Files/Node/Folder.php - line 149: OC\Files\View->mkdir('/MyUser/files')
/var/www/nextcloud/lib/private/Files/Node/Root.php - line 380: OC\Files\Node\Folder->newFolder('/MyUser/files')
[internal function] OC\Files\Node\Root->getUserFolder('MyUser')
/var/www/nextcloud/lib/private/Files/Node/LazyRoot.php - line 65: call_user_func_array(Array, Array)
/var/www/nextcloud/lib/private/Files/Node/LazyRoot.php - line 282: OC\Files\Node\LazyRoot->__call('getUserFolder', Array)
/var/www/nextcloud/lib/private/Server.php - line 948: OC\Files\Node\LazyRoot->getUserFolder('MyUser')
/var/www/nextcloud/lib/private/User/Session.php - line 411: OC\Server->getUserFolder('MyUser')
/var/www/nextcloud/lib/private/User/Session.php - line 479: OC\User\Session->prepareUserLogin(true)
/var/www/nextcloud/lib/private/User/Session.php - line 299: OC\User\Session->loginWithPassword(*** sensitive parameters replaced ***)
/var/www/nextcloud/core/Controller/LoginController.php - line 244: OC\User\Session->login(*** sensitive parameters replaced ***)
[internal function] OC\Core\Controller\LoginController->tryLogin(*** sensitive parameters replaced ***)
/var/www/nextcloud/lib/private/AppFramework/Http/Dispatcher.php - line 160: call_user_func_array(Array, Array)
/var/www/nextcloud/lib/private/AppFramework/Http/Dispatcher.php - line 90: OC\AppFramework\Http\Dispatcher->executeController(Object(OC\Core\Controller\LoginController), 'tryLogin')
/var/www/nextcloud/lib/private/AppFramework/App.php - line 114: OC\AppFramework\Http\Dispatcher->dispatch(Object(OC\Core\Controller\LoginController), 'tryLogin')
/var/www/nextcloud/lib/private/AppFramework/Routing/RouteActionHandler.php - line 47: OC\AppFramework\App main('LoginController', 'tryLogin', Object(OC\AppFramework\DependencyInjection\DIContainer), Array)
[internal function] OC\AppFramework\Routing\RouteActionHandler->__invoke(Array)
/var/www/nextcloud/lib/private/Route/Router.php - line 299: call_user_func(Object(OC\AppFramework\Routing\RouteActionHandler), Array)
/var/www/nextcloud/lib/base.php - line 1010: OC\Route\Router->match('/login')
/var/www/nextcloud/index.php - line 40: OC handleRequest()
{main}`
| 1.0 | DietPi-Software | NextCloud Webdav is nonfunctional - I've spent the last three days trying to make NextCloud Webdav work. I really could use some help. Some of these errors aren't related but may be useful. Clients can't discover Webdav Service.
Mobile app
[Davdroid](https://davdroid.bitfire.at/)via [F-Droid](https://f-droid.org/)
Overall I think Dietpi does not set up the Web servers with .well-known urls.
[Troubleshooting webdav](https://docs.nextcloud.com/server/9/admin_manual/issues/general_troubleshooting.html)
[litmus - Test webdav](http://www.webdav.org/neon/litmus/)
**Hardware**
Odroid c2
**Configuration**
Dietpi 141
A let's encrypt certificate forcing http to https
'always_populate_raw_post_data' to '-1' in php.ini
I removed special characters from MyUser passwords as apparently in my research discovered that Webdav cannot parse them but the rest of NextCloud can through the main login.
NextCloud log data
- Warning core Login failed: 'admin' (Remote IP: '192.168.1.1')
I'm a little confused why this exists as '192.168.1.1' is my router. Which shouldn't be trying to login anything.
- Sabre\DAV\Exception\Conflict: HTTP/1.1 409 Parent node does not exist
A Webdav error -I've googled this extensively and have not found a solution.
https://github.com/stackd/SabreDAV/blob/master/lib/Sabre/DAV/Exception/Conflict.php
` /var/www/nextcloud/3rdparty/sabre/dav/lib/DAV/CorePlugin.php - line 590: Sabre\DAV\Server->createCollection('InstantUpload/2...', Object(Sabre\DAV\MkCol))
[internal function] Sabre\DAV\CorePlugin->httpMkcol(Object(Sabre\HTTP\Request), Object(Sabre\HTTP\Response))
/var/www/nextcloud/3rdparty/sabre/event/lib/EventEmitterTrait.php - line 105: call_user_func_array(Array, Array)
/var/www/nextcloud/3rdparty/sabre/dav/lib/DAV/Server.php - line 479: Sabre\Event\EventEmitter->emit('method MKCOL', Array)
/var/www/nextcloud/3rdparty/sabre/dav/lib/DAV/Server.php - line 254: Sabre\DAV\Server->invokeMethod(Object(Sabre\HTTP\Request), Object(Sabre\HTTP\Response))
/var/www/nextcloud/apps/dav/appinfo/v1/webdav.php - line 60: Sabre\DAV\Server->exec()
/var/www/nextcloud/remote.php - line 165: require_once('/var/www/nextcl...')
{main}`
- Error no app in context InvalidArgumentException: The given object name is invalid
` /var/www/nextcloud/apps/activity/lib/FilesHooks.php - line 892: OC\Activity\Event->setObject('files', 48, false)
/var/www/nextcloud/apps/activity/lib/FilesHooks.php - line 184: OCA\Activity\FilesHooks->addNotificationsForUser('MyUser', 'created_self', Array, 48, false, true, true, 0, 'file_created')
/var/www/nextcloud/apps/activity/lib/FilesHooks.php - line 111: OCA\Activity\FilesHooks->addNotificationsForFileAction('/', 'file_created', 'created_self', 'created_by')
/var/www/nextcloud/apps/activity/lib/FilesHooksStatic.php - line 45: OCA\Activity\FilesHooks->fileCreate('/')
[internal function] OCA\Activity\FilesHooksStatic fileCreate(Array)
/var/www/nextcloud/lib/private/legacy/hook.php - line 106: call_user_func(Array, Array)
/var/www/nextcloud/lib/private/Files/View.php - line 1237: OC_Hook emit('OC_Filesystem', 'post_create', Array)
/var/www/nextcloud/lib/private/Files/View.php - line 1163: OC\Files\View->runHooks(Array, '/MyUser/files', true)
/var/www/nextcloud/lib/private/Files/View.php - line 266: OC\Files\View->basicOperation('mkdir', '/MyUser/files', Array)
/var/www/nextcloud/lib/private/Files/Node/Folder.php - line 149: OC\Files\View->mkdir('/MyUser/files')
/var/www/nextcloud/lib/private/Files/Node/Root.php - line 380: OC\Files\Node\Folder->newFolder('/MyUser/files')
[internal function] OC\Files\Node\Root->getUserFolder('MyUser')
/var/www/nextcloud/lib/private/Files/Node/LazyRoot.php - line 65: call_user_func_array(Array, Array)
/var/www/nextcloud/lib/private/Files/Node/LazyRoot.php - line 282: OC\Files\Node\LazyRoot->__call('getUserFolder', Array)
/var/www/nextcloud/lib/private/Server.php - line 948: OC\Files\Node\LazyRoot->getUserFolder('MyUser')
/var/www/nextcloud/lib/private/User/Session.php - line 411: OC\Server->getUserFolder('MyUser')
/var/www/nextcloud/lib/private/User/Session.php - line 479: OC\User\Session->prepareUserLogin(true)
/var/www/nextcloud/lib/private/User/Session.php - line 299: OC\User\Session->loginWithPassword(*** sensitive parameters replaced ***)
/var/www/nextcloud/core/Controller/LoginController.php - line 244: OC\User\Session->login(*** sensitive parameters replaced ***)
[internal function] OC\Core\Controller\LoginController->tryLogin(*** sensitive parameters replaced ***)
/var/www/nextcloud/lib/private/AppFramework/Http/Dispatcher.php - line 160: call_user_func_array(Array, Array)
/var/www/nextcloud/lib/private/AppFramework/Http/Dispatcher.php - line 90: OC\AppFramework\Http\Dispatcher->executeController(Object(OC\Core\Controller\LoginController), 'tryLogin')
/var/www/nextcloud/lib/private/AppFramework/App.php - line 114: OC\AppFramework\Http\Dispatcher->dispatch(Object(OC\Core\Controller\LoginController), 'tryLogin')
/var/www/nextcloud/lib/private/AppFramework/Routing/RouteActionHandler.php - line 47: OC\AppFramework\App main('LoginController', 'tryLogin', Object(OC\AppFramework\DependencyInjection\DIContainer), Array)
[internal function] OC\AppFramework\Routing\RouteActionHandler->__invoke(Array)
/var/www/nextcloud/lib/private/Route/Router.php - line 299: call_user_func(Object(OC\AppFramework\Routing\RouteActionHandler), Array)
/var/www/nextcloud/lib/base.php - line 1010: OC\Route\Router->match('/login')
/var/www/nextcloud/index.php - line 40: OC handleRequest()
{main}`
| non_defect | dietpi software nextcloud webdav is nonfunctional i ve spent the last three days trying to make nextcloud webdav work i really could use some help some of these errors aren t related but may be useful clients can t discover webdav service mobile app overall i think dietpi does not set up the web servers with well known urls hardware odroid configuration dietpi a let s encrypt certificate forcing http to https always populate raw post data to in php ini i removed special characters from myuser passwords as apparently in my research discovered that webdav cannot parse them but the rest of nextcloud can through the main login nextcloud log data warning core login failed admin remote ip i m a little confused why this exists as is my router which shouldn t be trying to login anything sabre dav exception conflict http parent node does not exist a webdav error i ve googled this extensively and have not found a solution var www nextcloud sabre dav lib dav coreplugin php line sabre dav server createcollection instantupload object sabre dav mkcol sabre dav coreplugin httpmkcol object sabre http request object sabre http response var www nextcloud sabre event lib eventemittertrait php line call user func array array array var www nextcloud sabre dav lib dav server php line sabre event eventemitter emit method mkcol array var www nextcloud sabre dav lib dav server php line sabre dav server invokemethod object sabre http request object sabre http response var www nextcloud apps dav appinfo webdav php line sabre dav server exec var www nextcloud remote php line require once var www nextcl main error no app in context invalidargumentexception the given object name is invalid var www nextcloud apps activity lib fileshooks php line oc activity event setobject files false var www nextcloud apps activity lib fileshooks php line oca activity fileshooks addnotificationsforuser myuser created self array false true true file created var www nextcloud apps activity lib fileshooks php line oca activity fileshooks addnotificationsforfileaction file created created self created by var www nextcloud apps activity lib fileshooksstatic php line oca activity fileshooks filecreate oca activity fileshooksstatic filecreate array var www nextcloud lib private legacy hook php line call user func array array var www nextcloud lib private files view php line oc hook emit oc filesystem post create array var www nextcloud lib private files view php line oc files view runhooks array myuser files true var www nextcloud lib private files view php line oc files view basicoperation mkdir myuser files array var www nextcloud lib private files node folder php line oc files view mkdir myuser files var www nextcloud lib private files node root php line oc files node folder newfolder myuser files oc files node root getuserfolder myuser var www nextcloud lib private files node lazyroot php line call user func array array array var www nextcloud lib private files node lazyroot php line oc files node lazyroot call getuserfolder array var www nextcloud lib private server php line oc files node lazyroot getuserfolder myuser var www nextcloud lib private user session php line oc server getuserfolder myuser var www nextcloud lib private user session php line oc user session prepareuserlogin true var www nextcloud lib private user session php line oc user session loginwithpassword sensitive parameters replaced var www nextcloud core controller logincontroller php line oc user session login sensitive parameters replaced oc core controller logincontroller trylogin sensitive parameters replaced var www nextcloud lib private appframework http dispatcher php line call user func array array array var www nextcloud lib private appframework http dispatcher php line oc appframework http dispatcher executecontroller object oc core controller logincontroller trylogin var www nextcloud lib private appframework app php line oc appframework http dispatcher dispatch object oc core controller logincontroller trylogin var www nextcloud lib private appframework routing routeactionhandler php line oc appframework app main logincontroller trylogin object oc appframework dependencyinjection dicontainer array oc appframework routing routeactionhandler invoke array var www nextcloud lib private route router php line call user func object oc appframework routing routeactionhandler array var www nextcloud lib base php line oc route router match login var www nextcloud index php line oc handlerequest main | 0 |
6,721 | 2,610,273,399 | IssuesEvent | 2015-02-26 19:27:30 | chrsmith/scribefire-chrome | https://api.github.com/repos/chrsmith/scribefire-chrome | closed | While trying to determine your blog's settings, ScribeFire tripped over this code: INCOMPATIBLE | auto-migrated Priority-Medium Type-Defect | ```
What's the problem?
I'm getting the above message when I click on Next after entering the URL of my
blog http://www.andymawson.com
What browser are you using?
Chrome 9.0.597.84
What version of ScribeFire are you running?
1.4.3.0
```
-----
Original issue reported on code.google.com by `Andy.Maw...@gmail.com` on 6 Feb 2011 at 3:19 | 1.0 | While trying to determine your blog's settings, ScribeFire tripped over this code: INCOMPATIBLE - ```
What's the problem?
I'm getting the above message when I click on Next after entering the URL of my
blog http://www.andymawson.com
What browser are you using?
Chrome 9.0.597.84
What version of ScribeFire are you running?
1.4.3.0
```
-----
Original issue reported on code.google.com by `Andy.Maw...@gmail.com` on 6 Feb 2011 at 3:19 | defect | while trying to determine your blog s settings scribefire tripped over this code incompatible what s the problem i m getting the above message when i click on next after entering the url of my blog what browser are you using chrome what version of scribefire are you running original issue reported on code google com by andy maw gmail com on feb at | 1 |
427,692 | 12,397,947,549 | IssuesEvent | 2020-05-21 00:15:17 | eclipse-ee4j/glassfish | https://api.github.com/repos/eclipse-ee4j/glassfish | closed | Unable to start Cluster Instances when using JDK-7 on RHEL 5 | Component: monitoring ERR: Assignee JDK-7 JDK7 Priority: Blocker RHEL Stale Type: Bug | After upgrading from GF 3.1.2 to 3.1.2.2 on DAS, removing cluster instances and recreating them, the instances will not start using JDK 7\. The following exception is seen:
<snip>
[#|2012-07-27T09:04:36.428-0400|WARNING|oracle-glassfish3.1.2|javax.enterprise.system.tools.admin.com.sun.enterprise.v3.admin.cluster|_ThreadID=1570;_ThreadName=Thread-2;|Could not start instance Instance1 on node QA-Node-1 (btsqa01dfw.bot.testnet.rim.net).: Command ' /home/glassfish/glassfish3/glassfish/bin/asadmin --_auxinput - --interactive=false start-local-instance --node QA-Node-1 --sync normal Instance1' failed on node QA-Node-1 (<removed>): Waiting for Instance1 to start ......Error starting instance Instance1.
The server exited prematurely with exit code 1.
Before it died, it produced the following output:
Launching GlassFish on Felix platform
Completed shutdown of GlassFish runtime
Exception in thread "main" java.lang.reflect.InvocationTargetException
at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:57)
at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.lang.reflect.Method.invoke(Method.java:601)
at com.sun.enterprise.glassfish.bootstrap.GlassFishMain.main(GlassFishMain.java:97)
at com.sun.enterprise.glassfish.bootstrap.ASMain.main(ASMain.java:55)
Caused by: java.lang.RuntimeException: javax.management.MBeanRegistrationException: Exception thrown in preRegister method
at java.lang.management.ManagementFactory.addMXBean(ManagementFactory.java:824)
at java.lang.management.ManagementFactory.getPlatformMBeanServer(ManagementFactory.java:481)
at org.glassfish.admin.monitor.MonitoringBootstrap.setStatsProviderManagerDelegate(MonitoringBootstrap.java:227)
at org.glassfish.admin.monitor.MonitoringBootstrap.enableMonitoringForProbeProviders(MonitoringBootstrap.java:634)
at org.glassfish.admin.monitor.MonitoringBootstrap.postConstruct(MonitoringBootstrap.java:176)
at com.sun.hk2.component.AbstractCreatorImpl.inject(AbstractCreatorImpl.java:131)
at com.sun.hk2.component.ConstructorCreator.initialize(ConstructorCreator.java:91)
at com.sun.hk2.component.AbstractCreatorImpl.get(AbstractCreatorImpl.java:82)
at com.sun.hk2.component.SingletonInhabitant.get(SingletonInhabitant.java:67)
at com.sun.hk2.component.EventPublishingInhabitant.get(EventPublishingInhabitant.java:139)
at com.sun.hk2.component.AbstractInhabitantImpl.get(AbstractInhabitantImpl.java:78)
at com.sun.enterprise.v3.server.AppServerStartup.run(AppServerStartup.java:229)
at com.sun.enterprise.v3.server.AppServerStartup.doStart(AppServerStartup.java:145)
at com.sun.enterprise.v3.server.AppServerStartup.start(AppServerStartup.java:136)
at com.sun.enterprise.glassfish.bootstrap.GlassFishImpl.start(GlassFishImpl.java:79)
at com.sun.enterprise.glassfish.bootstrap.GlassFishDecorator.start(GlassFishDecorator.java:63)
at com.sun.enterprise.glassfish.bootstrap.osgi.OSGiGlassFishImpl.start(OSGiGlassFishImpl.java:69)
at com.sun.enterprise.glassfish.bootstrap.GlassFishMain$Launcher.launch(GlassFishMain.java:117)
... 6 more
Caused by: javax.management.MBeanRegistrationException: Exception thrown in preRegister method
at com.sun.jmx.interceptor.DefaultMBeanServerInterceptor.throwMBeanRegistrationException(DefaultMBeanServerInterceptor.java:993)
at com.sun.jmx.interceptor.DefaultMBeanServerInterceptor.preRegister(DefaultMBeanServerInterceptor.java:1009)
at com.sun.jmx.interceptor.DefaultMBeanServerInterceptor.registerDynamicMBean(DefaultMBeanServerInterceptor.java:919)
at com.sun.jmx.interceptor.DefaultMBeanServerInterceptor.registerObject(DefaultMBeanServerInterceptor.java:900)
at com.sun.jmx.interceptor.DefaultMBeanServerInterceptor.registerMBean(DefaultMBeanServerInterceptor.java:324)
at com.sun.jmx.mbeanserver.JmxMBeanServer.registerMBean(JmxMBeanServer.java:512)
at com.sun.enterprise.v3.admin.DynamicInterceptor.registerMBean(DynamicInterceptor.java:472)
at java.lang.management.ManagementFactory$2.run(ManagementFactory.java:819)
at java.lang.management.ManagementFactory$2.run(ManagementFactory.java:815)
at java.security.AccessController.doPrivileged(Native Method)
at java.lang.management.ManagementFactory.addMXBean(ManagementFactory.java:815)
... 23 more
Caused by: javax.management.InstanceAlreadyExistsException: MXBean already registered with name java.lang:type=GarbageCollector,name=PS Scavenge
at com.sun.jmx.mbeanserver.MXBeanLookup.addReference(MXBeanLookup.java:151)
at com.sun.jmx.mbeanserver.MXBeanSupport.register(MXBeanSupport.java:160)
at javax.management.StandardMBean.preRegister(StandardMBean.java:1075)
at com.sun.jmx.interceptor.DefaultMBeanServerInterceptor.preRegister(DefaultMBeanServerInterceptor.java:1007)
... 32 more
Command start-local-instance failed.: To complete this operation run the following command locally on host <removed> from the GlassFish install location /home/glassfish/glassfish3:
bin/asadmin start-local-instance --node QA-Node-1 --sync normal Instance1|#]
[#|2012-07-27T09:04:36.434-0400|SEVERE|oracle-glassfish3.1.2|org.glassfish.admingui|_ThreadID=1567;_ThreadName=Thread-2;|RestResponse.getResponse() gives FAILURE. endpoint = 'https://localhost:4848/management/domain/servers/server/Instance1/start-instance'; attrs = '{}'|#]
[#|2012-07-27T09:04:36.435-0400|SEVERE|oracle-glassfish3.1.2|org.glassfish.admingui|_ThreadID=1567;_ThreadName=Thread-2;|Error in instanceAction ;
endpoint=[https://localhost:4848/management/domain/servers/server/Instance1/start-instance;attrsMap=null](https://localhost:4848/management/domain/servers/server/Instance1/start-instance;attrsMap=null)|#]
</snip>
After downgrading java to JDK 6, everything works correctly. It should be noted that this behaviour is seen for the following JDK versions: 1.7.0_02, 1.7.0_03, 1.7.0_04, 1.7.0_05
#### Environment
Oracle Glassfish 3.1.2.2
RHEL 5
JDK 7u4
#### Affected Versions
[3.1.2] | 1.0 | Unable to start Cluster Instances when using JDK-7 on RHEL 5 - After upgrading from GF 3.1.2 to 3.1.2.2 on DAS, removing cluster instances and recreating them, the instances will not start using JDK 7\. The following exception is seen:
<snip>
[#|2012-07-27T09:04:36.428-0400|WARNING|oracle-glassfish3.1.2|javax.enterprise.system.tools.admin.com.sun.enterprise.v3.admin.cluster|_ThreadID=1570;_ThreadName=Thread-2;|Could not start instance Instance1 on node QA-Node-1 (btsqa01dfw.bot.testnet.rim.net).: Command ' /home/glassfish/glassfish3/glassfish/bin/asadmin --_auxinput - --interactive=false start-local-instance --node QA-Node-1 --sync normal Instance1' failed on node QA-Node-1 (<removed>): Waiting for Instance1 to start ......Error starting instance Instance1.
The server exited prematurely with exit code 1.
Before it died, it produced the following output:
Launching GlassFish on Felix platform
Completed shutdown of GlassFish runtime
Exception in thread "main" java.lang.reflect.InvocationTargetException
at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:57)
at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.lang.reflect.Method.invoke(Method.java:601)
at com.sun.enterprise.glassfish.bootstrap.GlassFishMain.main(GlassFishMain.java:97)
at com.sun.enterprise.glassfish.bootstrap.ASMain.main(ASMain.java:55)
Caused by: java.lang.RuntimeException: javax.management.MBeanRegistrationException: Exception thrown in preRegister method
at java.lang.management.ManagementFactory.addMXBean(ManagementFactory.java:824)
at java.lang.management.ManagementFactory.getPlatformMBeanServer(ManagementFactory.java:481)
at org.glassfish.admin.monitor.MonitoringBootstrap.setStatsProviderManagerDelegate(MonitoringBootstrap.java:227)
at org.glassfish.admin.monitor.MonitoringBootstrap.enableMonitoringForProbeProviders(MonitoringBootstrap.java:634)
at org.glassfish.admin.monitor.MonitoringBootstrap.postConstruct(MonitoringBootstrap.java:176)
at com.sun.hk2.component.AbstractCreatorImpl.inject(AbstractCreatorImpl.java:131)
at com.sun.hk2.component.ConstructorCreator.initialize(ConstructorCreator.java:91)
at com.sun.hk2.component.AbstractCreatorImpl.get(AbstractCreatorImpl.java:82)
at com.sun.hk2.component.SingletonInhabitant.get(SingletonInhabitant.java:67)
at com.sun.hk2.component.EventPublishingInhabitant.get(EventPublishingInhabitant.java:139)
at com.sun.hk2.component.AbstractInhabitantImpl.get(AbstractInhabitantImpl.java:78)
at com.sun.enterprise.v3.server.AppServerStartup.run(AppServerStartup.java:229)
at com.sun.enterprise.v3.server.AppServerStartup.doStart(AppServerStartup.java:145)
at com.sun.enterprise.v3.server.AppServerStartup.start(AppServerStartup.java:136)
at com.sun.enterprise.glassfish.bootstrap.GlassFishImpl.start(GlassFishImpl.java:79)
at com.sun.enterprise.glassfish.bootstrap.GlassFishDecorator.start(GlassFishDecorator.java:63)
at com.sun.enterprise.glassfish.bootstrap.osgi.OSGiGlassFishImpl.start(OSGiGlassFishImpl.java:69)
at com.sun.enterprise.glassfish.bootstrap.GlassFishMain$Launcher.launch(GlassFishMain.java:117)
... 6 more
Caused by: javax.management.MBeanRegistrationException: Exception thrown in preRegister method
at com.sun.jmx.interceptor.DefaultMBeanServerInterceptor.throwMBeanRegistrationException(DefaultMBeanServerInterceptor.java:993)
at com.sun.jmx.interceptor.DefaultMBeanServerInterceptor.preRegister(DefaultMBeanServerInterceptor.java:1009)
at com.sun.jmx.interceptor.DefaultMBeanServerInterceptor.registerDynamicMBean(DefaultMBeanServerInterceptor.java:919)
at com.sun.jmx.interceptor.DefaultMBeanServerInterceptor.registerObject(DefaultMBeanServerInterceptor.java:900)
at com.sun.jmx.interceptor.DefaultMBeanServerInterceptor.registerMBean(DefaultMBeanServerInterceptor.java:324)
at com.sun.jmx.mbeanserver.JmxMBeanServer.registerMBean(JmxMBeanServer.java:512)
at com.sun.enterprise.v3.admin.DynamicInterceptor.registerMBean(DynamicInterceptor.java:472)
at java.lang.management.ManagementFactory$2.run(ManagementFactory.java:819)
at java.lang.management.ManagementFactory$2.run(ManagementFactory.java:815)
at java.security.AccessController.doPrivileged(Native Method)
at java.lang.management.ManagementFactory.addMXBean(ManagementFactory.java:815)
... 23 more
Caused by: javax.management.InstanceAlreadyExistsException: MXBean already registered with name java.lang:type=GarbageCollector,name=PS Scavenge
at com.sun.jmx.mbeanserver.MXBeanLookup.addReference(MXBeanLookup.java:151)
at com.sun.jmx.mbeanserver.MXBeanSupport.register(MXBeanSupport.java:160)
at javax.management.StandardMBean.preRegister(StandardMBean.java:1075)
at com.sun.jmx.interceptor.DefaultMBeanServerInterceptor.preRegister(DefaultMBeanServerInterceptor.java:1007)
... 32 more
Command start-local-instance failed.: To complete this operation run the following command locally on host <removed> from the GlassFish install location /home/glassfish/glassfish3:
bin/asadmin start-local-instance --node QA-Node-1 --sync normal Instance1|#]
[#|2012-07-27T09:04:36.434-0400|SEVERE|oracle-glassfish3.1.2|org.glassfish.admingui|_ThreadID=1567;_ThreadName=Thread-2;|RestResponse.getResponse() gives FAILURE. endpoint = 'https://localhost:4848/management/domain/servers/server/Instance1/start-instance'; attrs = '{}'|#]
[#|2012-07-27T09:04:36.435-0400|SEVERE|oracle-glassfish3.1.2|org.glassfish.admingui|_ThreadID=1567;_ThreadName=Thread-2;|Error in instanceAction ;
endpoint=[https://localhost:4848/management/domain/servers/server/Instance1/start-instance;attrsMap=null](https://localhost:4848/management/domain/servers/server/Instance1/start-instance;attrsMap=null)|#]
</snip>
After downgrading java to JDK 6, everything works correctly. It should be noted that this behaviour is seen for the following JDK versions: 1.7.0_02, 1.7.0_03, 1.7.0_04, 1.7.0_05
#### Environment
Oracle Glassfish 3.1.2.2
RHEL 5
JDK 7u4
#### Affected Versions
[3.1.2] | non_defect | unable to start cluster instances when using jdk on rhel after upgrading from gf to on das removing cluster instances and recreating them the instances will not start using jdk the following exception is seen warning oracle javax enterprise system tools admin com sun enterprise admin cluster threadid threadname thread could not start instance on node qa node bot testnet rim net command home glassfish glassfish bin asadmin auxinput interactive false start local instance node qa node sync normal failed on node qa node waiting for to start error starting instance the server exited prematurely with exit code before it died it produced the following output launching glassfish on felix platform completed shutdown of glassfish runtime exception in thread main java lang reflect invocationtargetexception at sun reflect nativemethodaccessorimpl native method at sun reflect nativemethodaccessorimpl invoke nativemethodaccessorimpl java at sun reflect delegatingmethodaccessorimpl invoke delegatingmethodaccessorimpl java at java lang reflect method invoke method java at com sun enterprise glassfish bootstrap glassfishmain main glassfishmain java at com sun enterprise glassfish bootstrap asmain main asmain java caused by java lang runtimeexception javax management mbeanregistrationexception exception thrown in preregister method at java lang management managementfactory addmxbean managementfactory java at java lang management managementfactory getplatformmbeanserver managementfactory java at org glassfish admin monitor monitoringbootstrap setstatsprovidermanagerdelegate monitoringbootstrap java at org glassfish admin monitor monitoringbootstrap enablemonitoringforprobeproviders monitoringbootstrap java at org glassfish admin monitor monitoringbootstrap postconstruct monitoringbootstrap java at com sun component abstractcreatorimpl inject abstractcreatorimpl java at com sun component constructorcreator initialize constructorcreator java at com sun component abstractcreatorimpl get abstractcreatorimpl java at com sun component singletoninhabitant get singletoninhabitant java at com sun component eventpublishinginhabitant get eventpublishinginhabitant java at com sun component abstractinhabitantimpl get abstractinhabitantimpl java at com sun enterprise server appserverstartup run appserverstartup java at com sun enterprise server appserverstartup dostart appserverstartup java at com sun enterprise server appserverstartup start appserverstartup java at com sun enterprise glassfish bootstrap glassfishimpl start glassfishimpl java at com sun enterprise glassfish bootstrap glassfishdecorator start glassfishdecorator java at com sun enterprise glassfish bootstrap osgi osgiglassfishimpl start osgiglassfishimpl java at com sun enterprise glassfish bootstrap glassfishmain launcher launch glassfishmain java more caused by javax management mbeanregistrationexception exception thrown in preregister method at com sun jmx interceptor defaultmbeanserverinterceptor throwmbeanregistrationexception defaultmbeanserverinterceptor java at com sun jmx interceptor defaultmbeanserverinterceptor preregister defaultmbeanserverinterceptor java at com sun jmx interceptor defaultmbeanserverinterceptor registerdynamicmbean defaultmbeanserverinterceptor java at com sun jmx interceptor defaultmbeanserverinterceptor registerobject defaultmbeanserverinterceptor java at com sun jmx interceptor defaultmbeanserverinterceptor registermbean defaultmbeanserverinterceptor java at com sun jmx mbeanserver jmxmbeanserver registermbean jmxmbeanserver java at com sun enterprise admin dynamicinterceptor registermbean dynamicinterceptor java at java lang management managementfactory run managementfactory java at java lang management managementfactory run managementfactory java at java security accesscontroller doprivileged native method at java lang management managementfactory addmxbean managementfactory java more caused by javax management instancealreadyexistsexception mxbean already registered with name java lang type garbagecollector name ps scavenge at com sun jmx mbeanserver mxbeanlookup addreference mxbeanlookup java at com sun jmx mbeanserver mxbeansupport register mxbeansupport java at javax management standardmbean preregister standardmbean java at com sun jmx interceptor defaultmbeanserverinterceptor preregister defaultmbeanserverinterceptor java more command start local instance failed to complete this operation run the following command locally on host from the glassfish install location home glassfish bin asadmin start local instance node qa node sync normal severe oracle org glassfish admingui threadid threadname thread error in instanceaction endpoint after downgrading java to jdk everything works correctly it should be noted that this behaviour is seen for the following jdk versions environment oracle glassfish rhel jdk affected versions | 0 |
825,619 | 31,464,783,594 | IssuesEvent | 2023-08-30 00:29:49 | War-Brokers/War-Brokers | https://api.github.com/repos/War-Brokers/War-Brokers | opened | suggestion(stats-site): Public discord server listing | type:suggestion area:stats-site priority:3 - low | - from https://github.com/War-Brokers/.github/issues/117
Show a bubble diagram (like image below without connecting lines) in the stats site showing different War Brokers discoerd community servers and their size.
- stats page of a player shows servers they're in
- opt-in by server owners
- community server feature must be enabled to be registered

| 1.0 | suggestion(stats-site): Public discord server listing - - from https://github.com/War-Brokers/.github/issues/117
Show a bubble diagram (like image below without connecting lines) in the stats site showing different War Brokers discoerd community servers and their size.
- stats page of a player shows servers they're in
- opt-in by server owners
- community server feature must be enabled to be registered

| non_defect | suggestion stats site public discord server listing from show a bubble diagram like image below without connecting lines in the stats site showing different war brokers discoerd community servers and their size stats page of a player shows servers they re in opt in by server owners community server feature must be enabled to be registered | 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.