Unnamed: 0
int64
0
832k
id
float64
2.49B
32.1B
type
stringclasses
1 value
created_at
stringlengths
19
19
repo
stringlengths
5
112
repo_url
stringlengths
34
141
action
stringclasses
3 values
title
stringlengths
1
757
labels
stringlengths
4
664
body
stringlengths
3
261k
index
stringclasses
10 values
text_combine
stringlengths
96
261k
label
stringclasses
2 values
text
stringlengths
96
232k
binary_label
int64
0
1
41,771
2,869,080,369
IssuesEvent
2015-06-05 23:10:30
dart-lang/polymer-dart
https://api.github.com/repos/dart-lang/polymer-dart
closed
Polymer test_custom_event_test fails on Safari 6.2.
bug duplicate Priority-Medium
<a href="https://github.com/whesse"><img src="https://avatars.githubusercontent.com/u/4905639?v=3" align="left" width="96" height="96"hspace="10"></img></a> **Issue by [whesse](https://github.com/whesse)** _Originally opened as dart-lang/sdk#21425_ ---- The test pkg/polymer/test/custom_event_test fails on Safari 6.2 on macos 10.8. Error is: type: window_onerror &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;value: window.onerror called: &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;http://127.0.0.1:51946/root_build/generated_tests/dart2js-safari-sdk/pkg_polymer_test_custom_event_test/test/custom_event_test.html_bootstrap.dart.js:1642: &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;TypeError: undefined is not a function (evaluating 't1.get$attributes(n)._html$_element.hasAttribute(&quot;template&quot;)') &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
1.0
Polymer test_custom_event_test fails on Safari 6.2. - <a href="https://github.com/whesse"><img src="https://avatars.githubusercontent.com/u/4905639?v=3" align="left" width="96" height="96"hspace="10"></img></a> **Issue by [whesse](https://github.com/whesse)** _Originally opened as dart-lang/sdk#21425_ ---- The test pkg/polymer/test/custom_event_test fails on Safari 6.2 on macos 10.8. Error is: type: window_onerror &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;value: window.onerror called: &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;http://127.0.0.1:51946/root_build/generated_tests/dart2js-safari-sdk/pkg_polymer_test_custom_event_test/test/custom_event_test.html_bootstrap.dart.js:1642: &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;TypeError: undefined is not a function (evaluating 't1.get$attributes(n)._html$_element.hasAttribute(&quot;template&quot;)') &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
non_defect
polymer test custom event test fails on safari issue by originally opened as dart lang sdk the test pkg polymer test custom event test fails on safari on macos error is type window onerror nbsp nbsp nbsp nbsp nbsp nbsp nbsp nbsp nbsp nbsp nbsp nbsp nbsp nbsp value window onerror called nbsp nbsp nbsp nbsp nbsp nbsp nbsp nbsp nbsp nbsp nbsp nbsp nbsp nbsp nbsp nbsp nbsp nbsp nbsp nbsp nbsp nbsp nbsp nbsp nbsp nbsp nbsp nbsp nbsp nbsp nbsp nbsp nbsp nbsp nbsp nbsp nbsp nbsp nbsp nbsp nbsp nbsp nbsp nbsp nbsp nbsp nbsp nbsp nbsp nbsp nbsp nbsp nbsp nbsp nbsp nbsp nbsp nbsp nbsp nbsp typeerror undefined is not a function evaluating get attributes n html element hasattribute quot template quot nbsp nbsp nbsp nbsp nbsp nbsp nbsp nbsp nbsp nbsp nbsp nbsp nbsp nbsp nbsp nbsp nbsp nbsp nbsp nbsp
0
2,111
2,603,976,485
IssuesEvent
2015-02-24 19:01:37
chrsmith/nishazi6
https://api.github.com/repos/chrsmith/nishazi6
opened
沈阳龟头上肉芽
auto-migrated Priority-Medium Type-Defect
``` 沈阳龟头上肉芽〓沈陽軍區政治部醫院性病〓TEL:024-31023308�� �成立于1946年,68年專注于性傳播疾病的研究和治療。位于沈� ��市沈河區二緯路32號。是一所與新中國同建立共輝煌的歷史� ��久、設備精良、技術權威、專家云集,是預防、保健、醫療 、科研康復為一體的綜合性醫院。是國家首批公立甲等部隊�� �院、全國首批醫療規范定點單位,是第四軍醫大學、東南大� ��等知名高等院校的教學醫院。曾被中國人民解放軍空軍后勤 部衛生部評為衛生工作先進單位,先后兩次榮立集體二等功�� � ``` ----- Original issue reported on code.google.com by `q964105...@gmail.com` on 4 Jun 2014 at 8:21
1.0
沈阳龟头上肉芽 - ``` 沈阳龟头上肉芽〓沈陽軍區政治部醫院性病〓TEL:024-31023308�� �成立于1946年,68年專注于性傳播疾病的研究和治療。位于沈� ��市沈河區二緯路32號。是一所與新中國同建立共輝煌的歷史� ��久、設備精良、技術權威、專家云集,是預防、保健、醫療 、科研康復為一體的綜合性醫院。是國家首批公立甲等部隊�� �院、全國首批醫療規范定點單位,是第四軍醫大學、東南大� ��等知名高等院校的教學醫院。曾被中國人民解放軍空軍后勤 部衛生部評為衛生工作先進單位,先后兩次榮立集體二等功�� � ``` ----- Original issue reported on code.google.com by `q964105...@gmail.com` on 4 Jun 2014 at 8:21
defect
沈阳龟头上肉芽 沈阳龟头上肉芽〓沈陽軍區政治部醫院性病〓tel: �� � , 。位于沈� �� 。是一所與新中國同建立共輝煌的歷史� ��久、設備精良、技術權威、專家云集,是預防、保健、醫療 、科研康復為一體的綜合性醫院。是國家首批公立甲等部隊�� �院、全國首批醫療規范定點單位,是第四軍醫大學、東南大� ��等知名高等院校的教學醫院。曾被中國人民解放軍空軍后勤 部衛生部評為衛生工作先進單位,先后兩次榮立集體二等功�� � original issue reported on code google com by gmail com on jun at
1
52,914
13,772,794,781
IssuesEvent
2020-10-08 01:39:32
raindigi/reaction
https://api.github.com/repos/raindigi/reaction
opened
CVE-2019-20922 (High) detected in handlebars-4.1.0.tgz
security vulnerability
## CVE-2019-20922 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>handlebars-4.1.0.tgz</b></p></summary> <p>Handlebars provides the power necessary to let you build semantic templates effectively with no frustration</p> <p>Library home page: <a href="https://registry.npmjs.org/handlebars/-/handlebars-4.1.0.tgz">https://registry.npmjs.org/handlebars/-/handlebars-4.1.0.tgz</a></p> <p>Path to dependency file: reaction/package.json</p> <p>Path to vulnerable library: reaction/node_modules/handlebars/package.json</p> <p> Dependency Hierarchy: - :x: **handlebars-4.1.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/raindigi/reaction/commit/d65392474214ca5f46d3846f149b6c236bd4dd06">d65392474214ca5f46d3846f149b6c236bd4dd06</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Handlebars before 4.4.5 allows Regular Expression Denial of Service (ReDoS) because of eager matching. The parser may be forced into an endless loop while processing crafted templates. This may allow attackers to exhaust system resources. <p>Publish Date: 2020-09-30 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-20922>CVE-2019-20922</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20922">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20922</a></p> <p>Release Date: 2020-09-30</p> <p>Fix Resolution: 4.4.5</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2019-20922 (High) detected in handlebars-4.1.0.tgz - ## CVE-2019-20922 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>handlebars-4.1.0.tgz</b></p></summary> <p>Handlebars provides the power necessary to let you build semantic templates effectively with no frustration</p> <p>Library home page: <a href="https://registry.npmjs.org/handlebars/-/handlebars-4.1.0.tgz">https://registry.npmjs.org/handlebars/-/handlebars-4.1.0.tgz</a></p> <p>Path to dependency file: reaction/package.json</p> <p>Path to vulnerable library: reaction/node_modules/handlebars/package.json</p> <p> Dependency Hierarchy: - :x: **handlebars-4.1.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/raindigi/reaction/commit/d65392474214ca5f46d3846f149b6c236bd4dd06">d65392474214ca5f46d3846f149b6c236bd4dd06</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Handlebars before 4.4.5 allows Regular Expression Denial of Service (ReDoS) because of eager matching. The parser may be forced into an endless loop while processing crafted templates. This may allow attackers to exhaust system resources. <p>Publish Date: 2020-09-30 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-20922>CVE-2019-20922</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20922">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20922</a></p> <p>Release Date: 2020-09-30</p> <p>Fix Resolution: 4.4.5</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_defect
cve high detected in handlebars tgz cve high severity vulnerability vulnerable library handlebars tgz handlebars provides the power necessary to let you build semantic templates effectively with no frustration library home page a href path to dependency file reaction package json path to vulnerable library reaction node modules handlebars package json dependency hierarchy x handlebars tgz vulnerable library found in head commit a href vulnerability details handlebars before allows regular expression denial of service redos because of eager matching the parser may be forced into an endless loop while processing crafted templates this may allow attackers to exhaust system resources publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
0
77,353
26,945,713,940
IssuesEvent
2023-02-08 07:54:00
vector-im/element-x-ios
https://api.github.com/repos/vector-im/element-x-ios
closed
Room avatars disappear in room list
T-Defect
**Describe the bug** Sometimes all avatars on the room list and the fallback (coloured avatar with a letter in it) appear instead **To Reproduce** I haven't been able to pin-point steps to reproduce, but it seems to happen when going back from the chat view to the room list, and there's a flash on the correct avatars, and then the room list transforms in its incorrect form. This has also been seen when coming back to EX from a different application
1.0
Room avatars disappear in room list - **Describe the bug** Sometimes all avatars on the room list and the fallback (coloured avatar with a letter in it) appear instead **To Reproduce** I haven't been able to pin-point steps to reproduce, but it seems to happen when going back from the chat view to the room list, and there's a flash on the correct avatars, and then the room list transforms in its incorrect form. This has also been seen when coming back to EX from a different application
defect
room avatars disappear in room list describe the bug sometimes all avatars on the room list and the fallback coloured avatar with a letter in it appear instead to reproduce i haven t been able to pin point steps to reproduce but it seems to happen when going back from the chat view to the room list and there s a flash on the correct avatars and then the room list transforms in its incorrect form this has also been seen when coming back to ex from a different application
1
24,352
3,968,652,667
IssuesEvent
2016-05-03 20:26:09
lester88a/snova
https://api.github.com/repos/lester88a/snova
closed
终于部署成功,但访问FB速度好慢。。。。
auto-migrated Priority-Medium Type-Defect
``` 终于部署成功,但访问FB速度好慢。。。。是怎么个情况呢? ``` Original issue reported on code.google.com by `dover...@gmail.com` on 29 Jan 2014 at 9:25
1.0
终于部署成功,但访问FB速度好慢。。。。 - ``` 终于部署成功,但访问FB速度好慢。。。。是怎么个情况呢? ``` Original issue reported on code.google.com by `dover...@gmail.com` on 29 Jan 2014 at 9:25
defect
终于部署成功,但访问fb速度好慢。。。。 终于部署成功,但访问fb速度好慢。。。。是怎么个情况呢? original issue reported on code google com by dover gmail com on jan at
1
714,217
24,554,788,299
IssuesEvent
2022-10-12 15:05:03
ooni/probe
https://api.github.com/repos/ooni/probe
opened
miniooni: add --remote=REMOTE functionality
enhancement priority/medium research prototype methodology ooni/probe-engine
This functionality has been discussed with @ainghazal for quite some time now. The general idea is that we are able to capture all the traffic generated by a miniooni instance and "remote" the traffic to a remote endpoint using a transport. The main use case for this functionality seems to run integration testing inside a network where we implement censorship. An additional use case could be to use a remote endpoint as the "exit node" for miniooni measurements. We cannot easily implement this functionality with an all encompassing socks5 proxy because we also include QUIC and we would like to preserve the fact that QUIC is over UDP. More generally, we would like to preserve the property that miniooni is using a network stack and gets real network stack errors. To make this possible, we will use an userspace network stack such as gvisor, and we'll inject the packets arriving on the remote host using a TUN device. A prototype of this functionality is available at https://github.com/ooni/probe-cli/pull/969. This design seems the best candidate for some sort of "Jafar 2.0" functionality (see https://github.com/ooni/probe/issues/1803).
1.0
miniooni: add --remote=REMOTE functionality - This functionality has been discussed with @ainghazal for quite some time now. The general idea is that we are able to capture all the traffic generated by a miniooni instance and "remote" the traffic to a remote endpoint using a transport. The main use case for this functionality seems to run integration testing inside a network where we implement censorship. An additional use case could be to use a remote endpoint as the "exit node" for miniooni measurements. We cannot easily implement this functionality with an all encompassing socks5 proxy because we also include QUIC and we would like to preserve the fact that QUIC is over UDP. More generally, we would like to preserve the property that miniooni is using a network stack and gets real network stack errors. To make this possible, we will use an userspace network stack such as gvisor, and we'll inject the packets arriving on the remote host using a TUN device. A prototype of this functionality is available at https://github.com/ooni/probe-cli/pull/969. This design seems the best candidate for some sort of "Jafar 2.0" functionality (see https://github.com/ooni/probe/issues/1803).
non_defect
miniooni add remote remote functionality this functionality has been discussed with ainghazal for quite some time now the general idea is that we are able to capture all the traffic generated by a miniooni instance and remote the traffic to a remote endpoint using a transport the main use case for this functionality seems to run integration testing inside a network where we implement censorship an additional use case could be to use a remote endpoint as the exit node for miniooni measurements we cannot easily implement this functionality with an all encompassing proxy because we also include quic and we would like to preserve the fact that quic is over udp more generally we would like to preserve the property that miniooni is using a network stack and gets real network stack errors to make this possible we will use an userspace network stack such as gvisor and we ll inject the packets arriving on the remote host using a tun device a prototype of this functionality is available at this design seems the best candidate for some sort of jafar functionality see
0
97,650
12,248,940,647
IssuesEvent
2020-05-05 18:22:25
project-koku/koku-ui
https://api.github.com/repos/project-koku/koku-ui
closed
RFE for UI HCCM/AWS heath check/current status
GA design enhancement
We should consider adding a monitor for Cost and sources (AWS, Azure, OCP) so we can see current status, basically being able to quickly tell if cost management has stale data and what time stamp the last data was collected on.
1.0
RFE for UI HCCM/AWS heath check/current status - We should consider adding a monitor for Cost and sources (AWS, Azure, OCP) so we can see current status, basically being able to quickly tell if cost management has stale data and what time stamp the last data was collected on.
non_defect
rfe for ui hccm aws heath check current status we should consider adding a monitor for cost and sources aws azure ocp so we can see current status basically being able to quickly tell if cost management has stale data and what time stamp the last data was collected on
0
18,681
3,080,680,543
IssuesEvent
2015-08-22 00:32:16
jameslh/pagedown
https://api.github.com/repos/jameslh/pagedown
closed
Enable Superscripts and subscripts as defined in Pandoc Markdown extension
auto-migrated Priority-Medium Type-Defect
``` What steps will reproduce the problem? 1. In text editor, use ~word~ ( ^word^ ) to mark chars as sub or superscript. 2. Check the HTML preview What is the expected output? What do you see instead? If the Pandoc Extensions: superscript and subscript (see [1]) were supported, it would be easy to markup sup and superscript which is required for most scientific writing. By using the HTML tags <sup> and <sub>, this would be displayed correctly in the html preview. Please provide any additional information below. [1] http://johnmacfarlane.net/pandoc/README.html#superscripts-and-subscripts My patch must be reviewed carefully because i am a newbie in both js and reg ex. ``` Original issue reported on code.google.com by `benimnetz@gmail.com` on 27 May 2013 at 6:59 Attachments: * [sub_and_superscript.patch](https://storage.googleapis.com/google-code-attachments/pagedown/issue-59/comment-0/sub_and_superscript.patch)
1.0
Enable Superscripts and subscripts as defined in Pandoc Markdown extension - ``` What steps will reproduce the problem? 1. In text editor, use ~word~ ( ^word^ ) to mark chars as sub or superscript. 2. Check the HTML preview What is the expected output? What do you see instead? If the Pandoc Extensions: superscript and subscript (see [1]) were supported, it would be easy to markup sup and superscript which is required for most scientific writing. By using the HTML tags <sup> and <sub>, this would be displayed correctly in the html preview. Please provide any additional information below. [1] http://johnmacfarlane.net/pandoc/README.html#superscripts-and-subscripts My patch must be reviewed carefully because i am a newbie in both js and reg ex. ``` Original issue reported on code.google.com by `benimnetz@gmail.com` on 27 May 2013 at 6:59 Attachments: * [sub_and_superscript.patch](https://storage.googleapis.com/google-code-attachments/pagedown/issue-59/comment-0/sub_and_superscript.patch)
defect
enable superscripts and subscripts as defined in pandoc markdown extension what steps will reproduce the problem in text editor use word word to mark chars as sub or superscript check the html preview what is the expected output what do you see instead if the pandoc extensions superscript and subscript see were supported it would be easy to markup sup and superscript which is required for most scientific writing by using the html tags and this would be displayed correctly in the html preview please provide any additional information below my patch must be reviewed carefully because i am a newbie in both js and reg ex original issue reported on code google com by benimnetz gmail com on may at attachments
1
46,508
2,958,386,437
IssuesEvent
2015-07-08 21:07:27
evil-mad/EggBot
https://api.github.com/repos/evil-mad/EggBot
closed
Add unicode support
enhancement priority-high
Currently, reportedly, unicode characters in the text of the document or layer names can cause an error. See here for possible solutions: http://stackoverflow.com/questions/2365411/python-convert-unicode-to-ascii-without-errors
1.0
Add unicode support - Currently, reportedly, unicode characters in the text of the document or layer names can cause an error. See here for possible solutions: http://stackoverflow.com/questions/2365411/python-convert-unicode-to-ascii-without-errors
non_defect
add unicode support currently reportedly unicode characters in the text of the document or layer names can cause an error see here for possible solutions
0
9,709
2,615,166,229
IssuesEvent
2015-03-01 06:46:42
chrsmith/reaver-wps
https://api.github.com/repos/chrsmith/reaver-wps
opened
Found PIN but bad password
auto-migrated Priority-Triage Type-Defect
``` 0. What version of Reaver are you using? (Only defects against the latest version will be considered.) 1.4 1. What operating system are you using (Linux is the only supported OS)? backtrack 5 r3 2. Is your wireless card in monitor mode (yes/no)? yes 3. What is the signal strength of the Access Point you are trying to crack? great 4. What is the manufacturer and model # of the device you are trying to crack? tp-link 5. What is the entire command line string you are supplying to reaver? reaver -i mon0 -b 64:70:02:97:61:72 -p 46671448 -vv 6. Please describe what you think the issue is. I get the PIN but password is not normal. So how can I see normal/usual password? 7. Paste the output from Reaver below. Reaver v1.4 WiFi Protected Setup Attack Tool Copyright (c) 2011, Tactical Network Solutions, Craig Heffner <cheffner@tacnetsol.com> [+] Waiting for beacon from 64:70:02:97:61:72 [+] Switching mon0 to channel 6 [+] Associated with 64:70:02:97:61:72 (ESSID: TP-LINK_976172) [+] Trying pin 46671448 [+] Sending EAPOL START request [+] Received identity request [+] Sending identity response [+] Received M1 message [+] Sending M2 message [+] Received M3 message [+] Sending M4 message [+] Received M5 message [+] Sending M6 message [+] Received M7 message [+] Sending WSC NACK [+] Sending WSC NACK [+] Pin cracked in 4 seconds [+] WPS PIN: '46671448' [+] WPA PSK: 'A35EAE12682E5E8C1480857B321C8ABD4D2D3B012CCF6832D05C3EAA2A766518' [+] AP SSID: 'Network-682E5E8C1480857B321C8ABD ' ``` Original issue reported on code.google.com by `vandalis...@gmail.com` on 27 Jun 2013 at 11:53
1.0
Found PIN but bad password - ``` 0. What version of Reaver are you using? (Only defects against the latest version will be considered.) 1.4 1. What operating system are you using (Linux is the only supported OS)? backtrack 5 r3 2. Is your wireless card in monitor mode (yes/no)? yes 3. What is the signal strength of the Access Point you are trying to crack? great 4. What is the manufacturer and model # of the device you are trying to crack? tp-link 5. What is the entire command line string you are supplying to reaver? reaver -i mon0 -b 64:70:02:97:61:72 -p 46671448 -vv 6. Please describe what you think the issue is. I get the PIN but password is not normal. So how can I see normal/usual password? 7. Paste the output from Reaver below. Reaver v1.4 WiFi Protected Setup Attack Tool Copyright (c) 2011, Tactical Network Solutions, Craig Heffner <cheffner@tacnetsol.com> [+] Waiting for beacon from 64:70:02:97:61:72 [+] Switching mon0 to channel 6 [+] Associated with 64:70:02:97:61:72 (ESSID: TP-LINK_976172) [+] Trying pin 46671448 [+] Sending EAPOL START request [+] Received identity request [+] Sending identity response [+] Received M1 message [+] Sending M2 message [+] Received M3 message [+] Sending M4 message [+] Received M5 message [+] Sending M6 message [+] Received M7 message [+] Sending WSC NACK [+] Sending WSC NACK [+] Pin cracked in 4 seconds [+] WPS PIN: '46671448' [+] WPA PSK: 'A35EAE12682E5E8C1480857B321C8ABD4D2D3B012CCF6832D05C3EAA2A766518' [+] AP SSID: 'Network-682E5E8C1480857B321C8ABD ' ``` Original issue reported on code.google.com by `vandalis...@gmail.com` on 27 Jun 2013 at 11:53
defect
found pin but bad password what version of reaver are you using only defects against the latest version will be considered what operating system are you using linux is the only supported os backtrack is your wireless card in monitor mode yes no yes what is the signal strength of the access point you are trying to crack great what is the manufacturer and model of the device you are trying to crack tp link what is the entire command line string you are supplying to reaver reaver i b p vv please describe what you think the issue is i get the pin but password is not normal so how can i see normal usual password paste the output from reaver below reaver wifi protected setup attack tool copyright c tactical network solutions craig heffner waiting for beacon from switching to channel associated with essid tp link trying pin sending eapol start request received identity request sending identity response received message sending message received message sending message received message sending message received message sending wsc nack sending wsc nack pin cracked in seconds wps pin wpa psk ap ssid network original issue reported on code google com by vandalis gmail com on jun at
1
7,124
9,416,740,834
IssuesEvent
2019-04-10 15:15:14
elementor/elementor
https://api.github.com/repos/elementor/elementor
closed
Plugin Update Needed to Correct URL requests (Elementor)
compatibility
This plugin is inserting outdated URL’s into the page, for example, this one; `<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 283.5 19.6" preserveAspectRatio="none">` w3 website now uses HTTPS and the developers of Elementor need to update ALL their coding that uses outdated HTTP protocols to use HTTPS. This would also correct issues regarding HTTPS protocol websites that have HTTP URL calls in their website source coding. If the URL call goes to a website that still uses HTTP, then I suggest to find a replacement source.
True
Plugin Update Needed to Correct URL requests (Elementor) - This plugin is inserting outdated URL’s into the page, for example, this one; `<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 283.5 19.6" preserveAspectRatio="none">` w3 website now uses HTTPS and the developers of Elementor need to update ALL their coding that uses outdated HTTP protocols to use HTTPS. This would also correct issues regarding HTTPS protocol websites that have HTTP URL calls in their website source coding. If the URL call goes to a website that still uses HTTP, then I suggest to find a replacement source.
non_defect
plugin update needed to correct url requests elementor this plugin is inserting outdated url’s into the page for example this one website now uses https and the developers of elementor need to update all their coding that uses outdated http protocols to use https this would also correct issues regarding https protocol websites that have http url calls in their website source coding if the url call goes to a website that still uses http then i suggest to find a replacement source
0
196,878
22,571,814,178
IssuesEvent
2022-06-28 01:25:46
ChoeMinji/react-17.0.2
https://api.github.com/repos/ChoeMinji/react-17.0.2
opened
CVE-2021-42740 (High) detected in multiple libraries
security vulnerability
## CVE-2021-42740 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>shell-quote-1.7.2.tgz</b>, <b>shell-quote-1.7.1.tgz</b>, <b>shell-quote-1.6.1.tgz</b></p></summary> <p> <details><summary><b>shell-quote-1.7.2.tgz</b></p></summary> <p>quote and parse shell commands</p> <p>Library home page: <a href="https://registry.npmjs.org/shell-quote/-/shell-quote-1.7.2.tgz">https://registry.npmjs.org/shell-quote/-/shell-quote-1.7.2.tgz</a></p> <p> Dependency Hierarchy: - react-dev-utils-9.1.0.tgz (Root Library) - :x: **shell-quote-1.7.2.tgz** (Vulnerable Library) </details> <details><summary><b>shell-quote-1.7.1.tgz</b></p></summary> <p>quote and parse shell commands</p> <p>Library home page: <a href="https://registry.npmjs.org/shell-quote/-/shell-quote-1.7.1.tgz">https://registry.npmjs.org/shell-quote/-/shell-quote-1.7.1.tgz</a></p> <p> Dependency Hierarchy: - react-devtools-core-4.8.2.tgz (Root Library) - :x: **shell-quote-1.7.1.tgz** (Vulnerable Library) </details> <details><summary><b>shell-quote-1.6.1.tgz</b></p></summary> <p>quote and parse shell commands</p> <p>Library home page: <a href="https://registry.npmjs.org/shell-quote/-/shell-quote-1.6.1.tgz">https://registry.npmjs.org/shell-quote/-/shell-quote-1.6.1.tgz</a></p> <p> Dependency Hierarchy: - react-scripts-1.0.11.tgz (Root Library) - react-dev-utils-3.1.1.tgz - :x: **shell-quote-1.6.1.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/ChoeMinji/react-17.0.2/commit/4669645897ed4ebcd4ee037f4dabb509ed4754c7">4669645897ed4ebcd4ee037f4dabb509ed4754c7</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The shell-quote package before 1.7.3 for Node.js allows command injection. An attacker can inject unescaped shell metacharacters through a regex designed to support Windows drive letters. If the output of this package is passed to a real shell as a quoted argument to a command with exec(), an attacker can inject arbitrary commands. This is because the Windows drive letter regex character class is {A-z] instead of the correct {A-Za-z]. Several shell metacharacters exist in the space between capital letter Z and lower case letter a, such as the backtick character. <p>Publish Date: 2021-10-21 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-42740>CVE-2021-42740</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42740">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42740</a></p> <p>Release Date: 2021-10-21</p> <p>Fix Resolution: shell-quote - 1.7.3</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2021-42740 (High) detected in multiple libraries - ## CVE-2021-42740 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>shell-quote-1.7.2.tgz</b>, <b>shell-quote-1.7.1.tgz</b>, <b>shell-quote-1.6.1.tgz</b></p></summary> <p> <details><summary><b>shell-quote-1.7.2.tgz</b></p></summary> <p>quote and parse shell commands</p> <p>Library home page: <a href="https://registry.npmjs.org/shell-quote/-/shell-quote-1.7.2.tgz">https://registry.npmjs.org/shell-quote/-/shell-quote-1.7.2.tgz</a></p> <p> Dependency Hierarchy: - react-dev-utils-9.1.0.tgz (Root Library) - :x: **shell-quote-1.7.2.tgz** (Vulnerable Library) </details> <details><summary><b>shell-quote-1.7.1.tgz</b></p></summary> <p>quote and parse shell commands</p> <p>Library home page: <a href="https://registry.npmjs.org/shell-quote/-/shell-quote-1.7.1.tgz">https://registry.npmjs.org/shell-quote/-/shell-quote-1.7.1.tgz</a></p> <p> Dependency Hierarchy: - react-devtools-core-4.8.2.tgz (Root Library) - :x: **shell-quote-1.7.1.tgz** (Vulnerable Library) </details> <details><summary><b>shell-quote-1.6.1.tgz</b></p></summary> <p>quote and parse shell commands</p> <p>Library home page: <a href="https://registry.npmjs.org/shell-quote/-/shell-quote-1.6.1.tgz">https://registry.npmjs.org/shell-quote/-/shell-quote-1.6.1.tgz</a></p> <p> Dependency Hierarchy: - react-scripts-1.0.11.tgz (Root Library) - react-dev-utils-3.1.1.tgz - :x: **shell-quote-1.6.1.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/ChoeMinji/react-17.0.2/commit/4669645897ed4ebcd4ee037f4dabb509ed4754c7">4669645897ed4ebcd4ee037f4dabb509ed4754c7</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The shell-quote package before 1.7.3 for Node.js allows command injection. An attacker can inject unescaped shell metacharacters through a regex designed to support Windows drive letters. If the output of this package is passed to a real shell as a quoted argument to a command with exec(), an attacker can inject arbitrary commands. This is because the Windows drive letter regex character class is {A-z] instead of the correct {A-Za-z]. Several shell metacharacters exist in the space between capital letter Z and lower case letter a, such as the backtick character. <p>Publish Date: 2021-10-21 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-42740>CVE-2021-42740</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42740">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42740</a></p> <p>Release Date: 2021-10-21</p> <p>Fix Resolution: shell-quote - 1.7.3</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_defect
cve high detected in multiple libraries cve high severity vulnerability vulnerable libraries shell quote tgz shell quote tgz shell quote tgz shell quote tgz quote and parse shell commands library home page a href dependency hierarchy react dev utils tgz root library x shell quote tgz vulnerable library shell quote tgz quote and parse shell commands library home page a href dependency hierarchy react devtools core tgz root library x shell quote tgz vulnerable library shell quote tgz quote and parse shell commands library home page a href dependency hierarchy react scripts tgz root library react dev utils tgz x shell quote tgz vulnerable library found in head commit a href found in base branch master vulnerability details the shell quote package before for node js allows command injection an attacker can inject unescaped shell metacharacters through a regex designed to support windows drive letters if the output of this package is passed to a real shell as a quoted argument to a command with exec an attacker can inject arbitrary commands this is because the windows drive letter regex character class is a z instead of the correct a za z several shell metacharacters exist in the space between capital letter z and lower case letter a such as the backtick character publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution shell quote step up your open source security game with mend
0
12,228
2,685,518,402
IssuesEvent
2015-03-30 02:05:15
IssueMigrationTest/Test5
https://api.github.com/repos/IssueMigrationTest/Test5
closed
annotations missing last character of last line
auto-migrated Priority-Medium Type-Defect
**Issue by willvar...@gmail.com** _30 Sep 2011 at 12:53 GMT_ _Originally opened on Google Code_ ---- ``` What steps will reproduce the problem? 1. annotate anything where the last line is not empty 2. observe the last character is missing Fix: annotate.py, paste function, change this line: line = source[expr.lineno-1][:-1] to just: line = source[expr.lineno-1] (there's an rstrip on the line below, so the \n gets zapped there anyway.) (P.S. I think the general using a regex to strip the comments is also a bit fuzzy but it hasn't bitten me because I don't have any # inside strings) ```
1.0
annotations missing last character of last line - **Issue by willvar...@gmail.com** _30 Sep 2011 at 12:53 GMT_ _Originally opened on Google Code_ ---- ``` What steps will reproduce the problem? 1. annotate anything where the last line is not empty 2. observe the last character is missing Fix: annotate.py, paste function, change this line: line = source[expr.lineno-1][:-1] to just: line = source[expr.lineno-1] (there's an rstrip on the line below, so the \n gets zapped there anyway.) (P.S. I think the general using a regex to strip the comments is also a bit fuzzy but it hasn't bitten me because I don't have any # inside strings) ```
defect
annotations missing last character of last line issue by willvar gmail com sep at gmt originally opened on google code what steps will reproduce the problem annotate anything where the last line is not empty observe the last character is missing fix annotate py paste function change this line line source to just line source there s an rstrip on the line below so the n gets zapped there anyway p s i think the general using a regex to strip the comments is also a bit fuzzy but it hasn t bitten me because i don t have any inside strings
1
5,201
2,610,183,070
IssuesEvent
2015-02-26 18:58:18
chrsmith/quchuseban
https://api.github.com/repos/chrsmith/quchuseban
opened
纠结怎么样才能去掉色斑
auto-migrated Priority-Medium Type-Defect
``` 《摘要》 想着曾经的画面,有多么美好,现在的疼痛,就有多么悲殇�� �不是我多情,只是我遇见了你,你就是我的桃花劫,不是我� ��情,只是我爱上了你,你就是我的鸳鸯梦,忆起那份约定, 在天愿作比翼鸟,在地愿为连理枝。泪早就流空了,只是心�� �一阵阵的绞痛,绝望的痛彻着,犹如深夜里大海的暗涌,歇� ��底里的咆哮着,只因,如今的我,成了断翅的鸟儿,成了无 根的浮萍。如果没有了色斑,我们是否会一起走进婚姻的殿�� �!怎么样才能去掉色斑, 《客户案例》   一直认为美丽不属于我,没想到去除色斑之后,我也来�� �个大变身。我从小就长了色斑,与遗传因素无关吧应该,父� ��的皮肤都很好,我就搞不懂自己这张脸了,随着年龄的增长 ,色斑越来越多,再加上这几年工作很忙很累,经常要加班�� �色斑更是疯狂的长。作也要靠自己加倍付出。无论是在街上� ��是在公司里,我都感觉不自在,总是感觉别人在以异样的眼 光看着我。<br>   祛斑产品我都不知道自己用了多少,反正无论是广告的�� �还是朋友介绍的,只要是祛斑的我都想试试,美容院也频频� ��顾。为了祛斑,钱花了不少不说,还搞得自己的皮肤伤痕累 累,斑也没有去掉。我也考虑过激光,但是风险太大了,听�� �多人都说不能轻易做,还容易反弹,而且还会破坏皮肤的角� ��层,搞不好还会有红血丝。无奈之下我就在网上查找祛斑产 品,发现还真不少,也不知道该如何选择了。<br>   后来看到很多人说「黛芙薇尔精华液」效果不错,后来�� �查发现还是纯精华的还调节内分泌,于是就订购了一个周期� ��先试试,精华调理过程确实比较缓慢,差不多一个周期快用 完了,才发觉脸上的色斑有点淡化了,斑点也变小了,不过�� �肤倒是感觉滋润了好多呢。后来就又订购了两个周期的,用� ��第二个周期之后,脸上的斑点已经消失得差不多了。如今, 没有色斑的困扰,我也能拥有漂亮的面孔了,估计感情也很�� �就会有归属了,呵呵。 阅读了怎么样才能去掉色斑,再看脸上容易长斑的原因: 《色斑形成原因》   内部因素   一、压力   当人受到压力时,就会分泌肾上腺素,为对付压力而做�� �备。如果长期受到压力,人体新陈代谢的平衡就会遭到破坏� ��皮肤所需的营养供应趋于缓慢,色素母细胞就会变得很活跃 。   二、荷尔蒙分泌失调   避孕药里所含的女性荷尔蒙雌激素,会刺激麦拉宁细胞�� �分泌而形成不均匀的斑点,因避孕药而形成的斑点,虽然在� ��药中断后会停止,但仍会在皮肤上停留很长一段时间。怀孕 中因女性荷尔蒙雌激素的增加,从怀孕4—5个月开始会容易出 现斑,这时候出现的斑点在产后大部分会消失。可是,新陈�� �谢不正常、肌肤裸露在强烈的紫外线下、精神上受到压力等� ��因,都会使斑加深。有时新长出的斑,产后也不会消失,所 以需要更加注意。   三、新陈代谢缓慢   肝的新陈代谢功能不正常或卵巢功能减退时也会出现斑�� �因为新陈代谢不顺畅、或内分泌失调,使身体处于敏感状态� ��,从而加剧色素问题。我们常说的便秘会形成斑,其实就是 内分泌失调导致过敏体质而形成的。另外,身体状态不正常�� �时候,紫外线的照射也会加速斑的形成。   四、错误的使用化妆品   使用了不适合自己皮肤的化妆品,会导致皮肤过敏。在�� �疗的过程中如过量照射到紫外线,皮肤会为了抵御外界的侵� ��,在有炎症的部位聚集麦拉宁色素,这样会出现色素沉着的 问题。   外部因素   一、紫外线   照射紫外线的时候,人体为了保护皮肤,会在基底层产�� �很多麦拉宁色素。所以为了保护皮肤,会在敏感部位聚集更� ��的色素。经常裸露在强烈的阳光底下不仅促进皮肤的老化, 还会引起黑斑、雀斑等色素沉着的皮肤疾患。   二、不良的清洁习惯   因强烈的清洁习惯使皮肤变得敏感,这样会刺激皮肤。�� �皮肤敏感时,人体为了保护皮肤,黑色素细胞会分泌很多麦� ��宁色素,当色素过剩时就出现了斑、瑕疵等皮肤色素沉着的 问题。   三、遗传基因   父母中有长斑的,则本人长斑的概率就很高,这种情况�� �一定程度上就可判定是遗传基因的作用。所以家里特别是长� ��有长斑的人,要注意避免引发长斑的重要因素之一——紫外 线照射,这是预防斑必须注意的。 《有疑问帮你解决》   1,黛芙薇尔精华液真的有效果吗?真的可以把脸上的黄褐�� �去掉吗?   答:黛芙薇尔精华液DNA精华能够有效的修复周围难以触�� �的色斑,其独有的纳豆成分为皮肤的美白与靓丽,提供了必� ��可少的营养物质,可以有效的去除黄褐斑,黄褐斑,黄褐斑 ,蝴蝶斑,晒斑、妊娠斑等。它它完全突破了传统的美肤时�� �,宛如在皮肤中注入了一杯兼具活化、再生、滋养等功效的� ��尾酒,同时为脸部提供大量有机维生素精华,脸部的改变显 而易见。自产品上市以来,老顾客纷纷介绍新顾客,71%的新�� �客都是通过老顾客介绍而来,口碑由此而来!   2,服用黛芙薇尔美白,会伤身体吗?有副作用吗?   答:黛芙薇尔精华液应用了精纯复合配方和领先的分类�� �斑科技,并将“DNA美肤系统”疗法应用到了该产品中,能彻� ��祛除黄褐斑,蝴蝶斑,妊娠斑,晒斑,黄褐斑,老年斑,有 效淡化黄褐斑至接近肤色。黛芙薇尔通过法国、美国、台湾�� �地的专家通力协作,超过10年的研究以全新的DNA肌肤修复技�� �,挑战传统化学护肤理念,不懈追寻发现破译大自然的美丽� ��迹,令每一位爱美的女性都能享受到科技创新所带来的自然 之美。 专为亚洲女性肤质研制,精心呵护女性美丽,多年来,为数�� �百万计的女性解除了黄褐斑困扰。深得广大女性朋友的信赖!   3,去除黄褐斑之后,会反弹吗?   答:很多曾经长了黄褐斑的人士,自从选择了黛芙薇尔�� �白,就一劳永逸。这款祛斑产品是经过数十位权威祛斑专家� ��据斑的形成原因精心研制而成用事实说话,让消费者打分。 树立权威品牌!我们的很多新客户都是老客户介绍而来,请问� ��如果效果不好,会有客户转介绍吗?   4,你们的价格有点贵,能不能便宜一点?   答:如果您使用西药最少需要2000元,煎服的药最少需要3 000元,做手术最少是5000元,而这些毫无疑问,不会对彻底去� ��你的斑点有任何帮助!一分价钱,一份价值,我们现在做的�� �是一个口碑,一个品牌,价钱并不高。如果花这点钱把你的� ��褐斑彻底去除,你还会觉得贵吗?你还会再去花那么多冤枉�� �,不但斑没去掉,还把自己的皮肤弄的越来越糟吗   5,我适合用黛芙薇尔精华液吗?   答:黛芙薇尔适用人群:   1、生理紊乱引起的黄褐斑人群   2、生育引起的妊娠斑人群   3、年纪增长引起的老年斑人群   4、化妆品色素沉积、辐射斑人群   5、长期日照引起的日晒斑人群   6、肌肤暗淡急需美白的人群 《祛斑小方法》 怎么样才能去掉色斑,同时为您分享祛斑小方法 绿豆汤:绿豆可以降低体内的胆固醇含量,具有保护肝脏、�� �治过敏的作用。绿豆含有丰富的维生素B族、蛋白质、氧化镁 等多种成分,常喝绿豆汤可助于排出体内毒素,促进身体的�� �陈代谢。秋冬之际,绿豆汤也是排毒养颜佳品。 ``` ----- Original issue reported on code.google.com by `additive...@gmail.com` on 1 Jul 2014 at 3:00
1.0
纠结怎么样才能去掉色斑 - ``` 《摘要》 想着曾经的画面,有多么美好,现在的疼痛,就有多么悲殇�� �不是我多情,只是我遇见了你,你就是我的桃花劫,不是我� ��情,只是我爱上了你,你就是我的鸳鸯梦,忆起那份约定, 在天愿作比翼鸟,在地愿为连理枝。泪早就流空了,只是心�� �一阵阵的绞痛,绝望的痛彻着,犹如深夜里大海的暗涌,歇� ��底里的咆哮着,只因,如今的我,成了断翅的鸟儿,成了无 根的浮萍。如果没有了色斑,我们是否会一起走进婚姻的殿�� �!怎么样才能去掉色斑, 《客户案例》   一直认为美丽不属于我,没想到去除色斑之后,我也来�� �个大变身。我从小就长了色斑,与遗传因素无关吧应该,父� ��的皮肤都很好,我就搞不懂自己这张脸了,随着年龄的增长 ,色斑越来越多,再加上这几年工作很忙很累,经常要加班�� �色斑更是疯狂的长。作也要靠自己加倍付出。无论是在街上� ��是在公司里,我都感觉不自在,总是感觉别人在以异样的眼 光看着我。<br>   祛斑产品我都不知道自己用了多少,反正无论是广告的�� �还是朋友介绍的,只要是祛斑的我都想试试,美容院也频频� ��顾。为了祛斑,钱花了不少不说,还搞得自己的皮肤伤痕累 累,斑也没有去掉。我也考虑过激光,但是风险太大了,听�� �多人都说不能轻易做,还容易反弹,而且还会破坏皮肤的角� ��层,搞不好还会有红血丝。无奈之下我就在网上查找祛斑产 品,发现还真不少,也不知道该如何选择了。<br>   后来看到很多人说「黛芙薇尔精华液」效果不错,后来�� �查发现还是纯精华的还调节内分泌,于是就订购了一个周期� ��先试试,精华调理过程确实比较缓慢,差不多一个周期快用 完了,才发觉脸上的色斑有点淡化了,斑点也变小了,不过�� �肤倒是感觉滋润了好多呢。后来就又订购了两个周期的,用� ��第二个周期之后,脸上的斑点已经消失得差不多了。如今, 没有色斑的困扰,我也能拥有漂亮的面孔了,估计感情也很�� �就会有归属了,呵呵。 阅读了怎么样才能去掉色斑,再看脸上容易长斑的原因: 《色斑形成原因》   内部因素   一、压力   当人受到压力时,就会分泌肾上腺素,为对付压力而做�� �备。如果长期受到压力,人体新陈代谢的平衡就会遭到破坏� ��皮肤所需的营养供应趋于缓慢,色素母细胞就会变得很活跃 。   二、荷尔蒙分泌失调   避孕药里所含的女性荷尔蒙雌激素,会刺激麦拉宁细胞�� �分泌而形成不均匀的斑点,因避孕药而形成的斑点,虽然在� ��药中断后会停止,但仍会在皮肤上停留很长一段时间。怀孕 中因女性荷尔蒙雌激素的增加,从怀孕4—5个月开始会容易出 现斑,这时候出现的斑点在产后大部分会消失。可是,新陈�� �谢不正常、肌肤裸露在强烈的紫外线下、精神上受到压力等� ��因,都会使斑加深。有时新长出的斑,产后也不会消失,所 以需要更加注意。   三、新陈代谢缓慢   肝的新陈代谢功能不正常或卵巢功能减退时也会出现斑�� �因为新陈代谢不顺畅、或内分泌失调,使身体处于敏感状态� ��,从而加剧色素问题。我们常说的便秘会形成斑,其实就是 内分泌失调导致过敏体质而形成的。另外,身体状态不正常�� �时候,紫外线的照射也会加速斑的形成。   四、错误的使用化妆品   使用了不适合自己皮肤的化妆品,会导致皮肤过敏。在�� �疗的过程中如过量照射到紫外线,皮肤会为了抵御外界的侵� ��,在有炎症的部位聚集麦拉宁色素,这样会出现色素沉着的 问题。   外部因素   一、紫外线   照射紫外线的时候,人体为了保护皮肤,会在基底层产�� �很多麦拉宁色素。所以为了保护皮肤,会在敏感部位聚集更� ��的色素。经常裸露在强烈的阳光底下不仅促进皮肤的老化, 还会引起黑斑、雀斑等色素沉着的皮肤疾患。   二、不良的清洁习惯   因强烈的清洁习惯使皮肤变得敏感,这样会刺激皮肤。�� �皮肤敏感时,人体为了保护皮肤,黑色素细胞会分泌很多麦� ��宁色素,当色素过剩时就出现了斑、瑕疵等皮肤色素沉着的 问题。   三、遗传基因   父母中有长斑的,则本人长斑的概率就很高,这种情况�� �一定程度上就可判定是遗传基因的作用。所以家里特别是长� ��有长斑的人,要注意避免引发长斑的重要因素之一——紫外 线照射,这是预防斑必须注意的。 《有疑问帮你解决》   1,黛芙薇尔精华液真的有效果吗?真的可以把脸上的黄褐�� �去掉吗?   答:黛芙薇尔精华液DNA精华能够有效的修复周围难以触�� �的色斑,其独有的纳豆成分为皮肤的美白与靓丽,提供了必� ��可少的营养物质,可以有效的去除黄褐斑,黄褐斑,黄褐斑 ,蝴蝶斑,晒斑、妊娠斑等。它它完全突破了传统的美肤时�� �,宛如在皮肤中注入了一杯兼具活化、再生、滋养等功效的� ��尾酒,同时为脸部提供大量有机维生素精华,脸部的改变显 而易见。自产品上市以来,老顾客纷纷介绍新顾客,71%的新�� �客都是通过老顾客介绍而来,口碑由此而来!   2,服用黛芙薇尔美白,会伤身体吗?有副作用吗?   答:黛芙薇尔精华液应用了精纯复合配方和领先的分类�� �斑科技,并将“DNA美肤系统”疗法应用到了该产品中,能彻� ��祛除黄褐斑,蝴蝶斑,妊娠斑,晒斑,黄褐斑,老年斑,有 效淡化黄褐斑至接近肤色。黛芙薇尔通过法国、美国、台湾�� �地的专家通力协作,超过10年的研究以全新的DNA肌肤修复技�� �,挑战传统化学护肤理念,不懈追寻发现破译大自然的美丽� ��迹,令每一位爱美的女性都能享受到科技创新所带来的自然 之美。 专为亚洲女性肤质研制,精心呵护女性美丽,多年来,为数�� �百万计的女性解除了黄褐斑困扰。深得广大女性朋友的信赖!   3,去除黄褐斑之后,会反弹吗?   答:很多曾经长了黄褐斑的人士,自从选择了黛芙薇尔�� �白,就一劳永逸。这款祛斑产品是经过数十位权威祛斑专家� ��据斑的形成原因精心研制而成用事实说话,让消费者打分。 树立权威品牌!我们的很多新客户都是老客户介绍而来,请问� ��如果效果不好,会有客户转介绍吗?   4,你们的价格有点贵,能不能便宜一点?   答:如果您使用西药最少需要2000元,煎服的药最少需要3 000元,做手术最少是5000元,而这些毫无疑问,不会对彻底去� ��你的斑点有任何帮助!一分价钱,一份价值,我们现在做的�� �是一个口碑,一个品牌,价钱并不高。如果花这点钱把你的� ��褐斑彻底去除,你还会觉得贵吗?你还会再去花那么多冤枉�� �,不但斑没去掉,还把自己的皮肤弄的越来越糟吗   5,我适合用黛芙薇尔精华液吗?   答:黛芙薇尔适用人群:   1、生理紊乱引起的黄褐斑人群   2、生育引起的妊娠斑人群   3、年纪增长引起的老年斑人群   4、化妆品色素沉积、辐射斑人群   5、长期日照引起的日晒斑人群   6、肌肤暗淡急需美白的人群 《祛斑小方法》 怎么样才能去掉色斑,同时为您分享祛斑小方法 绿豆汤:绿豆可以降低体内的胆固醇含量,具有保护肝脏、�� �治过敏的作用。绿豆含有丰富的维生素B族、蛋白质、氧化镁 等多种成分,常喝绿豆汤可助于排出体内毒素,促进身体的�� �陈代谢。秋冬之际,绿豆汤也是排毒养颜佳品。 ``` ----- Original issue reported on code.google.com by `additive...@gmail.com` on 1 Jul 2014 at 3:00
defect
纠结怎么样才能去掉色斑 《摘要》 想着曾经的画面,有多么美好,现在的疼痛,就有多么悲殇�� �不是我多情,只是我遇见了你,你就是我的桃花劫,不是我� ��情,只是我爱上了你,你就是我的鸳鸯梦,忆起那份约定, 在天愿作比翼鸟,在地愿为连理枝。泪早就流空了,只是心�� �一阵阵的绞痛,绝望的痛彻着,犹如深夜里大海的暗涌,歇� ��底里的咆哮着,只因,如今的我,成了断翅的鸟儿,成了无 根的浮萍。如果没有了色斑,我们是否会一起走进婚姻的殿�� �!怎么样才能去掉色斑, 《客户案例》   一直认为美丽不属于我,没想到去除色斑之后,我也来�� �个大变身。我从小就长了色斑,与遗传因素无关吧应该,父� ��的皮肤都很好,我就搞不懂自己这张脸了,随着年龄的增长 ,色斑越来越多,再加上这几年工作很忙很累,经常要加班�� �色斑更是疯狂的长。作也要靠自己加倍付出。无论是在街上� ��是在公司里,我都感觉不自在,总是感觉别人在以异样的眼 光看着我。   祛斑产品我都不知道自己用了多少,反正无论是广告的�� �还是朋友介绍的,只要是祛斑的我都想试试,美容院也频频� ��顾。为了祛斑,钱花了不少不说,还搞得自己的皮肤伤痕累 累,斑也没有去掉。我也考虑过激光,但是风险太大了,听�� �多人都说不能轻易做,还容易反弹,而且还会破坏皮肤的角� ��层,搞不好还会有红血丝。无奈之下我就在网上查找祛斑产 品,发现还真不少,也不知道该如何选择了。   后来看到很多人说「黛芙薇尔精华液」效果不错,后来�� �查发现还是纯精华的还调节内分泌,于是就订购了一个周期� ��先试试,精华调理过程确实比较缓慢,差不多一个周期快用 完了,才发觉脸上的色斑有点淡化了,斑点也变小了,不过�� �肤倒是感觉滋润了好多呢。后来就又订购了两个周期的,用� ��第二个周期之后,脸上的斑点已经消失得差不多了。如今, 没有色斑的困扰,我也能拥有漂亮的面孔了,估计感情也很�� �就会有归属了,呵呵。 阅读了怎么样才能去掉色斑,再看脸上容易长斑的原因: 《色斑形成原因》   内部因素   一、压力   当人受到压力时,就会分泌肾上腺素,为对付压力而做�� �备。如果长期受到压力,人体新陈代谢的平衡就会遭到破坏� ��皮肤所需的营养供应趋于缓慢,色素母细胞就会变得很活跃 。   二、荷尔蒙分泌失调   避孕药里所含的女性荷尔蒙雌激素,会刺激麦拉宁细胞�� �分泌而形成不均匀的斑点,因避孕药而形成的斑点,虽然在� ��药中断后会停止,但仍会在皮肤上停留很长一段时间。怀孕 中因女性荷尔蒙雌激素的增加, — 现斑,这时候出现的斑点在产后大部分会消失。可是,新陈�� �谢不正常、肌肤裸露在强烈的紫外线下、精神上受到压力等� ��因,都会使斑加深。有时新长出的斑,产后也不会消失,所 以需要更加注意。   三、新陈代谢缓慢   肝的新陈代谢功能不正常或卵巢功能减退时也会出现斑�� �因为新陈代谢不顺畅、或内分泌失调,使身体处于敏感状态� ��,从而加剧色素问题。我们常说的便秘会形成斑,其实就是 内分泌失调导致过敏体质而形成的。另外,身体状态不正常�� �时候,紫外线的照射也会加速斑的形成。   四、错误的使用化妆品   使用了不适合自己皮肤的化妆品,会导致皮肤过敏。在�� �疗的过程中如过量照射到紫外线,皮肤会为了抵御外界的侵� ��,在有炎症的部位聚集麦拉宁色素,这样会出现色素沉着的 问题。   外部因素   一、紫外线   照射紫外线的时候,人体为了保护皮肤,会在基底层产�� �很多麦拉宁色素。所以为了保护皮肤,会在敏感部位聚集更� ��的色素。经常裸露在强烈的阳光底下不仅促进皮肤的老化, 还会引起黑斑、雀斑等色素沉着的皮肤疾患。   二、不良的清洁习惯   因强烈的清洁习惯使皮肤变得敏感,这样会刺激皮肤。�� �皮肤敏感时,人体为了保护皮肤,黑色素细胞会分泌很多麦� ��宁色素,当色素过剩时就出现了斑、瑕疵等皮肤色素沉着的 问题。   三、遗传基因   父母中有长斑的,则本人长斑的概率就很高,这种情况�� �一定程度上就可判定是遗传基因的作用。所以家里特别是长� ��有长斑的人,要注意避免引发长斑的重要因素之一——紫外 线照射,这是预防斑必须注意的。 《有疑问帮你解决》    黛芙薇尔精华液真的有效果吗 真的可以把脸上的黄褐�� �去掉吗   答:黛芙薇尔精华液dna精华能够有效的修复周围难以触�� �的色斑,其独有的纳豆成分为皮肤的美白与靓丽,提供了必� ��可少的营养物质,可以有效的去除黄褐斑,黄褐斑,黄褐斑 ,蝴蝶斑,晒斑、妊娠斑等。它它完全突破了传统的美肤时�� �,宛如在皮肤中注入了一杯兼具活化、再生、滋养等功效的� ��尾酒,同时为脸部提供大量有机维生素精华,脸部的改变显 而易见。自产品上市以来,老顾客纷纷介绍新顾客, 的新�� �客都是通过老顾客介绍而来,口碑由此而来    ,服用黛芙薇尔美白,会伤身体吗 有副作用吗   答:黛芙薇尔精华液应用了精纯复合配方和领先的分类�� �斑科技,并将“dna美肤系统”疗法应用到了该产品中,能彻� ��祛除黄褐斑,蝴蝶斑,妊娠斑,晒斑,黄褐斑,老年斑,有 效淡化黄褐斑至接近肤色。黛芙薇尔通过法国、美国、台湾�� �地的专家通力协作, �� �,挑战传统化学护肤理念,不懈追寻发现破译大自然的美丽� ��迹,令每一位爱美的女性都能享受到科技创新所带来的自然 之美。 专为亚洲女性肤质研制,精心呵护女性美丽,多年来,为数�� �百万计的女性解除了黄褐斑困扰。深得广大女性朋友的信赖    ,去除黄褐斑之后,会反弹吗   答:很多曾经长了黄褐斑的人士,自从选择了黛芙薇尔�� �白,就一劳永逸。这款祛斑产品是经过数十位权威祛斑专家� ��据斑的形成原因精心研制而成用事实说话,让消费者打分。 树立权威品牌 我们的很多新客户都是老客户介绍而来,请问� ��如果效果不好,会有客户转介绍吗    ,你们的价格有点贵,能不能便宜一点   答: , , ,而这些毫无疑问,不会对彻底去� ��你的斑点有任何帮助 一分价钱,一份价值,我们现在做的�� �是一个口碑,一个品牌,价钱并不高。如果花这点钱把你的� ��褐斑彻底去除,你还会觉得贵吗 你还会再去花那么多冤枉�� �,不但斑没去掉,还把自己的皮肤弄的越来越糟吗    ,我适合用黛芙薇尔精华液吗   答:黛芙薇尔适用人群:    、生理紊乱引起的黄褐斑人群    、生育引起的妊娠斑人群    、年纪增长引起的老年斑人群    、化妆品色素沉积、辐射斑人群    、长期日照引起的日晒斑人群    、肌肤暗淡急需美白的人群 《祛斑小方法》 怎么样才能去掉色斑,同时为您分享祛斑小方法 绿豆汤:绿豆可以降低体内的胆固醇含量,具有保护肝脏、�� �治过敏的作用。绿豆含有丰富的维生素b族、蛋白质、氧化镁 等多种成分,常喝绿豆汤可助于排出体内毒素,促进身体的�� �陈代谢。秋冬之际,绿豆汤也是排毒养颜佳品。 original issue reported on code google com by additive gmail com on jul at
1
37,041
15,159,226,749
IssuesEvent
2021-02-12 03:34:36
ruma/ruma
https://api.github.com/repos/ruma/ruma
closed
identity-service: Add autodiscovery endpoint
crate/ruma-identity-service-api help wanted
Endpoint: `GET /_matrix/identity/v2` Docs: https://matrix.org/docs/spec/identity_service/r0.3.0#get-matrix-identity-v2 [Suggested] Module name: `status::v2`?
1.0
identity-service: Add autodiscovery endpoint - Endpoint: `GET /_matrix/identity/v2` Docs: https://matrix.org/docs/spec/identity_service/r0.3.0#get-matrix-identity-v2 [Suggested] Module name: `status::v2`?
non_defect
identity service add autodiscovery endpoint endpoint get matrix identity docs module name status
0
95,104
16,068,474,066
IssuesEvent
2021-04-24 00:45:02
snowflakedb/snowflake-hive-metastore-connector
https://api.github.com/repos/snowflakedb/snowflake-hive-metastore-connector
opened
CVE-2019-10202 (High) detected in jackson-databind-2.6.5.jar, jackson-mapper-asl-1.9.13.jar
security vulnerability
## CVE-2019-10202 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>jackson-databind-2.6.5.jar</b>, <b>jackson-mapper-asl-1.9.13.jar</b></p></summary> <p> <details><summary><b>jackson-databind-2.6.5.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: snowflake-hive-metastore-connector/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.6.5/jackson-databind-2.6.5.jar</p> <p> Dependency Hierarchy: - hive-metastore-2.3.5.jar (Root Library) - hive-serde-2.3.5.jar - hive-common-2.3.5.jar - :x: **jackson-databind-2.6.5.jar** (Vulnerable Library) </details> <details><summary><b>jackson-mapper-asl-1.9.13.jar</b></p></summary> <p>Data Mapper package is a high-performance data binding package built on Jackson JSON processor</p> <p>Path to dependency file: snowflake-hive-metastore-connector/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/codehaus/jackson/jackson-mapper-asl/1.9.13/jackson-mapper-asl-1.9.13.jar</p> <p> Dependency Hierarchy: - hadoop-common-2.7.7.jar (Root Library) - :x: **jackson-mapper-asl-1.9.13.jar** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/snowflakedb/snowflake-hive-metastore-connector/commit/37f5b0ac91898ef82cc1bf4610b729970f6eed58">37f5b0ac91898ef82cc1bf4610b729970f6eed58</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A series of deserialization vulnerabilities have been discovered in Codehaus 1.9.x implemented in EAP 7. This CVE fixes CVE-2017-17485, CVE-2017-7525, CVE-2017-15095, CVE-2018-5968, CVE-2018-7489, CVE-2018-1000873, CVE-2019-12086 reported for FasterXML jackson-databind by implementing a whitelist approach that will mitigate these vulnerabilities and future ones alike. <p>Publish Date: 2019-10-01 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-10202>CVE-2019-10202</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://access.redhat.com/errata/RHSA-2019:2938">https://access.redhat.com/errata/RHSA-2019:2938</a></p> <p>Release Date: 2019-10-01</p> <p>Fix Resolution: JBoss Enterprise Application Platform - 7.2.4;com.fasterxml.jackson.core:jackson-databind:2.9.9</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.6.5","packageFilePaths":["/pom.xml"],"isTransitiveDependency":true,"dependencyTree":"org.apache.hive:hive-metastore:2.3.5;org.apache.hive:hive-serde:2.3.5;org.apache.hive:hive-common:2.3.5;com.fasterxml.jackson.core:jackson-databind:2.6.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"JBoss Enterprise Application Platform - 7.2.4;com.fasterxml.jackson.core:jackson-databind:2.9.9"},{"packageType":"Java","groupId":"org.codehaus.jackson","packageName":"jackson-mapper-asl","packageVersion":"1.9.13","packageFilePaths":["/pom.xml"],"isTransitiveDependency":true,"dependencyTree":"org.apache.hadoop:hadoop-common:2.7.7;org.codehaus.jackson:jackson-mapper-asl:1.9.13","isMinimumFixVersionAvailable":true,"minimumFixVersion":"JBoss Enterprise Application Platform - 7.2.4;com.fasterxml.jackson.core:jackson-databind:2.9.9"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2019-10202","vulnerabilityDetails":"A series of deserialization vulnerabilities have been discovered in Codehaus 1.9.x implemented in EAP 7. This CVE fixes CVE-2017-17485, CVE-2017-7525, CVE-2017-15095, CVE-2018-5968, CVE-2018-7489, CVE-2018-1000873, CVE-2019-12086 reported for FasterXML jackson-databind by implementing a whitelist approach that will mitigate these vulnerabilities and future ones alike.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-10202","cvss3Severity":"high","cvss3Score":"9.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> -->
True
CVE-2019-10202 (High) detected in jackson-databind-2.6.5.jar, jackson-mapper-asl-1.9.13.jar - ## CVE-2019-10202 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>jackson-databind-2.6.5.jar</b>, <b>jackson-mapper-asl-1.9.13.jar</b></p></summary> <p> <details><summary><b>jackson-databind-2.6.5.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: snowflake-hive-metastore-connector/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.6.5/jackson-databind-2.6.5.jar</p> <p> Dependency Hierarchy: - hive-metastore-2.3.5.jar (Root Library) - hive-serde-2.3.5.jar - hive-common-2.3.5.jar - :x: **jackson-databind-2.6.5.jar** (Vulnerable Library) </details> <details><summary><b>jackson-mapper-asl-1.9.13.jar</b></p></summary> <p>Data Mapper package is a high-performance data binding package built on Jackson JSON processor</p> <p>Path to dependency file: snowflake-hive-metastore-connector/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/codehaus/jackson/jackson-mapper-asl/1.9.13/jackson-mapper-asl-1.9.13.jar</p> <p> Dependency Hierarchy: - hadoop-common-2.7.7.jar (Root Library) - :x: **jackson-mapper-asl-1.9.13.jar** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/snowflakedb/snowflake-hive-metastore-connector/commit/37f5b0ac91898ef82cc1bf4610b729970f6eed58">37f5b0ac91898ef82cc1bf4610b729970f6eed58</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A series of deserialization vulnerabilities have been discovered in Codehaus 1.9.x implemented in EAP 7. This CVE fixes CVE-2017-17485, CVE-2017-7525, CVE-2017-15095, CVE-2018-5968, CVE-2018-7489, CVE-2018-1000873, CVE-2019-12086 reported for FasterXML jackson-databind by implementing a whitelist approach that will mitigate these vulnerabilities and future ones alike. <p>Publish Date: 2019-10-01 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-10202>CVE-2019-10202</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://access.redhat.com/errata/RHSA-2019:2938">https://access.redhat.com/errata/RHSA-2019:2938</a></p> <p>Release Date: 2019-10-01</p> <p>Fix Resolution: JBoss Enterprise Application Platform - 7.2.4;com.fasterxml.jackson.core:jackson-databind:2.9.9</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.6.5","packageFilePaths":["/pom.xml"],"isTransitiveDependency":true,"dependencyTree":"org.apache.hive:hive-metastore:2.3.5;org.apache.hive:hive-serde:2.3.5;org.apache.hive:hive-common:2.3.5;com.fasterxml.jackson.core:jackson-databind:2.6.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"JBoss Enterprise Application Platform - 7.2.4;com.fasterxml.jackson.core:jackson-databind:2.9.9"},{"packageType":"Java","groupId":"org.codehaus.jackson","packageName":"jackson-mapper-asl","packageVersion":"1.9.13","packageFilePaths":["/pom.xml"],"isTransitiveDependency":true,"dependencyTree":"org.apache.hadoop:hadoop-common:2.7.7;org.codehaus.jackson:jackson-mapper-asl:1.9.13","isMinimumFixVersionAvailable":true,"minimumFixVersion":"JBoss Enterprise Application Platform - 7.2.4;com.fasterxml.jackson.core:jackson-databind:2.9.9"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2019-10202","vulnerabilityDetails":"A series of deserialization vulnerabilities have been discovered in Codehaus 1.9.x implemented in EAP 7. This CVE fixes CVE-2017-17485, CVE-2017-7525, CVE-2017-15095, CVE-2018-5968, CVE-2018-7489, CVE-2018-1000873, CVE-2019-12086 reported for FasterXML jackson-databind by implementing a whitelist approach that will mitigate these vulnerabilities and future ones alike.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-10202","cvss3Severity":"high","cvss3Score":"9.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> -->
non_defect
cve high detected in jackson databind jar jackson mapper asl jar cve high severity vulnerability vulnerable libraries jackson databind jar jackson mapper asl jar jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file snowflake hive metastore connector pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy hive metastore jar root library hive serde jar hive common jar x jackson databind jar vulnerable library jackson mapper asl jar data mapper package is a high performance data binding package built on jackson json processor path to dependency file snowflake hive metastore connector pom xml path to vulnerable library home wss scanner repository org codehaus jackson jackson mapper asl jackson mapper asl jar dependency hierarchy hadoop common jar root library x jackson mapper asl jar vulnerable library found in head commit a href found in base branch master vulnerability details a series of deserialization vulnerabilities have been discovered in codehaus x implemented in eap this cve fixes cve cve cve cve cve cve cve reported for fasterxml jackson databind by implementing a whitelist approach that will mitigate these vulnerabilities and future ones alike publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution jboss enterprise application platform com fasterxml jackson core jackson databind isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree org apache hive hive metastore org apache hive hive serde org apache hive hive common com fasterxml jackson core jackson databind isminimumfixversionavailable true minimumfixversion jboss enterprise application platform com fasterxml jackson core jackson databind packagetype java groupid org codehaus jackson packagename jackson mapper asl packageversion packagefilepaths istransitivedependency true dependencytree org apache hadoop hadoop common org codehaus jackson jackson mapper asl isminimumfixversionavailable true minimumfixversion jboss enterprise application platform com fasterxml jackson core jackson databind basebranches vulnerabilityidentifier cve vulnerabilitydetails a series of deserialization vulnerabilities have been discovered in codehaus x implemented in eap this cve fixes cve cve cve cve cve cve cve reported for fasterxml jackson databind by implementing a whitelist approach that will mitigate these vulnerabilities and future ones alike vulnerabilityurl
0
297,989
25,779,017,297
IssuesEvent
2022-12-09 14:24:59
department-of-veterans-affairs/va.gov-team
https://api.github.com/repos/department-of-veterans-affairs/va.gov-team
closed
🥐🥐 Flaky E2E Test Detected! secure-messaging-messages-faq.cypress.spec.js
MHV-Secure-Messaging e2e-flaky-test
Your test spec `src/applications/mhv/secure-messaging/tests/e2e/secure-messaging-messages-faq.cypress.spec.js` has been disallowed from running on vets-website due to flakiness since 10/28/2022. Please make corrections to the test spec and run it through CI to have it re-enabled.
1.0
🥐🥐 Flaky E2E Test Detected! secure-messaging-messages-faq.cypress.spec.js - Your test spec `src/applications/mhv/secure-messaging/tests/e2e/secure-messaging-messages-faq.cypress.spec.js` has been disallowed from running on vets-website due to flakiness since 10/28/2022. Please make corrections to the test spec and run it through CI to have it re-enabled.
non_defect
🥐🥐 flaky test detected secure messaging messages faq cypress spec js your test spec src applications mhv secure messaging tests secure messaging messages faq cypress spec js has been disallowed from running on vets website due to flakiness since please make corrections to the test spec and run it through ci to have it re enabled
0
94,992
19,636,225,354
IssuesEvent
2022-01-08 10:28:31
harshagrawal523/Portfolyser
https://api.github.com/repos/harshagrawal523/Portfolyser
closed
Authenticate user while registering.
enhancement CodePeak Easy
Right now, when a new account is made using email login, the user is redirected to the login page. We should authenticate the user even if they are registering a new account.
1.0
Authenticate user while registering. - Right now, when a new account is made using email login, the user is redirected to the login page. We should authenticate the user even if they are registering a new account.
non_defect
authenticate user while registering right now when a new account is made using email login the user is redirected to the login page we should authenticate the user even if they are registering a new account
0
43,122
11,490,232,892
IssuesEvent
2020-02-11 16:44:53
mozilla/blurts-server
https://api.github.com/repos/mozilla/blurts-server
closed
Broken image displayed for the account avatar if the user deletes the Account picture
defect feature-fxa
[Affected versions]: - Firefox 65.0.1 [Affected Platforms]: - Windows 10 x64 - macOS 10.13 - Ubuntu 18.04 x64 [Steps to reproduce]: 1. Navigate to http://stage.firefoxmonitor.nonprod.cloudops.mozgcp.net and Sign in with a valid account. 2. Go to https://stable.dev.lcip.org/settings and change the default "Account picture" to any other one. 3. Click on the "Change" button from https://stable.dev.lcip.org/settings and clear the image set at the above step. 3. Refresh the http://stage.firefoxmonitor.nonprod.cloudops.mozgcp.net website. [Expected result]: - The "Account picture" is reverted to the default image. [Actual result]: - The "Account picture" is reverted to broken image. [Regression]: - N/A [Additional notes]: - Note that after the user signs out from the website then signs in again, the default image is properly displayed. - please observe the screenshot with the issue below: ![image](https://user-images.githubusercontent.com/43886441/53078722-812b9c80-34fd-11e9-936f-942222988c55.png)
1.0
Broken image displayed for the account avatar if the user deletes the Account picture - [Affected versions]: - Firefox 65.0.1 [Affected Platforms]: - Windows 10 x64 - macOS 10.13 - Ubuntu 18.04 x64 [Steps to reproduce]: 1. Navigate to http://stage.firefoxmonitor.nonprod.cloudops.mozgcp.net and Sign in with a valid account. 2. Go to https://stable.dev.lcip.org/settings and change the default "Account picture" to any other one. 3. Click on the "Change" button from https://stable.dev.lcip.org/settings and clear the image set at the above step. 3. Refresh the http://stage.firefoxmonitor.nonprod.cloudops.mozgcp.net website. [Expected result]: - The "Account picture" is reverted to the default image. [Actual result]: - The "Account picture" is reverted to broken image. [Regression]: - N/A [Additional notes]: - Note that after the user signs out from the website then signs in again, the default image is properly displayed. - please observe the screenshot with the issue below: ![image](https://user-images.githubusercontent.com/43886441/53078722-812b9c80-34fd-11e9-936f-942222988c55.png)
defect
broken image displayed for the account avatar if the user deletes the account picture firefox windows macos ubuntu navigate to and sign in with a valid account go to and change the default account picture to any other one click on the change button from and clear the image set at the above step refresh the website the account picture is reverted to the default image the account picture is reverted to broken image n a note that after the user signs out from the website then signs in again the default image is properly displayed please observe the screenshot with the issue below
1
20,334
3,343,341,313
IssuesEvent
2015-11-15 12:19:12
bridgedotnet/Bridge
https://api.github.com/repos/bridgedotnet/Bridge
closed
Missed Array's .CopyTo(). There are two overloads
defect
http://forums.bridge.net/forum/general/feature-requests/727 `public void CopyTo(Array array, int index)` `public void CopyTo(Array array, long index)` A related Bridge v2 [issue](https://github.com/bridgedotnet/Bridge2/issues/38).
1.0
Missed Array's .CopyTo(). There are two overloads - http://forums.bridge.net/forum/general/feature-requests/727 `public void CopyTo(Array array, int index)` `public void CopyTo(Array array, long index)` A related Bridge v2 [issue](https://github.com/bridgedotnet/Bridge2/issues/38).
defect
missed array s copyto there are two overloads public void copyto array array int index public void copyto array array long index a related bridge
1
7,348
2,894,227,280
IssuesEvent
2015-06-15 22:11:47
mouseas/steamSummerMinigame
https://api.github.com/repos/mouseas/steamSummerMinigame
closed
Syntax error, script broken
needs testing
From Chrome console: ``` Syntax error @ 'Monster Minigame AutoScript'! ########################## JSHINT output: script: (W033) Missing semicolon on line: 84 at character: 2 script: (W033) Missing semicolon on line: 103 at character: 10 script: (W033) Missing semicolon on line: 177 at character: 6 script: (W004) 'i' is already defined on line: 255 at character: 20 script: (W041) Use '===' to compare with '0' on line: 264 at character: 37 script: (W033) Missing semicolon on line: 366 at character: 6 script: (W041) Use '!==' to compare with 'undefined' on line: 381 at character: 39 script: (W041) Use '!==' to compare with 'undefined' on line: 383 at character: 71 script: (W038) 'upgradeCost' used out of scope on line: 439 at character: 9 script: (W038) 'upgradeCost' used out of scope on line: 443 at character: 76 script: (W038) 'upgradeCost' used out of scope on line: 456 at character: 9 script: (W038) 'upgradeCost' used out of scope on line: 463 at character: 21 script: (W038) 'upgradeCost' used out of scope on line: 475 at character: 5 script: (W038) 'upgradeCost' used out of scope on line: 477 at character: 17 script: (W032) Unnecessary semicolon on line: 502 at character: 2 script: (W041) Use '===' to compare with '0' on line: 538 at character: 39 script: (W041) Use '===' to compare with '0' on line: 575 at character: 39 script: (W116) Expected '(end)' and instead saw '}' on line: 595 at character: 1 ########################## SyntaxError: Missing catch or finally after try at Function (native) at d (eval at <anonymous> (unknown source), <anonymous>:27:37) at eval (eval at <anonymous> (eval at <anonymous> (unknown source)), <anonymous>:1:23) at eval (native) at m (eval at <anonymous> (unknown source), <anonymous>:53:418) at Z (eval at <anonymous> (unknown source), <anonymous>:27:80) at aa (eval at <anonymous> (unknown source), <anonymous>:63:497) at b (eval at <anonymous> (unknown source), <anonymous>:64:398) at v.push.fn (eval at <anonymous> (unknown source), <anonymous>:32:209)(anonymous function) @ (program):28 ``` The script is not changing lanes, so I do not think it is working. Using version ffc61ef48fe6aa89537f3da77c09ffc8950615a9.
1.0
Syntax error, script broken - From Chrome console: ``` Syntax error @ 'Monster Minigame AutoScript'! ########################## JSHINT output: script: (W033) Missing semicolon on line: 84 at character: 2 script: (W033) Missing semicolon on line: 103 at character: 10 script: (W033) Missing semicolon on line: 177 at character: 6 script: (W004) 'i' is already defined on line: 255 at character: 20 script: (W041) Use '===' to compare with '0' on line: 264 at character: 37 script: (W033) Missing semicolon on line: 366 at character: 6 script: (W041) Use '!==' to compare with 'undefined' on line: 381 at character: 39 script: (W041) Use '!==' to compare with 'undefined' on line: 383 at character: 71 script: (W038) 'upgradeCost' used out of scope on line: 439 at character: 9 script: (W038) 'upgradeCost' used out of scope on line: 443 at character: 76 script: (W038) 'upgradeCost' used out of scope on line: 456 at character: 9 script: (W038) 'upgradeCost' used out of scope on line: 463 at character: 21 script: (W038) 'upgradeCost' used out of scope on line: 475 at character: 5 script: (W038) 'upgradeCost' used out of scope on line: 477 at character: 17 script: (W032) Unnecessary semicolon on line: 502 at character: 2 script: (W041) Use '===' to compare with '0' on line: 538 at character: 39 script: (W041) Use '===' to compare with '0' on line: 575 at character: 39 script: (W116) Expected '(end)' and instead saw '}' on line: 595 at character: 1 ########################## SyntaxError: Missing catch or finally after try at Function (native) at d (eval at <anonymous> (unknown source), <anonymous>:27:37) at eval (eval at <anonymous> (eval at <anonymous> (unknown source)), <anonymous>:1:23) at eval (native) at m (eval at <anonymous> (unknown source), <anonymous>:53:418) at Z (eval at <anonymous> (unknown source), <anonymous>:27:80) at aa (eval at <anonymous> (unknown source), <anonymous>:63:497) at b (eval at <anonymous> (unknown source), <anonymous>:64:398) at v.push.fn (eval at <anonymous> (unknown source), <anonymous>:32:209)(anonymous function) @ (program):28 ``` The script is not changing lanes, so I do not think it is working. Using version ffc61ef48fe6aa89537f3da77c09ffc8950615a9.
non_defect
syntax error script broken from chrome console syntax error monster minigame autoscript jshint output script missing semicolon on line at character script missing semicolon on line at character script missing semicolon on line at character script i is already defined on line at character script use to compare with on line at character script missing semicolon on line at character script use to compare with undefined on line at character script use to compare with undefined on line at character script upgradecost used out of scope on line at character script upgradecost used out of scope on line at character script upgradecost used out of scope on line at character script upgradecost used out of scope on line at character script upgradecost used out of scope on line at character script upgradecost used out of scope on line at character script unnecessary semicolon on line at character script use to compare with on line at character script use to compare with on line at character script expected end and instead saw on line at character syntaxerror missing catch or finally after try at function native at d eval at unknown source at eval eval at eval at unknown source at eval native at m eval at unknown source at z eval at unknown source at aa eval at unknown source at b eval at unknown source at v push fn eval at unknown source anonymous function program the script is not changing lanes so i do not think it is working using version
0
86,899
15,755,896,289
IssuesEvent
2021-03-31 02:34:29
turkdevops/node
https://api.github.com/repos/turkdevops/node
opened
CVE-2015-1790 (Medium) detected in opensslOpenSSL_1_0_1i
security vulnerability
## CVE-2015-1790 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>opensslOpenSSL_1_0_1i</b></p></summary> <p> <p>TLS/SSL and crypto library</p> <p>Library home page: <a href=https://github.com/openssl/openssl.git>https://github.com/openssl/openssl.git</a></p> <p>Found in base branch: <b>archived-io.js-v0.10</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>node/deps/openssl/openssl/crypto/pkcs7/pk7_doit.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The PKCS7_dataDecodefunction in crypto/pkcs7/pk7_doit.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a PKCS#7 blob that uses ASN.1 encoding and lacks inner EncryptedContent data. <p>Publish Date: 2015-06-12 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2015-1790>CVE-2015-1790</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>5.0</b>)</summary> <p> Base Score Metrics not available</p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2015-1790">https://nvd.nist.gov/vuln/detail/CVE-2015-1790</a></p> <p>Release Date: 2015-06-12</p> <p>Fix Resolution: 0.9.8zg,1.0.0s,1.0.1n,1.0.2b</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2015-1790 (Medium) detected in opensslOpenSSL_1_0_1i - ## CVE-2015-1790 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>opensslOpenSSL_1_0_1i</b></p></summary> <p> <p>TLS/SSL and crypto library</p> <p>Library home page: <a href=https://github.com/openssl/openssl.git>https://github.com/openssl/openssl.git</a></p> <p>Found in base branch: <b>archived-io.js-v0.10</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>node/deps/openssl/openssl/crypto/pkcs7/pk7_doit.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The PKCS7_dataDecodefunction in crypto/pkcs7/pk7_doit.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a PKCS#7 blob that uses ASN.1 encoding and lacks inner EncryptedContent data. <p>Publish Date: 2015-06-12 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2015-1790>CVE-2015-1790</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>5.0</b>)</summary> <p> Base Score Metrics not available</p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2015-1790">https://nvd.nist.gov/vuln/detail/CVE-2015-1790</a></p> <p>Release Date: 2015-06-12</p> <p>Fix Resolution: 0.9.8zg,1.0.0s,1.0.1n,1.0.2b</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_defect
cve medium detected in opensslopenssl cve medium severity vulnerability vulnerable library opensslopenssl tls ssl and crypto library library home page a href found in base branch archived io js vulnerable source files node deps openssl openssl crypto doit c vulnerability details the datadecodefunction in crypto doit c in openssl before before before and before allows remote attackers to cause a denial of service null pointer dereference and application crash via a pkcs blob that uses asn encoding and lacks inner encryptedcontent data publish date url a href cvss score details base score metrics not available suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
0
27,651
5,073,293,233
IssuesEvent
2016-12-27 07:48:10
TNGSB/eWallet
https://api.github.com/repos/TNGSB/eWallet
closed
e-Wallet_Merchant Portal (Voucher Used Details Report)_19122016 #153
ABL Defect - High (Sev-2) Dev Environment
Test Description : To download the Voucher Used Details Report Expected Result : 1. Succesfully download the report in PDF format Actual Result : System displayed Bad Credentials page Steps: 1. User to click Export as PDF link of the report from the page Refer attachment for reference [Defect_MerchantPortal_#153.xlsx](https://github.com/TNGSB/eWallet/files/660463/Defect_MerchantPortal_.153.xlsx)
1.0
e-Wallet_Merchant Portal (Voucher Used Details Report)_19122016 #153 - Test Description : To download the Voucher Used Details Report Expected Result : 1. Succesfully download the report in PDF format Actual Result : System displayed Bad Credentials page Steps: 1. User to click Export as PDF link of the report from the page Refer attachment for reference [Defect_MerchantPortal_#153.xlsx](https://github.com/TNGSB/eWallet/files/660463/Defect_MerchantPortal_.153.xlsx)
defect
e wallet merchant portal voucher used details report test description to download the voucher used details report expected result succesfully download the report in pdf format actual result system displayed bad credentials page steps user to click export as pdf link of the report from the page refer attachment for reference
1
625,812
19,766,576,233
IssuesEvent
2022-01-17 03:38:20
aitos-io/BoAT-X-Framework
https://api.github.com/repos/aitos-io/BoAT-X-Framework
closed
Pointer error in web3 function
bug Severity/major Priority/P1
web3Result is a pointer to BOAT_RESULT, and need to determine if the input pointer is null, not if the value is null. ``` BOAT_RESULT *web3Result if(*web3Result != NULL){ *web3Result = result; } ```
1.0
Pointer error in web3 function - web3Result is a pointer to BOAT_RESULT, and need to determine if the input pointer is null, not if the value is null. ``` BOAT_RESULT *web3Result if(*web3Result != NULL){ *web3Result = result; } ```
non_defect
pointer error in function is a pointer to boat result and need to determine if the input pointer is null not if the value is null boat result if null result
0
19,432
3,202,767,025
IssuesEvent
2015-10-02 15:34:09
JPaulMora/Pyrit
https://api.github.com/repos/JPaulMora/Pyrit
closed
pyrit server
auto-migrated Priority-Medium Type-Defect
``` hi i have problems with Pyrite server get it when I run Pyrite benchmark on the client detested is what gets on Pyrite server plis help!!! Please provide any additional information below. Serving 1 active clients; 0 PMKs/s; 0.0 TTS Exception in thread Thread-20: Traceback (most recent call last): File "/usr/lib/python2.7/threading.py", line 552, in __bootstrap_inner self.run() File "/usr/local/lib/python2.7/dist-packages/cpyrit/network.py", line 55, in run self.client.enqueue(essid, pwlist) File "/usr/local/lib/python2.7/dist-packages/cpyrit/network.py", line 103, in enqueue self.enqueue_callback(self.uuid, (essid, pwlist)) File "/usr/local/lib/python2.7/dist-packages/cpyrit/network.py", line 153, in enqueue self.cp.enqueue(essid, pwlist) File "/usr/local/lib/python2.7/dist-packages/cpyrit/cpyrit.py", line 566, in enqueue passwordlist = list(passwords) File "/usr/local/lib/python2.7/dist-packages/cpyrit/storage.py", line 156, in __iter__ return self.collection.__iter__() AttributeError: 'str' object has no attribute '__iter__' plis help!!! ``` Original issue reported on code.google.com by `keiko...@gmail.com` on 11 Sep 2013 at 11:10
1.0
pyrit server - ``` hi i have problems with Pyrite server get it when I run Pyrite benchmark on the client detested is what gets on Pyrite server plis help!!! Please provide any additional information below. Serving 1 active clients; 0 PMKs/s; 0.0 TTS Exception in thread Thread-20: Traceback (most recent call last): File "/usr/lib/python2.7/threading.py", line 552, in __bootstrap_inner self.run() File "/usr/local/lib/python2.7/dist-packages/cpyrit/network.py", line 55, in run self.client.enqueue(essid, pwlist) File "/usr/local/lib/python2.7/dist-packages/cpyrit/network.py", line 103, in enqueue self.enqueue_callback(self.uuid, (essid, pwlist)) File "/usr/local/lib/python2.7/dist-packages/cpyrit/network.py", line 153, in enqueue self.cp.enqueue(essid, pwlist) File "/usr/local/lib/python2.7/dist-packages/cpyrit/cpyrit.py", line 566, in enqueue passwordlist = list(passwords) File "/usr/local/lib/python2.7/dist-packages/cpyrit/storage.py", line 156, in __iter__ return self.collection.__iter__() AttributeError: 'str' object has no attribute '__iter__' plis help!!! ``` Original issue reported on code.google.com by `keiko...@gmail.com` on 11 Sep 2013 at 11:10
defect
pyrit server hi i have problems with pyrite server get it when i run pyrite benchmark on the client detested is what gets on pyrite server plis help please provide any additional information below serving active clients pmks s tts exception in thread thread traceback most recent call last file usr lib threading py line in bootstrap inner self run file usr local lib dist packages cpyrit network py line in run self client enqueue essid pwlist file usr local lib dist packages cpyrit network py line in enqueue self enqueue callback self uuid essid pwlist file usr local lib dist packages cpyrit network py line in enqueue self cp enqueue essid pwlist file usr local lib dist packages cpyrit cpyrit py line in enqueue passwordlist list passwords file usr local lib dist packages cpyrit storage py line in iter return self collection iter attributeerror str object has no attribute iter plis help original issue reported on code google com by keiko gmail com on sep at
1
720,539
24,796,394,785
IssuesEvent
2022-10-24 17:39:32
AmplifyCreations/AmplifyShaderEditor-Feedback
https://api.github.com/repos/AmplifyCreations/AmplifyShaderEditor-Feedback
closed
HDRP 12 Bug - undeclared identifier 'GetMaterialDebugColor'
bug highest priority
Repo: Enter a prefab and disable the lighting Unity 2021.3.11 HDRP 12.1.7 ![image](https://user-images.githubusercontent.com/33637574/197469708-4d123147-8b9f-49cd-bfbf-b5eafa1c0dca.png)
1.0
HDRP 12 Bug - undeclared identifier 'GetMaterialDebugColor' - Repo: Enter a prefab and disable the lighting Unity 2021.3.11 HDRP 12.1.7 ![image](https://user-images.githubusercontent.com/33637574/197469708-4d123147-8b9f-49cd-bfbf-b5eafa1c0dca.png)
non_defect
hdrp bug undeclared identifier getmaterialdebugcolor repo enter a prefab and disable the lighting unity hdrp
0
128,002
5,042,393,872
IssuesEvent
2016-12-19 13:51:31
pombase/curation
https://api.github.com/repos/pombase/curation
closed
cdc15 -> cdc7
high priority
There are a couple of cdc7alleles on the cdc15 gene page (looks like copy paste and not editing allele) Also, one of these is mitotic G2/M transition delay I suspect this should be inviable binucleate aseptate cell with mitotic cell cycle arrest in G2 before cell separation which is when there is a G2 arrest in the subsequent cell cycle....
1.0
cdc15 -> cdc7 - There are a couple of cdc7alleles on the cdc15 gene page (looks like copy paste and not editing allele) Also, one of these is mitotic G2/M transition delay I suspect this should be inviable binucleate aseptate cell with mitotic cell cycle arrest in G2 before cell separation which is when there is a G2 arrest in the subsequent cell cycle....
non_defect
there are a couple of on the gene page looks like copy paste and not editing allele also one of these is mitotic m transition delay i suspect this should be inviable binucleate aseptate cell with mitotic cell cycle arrest in before cell separation which is when there is a arrest in the subsequent cell cycle
0
71,405
23,612,103,678
IssuesEvent
2022-08-24 13:13:43
vector-im/element-android
https://api.github.com/repos/vector-im/element-android
closed
[bug] not possible to verify Android Version
T-Defect
### Steps to reproduce ### Steps to reproduce 1. for weeks i enabled a other Beta-Feature at Linux Client Element. works very well 2. then i enabled this other Beta-Feature at Android Client Element. not works. it waits for server response for days, and it still wait at the moment. 3. i disabled the beta at linux desktiop (no effect) 4. i reinstalled the andoid version (no effect) it still waits for sever response 5. and at same time it tries verification (Desktop as for QR-Code or Emoji Verification) but Android is in deadLock. to problems at same times seems to be not possible to solve for it. so i stack with to problems. and i cant use Android Element not any more BTW the german cumunity also now it. i long time user in this room: #german:matrix.org ### Outcome verification the android element version its blocked (dedlock) because android could not handle this two problems as same time (see description above) ### Operating system Ubuntu and Andoid ### Application version Element newest Version at both devices Desktop Version: Element version: 1.10.13 Olm version: 3.2.8 ### How did you install the app? the Andoid is from Google Play Store ### Homeserver tchncs.de ### Will you send logs? Yes but the android is blocked, so i cant send the anroid logs. but i have sended the linux-Desktop logs here: https://github.com/vector-im/element-web/issues/22387 ### Outcome #### What did you expect? - waiting for server-antword will end a day. but it stays already for many days - allows me to identify my desktop, but its blocked by the other message. (deadlock) #### What happened instead? all is blocked by the other message, waiting for server-answer (deadlock). please read also here: https://github.com/vector-im/element-web/issues/22387 ![photo_2022-06-01_12-14-43](https://user-images.githubusercontent.com/5634759/171381848-46fa55c2-716c-4710-9fdb-6d52c341db72.jpg) ![photo_2022-06-01_12-14-59](https://user-images.githubusercontent.com/5634759/171381972-e60da4c0-e577-4259-8f00-12f46fbc0cfb.jpg) ### Your phone model Samsung S8 ### Operating system version Ubuntu and Andoid Version 9 ### Application version and app store Element newest Verson at both devices ### Homeserver tchncs.de ### Will you send logs? Yes ### Are you willing to provide a PR? Yes
1.0
[bug] not possible to verify Android Version - ### Steps to reproduce ### Steps to reproduce 1. for weeks i enabled a other Beta-Feature at Linux Client Element. works very well 2. then i enabled this other Beta-Feature at Android Client Element. not works. it waits for server response for days, and it still wait at the moment. 3. i disabled the beta at linux desktiop (no effect) 4. i reinstalled the andoid version (no effect) it still waits for sever response 5. and at same time it tries verification (Desktop as for QR-Code or Emoji Verification) but Android is in deadLock. to problems at same times seems to be not possible to solve for it. so i stack with to problems. and i cant use Android Element not any more BTW the german cumunity also now it. i long time user in this room: #german:matrix.org ### Outcome verification the android element version its blocked (dedlock) because android could not handle this two problems as same time (see description above) ### Operating system Ubuntu and Andoid ### Application version Element newest Version at both devices Desktop Version: Element version: 1.10.13 Olm version: 3.2.8 ### How did you install the app? the Andoid is from Google Play Store ### Homeserver tchncs.de ### Will you send logs? Yes but the android is blocked, so i cant send the anroid logs. but i have sended the linux-Desktop logs here: https://github.com/vector-im/element-web/issues/22387 ### Outcome #### What did you expect? - waiting for server-antword will end a day. but it stays already for many days - allows me to identify my desktop, but its blocked by the other message. (deadlock) #### What happened instead? all is blocked by the other message, waiting for server-answer (deadlock). please read also here: https://github.com/vector-im/element-web/issues/22387 ![photo_2022-06-01_12-14-43](https://user-images.githubusercontent.com/5634759/171381848-46fa55c2-716c-4710-9fdb-6d52c341db72.jpg) ![photo_2022-06-01_12-14-59](https://user-images.githubusercontent.com/5634759/171381972-e60da4c0-e577-4259-8f00-12f46fbc0cfb.jpg) ### Your phone model Samsung S8 ### Operating system version Ubuntu and Andoid Version 9 ### Application version and app store Element newest Verson at both devices ### Homeserver tchncs.de ### Will you send logs? Yes ### Are you willing to provide a PR? Yes
defect
not possible to verify android version steps to reproduce steps to reproduce for weeks i enabled a other beta feature at linux client element works very well then i enabled this other beta feature at android client element not works it waits for server response for days and it still wait at the moment i disabled the beta at linux desktiop no effect i reinstalled the andoid version no effect it still waits for sever response and at same time it tries verification desktop as for qr code or emoji verification but android is in deadlock to problems at same times seems to be not possible to solve for it so i stack with to problems and i cant use android element not any more btw the german cumunity also now it i long time user in this room german matrix org outcome verification the android element version its blocked dedlock because android could not handle this two problems as same time see description above operating system ubuntu and andoid application version element newest version at both devices desktop version element version olm version how did you install the app the andoid is from google play store homeserver tchncs de will you send logs yes but the android is blocked so i cant send the anroid logs but i have sended the linux desktop logs here outcome what did you expect waiting for server antword will end a day but it stays already for many days allows me to identify my desktop but its blocked by the other message deadlock what happened instead all is blocked by the other message waiting for server answer deadlock please read also here your phone model samsung operating system version ubuntu and andoid version application version and app store element newest verson at both devices homeserver tchncs de will you send logs yes are you willing to provide a pr yes
1
80,906
30,592,723,879
IssuesEvent
2023-07-21 18:35:41
DependencyTrack/dependency-track
https://api.github.com/repos/DependencyTrack/dependency-track
closed
Update Docker image to latest debian stable release
defect
### Current Behavior When pulling docker bundled image, I noticed the base image is outdated a little bit. Recommend updating to the latest stable docker image. Additionally, we should change the Dependabot schedule for docker to daily instead of weekly, to keep track of new updates for containers. https://hub.docker.com/layers/library/debian/stable-slim/images/sha256-9071e1878844a004088f3c3f4db1dc54421dac00f15437424533c91c81108469?context=explore ### Steps to Reproduce Download latest dep track container image ![image](https://github.com/DependencyTrack/dependency-track/assets/101211710/957ce503-7122-4ae8-ab2c-ff0c0b19416c) ### Expected Behavior Scan images daily to identify new updates Downloaded docker image would identify to be on the latest stable release of debian ### Dependency-Track Version 4.8.2 ### Dependency-Track Distribution Container Image ### Database Server N/A ### Database Server Version _No response_ ### Browser Google Chrome ### Checklist - [X] I have read and understand the [contributing guidelines](https://github.com/DependencyTrack/dependency-track/blob/master/CONTRIBUTING.md#filing-issues) - [X] I have checked the [existing issues](https://github.com/DependencyTrack/dependency-track/issues) for whether this defect was already reported
1.0
Update Docker image to latest debian stable release - ### Current Behavior When pulling docker bundled image, I noticed the base image is outdated a little bit. Recommend updating to the latest stable docker image. Additionally, we should change the Dependabot schedule for docker to daily instead of weekly, to keep track of new updates for containers. https://hub.docker.com/layers/library/debian/stable-slim/images/sha256-9071e1878844a004088f3c3f4db1dc54421dac00f15437424533c91c81108469?context=explore ### Steps to Reproduce Download latest dep track container image ![image](https://github.com/DependencyTrack/dependency-track/assets/101211710/957ce503-7122-4ae8-ab2c-ff0c0b19416c) ### Expected Behavior Scan images daily to identify new updates Downloaded docker image would identify to be on the latest stable release of debian ### Dependency-Track Version 4.8.2 ### Dependency-Track Distribution Container Image ### Database Server N/A ### Database Server Version _No response_ ### Browser Google Chrome ### Checklist - [X] I have read and understand the [contributing guidelines](https://github.com/DependencyTrack/dependency-track/blob/master/CONTRIBUTING.md#filing-issues) - [X] I have checked the [existing issues](https://github.com/DependencyTrack/dependency-track/issues) for whether this defect was already reported
defect
update docker image to latest debian stable release current behavior when pulling docker bundled image i noticed the base image is outdated a little bit recommend updating to the latest stable docker image additionally we should change the dependabot schedule for docker to daily instead of weekly to keep track of new updates for containers steps to reproduce download latest dep track container image expected behavior scan images daily to identify new updates downloaded docker image would identify to be on the latest stable release of debian dependency track version dependency track distribution container image database server n a database server version no response browser google chrome checklist i have read and understand the i have checked the for whether this defect was already reported
1
721,706
24,835,411,627
IssuesEvent
2022-10-26 08:27:41
authzed/spicedb
https://api.github.com/repos/authzed/spicedb
closed
Investigate eliding updates of namespaces unchanged in schema write
priority/4 maybe area/perf area/api v1
If a schema is written with namespaces that have not changed at all, investigate whether they need to be written This can occur if the *same* schema is written by tooling
1.0
Investigate eliding updates of namespaces unchanged in schema write - If a schema is written with namespaces that have not changed at all, investigate whether they need to be written This can occur if the *same* schema is written by tooling
non_defect
investigate eliding updates of namespaces unchanged in schema write if a schema is written with namespaces that have not changed at all investigate whether they need to be written this can occur if the same schema is written by tooling
0
707,576
24,310,118,433
IssuesEvent
2022-09-29 21:19:35
o3de/o3de
https://api.github.com/repos/o3de/o3de
closed
Landscape Canvas: Duplicated Landscape Canvas nodes have no attached components, are created outside of the LC parent hierarchy, and are not deleted upon node removal
kind/bug sig/content triage/accepted priority/critical feature/vegetation
**Describe the bug** Duplicated Landscape Canvas nodes have no attached components, are created outside of the LC parent hierarchy, and are not deleted upon node removal **Steps to reproduce** 1. Launch the Editor with the AutomatedTesting project. 2. Open Landscape Canvas (Tools > Landscape Canvas). 3. Drag a new Vegetation Layer Spawner node from the Node Palette to the graph area. 4. Right-click the new node, and Duplicate. 5. Select the newly duplicated node, and observe the Node Inspector lists no components. 6. Right-click the node and Select Entity in Editor. 7. Observe that the Entity Inspector lists "Entity Not Found" and the Level component is selected in the Entity Outliner. 8. Right-click the node and Delete. 9. Observe that the Entity is not deleted from the Entity Outliner. **Expected behavior** Duplicated nodes create a new entity with the proper components under the LC graph parent hierarchy, node properties can be edited via the Node Inspector, and the linked entity is deleted upon deleting its node in LC. **Actual behavior** Duplicated entities are created outside of the LC graph parent hierarchy, list no components in the Node Inspector, and entities are not deleted upon deleting its corresponding node. **Screenshots/Video** https://user-images.githubusercontent.com/82226555/179803458-76c1c69e-d511-430b-8c44-4162a0222450.mp4 **Found in Branch** development@ cae5077af9a4436fbf63c89c00fdcdcb910cd8df **Desktop/Device:** - Device: PC - OS: Windows 10 21H1 - CPU: Ryzen 5950x - GPU: Nvidia 2070 - Memory: 64GB
1.0
Landscape Canvas: Duplicated Landscape Canvas nodes have no attached components, are created outside of the LC parent hierarchy, and are not deleted upon node removal - **Describe the bug** Duplicated Landscape Canvas nodes have no attached components, are created outside of the LC parent hierarchy, and are not deleted upon node removal **Steps to reproduce** 1. Launch the Editor with the AutomatedTesting project. 2. Open Landscape Canvas (Tools > Landscape Canvas). 3. Drag a new Vegetation Layer Spawner node from the Node Palette to the graph area. 4. Right-click the new node, and Duplicate. 5. Select the newly duplicated node, and observe the Node Inspector lists no components. 6. Right-click the node and Select Entity in Editor. 7. Observe that the Entity Inspector lists "Entity Not Found" and the Level component is selected in the Entity Outliner. 8. Right-click the node and Delete. 9. Observe that the Entity is not deleted from the Entity Outliner. **Expected behavior** Duplicated nodes create a new entity with the proper components under the LC graph parent hierarchy, node properties can be edited via the Node Inspector, and the linked entity is deleted upon deleting its node in LC. **Actual behavior** Duplicated entities are created outside of the LC graph parent hierarchy, list no components in the Node Inspector, and entities are not deleted upon deleting its corresponding node. **Screenshots/Video** https://user-images.githubusercontent.com/82226555/179803458-76c1c69e-d511-430b-8c44-4162a0222450.mp4 **Found in Branch** development@ cae5077af9a4436fbf63c89c00fdcdcb910cd8df **Desktop/Device:** - Device: PC - OS: Windows 10 21H1 - CPU: Ryzen 5950x - GPU: Nvidia 2070 - Memory: 64GB
non_defect
landscape canvas duplicated landscape canvas nodes have no attached components are created outside of the lc parent hierarchy and are not deleted upon node removal describe the bug duplicated landscape canvas nodes have no attached components are created outside of the lc parent hierarchy and are not deleted upon node removal steps to reproduce launch the editor with the automatedtesting project open landscape canvas tools landscape canvas drag a new vegetation layer spawner node from the node palette to the graph area right click the new node and duplicate select the newly duplicated node and observe the node inspector lists no components right click the node and select entity in editor observe that the entity inspector lists entity not found and the level component is selected in the entity outliner right click the node and delete observe that the entity is not deleted from the entity outliner expected behavior duplicated nodes create a new entity with the proper components under the lc graph parent hierarchy node properties can be edited via the node inspector and the linked entity is deleted upon deleting its node in lc actual behavior duplicated entities are created outside of the lc graph parent hierarchy list no components in the node inspector and entities are not deleted upon deleting its corresponding node screenshots video found in branch development desktop device device pc os windows cpu ryzen gpu nvidia memory
0
71,785
23,802,722,956
IssuesEvent
2022-09-03 14:57:05
vector-im/element-web
https://api.github.com/repos/vector-im/element-web
opened
QR codes for app download doesn't look nice in the dark theme
T-Defect
### Steps to reproduce 1. Start out using Element Web 2. Use the dark theme 3. Click on “Download app”, and see the QR codes ### Outcome #### What did you expect? The QR codes should be inverted, or have a padding around it to make it look nice, though technically it is still scannable #### What happened instead? ![Screenshot_20220903_215415](https://user-images.githubusercontent.com/47475676/188276113-abaa2361-159a-44c3-9ebb-2aab433871d8.png) ### Operating system _No response_ ### Browser information _No response_ ### URL for webapp app.element.io ### Application version _No response_ ### Homeserver _No response_ ### Will you send logs? No
1.0
QR codes for app download doesn't look nice in the dark theme - ### Steps to reproduce 1. Start out using Element Web 2. Use the dark theme 3. Click on “Download app”, and see the QR codes ### Outcome #### What did you expect? The QR codes should be inverted, or have a padding around it to make it look nice, though technically it is still scannable #### What happened instead? ![Screenshot_20220903_215415](https://user-images.githubusercontent.com/47475676/188276113-abaa2361-159a-44c3-9ebb-2aab433871d8.png) ### Operating system _No response_ ### Browser information _No response_ ### URL for webapp app.element.io ### Application version _No response_ ### Homeserver _No response_ ### Will you send logs? No
defect
qr codes for app download doesn t look nice in the dark theme steps to reproduce start out using element web use the dark theme click on “download app” and see the qr codes outcome what did you expect the qr codes should be inverted or have a padding around it to make it look nice though technically it is still scannable what happened instead operating system no response browser information no response url for webapp app element io application version no response homeserver no response will you send logs no
1
101,178
11,219,830,535
IssuesEvent
2020-01-07 14:40:53
Maproom/qmapshack
https://api.github.com/repos/Maproom/qmapshack
closed
Missing SQLITE files mentioned in msvc_64/copyfiles.bat (Windows version)
bug documentation
**Describe the bug** In the `msvc_64/copyfiles.bat` section 2.2.10 (sqlite) the 2 files * `sqldiff.exe` * `sqlite3_analyzer.exe` should be copied. These files don't exist (are not downloaded from somewhere) when following the Windows installation instructions in the Wiki pages `BuildWindowsVisualStudio`and `BuildWindowsGdalWithAdditionalFormats` **To Reproduce** Run `msvc_64\copyfiles.bat`and check output. **Expected behavior** Either the 2 files are not necessary when running QMS. Then they should be dropped from the batch file or the installation instructions in the Wiki should describe how to find/download these 2 files. **Screenshots** none **Desktop (please complete the following information):** - OS: Windows 10 - QMapShack Version: latest dev version **Additional context** none
1.0
Missing SQLITE files mentioned in msvc_64/copyfiles.bat (Windows version) - **Describe the bug** In the `msvc_64/copyfiles.bat` section 2.2.10 (sqlite) the 2 files * `sqldiff.exe` * `sqlite3_analyzer.exe` should be copied. These files don't exist (are not downloaded from somewhere) when following the Windows installation instructions in the Wiki pages `BuildWindowsVisualStudio`and `BuildWindowsGdalWithAdditionalFormats` **To Reproduce** Run `msvc_64\copyfiles.bat`and check output. **Expected behavior** Either the 2 files are not necessary when running QMS. Then they should be dropped from the batch file or the installation instructions in the Wiki should describe how to find/download these 2 files. **Screenshots** none **Desktop (please complete the following information):** - OS: Windows 10 - QMapShack Version: latest dev version **Additional context** none
non_defect
missing sqlite files mentioned in msvc copyfiles bat windows version describe the bug in the msvc copyfiles bat section sqlite the files sqldiff exe analyzer exe should be copied these files don t exist are not downloaded from somewhere when following the windows installation instructions in the wiki pages buildwindowsvisualstudio and buildwindowsgdalwithadditionalformats to reproduce run msvc copyfiles bat and check output expected behavior either the files are not necessary when running qms then they should be dropped from the batch file or the installation instructions in the wiki should describe how to find download these files screenshots none desktop please complete the following information os windows qmapshack version latest dev version additional context none
0
90,862
15,856,291,535
IssuesEvent
2021-04-08 01:59:55
tongni1975/containers-may19-2020-MyWork
https://api.github.com/repos/tongni1975/containers-may19-2020-MyWork
opened
CVE-2020-11023 (Medium) detected in jquery-2.1.4.min.js, jquery-1.7.1.min.js
security vulnerability
## CVE-2020-11023 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>jquery-2.1.4.min.js</b>, <b>jquery-1.7.1.min.js</b></p></summary> <p> <details><summary><b>jquery-2.1.4.min.js</b></p></summary> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/2.1.4/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/2.1.4/jquery.min.js</a></p> <p>Path to dependency file: containers-may19-2020-MyWork/northwind/client/node_modules/js-base64/.attic/test-moment/index.html</p> <p>Path to vulnerable library: containers-may19-2020-MyWork/northwind/client/node_modules/js-base64/.attic/test-moment/index.html</p> <p> Dependency Hierarchy: - :x: **jquery-2.1.4.min.js** (Vulnerable Library) </details> <details><summary><b>jquery-1.7.1.min.js</b></p></summary> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.7.1/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/1.7.1/jquery.min.js</a></p> <p>Path to dependency file: containers-may19-2020-MyWork/northwind/client/node_modules/vm-browserify/example/run/index.html</p> <p>Path to vulnerable library: containers-may19-2020-MyWork/northwind/client/node_modules/vm-browserify/example/run/index.html,containers-may19-2020-MyWork/northwind/client/node_modules/sockjs/examples/hapi/html/index.html,containers-may19-2020-MyWork/northwind/client/node_modules/sockjs/examples/echo/index.html,containers-may19-2020-MyWork/northwind/client/node_modules/sockjs/examples/multiplex/index.html,containers-may19-2020-MyWork/northwind/client/node_modules/sockjs/examples/express-3.x/index.html</p> <p> Dependency Hierarchy: - :x: **jquery-1.7.1.min.js** (Vulnerable Library) </details> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0. <p>Publish Date: 2020-04-29 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11023>CVE-2020-11023</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11023">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11023</a></p> <p>Release Date: 2020-04-29</p> <p>Fix Resolution: jquery - 3.5.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2020-11023 (Medium) detected in jquery-2.1.4.min.js, jquery-1.7.1.min.js - ## CVE-2020-11023 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>jquery-2.1.4.min.js</b>, <b>jquery-1.7.1.min.js</b></p></summary> <p> <details><summary><b>jquery-2.1.4.min.js</b></p></summary> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/2.1.4/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/2.1.4/jquery.min.js</a></p> <p>Path to dependency file: containers-may19-2020-MyWork/northwind/client/node_modules/js-base64/.attic/test-moment/index.html</p> <p>Path to vulnerable library: containers-may19-2020-MyWork/northwind/client/node_modules/js-base64/.attic/test-moment/index.html</p> <p> Dependency Hierarchy: - :x: **jquery-2.1.4.min.js** (Vulnerable Library) </details> <details><summary><b>jquery-1.7.1.min.js</b></p></summary> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.7.1/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/1.7.1/jquery.min.js</a></p> <p>Path to dependency file: containers-may19-2020-MyWork/northwind/client/node_modules/vm-browserify/example/run/index.html</p> <p>Path to vulnerable library: containers-may19-2020-MyWork/northwind/client/node_modules/vm-browserify/example/run/index.html,containers-may19-2020-MyWork/northwind/client/node_modules/sockjs/examples/hapi/html/index.html,containers-may19-2020-MyWork/northwind/client/node_modules/sockjs/examples/echo/index.html,containers-may19-2020-MyWork/northwind/client/node_modules/sockjs/examples/multiplex/index.html,containers-may19-2020-MyWork/northwind/client/node_modules/sockjs/examples/express-3.x/index.html</p> <p> Dependency Hierarchy: - :x: **jquery-1.7.1.min.js** (Vulnerable Library) </details> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0. <p>Publish Date: 2020-04-29 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11023>CVE-2020-11023</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11023">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11023</a></p> <p>Release Date: 2020-04-29</p> <p>Fix Resolution: jquery - 3.5.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_defect
cve medium detected in jquery min js jquery min js cve medium severity vulnerability vulnerable libraries jquery min js jquery min js jquery min js javascript library for dom operations library home page a href path to dependency file containers mywork northwind client node modules js attic test moment index html path to vulnerable library containers mywork northwind client node modules js attic test moment index html dependency hierarchy x jquery min js vulnerable library jquery min js javascript library for dom operations library home page a href path to dependency file containers mywork northwind client node modules vm browserify example run index html path to vulnerable library containers mywork northwind client node modules vm browserify example run index html containers mywork northwind client node modules sockjs examples hapi html index html containers mywork northwind client node modules sockjs examples echo index html containers mywork northwind client node modules sockjs examples multiplex index html containers mywork northwind client node modules sockjs examples express x index html dependency hierarchy x jquery min js vulnerable library vulnerability details in jquery versions greater than or equal to and before passing html containing elements from untrusted sources even after sanitizing it to one of jquery s dom manipulation methods i e html append and others may execute untrusted code this problem is patched in jquery publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution jquery step up your open source security game with whitesource
0
22,306
3,626,937,755
IssuesEvent
2016-02-10 04:53:01
kronometrix/recording
https://api.github.com/repos/kronometrix/recording
closed
win32 nic detection mechanism optimizations
defect-high enhancement
It has been noticed that fetching NIC stats takes time up to 0.7seconds on some systems. For example a very simple procedure to simple fetch NIC stats calling a single perf class returns these timing results: * Win32_PerfFormattedData_Tcpip_NetworkInterface ``` Realtek RTL8139C+ Fast Ethernet NIC isatap.{F9A690A7-F428-486B-B612-EEE008DE3B01} real 0m0.484s user 0m0.000s sys 0m0.000s ``` * Win32_PerfRawData_Tcpip_NetworkInterface ``` Realtek RTL8139C+ Fast Ethernet NIC isatap.{F9A690A7-F428-486B-B612-EEE008DE3B01} real 0m0.218s user 0m0.000s sys 0m0.000s ``` Thats two times longer to look again on Formatted classes. Microsoft seems have a very crappy implementation of these classes when used to fetch data. Preferable is to look Raw data and do delta and other calculations to avoid overhead. In addition we should skip NICs which are no physical NICs.
1.0
win32 nic detection mechanism optimizations - It has been noticed that fetching NIC stats takes time up to 0.7seconds on some systems. For example a very simple procedure to simple fetch NIC stats calling a single perf class returns these timing results: * Win32_PerfFormattedData_Tcpip_NetworkInterface ``` Realtek RTL8139C+ Fast Ethernet NIC isatap.{F9A690A7-F428-486B-B612-EEE008DE3B01} real 0m0.484s user 0m0.000s sys 0m0.000s ``` * Win32_PerfRawData_Tcpip_NetworkInterface ``` Realtek RTL8139C+ Fast Ethernet NIC isatap.{F9A690A7-F428-486B-B612-EEE008DE3B01} real 0m0.218s user 0m0.000s sys 0m0.000s ``` Thats two times longer to look again on Formatted classes. Microsoft seems have a very crappy implementation of these classes when used to fetch data. Preferable is to look Raw data and do delta and other calculations to avoid overhead. In addition we should skip NICs which are no physical NICs.
defect
nic detection mechanism optimizations it has been noticed that fetching nic stats takes time up to on some systems for example a very simple procedure to simple fetch nic stats calling a single perf class returns these timing results perfformatteddata tcpip networkinterface realtek fast ethernet nic isatap real user sys perfrawdata tcpip networkinterface realtek fast ethernet nic isatap real user sys thats two times longer to look again on formatted classes microsoft seems have a very crappy implementation of these classes when used to fetch data preferable is to look raw data and do delta and other calculations to avoid overhead in addition we should skip nics which are no physical nics
1
41,327
10,416,889,623
IssuesEvent
2019-09-14 17:07:52
mozilla/blurts-server
https://api.github.com/repos/mozilla/blurts-server
closed
unsubscribe
Content :memo: feature-fxa :bust_in_silhouette: needs: PM needs: UX type: defect
When someone signs up with Firefox Account, they get a report email with blue text that says "If you no longer want Firefox Monitor alerts, unsubscribe." but they have no way to unsubscribe. ![image](https://user-images.githubusercontent.com/71928/52649168-6cbc2400-2ead-11e9-84fd-1d8b736b9866.png) We should either fix #697 and link the recipient to that page, or else restore the functionality to unsubscribe from Monitor emails with a direct link to /user/unsubscribe like we had before. Either way, we need to add content to the page that unsubscribing from Monitor doesn't destroy their Firefox Account, and provide them a link to delete their Firefox Account if they want to do that too.
1.0
unsubscribe - When someone signs up with Firefox Account, they get a report email with blue text that says "If you no longer want Firefox Monitor alerts, unsubscribe." but they have no way to unsubscribe. ![image](https://user-images.githubusercontent.com/71928/52649168-6cbc2400-2ead-11e9-84fd-1d8b736b9866.png) We should either fix #697 and link the recipient to that page, or else restore the functionality to unsubscribe from Monitor emails with a direct link to /user/unsubscribe like we had before. Either way, we need to add content to the page that unsubscribing from Monitor doesn't destroy their Firefox Account, and provide them a link to delete their Firefox Account if they want to do that too.
defect
unsubscribe when someone signs up with firefox account they get a report email with blue text that says if you no longer want firefox monitor alerts unsubscribe but they have no way to unsubscribe we should either fix and link the recipient to that page or else restore the functionality to unsubscribe from monitor emails with a direct link to user unsubscribe like we had before either way we need to add content to the page that unsubscribing from monitor doesn t destroy their firefox account and provide them a link to delete their firefox account if they want to do that too
1
77,152
7,567,127,444
IssuesEvent
2018-04-22 05:58:09
intesar/Fx-Test-Data
https://api.github.com/repos/intesar/Fx-Test-Data
closed
Test-bvpoGI : enterprise_user_signup_invalid
Test-bvpoGI
Project : Test-bvpoGI Job : Stg Env : Stg Region : FxLabs/US_WEST_1 Result : fail Status Code : 503 Headers : {Cache-Control=[no-cache], Connection=[close], Content-Type=[text/html]} Endpoint : http://stg1.fxlabs.io/api/v1/users/enterprise-sign-up Request : { "name" : "fn1 ln", "email" : "test@fxlabs.io", "password" : "12345678", "company" : "" } Response : null Logs : Assertion [@Response.errors == true] failed, expected value [true] but found []
1.0
Test-bvpoGI : enterprise_user_signup_invalid - Project : Test-bvpoGI Job : Stg Env : Stg Region : FxLabs/US_WEST_1 Result : fail Status Code : 503 Headers : {Cache-Control=[no-cache], Connection=[close], Content-Type=[text/html]} Endpoint : http://stg1.fxlabs.io/api/v1/users/enterprise-sign-up Request : { "name" : "fn1 ln", "email" : "test@fxlabs.io", "password" : "12345678", "company" : "" } Response : null Logs : Assertion [@Response.errors == true] failed, expected value [true] but found []
non_defect
test bvpogi enterprise user signup invalid project test bvpogi job stg env stg region fxlabs us west result fail status code headers cache control connection content type endpoint request name ln email test fxlabs io password company response null logs assertion failed expected value but found
0
58,362
16,504,676,441
IssuesEvent
2021-05-25 17:47:21
matrix-org/synapse
https://api.github.com/repos/matrix-org/synapse
opened
Synapse workers Complement image results in flaky tests due to inconsistent worker process init
T-Defect X-Needs-Discussion
The worker-version of Synapse running in Complement (as described [here](https://github.com/matrix-org/synapse/blob/develop/docker/README-testing.md#testing-with-postgresql-and-single-or-multi-process-synapse)) currently uses `supervisord` as an init system to start all worker processes in the container. This works, and eventually all processes start up. However, Complement checks whether a homeserver is ready to start testing by the fact that it responds successfully to a `GET /_matrix/client/versions` call. This endpoint may be successfully responded to by a worker that has started, while other workers are still starting up. This inconsistency can lead to test failures, where Complement finds a 502 from a call to a different endpoint that should be handled by a different worker. Since that worker hasn't started yet, nginx returns a 502, and the test fails. The result of this is flaky Complement tests - which nobody wants. I believe the solution is to start groups of processes in the container through a priority system. Only should the next group be started once the previous has successfully responded to healthchecks (indicating the process is ready to receive connections): 1. the main Synapse process * thus all database migrations are handled before any workers start up. 2. all worker Synapse processes 3. nginx (Note that caddy [just used for custom CA stuff] and Postgres are started before `supervisord` even is.) By starting nginx at the very end, which is the reverse proxy that actually routes matrix requests to the appropriate Synapse process, Complement will not receive a successful response to `/_matrix/client/versions` until everything else has started. Initially I had hoped to use systemd as an init system to replace `supervisord`, but [systemd apparently doesn't work in docker containers](https://developers.redhat.com/blog/2019/04/24/how-to-run-systemd-in-a-container). Additionally, we need each process to output its logs to stdout, as otherwise Complement won't be able to display the homeserver logs after a test failure. systemd would make this a bit tricky as it tries to capture logs. Currently this has worked by having `supervisord` simply redirecting all process logs to stdout, which the [`ENTRYPOINT`](https://github.com/matrix-org/complement/blob/4a297f8d1bc87a8ebf5a4bc4f05918d0420e826d/dockerfiles/SynapseWorkers.Dockerfile#L36-L66) of the docker container, [configure_workers_and_start.py](https://github.com/matrix-org/synapse/blob/7e460ec2a566b19bbcda63bc04b1e422127a99b3/docker/configure_workers_and_start.py#L524), would simply relay. I don't believe we want to use `synctl` here, as the team has been trying to phase that out for a while now. We could simply do all of this via `subprocess` in `configure_workers_and_start.py`, but I'm hoping there's a better, less manual way. Any ideas? @richvdh and @erikjohnston also mentioned that Synapse has a way to signal to processes that it's ready to receive connections (that may potentially be better than just polling the /health endpoint), which may be useful depending on what init system we choose.
1.0
Synapse workers Complement image results in flaky tests due to inconsistent worker process init - The worker-version of Synapse running in Complement (as described [here](https://github.com/matrix-org/synapse/blob/develop/docker/README-testing.md#testing-with-postgresql-and-single-or-multi-process-synapse)) currently uses `supervisord` as an init system to start all worker processes in the container. This works, and eventually all processes start up. However, Complement checks whether a homeserver is ready to start testing by the fact that it responds successfully to a `GET /_matrix/client/versions` call. This endpoint may be successfully responded to by a worker that has started, while other workers are still starting up. This inconsistency can lead to test failures, where Complement finds a 502 from a call to a different endpoint that should be handled by a different worker. Since that worker hasn't started yet, nginx returns a 502, and the test fails. The result of this is flaky Complement tests - which nobody wants. I believe the solution is to start groups of processes in the container through a priority system. Only should the next group be started once the previous has successfully responded to healthchecks (indicating the process is ready to receive connections): 1. the main Synapse process * thus all database migrations are handled before any workers start up. 2. all worker Synapse processes 3. nginx (Note that caddy [just used for custom CA stuff] and Postgres are started before `supervisord` even is.) By starting nginx at the very end, which is the reverse proxy that actually routes matrix requests to the appropriate Synapse process, Complement will not receive a successful response to `/_matrix/client/versions` until everything else has started. Initially I had hoped to use systemd as an init system to replace `supervisord`, but [systemd apparently doesn't work in docker containers](https://developers.redhat.com/blog/2019/04/24/how-to-run-systemd-in-a-container). Additionally, we need each process to output its logs to stdout, as otherwise Complement won't be able to display the homeserver logs after a test failure. systemd would make this a bit tricky as it tries to capture logs. Currently this has worked by having `supervisord` simply redirecting all process logs to stdout, which the [`ENTRYPOINT`](https://github.com/matrix-org/complement/blob/4a297f8d1bc87a8ebf5a4bc4f05918d0420e826d/dockerfiles/SynapseWorkers.Dockerfile#L36-L66) of the docker container, [configure_workers_and_start.py](https://github.com/matrix-org/synapse/blob/7e460ec2a566b19bbcda63bc04b1e422127a99b3/docker/configure_workers_and_start.py#L524), would simply relay. I don't believe we want to use `synctl` here, as the team has been trying to phase that out for a while now. We could simply do all of this via `subprocess` in `configure_workers_and_start.py`, but I'm hoping there's a better, less manual way. Any ideas? @richvdh and @erikjohnston also mentioned that Synapse has a way to signal to processes that it's ready to receive connections (that may potentially be better than just polling the /health endpoint), which may be useful depending on what init system we choose.
defect
synapse workers complement image results in flaky tests due to inconsistent worker process init the worker version of synapse running in complement as described currently uses supervisord as an init system to start all worker processes in the container this works and eventually all processes start up however complement checks whether a homeserver is ready to start testing by the fact that it responds successfully to a get matrix client versions call this endpoint may be successfully responded to by a worker that has started while other workers are still starting up this inconsistency can lead to test failures where complement finds a from a call to a different endpoint that should be handled by a different worker since that worker hasn t started yet nginx returns a and the test fails the result of this is flaky complement tests which nobody wants i believe the solution is to start groups of processes in the container through a priority system only should the next group be started once the previous has successfully responded to healthchecks indicating the process is ready to receive connections the main synapse process thus all database migrations are handled before any workers start up all worker synapse processes nginx note that caddy and postgres are started before supervisord even is by starting nginx at the very end which is the reverse proxy that actually routes matrix requests to the appropriate synapse process complement will not receive a successful response to matrix client versions until everything else has started initially i had hoped to use systemd as an init system to replace supervisord but additionally we need each process to output its logs to stdout as otherwise complement won t be able to display the homeserver logs after a test failure systemd would make this a bit tricky as it tries to capture logs currently this has worked by having supervisord simply redirecting all process logs to stdout which the of the docker container would simply relay i don t believe we want to use synctl here as the team has been trying to phase that out for a while now we could simply do all of this via subprocess in configure workers and start py but i m hoping there s a better less manual way any ideas richvdh and erikjohnston also mentioned that synapse has a way to signal to processes that it s ready to receive connections that may potentially be better than just polling the health endpoint which may be useful depending on what init system we choose
1
67,695
14,886,277,616
IssuesEvent
2021-01-20 16:44:18
kadirselcuk/angularjs-realworld-example-app
https://api.github.com/repos/kadirselcuk/angularjs-realworld-example-app
opened
WS-2018-0628 (Medium) detected in marked-0.3.19.js, marked-0.3.19.tgz
security vulnerability
## WS-2018-0628 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>marked-0.3.19.js</b>, <b>marked-0.3.19.tgz</b></p></summary> <p> <details><summary><b>marked-0.3.19.js</b></p></summary> <p>A markdown parser built for speed</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/marked/0.3.19/marked.js">https://cdnjs.cloudflare.com/ajax/libs/marked/0.3.19/marked.js</a></p> <p>Path to dependency file: angularjs-realworld-example-app/node_modules/marked/www/demo.html</p> <p>Path to vulnerable library: angularjs-realworld-example-app/node_modules/marked/www/../lib/marked.js</p> <p> Dependency Hierarchy: - :x: **marked-0.3.19.js** (Vulnerable Library) </details> <details><summary><b>marked-0.3.19.tgz</b></p></summary> <p>A markdown parser built for speed</p> <p>Library home page: <a href="https://registry.npmjs.org/marked/-/marked-0.3.19.tgz">https://registry.npmjs.org/marked/-/marked-0.3.19.tgz</a></p> <p>Path to dependency file: angularjs-realworld-example-app/package.json</p> <p>Path to vulnerable library: angularjs-realworld-example-app/node_modules/marked/package.json</p> <p> Dependency Hierarchy: - :x: **marked-0.3.19.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/kadirselcuk/angularjs-realworld-example-app/commit/96c72a666271672f2f980c3e6278b9c958747c3f">96c72a666271672f2f980c3e6278b9c958747c3f</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> marked before 0.4.0 is vulnerable to Regular Expression Denial of Service (REDoS) through heading in marked.js. <p>Publish Date: 2018-04-16 <p>URL: <a href=https://github.com/markedjs/marked/commit/09afabf69c6d0c919c03443f47bdfe476566105d>WS-2018-0628</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/markedjs/marked/releases/tag/0.4.0">https://github.com/markedjs/marked/releases/tag/0.4.0</a></p> <p>Release Date: 2018-04-16</p> <p>Fix Resolution: marked - 0.4.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
WS-2018-0628 (Medium) detected in marked-0.3.19.js, marked-0.3.19.tgz - ## WS-2018-0628 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>marked-0.3.19.js</b>, <b>marked-0.3.19.tgz</b></p></summary> <p> <details><summary><b>marked-0.3.19.js</b></p></summary> <p>A markdown parser built for speed</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/marked/0.3.19/marked.js">https://cdnjs.cloudflare.com/ajax/libs/marked/0.3.19/marked.js</a></p> <p>Path to dependency file: angularjs-realworld-example-app/node_modules/marked/www/demo.html</p> <p>Path to vulnerable library: angularjs-realworld-example-app/node_modules/marked/www/../lib/marked.js</p> <p> Dependency Hierarchy: - :x: **marked-0.3.19.js** (Vulnerable Library) </details> <details><summary><b>marked-0.3.19.tgz</b></p></summary> <p>A markdown parser built for speed</p> <p>Library home page: <a href="https://registry.npmjs.org/marked/-/marked-0.3.19.tgz">https://registry.npmjs.org/marked/-/marked-0.3.19.tgz</a></p> <p>Path to dependency file: angularjs-realworld-example-app/package.json</p> <p>Path to vulnerable library: angularjs-realworld-example-app/node_modules/marked/package.json</p> <p> Dependency Hierarchy: - :x: **marked-0.3.19.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/kadirselcuk/angularjs-realworld-example-app/commit/96c72a666271672f2f980c3e6278b9c958747c3f">96c72a666271672f2f980c3e6278b9c958747c3f</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> marked before 0.4.0 is vulnerable to Regular Expression Denial of Service (REDoS) through heading in marked.js. <p>Publish Date: 2018-04-16 <p>URL: <a href=https://github.com/markedjs/marked/commit/09afabf69c6d0c919c03443f47bdfe476566105d>WS-2018-0628</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/markedjs/marked/releases/tag/0.4.0">https://github.com/markedjs/marked/releases/tag/0.4.0</a></p> <p>Release Date: 2018-04-16</p> <p>Fix Resolution: marked - 0.4.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_defect
ws medium detected in marked js marked tgz ws medium severity vulnerability vulnerable libraries marked js marked tgz marked js a markdown parser built for speed library home page a href path to dependency file angularjs realworld example app node modules marked www demo html path to vulnerable library angularjs realworld example app node modules marked www lib marked js dependency hierarchy x marked js vulnerable library marked tgz a markdown parser built for speed library home page a href path to dependency file angularjs realworld example app package json path to vulnerable library angularjs realworld example app node modules marked package json dependency hierarchy x marked tgz vulnerable library found in head commit a href found in base branch master vulnerability details marked before is vulnerable to regular expression denial of service redos through heading in marked js publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution marked step up your open source security game with whitesource
0
44,210
12,043,546,829
IssuesEvent
2020-04-14 12:37:48
primefaces/primeng
https://api.github.com/repos/primefaces/primeng
closed
Dropdown allows selecting disabled options
defect
Dropdown has a 'search' feature which allows one to find an item by typing its label. This feature works fine, but it seems to ignore the option's 'disabled' status. Example: 1) A dropdown with options A, B, C. "B" is disabled; 2) Put focus on the dropdown (by mouse or keyboard); 3) Type "b" on the keyboard; 4) Disabled option "B" is now selected
1.0
Dropdown allows selecting disabled options - Dropdown has a 'search' feature which allows one to find an item by typing its label. This feature works fine, but it seems to ignore the option's 'disabled' status. Example: 1) A dropdown with options A, B, C. "B" is disabled; 2) Put focus on the dropdown (by mouse or keyboard); 3) Type "b" on the keyboard; 4) Disabled option "B" is now selected
defect
dropdown allows selecting disabled options dropdown has a search feature which allows one to find an item by typing its label this feature works fine but it seems to ignore the option s disabled status example a dropdown with options a b c b is disabled put focus on the dropdown by mouse or keyboard type b on the keyboard disabled option b is now selected
1
19,992
4,478,705,379
IssuesEvent
2016-08-27 05:35:03
grandstaish/paperparcel
https://api.github.com/repos/grandstaish/paperparcel
closed
Add usage docs to the wiki
Documentation
Include how to parcel a kotlin object too, because it currently isn't called out. E.g.: ``` java @PaperParcel object State : PaperParcelable { @JvmField val CREATOR = PaperParcelable.Creator(State::class.java) } ```
1.0
Add usage docs to the wiki - Include how to parcel a kotlin object too, because it currently isn't called out. E.g.: ``` java @PaperParcel object State : PaperParcelable { @JvmField val CREATOR = PaperParcelable.Creator(State::class.java) } ```
non_defect
add usage docs to the wiki include how to parcel a kotlin object too because it currently isn t called out e g java paperparcel object state paperparcelable jvmfield val creator paperparcelable creator state class java
0
24,575
11,046,997,126
IssuesEvent
2019-12-09 18:00:25
LevyForchh/webdataconnector
https://api.github.com/repos/LevyForchh/webdataconnector
opened
WS-2019-0064 (High) detected in handlebars-4.0.5.min.js, handlebars-4.0.5.tgz
security vulnerability
## WS-2019-0064 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>handlebars-4.0.5.min.js</b>, <b>handlebars-4.0.5.tgz</b></p></summary> <p> <details><summary><b>handlebars-4.0.5.min.js</b></p></summary> <p>Handlebars provides the power necessary to let you build semantic templates effectively with no frustration</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/handlebars.js/4.0.5/handlebars.min.js">https://cdnjs.cloudflare.com/ajax/libs/handlebars.js/4.0.5/handlebars.min.js</a></p> <p>Path to dependency file: /tmp/ws-scm/webdataconnector/node_modules/vis/examples/timeline/styling/itemTemplates.html</p> <p>Path to vulnerable library: /webdataconnector/node_modules/vis/examples/timeline/styling/itemTemplates.html</p> <p> Dependency Hierarchy: - :x: **handlebars-4.0.5.min.js** (Vulnerable Library) </details> <details><summary><b>handlebars-4.0.5.tgz</b></p></summary> <p>Handlebars provides the power necessary to let you build semantic templates effectively with no frustration</p> <p>Library home page: <a href="https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz">https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz</a></p> <p>Path to dependency file: /tmp/ws-scm/webdataconnector/package.json</p> <p>Path to vulnerable library: /tmp/ws-scm/webdataconnector/node_modules/nyc/node_modules/istanbul/node_modules/handlebars/package.json</p> <p> Dependency Hierarchy: - nyc-6.6.1.tgz (Root Library) - istanbul-0.4.3.tgz - :x: **handlebars-4.0.5.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/LevyForchh/webdataconnector/commit/5e5d2c912c2a10aa798a92712142633ee3a0580f">5e5d2c912c2a10aa798a92712142633ee3a0580f</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Versions of handlebars prior to 4.0.14 are vulnerable to Prototype Pollution. Templates may alter an Objects' prototype, thus allowing an attacker to execute arbitrary code on the server. <p>Publish Date: 2019-04-30 <p>URL: <a href=https://github.com/wycats/handlebars.js/compare/v4.1.1...v4.1.2>WS-2019-0064</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>8.0</b>)</summary> <p> Base Score Metrics not available</p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.npmjs.com/advisories/755/versions">https://www.npmjs.com/advisories/755/versions</a></p> <p>Release Date: 2019-04-30</p> <p>Fix Resolution: 1.0.6-2,4.0.14,4.1.2</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"JavaScript","packageName":"handlebars.js","packageVersion":"4.0.5","isTransitiveDependency":false,"dependencyTree":"handlebars.js:4.0.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.0.6-2,4.0.14,4.1.2"},{"packageType":"javascript/Node.js","packageName":"handlebars","packageVersion":"4.0.5","isTransitiveDependency":true,"dependencyTree":"nyc:6.6.1;istanbul:0.4.3;handlebars:4.0.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.0.6-2,4.0.14,4.1.2"}],"vulnerabilityIdentifier":"WS-2019-0064","vulnerabilityDetails":"Versions of handlebars prior to 4.0.14 are vulnerable to Prototype Pollution. Templates may alter an Objects\u0027 prototype, thus allowing an attacker to execute arbitrary code on the server.","vulnerabilityUrl":"https://github.com/wycats/handlebars.js/compare/v4.1.1...v4.1.2","cvss2Severity":"high","cvss2Score":"8.0","extraData":{}}</REMEDIATE> -->
True
WS-2019-0064 (High) detected in handlebars-4.0.5.min.js, handlebars-4.0.5.tgz - ## WS-2019-0064 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>handlebars-4.0.5.min.js</b>, <b>handlebars-4.0.5.tgz</b></p></summary> <p> <details><summary><b>handlebars-4.0.5.min.js</b></p></summary> <p>Handlebars provides the power necessary to let you build semantic templates effectively with no frustration</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/handlebars.js/4.0.5/handlebars.min.js">https://cdnjs.cloudflare.com/ajax/libs/handlebars.js/4.0.5/handlebars.min.js</a></p> <p>Path to dependency file: /tmp/ws-scm/webdataconnector/node_modules/vis/examples/timeline/styling/itemTemplates.html</p> <p>Path to vulnerable library: /webdataconnector/node_modules/vis/examples/timeline/styling/itemTemplates.html</p> <p> Dependency Hierarchy: - :x: **handlebars-4.0.5.min.js** (Vulnerable Library) </details> <details><summary><b>handlebars-4.0.5.tgz</b></p></summary> <p>Handlebars provides the power necessary to let you build semantic templates effectively with no frustration</p> <p>Library home page: <a href="https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz">https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz</a></p> <p>Path to dependency file: /tmp/ws-scm/webdataconnector/package.json</p> <p>Path to vulnerable library: /tmp/ws-scm/webdataconnector/node_modules/nyc/node_modules/istanbul/node_modules/handlebars/package.json</p> <p> Dependency Hierarchy: - nyc-6.6.1.tgz (Root Library) - istanbul-0.4.3.tgz - :x: **handlebars-4.0.5.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/LevyForchh/webdataconnector/commit/5e5d2c912c2a10aa798a92712142633ee3a0580f">5e5d2c912c2a10aa798a92712142633ee3a0580f</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Versions of handlebars prior to 4.0.14 are vulnerable to Prototype Pollution. Templates may alter an Objects' prototype, thus allowing an attacker to execute arbitrary code on the server. <p>Publish Date: 2019-04-30 <p>URL: <a href=https://github.com/wycats/handlebars.js/compare/v4.1.1...v4.1.2>WS-2019-0064</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>8.0</b>)</summary> <p> Base Score Metrics not available</p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.npmjs.com/advisories/755/versions">https://www.npmjs.com/advisories/755/versions</a></p> <p>Release Date: 2019-04-30</p> <p>Fix Resolution: 1.0.6-2,4.0.14,4.1.2</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"JavaScript","packageName":"handlebars.js","packageVersion":"4.0.5","isTransitiveDependency":false,"dependencyTree":"handlebars.js:4.0.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.0.6-2,4.0.14,4.1.2"},{"packageType":"javascript/Node.js","packageName":"handlebars","packageVersion":"4.0.5","isTransitiveDependency":true,"dependencyTree":"nyc:6.6.1;istanbul:0.4.3;handlebars:4.0.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.0.6-2,4.0.14,4.1.2"}],"vulnerabilityIdentifier":"WS-2019-0064","vulnerabilityDetails":"Versions of handlebars prior to 4.0.14 are vulnerable to Prototype Pollution. Templates may alter an Objects\u0027 prototype, thus allowing an attacker to execute arbitrary code on the server.","vulnerabilityUrl":"https://github.com/wycats/handlebars.js/compare/v4.1.1...v4.1.2","cvss2Severity":"high","cvss2Score":"8.0","extraData":{}}</REMEDIATE> -->
non_defect
ws high detected in handlebars min js handlebars tgz ws high severity vulnerability vulnerable libraries handlebars min js handlebars tgz handlebars min js handlebars provides the power necessary to let you build semantic templates effectively with no frustration library home page a href path to dependency file tmp ws scm webdataconnector node modules vis examples timeline styling itemtemplates html path to vulnerable library webdataconnector node modules vis examples timeline styling itemtemplates html dependency hierarchy x handlebars min js vulnerable library handlebars tgz handlebars provides the power necessary to let you build semantic templates effectively with no frustration library home page a href path to dependency file tmp ws scm webdataconnector package json path to vulnerable library tmp ws scm webdataconnector node modules nyc node modules istanbul node modules handlebars package json dependency hierarchy nyc tgz root library istanbul tgz x handlebars tgz vulnerable library found in head commit a href vulnerability details versions of handlebars prior to are vulnerable to prototype pollution templates may alter an objects prototype thus allowing an attacker to execute arbitrary code on the server publish date url a href cvss score details base score metrics not available suggested fix type upgrade version origin a href release date fix resolution isopenpronvulnerability false ispackagebased true isdefaultbranch true packages vulnerabilityidentifier ws vulnerabilitydetails versions of handlebars prior to are vulnerable to prototype pollution templates may alter an objects prototype thus allowing an attacker to execute arbitrary code on the server vulnerabilityurl
0
59,754
17,023,233,342
IssuesEvent
2021-07-03 00:59:00
tomhughes/trac-tickets
https://api.github.com/repos/tomhughes/trac-tickets
closed
tah.openstreetmap.org handles empty parts wrong
Component: osmarender Priority: minor Resolution: fixed Type: defect
**[Submitted to the original trac issue database at 11.50am, Thursday, 10th April 2008]** E.g. when you look at http://tah.openstreetmap.org/MapOf/index.php?lat=51.1264&long=14.1847&z=14&h=1994&w=1389&format=png there is an empty square part left of "Grodrebnitz". This is an area, which is totally empty and drawn totally white, but the normal background is a light grey. Same for http://tah.openstreetmap.org/MapOf/index.php?lat=52.345&long=13.60&z=15&h=1994&w=1389&format=png left beside Schulzendorf. Solution: For empty tiles use the same light grey color.
1.0
tah.openstreetmap.org handles empty parts wrong - **[Submitted to the original trac issue database at 11.50am, Thursday, 10th April 2008]** E.g. when you look at http://tah.openstreetmap.org/MapOf/index.php?lat=51.1264&long=14.1847&z=14&h=1994&w=1389&format=png there is an empty square part left of "Grodrebnitz". This is an area, which is totally empty and drawn totally white, but the normal background is a light grey. Same for http://tah.openstreetmap.org/MapOf/index.php?lat=52.345&long=13.60&z=15&h=1994&w=1389&format=png left beside Schulzendorf. Solution: For empty tiles use the same light grey color.
defect
tah openstreetmap org handles empty parts wrong e g when you look at there is an empty square part left of grodrebnitz this is an area which is totally empty and drawn totally white but the normal background is a light grey same for left beside schulzendorf solution for empty tiles use the same light grey color
1
9,609
2,615,163,625
IssuesEvent
2015-03-01 06:43:18
chrsmith/reaver-wps
https://api.github.com/repos/chrsmith/reaver-wps
opened
WPS and WPS Pin
auto-migrated Priority-Triage Type-Defect
``` Doing some Reaver (v.14) testing against my UK Virgin Media WPS enabled AP - and have encountered some unexpected results. Attachment 1 (available on request): wps_pin_en Shows WPS and WPS PIN enabled on the AP. Shows the WPS PIN. Reaver input where I've "guessed" the PIN number. Reaver output successfully retrieving the WPA-PSK key. Attachment 2 (available on request): wps_pin_dis Shows WPS enabled - but WPS PIN disabled on the AP. Greyed out WPS PIN. Reaver input where I've "guessed" the PIN number. Reaver output unable to retrieve the WPA-PSK key - despite knowing I've successfully "guessed" the WPS PIN. So I guess my question is; Are both WPS and WPS PIN functionality required to be enabled for a Reaver attack to work? Why is this important? If WPS is enabled on the AP - but the WPS PIN option is disabled - will the attack vector fail? Cheers Chris. ``` Original issue reported on code.google.com by `r8415...@gmail.com` on 10 Aug 2012 at 5:25
1.0
WPS and WPS Pin - ``` Doing some Reaver (v.14) testing against my UK Virgin Media WPS enabled AP - and have encountered some unexpected results. Attachment 1 (available on request): wps_pin_en Shows WPS and WPS PIN enabled on the AP. Shows the WPS PIN. Reaver input where I've "guessed" the PIN number. Reaver output successfully retrieving the WPA-PSK key. Attachment 2 (available on request): wps_pin_dis Shows WPS enabled - but WPS PIN disabled on the AP. Greyed out WPS PIN. Reaver input where I've "guessed" the PIN number. Reaver output unable to retrieve the WPA-PSK key - despite knowing I've successfully "guessed" the WPS PIN. So I guess my question is; Are both WPS and WPS PIN functionality required to be enabled for a Reaver attack to work? Why is this important? If WPS is enabled on the AP - but the WPS PIN option is disabled - will the attack vector fail? Cheers Chris. ``` Original issue reported on code.google.com by `r8415...@gmail.com` on 10 Aug 2012 at 5:25
defect
wps and wps pin doing some reaver v testing against my uk virgin media wps enabled ap and have encountered some unexpected results attachment available on request wps pin en shows wps and wps pin enabled on the ap shows the wps pin reaver input where i ve guessed the pin number reaver output successfully retrieving the wpa psk key attachment available on request wps pin dis shows wps enabled but wps pin disabled on the ap greyed out wps pin reaver input where i ve guessed the pin number reaver output unable to retrieve the wpa psk key despite knowing i ve successfully guessed the wps pin so i guess my question is are both wps and wps pin functionality required to be enabled for a reaver attack to work why is this important if wps is enabled on the ap but the wps pin option is disabled will the attack vector fail cheers chris original issue reported on code google com by gmail com on aug at
1
167,254
13,017,643,274
IssuesEvent
2020-07-26 13:33:41
chaotic-aur/infra
https://api.github.com/repos/chaotic-aur/infra
closed
Matrix.org qt clients
pkg-request waiting-testing
`quaternion`, `quaternion-git` `spectral-matrix`, `spectral-matrix-git` `nheko`, `nheko-git` `matrix-mirage`, `matrix-mirage-git`
1.0
Matrix.org qt clients - `quaternion`, `quaternion-git` `spectral-matrix`, `spectral-matrix-git` `nheko`, `nheko-git` `matrix-mirage`, `matrix-mirage-git`
non_defect
matrix org qt clients quaternion quaternion git spectral matrix spectral matrix git nheko nheko git matrix mirage matrix mirage git
0
15,110
11,355,647,318
IssuesEvent
2020-01-24 20:33:31
enarx/enarx
https://api.github.com/repos/enarx/enarx
closed
Issue Templates
infrastructure
We need some decent issue templates. This is related, in part, to project infrastructure automation.
1.0
Issue Templates - We need some decent issue templates. This is related, in part, to project infrastructure automation.
non_defect
issue templates we need some decent issue templates this is related in part to project infrastructure automation
0
30,928
6,359,320,092
IssuesEvent
2017-07-31 06:47:48
ironjan/metal-only
https://api.github.com/repos/ironjan/metal-only
closed
UnknownHostException for 6 devices via PlayStore
defect duplicate
``` org.springframework.web.client.ResourceAccessException: at org.springframework.web.client.RestTemplate.doExecute (RestTemplate.java:491) at org.springframework.web.client.RestTemplate.execute (RestTemplate.java:439) at org.springframework.web.client.RestTemplate.exchange (RestTemplate.java:415) at com.github.ironjan.metalonly.client_library.MetalOnlyAPI_.getStats (MetalOnlyAPI_.java:49) at com.github.ironjan.metalonly.client_library.MetalOnlyAPIWrapper.getStats (MetalOnlyAPIWrapper.kt:55) at com.codingspezis.android.metalonly.player.StreamControlActivity$2.run (StreamControlActivity.java:195) at java.lang.Thread.run (Thread.java:818) Caused by: java.net.UnknownHostException: at java.net.InetAddress.lookupHostByName (InetAddress.java:470) at java.net.InetAddress.getAllByNameImpl (InetAddress.java:252) at java.net.InetAddress.getAllByName (InetAddress.java:215) at com.android.okhttp.internal.Network$1.resolveInetAddresses (Network.java:29) at com.android.okhttp.internal.http.RouteSelector.resetNextInetSocketAddress (RouteSelector.java:220) at com.android.okhttp.internal.http.RouteSelector.nextProxy (RouteSelector.java:176) at com.android.okhttp.internal.http.RouteSelector.next (RouteSelector.java:108) at com.android.okhttp.internal.http.HttpEngine.createNextConnection (HttpEngine.java:500) at com.android.okhttp.internal.http.HttpEngine.nextConnection (HttpEngine.java:483) at com.android.okhttp.internal.http.HttpEngine.connect (HttpEngine.java:465) at com.android.okhttp.internal.http.HttpEngine.sendRequest (HttpEngine.java:371) at com.android.okhttp.internal.huc.HttpURLConnectionImpl.execute (HttpURLConnectionImpl.java:476) at com.android.okhttp.internal.huc.HttpURLConnectionImpl.connect (HttpURLConnectionImpl.java:118) at com.android.okhttp.internal.huc.DelegatingHttpsURLConnection.connect (DelegatingHttpsURLConnection.java:89) at com.android.okhttp.internal.huc.HttpsURLConnectionImpl.connect (HttpsURLConnectionImpl.java:25) at org.springframework.http.client.SimpleBufferingClientHttpRequest.executeInternal (SimpleBufferingClientHttpRequest.java:72) at org.springframework.http.client.AbstractBufferingClientHttpRequest.executeInternal (AbstractBufferingClientHttpRequest.java:46) at org.springframework.http.client.AbstractClientHttpRequest.execute (AbstractClientHttpRequest.java:63) at org.springframework.web.client.RestTemplate.doExecute (RestTemplate.java:476) ```
1.0
UnknownHostException for 6 devices via PlayStore - ``` org.springframework.web.client.ResourceAccessException: at org.springframework.web.client.RestTemplate.doExecute (RestTemplate.java:491) at org.springframework.web.client.RestTemplate.execute (RestTemplate.java:439) at org.springframework.web.client.RestTemplate.exchange (RestTemplate.java:415) at com.github.ironjan.metalonly.client_library.MetalOnlyAPI_.getStats (MetalOnlyAPI_.java:49) at com.github.ironjan.metalonly.client_library.MetalOnlyAPIWrapper.getStats (MetalOnlyAPIWrapper.kt:55) at com.codingspezis.android.metalonly.player.StreamControlActivity$2.run (StreamControlActivity.java:195) at java.lang.Thread.run (Thread.java:818) Caused by: java.net.UnknownHostException: at java.net.InetAddress.lookupHostByName (InetAddress.java:470) at java.net.InetAddress.getAllByNameImpl (InetAddress.java:252) at java.net.InetAddress.getAllByName (InetAddress.java:215) at com.android.okhttp.internal.Network$1.resolveInetAddresses (Network.java:29) at com.android.okhttp.internal.http.RouteSelector.resetNextInetSocketAddress (RouteSelector.java:220) at com.android.okhttp.internal.http.RouteSelector.nextProxy (RouteSelector.java:176) at com.android.okhttp.internal.http.RouteSelector.next (RouteSelector.java:108) at com.android.okhttp.internal.http.HttpEngine.createNextConnection (HttpEngine.java:500) at com.android.okhttp.internal.http.HttpEngine.nextConnection (HttpEngine.java:483) at com.android.okhttp.internal.http.HttpEngine.connect (HttpEngine.java:465) at com.android.okhttp.internal.http.HttpEngine.sendRequest (HttpEngine.java:371) at com.android.okhttp.internal.huc.HttpURLConnectionImpl.execute (HttpURLConnectionImpl.java:476) at com.android.okhttp.internal.huc.HttpURLConnectionImpl.connect (HttpURLConnectionImpl.java:118) at com.android.okhttp.internal.huc.DelegatingHttpsURLConnection.connect (DelegatingHttpsURLConnection.java:89) at com.android.okhttp.internal.huc.HttpsURLConnectionImpl.connect (HttpsURLConnectionImpl.java:25) at org.springframework.http.client.SimpleBufferingClientHttpRequest.executeInternal (SimpleBufferingClientHttpRequest.java:72) at org.springframework.http.client.AbstractBufferingClientHttpRequest.executeInternal (AbstractBufferingClientHttpRequest.java:46) at org.springframework.http.client.AbstractClientHttpRequest.execute (AbstractClientHttpRequest.java:63) at org.springframework.web.client.RestTemplate.doExecute (RestTemplate.java:476) ```
defect
unknownhostexception for devices via playstore org springframework web client resourceaccessexception at org springframework web client resttemplate doexecute resttemplate java at org springframework web client resttemplate execute resttemplate java at org springframework web client resttemplate exchange resttemplate java at com github ironjan metalonly client library metalonlyapi getstats metalonlyapi java at com github ironjan metalonly client library metalonlyapiwrapper getstats metalonlyapiwrapper kt at com codingspezis android metalonly player streamcontrolactivity run streamcontrolactivity java at java lang thread run thread java caused by java net unknownhostexception at java net inetaddress lookuphostbyname inetaddress java at java net inetaddress getallbynameimpl inetaddress java at java net inetaddress getallbyname inetaddress java at com android okhttp internal network resolveinetaddresses network java at com android okhttp internal http routeselector resetnextinetsocketaddress routeselector java at com android okhttp internal http routeselector nextproxy routeselector java at com android okhttp internal http routeselector next routeselector java at com android okhttp internal http httpengine createnextconnection httpengine java at com android okhttp internal http httpengine nextconnection httpengine java at com android okhttp internal http httpengine connect httpengine java at com android okhttp internal http httpengine sendrequest httpengine java at com android okhttp internal huc httpurlconnectionimpl execute httpurlconnectionimpl java at com android okhttp internal huc httpurlconnectionimpl connect httpurlconnectionimpl java at com android okhttp internal huc delegatinghttpsurlconnection connect delegatinghttpsurlconnection java at com android okhttp internal huc httpsurlconnectionimpl connect httpsurlconnectionimpl java at org springframework http client simplebufferingclienthttprequest executeinternal simplebufferingclienthttprequest java at org springframework http client abstractbufferingclienthttprequest executeinternal abstractbufferingclienthttprequest java at org springframework http client abstractclienthttprequest execute abstractclienthttprequest java at org springframework web client resttemplate doexecute resttemplate java
1
228,084
25,154,674,536
IssuesEvent
2022-11-10 12:41:36
vital-ws/npm-1
https://api.github.com/repos/vital-ws/npm-1
closed
express-4.0.0.tgz: 13 vulnerabilities (highest severity is: 7.5) - autoclosed
security vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>express-4.0.0.tgz</b></p></summary> <p>Sinatra inspired web development framework</p> <p>Library home page: <a href="https://registry.npmjs.org/express/-/express-4.0.0.tgz">https://registry.npmjs.org/express/-/express-4.0.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/express/package.json</p> <p> <p>Found in HEAD commit: <a href="https://github.com/vital-ws/npm-1/commit/2c6a2a3bfebd356a0f80c5e4c83d4252e0efec2c">2c6a2a3bfebd356a0f80c5e4c83d4252e0efec2c</a></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (express version) | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | ------------- | --- | | [WS-2014-0005](https://github.com/ljharb/qs/commit/6667340dd3c7deaa0eb1c27f175faaaf71f19823) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | qs-0.6.6.tgz | Transitive | 4.8.0 | &#9989; | | [CVE-2017-16138](https://www.mend.io/vulnerability-database/CVE-2017-16138) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | mime-1.2.11.tgz | Transitive | 4.16.0 | &#9989; | | [CVE-2014-10064](https://www.mend.io/vulnerability-database/CVE-2014-10064) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | qs-0.6.6.tgz | Transitive | 4.8.0 | &#9989; | | [CVE-2017-16119](https://www.mend.io/vulnerability-database/CVE-2017-16119) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | detected in multiple dependencies | Transitive | 4.15.5 | &#9989; | | [CVE-2014-6394](https://www.mend.io/vulnerability-database/CVE-2014-6394) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.3 | detected in multiple dependencies | Transitive | 4.8.8 | &#9989; | | [CVE-2016-10539](https://www.mend.io/vulnerability-database/CVE-2016-10539) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.3 | negotiator-0.3.0.tgz | Transitive | 4.14.0 | &#9989; | | [CVE-2015-8859](https://www.mend.io/vulnerability-database/CVE-2015-8859) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.3 | detected in multiple dependencies | Transitive | 4.11.1 | &#9989; | | [CVE-2017-1000048](https://www.mend.io/vulnerability-database/CVE-2017-1000048) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.3 | qs-0.6.6.tgz | Transitive | 4.14.0 | &#9989; | | [CVE-2017-16137](https://www.mend.io/vulnerability-database/CVE-2017-16137) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.3 | debug-0.8.1.tgz | Transitive | 4.15.5 | &#9989; | | [CVE-2014-7191](https://www.mend.io/vulnerability-database/CVE-2014-7191) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.3 | qs-0.6.6.tgz | Transitive | 4.8.0 | &#9989; | | [CVE-2016-1000236](https://www.mend.io/vulnerability-database/CVE-2016-1000236) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 4.4 | cookie-signature-1.0.3.tgz | Transitive | 4.4.5 | &#9989; | | [CVE-2015-1164](https://www.mend.io/vulnerability-database/CVE-2015-1164) | <img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> Low | 3.7 | serve-static-1.0.1.tgz | Transitive | 4.10.0 | &#9989; | | [CVE-2014-6393](https://www.mend.io/vulnerability-database/CVE-2014-6393) | <img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> Low | 3.7 | express-4.0.0.tgz | Direct | 4.5.0 | &#9989; | ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> WS-2014-0005</summary> ### Vulnerable Library - <b>qs-0.6.6.tgz</b></p> <p>querystring parser</p> <p>Library home page: <a href="https://registry.npmjs.org/qs/-/qs-0.6.6.tgz">https://registry.npmjs.org/qs/-/qs-0.6.6.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/qs/package.json</p> <p> Dependency Hierarchy: - express-4.0.0.tgz (Root Library) - :x: **qs-0.6.6.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/vital-ws/npm-1/commit/2c6a2a3bfebd356a0f80c5e4c83d4252e0efec2c">2c6a2a3bfebd356a0f80c5e4c83d4252e0efec2c</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> Denial-of-Service Extended Event Loop Blocking.The qs module does not have an option or default for specifying object depth and when parsing a string representing a deeply nested object will block the event loop for long periods of time <p>Publish Date: 2014-07-31 <p>URL: <a href=https://github.com/ljharb/qs/commit/6667340dd3c7deaa0eb1c27f175faaaf71f19823>WS-2014-0005</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/WS-2014-0005">https://nvd.nist.gov/vuln/detail/WS-2014-0005</a></p> <p>Release Date: 2014-07-31</p> <p>Fix Resolution (qs): 1.0.0</p> <p>Direct dependency fix Resolution (express): 4.8.0</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2017-16138</summary> ### Vulnerable Library - <b>mime-1.2.11.tgz</b></p> <p>A comprehensive library for mime-type mapping</p> <p>Library home page: <a href="https://registry.npmjs.org/mime/-/mime-1.2.11.tgz">https://registry.npmjs.org/mime/-/mime-1.2.11.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/mime/package.json</p> <p> Dependency Hierarchy: - express-4.0.0.tgz (Root Library) - type-is-1.0.0.tgz - :x: **mime-1.2.11.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/vital-ws/npm-1/commit/2c6a2a3bfebd356a0f80c5e4c83d4252e0efec2c">2c6a2a3bfebd356a0f80c5e4c83d4252e0efec2c</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> The mime module < 1.4.1, 2.0.1, 2.0.2 is vulnerable to regular expression denial of service when a mime lookup is performed on untrusted user input. <p>Publish Date: 2018-06-07 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2017-16138>CVE-2017-16138</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16138">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16138</a></p> <p>Release Date: 2018-06-07</p> <p>Fix Resolution (mime): 1.4.1</p> <p>Direct dependency fix Resolution (express): 4.16.0</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2014-10064</summary> ### Vulnerable Library - <b>qs-0.6.6.tgz</b></p> <p>querystring parser</p> <p>Library home page: <a href="https://registry.npmjs.org/qs/-/qs-0.6.6.tgz">https://registry.npmjs.org/qs/-/qs-0.6.6.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/qs/package.json</p> <p> Dependency Hierarchy: - express-4.0.0.tgz (Root Library) - :x: **qs-0.6.6.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/vital-ws/npm-1/commit/2c6a2a3bfebd356a0f80c5e4c83d4252e0efec2c">2c6a2a3bfebd356a0f80c5e4c83d4252e0efec2c</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> The qs module before 1.0.0 does not have an option or default for specifying object depth and when parsing a string representing a deeply nested object will block the event loop for long periods of time. An attacker could leverage this to cause a temporary denial-of-service condition, for example, in a web application, other requests would not be processed while this blocking is occurring. <p>Publish Date: 2018-05-31 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2014-10064>CVE-2014-10064</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2014-10064">https://nvd.nist.gov/vuln/detail/CVE-2014-10064</a></p> <p>Release Date: 2018-05-31</p> <p>Fix Resolution (qs): 1.0.0</p> <p>Direct dependency fix Resolution (express): 4.8.0</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2017-16119</summary> ### Vulnerable Libraries - <b>fresh-0.2.2.tgz</b>, <b>fresh-0.2.0.tgz</b></p> <p> ### <b>fresh-0.2.2.tgz</b></p> <p>HTTP response freshness testing</p> <p>Library home page: <a href="https://registry.npmjs.org/fresh/-/fresh-0.2.2.tgz">https://registry.npmjs.org/fresh/-/fresh-0.2.2.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/fresh/package.json</p> <p> Dependency Hierarchy: - express-4.0.0.tgz (Root Library) - :x: **fresh-0.2.2.tgz** (Vulnerable Library) ### <b>fresh-0.2.0.tgz</b></p> <p>HTTP response freshness testing</p> <p>Library home page: <a href="https://registry.npmjs.org/fresh/-/fresh-0.2.0.tgz">https://registry.npmjs.org/fresh/-/fresh-0.2.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/serve-static/node_modules/fresh/package.json</p> <p> Dependency Hierarchy: - express-4.0.0.tgz (Root Library) - serve-static-1.0.1.tgz - send-0.1.4.tgz - :x: **fresh-0.2.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/vital-ws/npm-1/commit/2c6a2a3bfebd356a0f80c5e4c83d4252e0efec2c">2c6a2a3bfebd356a0f80c5e4c83d4252e0efec2c</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> Fresh is a module used by the Express.js framework for HTTP response freshness testing. It is vulnerable to a regular expression denial of service when it is passed specially crafted input to parse. This causes the event loop to be blocked causing a denial of service condition. <p>Publish Date: 2018-06-07 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2017-16119>CVE-2017-16119</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.npmjs.com/advisories/526">https://www.npmjs.com/advisories/526</a></p> <p>Release Date: 2018-06-07</p> <p>Fix Resolution (fresh): 0.5.2</p> <p>Direct dependency fix Resolution (express): 4.15.5</p><p>Fix Resolution (fresh): 0.5.2</p> <p>Direct dependency fix Resolution (express): 4.15.5</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2014-6394</summary> ### Vulnerable Libraries - <b>send-0.1.4.tgz</b>, <b>send-0.2.0.tgz</b></p> <p> ### <b>send-0.1.4.tgz</b></p> <p>Better streaming static file server with Range and conditional-GET support</p> <p>Library home page: <a href="https://registry.npmjs.org/send/-/send-0.1.4.tgz">https://registry.npmjs.org/send/-/send-0.1.4.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/serve-static/node_modules/send/package.json</p> <p> Dependency Hierarchy: - express-4.0.0.tgz (Root Library) - serve-static-1.0.1.tgz - :x: **send-0.1.4.tgz** (Vulnerable Library) ### <b>send-0.2.0.tgz</b></p> <p>Better streaming static file server with Range and conditional-GET support</p> <p>Library home page: <a href="https://registry.npmjs.org/send/-/send-0.2.0.tgz">https://registry.npmjs.org/send/-/send-0.2.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/send/package.json</p> <p> Dependency Hierarchy: - express-4.0.0.tgz (Root Library) - :x: **send-0.2.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/vital-ws/npm-1/commit/2c6a2a3bfebd356a0f80c5e4c83d4252e0efec2c">2c6a2a3bfebd356a0f80c5e4c83d4252e0efec2c</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> visionmedia send before 0.8.4 for Node.js uses a partial comparison for verifying whether a directory is within the document root, which allows remote attackers to access restricted directories, as demonstrated using "public-restricted" under a "public" directory. <p>Publish Date: 2014-10-08 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2014-6394>CVE-2014-6394</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.3</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2014-6394">https://nvd.nist.gov/vuln/detail/CVE-2014-6394</a></p> <p>Release Date: 2014-10-08</p> <p>Fix Resolution (send): 0.8.4</p> <p>Direct dependency fix Resolution (express): 4.8.8</p><p>Fix Resolution (send): 0.8.4</p> <p>Direct dependency fix Resolution (express): 4.8.8</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2016-10539</summary> ### Vulnerable Library - <b>negotiator-0.3.0.tgz</b></p> <p>HTTP content negotiation</p> <p>Library home page: <a href="https://registry.npmjs.org/negotiator/-/negotiator-0.3.0.tgz">https://registry.npmjs.org/negotiator/-/negotiator-0.3.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/negotiator/package.json</p> <p> Dependency Hierarchy: - express-4.0.0.tgz (Root Library) - accepts-1.0.0.tgz - :x: **negotiator-0.3.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/vital-ws/npm-1/commit/2c6a2a3bfebd356a0f80c5e4c83d4252e0efec2c">2c6a2a3bfebd356a0f80c5e4c83d4252e0efec2c</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> negotiator is an HTTP content negotiator for Node.js and is used by many modules and frameworks including Express and Koa. The header for "Accept-Language", when parsed by negotiator 0.6.0 and earlier is vulnerable to Regular Expression Denial of Service via a specially crafted string. <p>Publish Date: 2018-05-31 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2016-10539>CVE-2016-10539</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>5.3</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.npmjs.com/advisories/106">https://www.npmjs.com/advisories/106</a></p> <p>Release Date: 2018-05-31</p> <p>Fix Resolution (negotiator): 0.6.1</p> <p>Direct dependency fix Resolution (express): 4.14.0</p> </p> <p></p> <p>In order to enable automatic remediation, please create <a target="_blank" href="https://docs.mend.io/bundle/integrations/page/mend_for_github_com.html#MendforGitHub.com-RemediateSettings(remediateSettings)">workflow rules</a></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2015-8859</summary> ### Vulnerable Libraries - <b>send-0.1.4.tgz</b>, <b>send-0.2.0.tgz</b></p> <p> ### <b>send-0.1.4.tgz</b></p> <p>Better streaming static file server with Range and conditional-GET support</p> <p>Library home page: <a href="https://registry.npmjs.org/send/-/send-0.1.4.tgz">https://registry.npmjs.org/send/-/send-0.1.4.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/serve-static/node_modules/send/package.json</p> <p> Dependency Hierarchy: - express-4.0.0.tgz (Root Library) - serve-static-1.0.1.tgz - :x: **send-0.1.4.tgz** (Vulnerable Library) ### <b>send-0.2.0.tgz</b></p> <p>Better streaming static file server with Range and conditional-GET support</p> <p>Library home page: <a href="https://registry.npmjs.org/send/-/send-0.2.0.tgz">https://registry.npmjs.org/send/-/send-0.2.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/send/package.json</p> <p> Dependency Hierarchy: - express-4.0.0.tgz (Root Library) - :x: **send-0.2.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/vital-ws/npm-1/commit/2c6a2a3bfebd356a0f80c5e4c83d4252e0efec2c">2c6a2a3bfebd356a0f80c5e4c83d4252e0efec2c</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> The send package before 0.11.1 for Node.js allows attackers to obtain the root path via unspecified vectors. <p>Publish Date: 2017-01-23 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2015-8859>CVE-2015-8859</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>5.3</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2015-8859">https://nvd.nist.gov/vuln/detail/CVE-2015-8859</a></p> <p>Release Date: 2017-01-23</p> <p>Fix Resolution (send): 0.11.1</p> <p>Direct dependency fix Resolution (express): 4.11.1</p><p>Fix Resolution (send): 0.11.1</p> <p>Direct dependency fix Resolution (express): 4.11.1</p> </p> <p></p> <p>In order to enable automatic remediation, please create <a target="_blank" href="https://docs.mend.io/bundle/integrations/page/mend_for_github_com.html#MendforGitHub.com-RemediateSettings(remediateSettings)">workflow rules</a></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2017-1000048</summary> ### Vulnerable Library - <b>qs-0.6.6.tgz</b></p> <p>querystring parser</p> <p>Library home page: <a href="https://registry.npmjs.org/qs/-/qs-0.6.6.tgz">https://registry.npmjs.org/qs/-/qs-0.6.6.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/qs/package.json</p> <p> Dependency Hierarchy: - express-4.0.0.tgz (Root Library) - :x: **qs-0.6.6.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/vital-ws/npm-1/commit/2c6a2a3bfebd356a0f80c5e4c83d4252e0efec2c">2c6a2a3bfebd356a0f80c5e4c83d4252e0efec2c</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> the web framework using ljharb's qs module older than v6.3.2, v6.2.3, v6.1.2, and v6.0.4 is vulnerable to a DoS. A malicious user can send a evil request to cause the web framework crash. <p>Publish Date: 2017-07-17 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2017-1000048>CVE-2017-1000048</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>5.3</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000048">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000048</a></p> <p>Release Date: 2017-07-17</p> <p>Fix Resolution (qs): 6.0.4</p> <p>Direct dependency fix Resolution (express): 4.14.0</p> </p> <p></p> <p>In order to enable automatic remediation, please create <a target="_blank" href="https://docs.mend.io/bundle/integrations/page/mend_for_github_com.html#MendforGitHub.com-RemediateSettings(remediateSettings)">workflow rules</a></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2017-16137</summary> ### Vulnerable Library - <b>debug-0.8.1.tgz</b></p> <p>small debugging utility</p> <p>Library home page: <a href="https://registry.npmjs.org/debug/-/debug-0.8.1.tgz">https://registry.npmjs.org/debug/-/debug-0.8.1.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/express/node_modules/debug/package.json</p> <p> Dependency Hierarchy: - express-4.0.0.tgz (Root Library) - :x: **debug-0.8.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/vital-ws/npm-1/commit/2c6a2a3bfebd356a0f80c5e4c83d4252e0efec2c">2c6a2a3bfebd356a0f80c5e4c83d4252e0efec2c</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> The debug module is vulnerable to regular expression denial of service when untrusted user input is passed into the o formatter. It takes around 50k characters to block for 2 seconds making this a low severity issue. <p>Publish Date: 2018-06-07 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2017-16137>CVE-2017-16137</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>5.3</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16137">https://nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16137</a></p> <p>Release Date: 2018-06-07</p> <p>Fix Resolution (debug): 2.6.9</p> <p>Direct dependency fix Resolution (express): 4.15.5</p> </p> <p></p> <p>In order to enable automatic remediation, please create <a target="_blank" href="https://docs.mend.io/bundle/integrations/page/mend_for_github_com.html#MendforGitHub.com-RemediateSettings(remediateSettings)">workflow rules</a></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2014-7191</summary> ### Vulnerable Library - <b>qs-0.6.6.tgz</b></p> <p>querystring parser</p> <p>Library home page: <a href="https://registry.npmjs.org/qs/-/qs-0.6.6.tgz">https://registry.npmjs.org/qs/-/qs-0.6.6.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/qs/package.json</p> <p> Dependency Hierarchy: - express-4.0.0.tgz (Root Library) - :x: **qs-0.6.6.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/vital-ws/npm-1/commit/2c6a2a3bfebd356a0f80c5e4c83d4252e0efec2c">2c6a2a3bfebd356a0f80c5e4c83d4252e0efec2c</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> The qs module before 1.0.0 in Node.js does not call the compact function for array data, which allows remote attackers to cause a denial of service (memory consumption) by using a large index value to create a sparse array. <p>Publish Date: 2014-10-19 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2014-7191>CVE-2014-7191</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>5.3</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2014-7191">https://nvd.nist.gov/vuln/detail/CVE-2014-7191</a></p> <p>Release Date: 2014-10-19</p> <p>Fix Resolution (qs): 1.0.0</p> <p>Direct dependency fix Resolution (express): 4.8.0</p> </p> <p></p> <p>In order to enable automatic remediation, please create <a target="_blank" href="https://docs.mend.io/bundle/integrations/page/mend_for_github_com.html#MendforGitHub.com-RemediateSettings(remediateSettings)">workflow rules</a></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2016-1000236</summary> ### Vulnerable Library - <b>cookie-signature-1.0.3.tgz</b></p> <p>Sign and unsign cookies</p> <p>Library home page: <a href="https://registry.npmjs.org/cookie-signature/-/cookie-signature-1.0.3.tgz">https://registry.npmjs.org/cookie-signature/-/cookie-signature-1.0.3.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/cookie-signature/package.json</p> <p> Dependency Hierarchy: - express-4.0.0.tgz (Root Library) - :x: **cookie-signature-1.0.3.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/vital-ws/npm-1/commit/2c6a2a3bfebd356a0f80c5e4c83d4252e0efec2c">2c6a2a3bfebd356a0f80c5e4c83d4252e0efec2c</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> Node-cookie-signature before 1.0.6 is affected by a timing attack due to the type of comparison used. <p>Publish Date: 2019-11-19 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2016-1000236>CVE-2016-1000236</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>4.4</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: High - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-92vm-wfm5-mxvv">https://github.com/advisories/GHSA-92vm-wfm5-mxvv</a></p> <p>Release Date: 2019-11-19</p> <p>Fix Resolution (cookie-signature): 1.0.4</p> <p>Direct dependency fix Resolution (express): 4.4.5</p> </p> <p></p> <p>In order to enable automatic remediation, please create <a target="_blank" href="https://docs.mend.io/bundle/integrations/page/mend_for_github_com.html#MendforGitHub.com-RemediateSettings(remediateSettings)">workflow rules</a></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> CVE-2015-1164</summary> ### Vulnerable Library - <b>serve-static-1.0.1.tgz</b></p> <p>Serve static files</p> <p>Library home page: <a href="https://registry.npmjs.org/serve-static/-/serve-static-1.0.1.tgz">https://registry.npmjs.org/serve-static/-/serve-static-1.0.1.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/serve-static/package.json</p> <p> Dependency Hierarchy: - express-4.0.0.tgz (Root Library) - :x: **serve-static-1.0.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/vital-ws/npm-1/commit/2c6a2a3bfebd356a0f80c5e4c83d4252e0efec2c">2c6a2a3bfebd356a0f80c5e4c83d4252e0efec2c</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> Open redirect vulnerability in the serve-static plugin before 1.7.2 for Node.js, when mounted at the root, allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a // (slash slash) followed by a domain in the PATH_INFO to the default URI. <p>Publish Date: 2015-01-21 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2015-1164>CVE-2015-1164</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>3.7</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2015-1164">https://nvd.nist.gov/vuln/detail/CVE-2015-1164</a></p> <p>Release Date: 2015-01-21</p> <p>Fix Resolution (serve-static): 1.7.2</p> <p>Direct dependency fix Resolution (express): 4.10.0</p> </p> <p></p> <p>In order to enable automatic remediation, please create <a target="_blank" href="https://docs.mend.io/bundle/integrations/page/mend_for_github_com.html#MendforGitHub.com-RemediateSettings(remediateSettings)">workflow rules</a></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> CVE-2014-6393</summary> ### Vulnerable Library - <b>express-4.0.0.tgz</b></p> <p>Sinatra inspired web development framework</p> <p>Library home page: <a href="https://registry.npmjs.org/express/-/express-4.0.0.tgz">https://registry.npmjs.org/express/-/express-4.0.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/express/package.json</p> <p> Dependency Hierarchy: - :x: **express-4.0.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/vital-ws/npm-1/commit/2c6a2a3bfebd356a0f80c5e4c83d4252e0efec2c">2c6a2a3bfebd356a0f80c5e4c83d4252e0efec2c</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> The Express web framework before 3.11 and 4.x before 4.5 for Node.js does not provide a charset field in HTTP Content-Type headers in 400 level responses, which might allow remote attackers to conduct cross-site scripting (XSS) attacks via characters in a non-standard encoding. <p>Publish Date: 2017-08-09 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2014-6393>CVE-2014-6393</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>3.7</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6393">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6393</a></p> <p>Release Date: 2017-08-09</p> <p>Fix Resolution: 4.5.0</p> </p> <p></p> <p>In order to enable automatic remediation, please create <a target="_blank" href="https://docs.mend.io/bundle/integrations/page/mend_for_github_com.html#MendforGitHub.com-RemediateSettings(remediateSettings)">workflow rules</a></p> </details> *** <p>:rescue_worker_helmet: Automatic Remediation is available for this issue.</p>
True
express-4.0.0.tgz: 13 vulnerabilities (highest severity is: 7.5) - autoclosed - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>express-4.0.0.tgz</b></p></summary> <p>Sinatra inspired web development framework</p> <p>Library home page: <a href="https://registry.npmjs.org/express/-/express-4.0.0.tgz">https://registry.npmjs.org/express/-/express-4.0.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/express/package.json</p> <p> <p>Found in HEAD commit: <a href="https://github.com/vital-ws/npm-1/commit/2c6a2a3bfebd356a0f80c5e4c83d4252e0efec2c">2c6a2a3bfebd356a0f80c5e4c83d4252e0efec2c</a></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (express version) | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | ------------- | --- | | [WS-2014-0005](https://github.com/ljharb/qs/commit/6667340dd3c7deaa0eb1c27f175faaaf71f19823) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | qs-0.6.6.tgz | Transitive | 4.8.0 | &#9989; | | [CVE-2017-16138](https://www.mend.io/vulnerability-database/CVE-2017-16138) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | mime-1.2.11.tgz | Transitive | 4.16.0 | &#9989; | | [CVE-2014-10064](https://www.mend.io/vulnerability-database/CVE-2014-10064) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | qs-0.6.6.tgz | Transitive | 4.8.0 | &#9989; | | [CVE-2017-16119](https://www.mend.io/vulnerability-database/CVE-2017-16119) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | detected in multiple dependencies | Transitive | 4.15.5 | &#9989; | | [CVE-2014-6394](https://www.mend.io/vulnerability-database/CVE-2014-6394) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.3 | detected in multiple dependencies | Transitive | 4.8.8 | &#9989; | | [CVE-2016-10539](https://www.mend.io/vulnerability-database/CVE-2016-10539) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.3 | negotiator-0.3.0.tgz | Transitive | 4.14.0 | &#9989; | | [CVE-2015-8859](https://www.mend.io/vulnerability-database/CVE-2015-8859) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.3 | detected in multiple dependencies | Transitive | 4.11.1 | &#9989; | | [CVE-2017-1000048](https://www.mend.io/vulnerability-database/CVE-2017-1000048) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.3 | qs-0.6.6.tgz | Transitive | 4.14.0 | &#9989; | | [CVE-2017-16137](https://www.mend.io/vulnerability-database/CVE-2017-16137) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.3 | debug-0.8.1.tgz | Transitive | 4.15.5 | &#9989; | | [CVE-2014-7191](https://www.mend.io/vulnerability-database/CVE-2014-7191) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.3 | qs-0.6.6.tgz | Transitive | 4.8.0 | &#9989; | | [CVE-2016-1000236](https://www.mend.io/vulnerability-database/CVE-2016-1000236) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 4.4 | cookie-signature-1.0.3.tgz | Transitive | 4.4.5 | &#9989; | | [CVE-2015-1164](https://www.mend.io/vulnerability-database/CVE-2015-1164) | <img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> Low | 3.7 | serve-static-1.0.1.tgz | Transitive | 4.10.0 | &#9989; | | [CVE-2014-6393](https://www.mend.io/vulnerability-database/CVE-2014-6393) | <img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> Low | 3.7 | express-4.0.0.tgz | Direct | 4.5.0 | &#9989; | ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> WS-2014-0005</summary> ### Vulnerable Library - <b>qs-0.6.6.tgz</b></p> <p>querystring parser</p> <p>Library home page: <a href="https://registry.npmjs.org/qs/-/qs-0.6.6.tgz">https://registry.npmjs.org/qs/-/qs-0.6.6.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/qs/package.json</p> <p> Dependency Hierarchy: - express-4.0.0.tgz (Root Library) - :x: **qs-0.6.6.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/vital-ws/npm-1/commit/2c6a2a3bfebd356a0f80c5e4c83d4252e0efec2c">2c6a2a3bfebd356a0f80c5e4c83d4252e0efec2c</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> Denial-of-Service Extended Event Loop Blocking.The qs module does not have an option or default for specifying object depth and when parsing a string representing a deeply nested object will block the event loop for long periods of time <p>Publish Date: 2014-07-31 <p>URL: <a href=https://github.com/ljharb/qs/commit/6667340dd3c7deaa0eb1c27f175faaaf71f19823>WS-2014-0005</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/WS-2014-0005">https://nvd.nist.gov/vuln/detail/WS-2014-0005</a></p> <p>Release Date: 2014-07-31</p> <p>Fix Resolution (qs): 1.0.0</p> <p>Direct dependency fix Resolution (express): 4.8.0</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2017-16138</summary> ### Vulnerable Library - <b>mime-1.2.11.tgz</b></p> <p>A comprehensive library for mime-type mapping</p> <p>Library home page: <a href="https://registry.npmjs.org/mime/-/mime-1.2.11.tgz">https://registry.npmjs.org/mime/-/mime-1.2.11.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/mime/package.json</p> <p> Dependency Hierarchy: - express-4.0.0.tgz (Root Library) - type-is-1.0.0.tgz - :x: **mime-1.2.11.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/vital-ws/npm-1/commit/2c6a2a3bfebd356a0f80c5e4c83d4252e0efec2c">2c6a2a3bfebd356a0f80c5e4c83d4252e0efec2c</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> The mime module < 1.4.1, 2.0.1, 2.0.2 is vulnerable to regular expression denial of service when a mime lookup is performed on untrusted user input. <p>Publish Date: 2018-06-07 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2017-16138>CVE-2017-16138</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16138">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16138</a></p> <p>Release Date: 2018-06-07</p> <p>Fix Resolution (mime): 1.4.1</p> <p>Direct dependency fix Resolution (express): 4.16.0</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2014-10064</summary> ### Vulnerable Library - <b>qs-0.6.6.tgz</b></p> <p>querystring parser</p> <p>Library home page: <a href="https://registry.npmjs.org/qs/-/qs-0.6.6.tgz">https://registry.npmjs.org/qs/-/qs-0.6.6.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/qs/package.json</p> <p> Dependency Hierarchy: - express-4.0.0.tgz (Root Library) - :x: **qs-0.6.6.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/vital-ws/npm-1/commit/2c6a2a3bfebd356a0f80c5e4c83d4252e0efec2c">2c6a2a3bfebd356a0f80c5e4c83d4252e0efec2c</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> The qs module before 1.0.0 does not have an option or default for specifying object depth and when parsing a string representing a deeply nested object will block the event loop for long periods of time. An attacker could leverage this to cause a temporary denial-of-service condition, for example, in a web application, other requests would not be processed while this blocking is occurring. <p>Publish Date: 2018-05-31 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2014-10064>CVE-2014-10064</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2014-10064">https://nvd.nist.gov/vuln/detail/CVE-2014-10064</a></p> <p>Release Date: 2018-05-31</p> <p>Fix Resolution (qs): 1.0.0</p> <p>Direct dependency fix Resolution (express): 4.8.0</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2017-16119</summary> ### Vulnerable Libraries - <b>fresh-0.2.2.tgz</b>, <b>fresh-0.2.0.tgz</b></p> <p> ### <b>fresh-0.2.2.tgz</b></p> <p>HTTP response freshness testing</p> <p>Library home page: <a href="https://registry.npmjs.org/fresh/-/fresh-0.2.2.tgz">https://registry.npmjs.org/fresh/-/fresh-0.2.2.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/fresh/package.json</p> <p> Dependency Hierarchy: - express-4.0.0.tgz (Root Library) - :x: **fresh-0.2.2.tgz** (Vulnerable Library) ### <b>fresh-0.2.0.tgz</b></p> <p>HTTP response freshness testing</p> <p>Library home page: <a href="https://registry.npmjs.org/fresh/-/fresh-0.2.0.tgz">https://registry.npmjs.org/fresh/-/fresh-0.2.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/serve-static/node_modules/fresh/package.json</p> <p> Dependency Hierarchy: - express-4.0.0.tgz (Root Library) - serve-static-1.0.1.tgz - send-0.1.4.tgz - :x: **fresh-0.2.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/vital-ws/npm-1/commit/2c6a2a3bfebd356a0f80c5e4c83d4252e0efec2c">2c6a2a3bfebd356a0f80c5e4c83d4252e0efec2c</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> Fresh is a module used by the Express.js framework for HTTP response freshness testing. It is vulnerable to a regular expression denial of service when it is passed specially crafted input to parse. This causes the event loop to be blocked causing a denial of service condition. <p>Publish Date: 2018-06-07 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2017-16119>CVE-2017-16119</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.npmjs.com/advisories/526">https://www.npmjs.com/advisories/526</a></p> <p>Release Date: 2018-06-07</p> <p>Fix Resolution (fresh): 0.5.2</p> <p>Direct dependency fix Resolution (express): 4.15.5</p><p>Fix Resolution (fresh): 0.5.2</p> <p>Direct dependency fix Resolution (express): 4.15.5</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2014-6394</summary> ### Vulnerable Libraries - <b>send-0.1.4.tgz</b>, <b>send-0.2.0.tgz</b></p> <p> ### <b>send-0.1.4.tgz</b></p> <p>Better streaming static file server with Range and conditional-GET support</p> <p>Library home page: <a href="https://registry.npmjs.org/send/-/send-0.1.4.tgz">https://registry.npmjs.org/send/-/send-0.1.4.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/serve-static/node_modules/send/package.json</p> <p> Dependency Hierarchy: - express-4.0.0.tgz (Root Library) - serve-static-1.0.1.tgz - :x: **send-0.1.4.tgz** (Vulnerable Library) ### <b>send-0.2.0.tgz</b></p> <p>Better streaming static file server with Range and conditional-GET support</p> <p>Library home page: <a href="https://registry.npmjs.org/send/-/send-0.2.0.tgz">https://registry.npmjs.org/send/-/send-0.2.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/send/package.json</p> <p> Dependency Hierarchy: - express-4.0.0.tgz (Root Library) - :x: **send-0.2.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/vital-ws/npm-1/commit/2c6a2a3bfebd356a0f80c5e4c83d4252e0efec2c">2c6a2a3bfebd356a0f80c5e4c83d4252e0efec2c</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> visionmedia send before 0.8.4 for Node.js uses a partial comparison for verifying whether a directory is within the document root, which allows remote attackers to access restricted directories, as demonstrated using "public-restricted" under a "public" directory. <p>Publish Date: 2014-10-08 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2014-6394>CVE-2014-6394</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.3</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2014-6394">https://nvd.nist.gov/vuln/detail/CVE-2014-6394</a></p> <p>Release Date: 2014-10-08</p> <p>Fix Resolution (send): 0.8.4</p> <p>Direct dependency fix Resolution (express): 4.8.8</p><p>Fix Resolution (send): 0.8.4</p> <p>Direct dependency fix Resolution (express): 4.8.8</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2016-10539</summary> ### Vulnerable Library - <b>negotiator-0.3.0.tgz</b></p> <p>HTTP content negotiation</p> <p>Library home page: <a href="https://registry.npmjs.org/negotiator/-/negotiator-0.3.0.tgz">https://registry.npmjs.org/negotiator/-/negotiator-0.3.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/negotiator/package.json</p> <p> Dependency Hierarchy: - express-4.0.0.tgz (Root Library) - accepts-1.0.0.tgz - :x: **negotiator-0.3.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/vital-ws/npm-1/commit/2c6a2a3bfebd356a0f80c5e4c83d4252e0efec2c">2c6a2a3bfebd356a0f80c5e4c83d4252e0efec2c</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> negotiator is an HTTP content negotiator for Node.js and is used by many modules and frameworks including Express and Koa. The header for "Accept-Language", when parsed by negotiator 0.6.0 and earlier is vulnerable to Regular Expression Denial of Service via a specially crafted string. <p>Publish Date: 2018-05-31 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2016-10539>CVE-2016-10539</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>5.3</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.npmjs.com/advisories/106">https://www.npmjs.com/advisories/106</a></p> <p>Release Date: 2018-05-31</p> <p>Fix Resolution (negotiator): 0.6.1</p> <p>Direct dependency fix Resolution (express): 4.14.0</p> </p> <p></p> <p>In order to enable automatic remediation, please create <a target="_blank" href="https://docs.mend.io/bundle/integrations/page/mend_for_github_com.html#MendforGitHub.com-RemediateSettings(remediateSettings)">workflow rules</a></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2015-8859</summary> ### Vulnerable Libraries - <b>send-0.1.4.tgz</b>, <b>send-0.2.0.tgz</b></p> <p> ### <b>send-0.1.4.tgz</b></p> <p>Better streaming static file server with Range and conditional-GET support</p> <p>Library home page: <a href="https://registry.npmjs.org/send/-/send-0.1.4.tgz">https://registry.npmjs.org/send/-/send-0.1.4.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/serve-static/node_modules/send/package.json</p> <p> Dependency Hierarchy: - express-4.0.0.tgz (Root Library) - serve-static-1.0.1.tgz - :x: **send-0.1.4.tgz** (Vulnerable Library) ### <b>send-0.2.0.tgz</b></p> <p>Better streaming static file server with Range and conditional-GET support</p> <p>Library home page: <a href="https://registry.npmjs.org/send/-/send-0.2.0.tgz">https://registry.npmjs.org/send/-/send-0.2.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/send/package.json</p> <p> Dependency Hierarchy: - express-4.0.0.tgz (Root Library) - :x: **send-0.2.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/vital-ws/npm-1/commit/2c6a2a3bfebd356a0f80c5e4c83d4252e0efec2c">2c6a2a3bfebd356a0f80c5e4c83d4252e0efec2c</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> The send package before 0.11.1 for Node.js allows attackers to obtain the root path via unspecified vectors. <p>Publish Date: 2017-01-23 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2015-8859>CVE-2015-8859</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>5.3</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2015-8859">https://nvd.nist.gov/vuln/detail/CVE-2015-8859</a></p> <p>Release Date: 2017-01-23</p> <p>Fix Resolution (send): 0.11.1</p> <p>Direct dependency fix Resolution (express): 4.11.1</p><p>Fix Resolution (send): 0.11.1</p> <p>Direct dependency fix Resolution (express): 4.11.1</p> </p> <p></p> <p>In order to enable automatic remediation, please create <a target="_blank" href="https://docs.mend.io/bundle/integrations/page/mend_for_github_com.html#MendforGitHub.com-RemediateSettings(remediateSettings)">workflow rules</a></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2017-1000048</summary> ### Vulnerable Library - <b>qs-0.6.6.tgz</b></p> <p>querystring parser</p> <p>Library home page: <a href="https://registry.npmjs.org/qs/-/qs-0.6.6.tgz">https://registry.npmjs.org/qs/-/qs-0.6.6.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/qs/package.json</p> <p> Dependency Hierarchy: - express-4.0.0.tgz (Root Library) - :x: **qs-0.6.6.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/vital-ws/npm-1/commit/2c6a2a3bfebd356a0f80c5e4c83d4252e0efec2c">2c6a2a3bfebd356a0f80c5e4c83d4252e0efec2c</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> the web framework using ljharb's qs module older than v6.3.2, v6.2.3, v6.1.2, and v6.0.4 is vulnerable to a DoS. A malicious user can send a evil request to cause the web framework crash. <p>Publish Date: 2017-07-17 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2017-1000048>CVE-2017-1000048</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>5.3</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000048">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000048</a></p> <p>Release Date: 2017-07-17</p> <p>Fix Resolution (qs): 6.0.4</p> <p>Direct dependency fix Resolution (express): 4.14.0</p> </p> <p></p> <p>In order to enable automatic remediation, please create <a target="_blank" href="https://docs.mend.io/bundle/integrations/page/mend_for_github_com.html#MendforGitHub.com-RemediateSettings(remediateSettings)">workflow rules</a></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2017-16137</summary> ### Vulnerable Library - <b>debug-0.8.1.tgz</b></p> <p>small debugging utility</p> <p>Library home page: <a href="https://registry.npmjs.org/debug/-/debug-0.8.1.tgz">https://registry.npmjs.org/debug/-/debug-0.8.1.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/express/node_modules/debug/package.json</p> <p> Dependency Hierarchy: - express-4.0.0.tgz (Root Library) - :x: **debug-0.8.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/vital-ws/npm-1/commit/2c6a2a3bfebd356a0f80c5e4c83d4252e0efec2c">2c6a2a3bfebd356a0f80c5e4c83d4252e0efec2c</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> The debug module is vulnerable to regular expression denial of service when untrusted user input is passed into the o formatter. It takes around 50k characters to block for 2 seconds making this a low severity issue. <p>Publish Date: 2018-06-07 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2017-16137>CVE-2017-16137</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>5.3</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16137">https://nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16137</a></p> <p>Release Date: 2018-06-07</p> <p>Fix Resolution (debug): 2.6.9</p> <p>Direct dependency fix Resolution (express): 4.15.5</p> </p> <p></p> <p>In order to enable automatic remediation, please create <a target="_blank" href="https://docs.mend.io/bundle/integrations/page/mend_for_github_com.html#MendforGitHub.com-RemediateSettings(remediateSettings)">workflow rules</a></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2014-7191</summary> ### Vulnerable Library - <b>qs-0.6.6.tgz</b></p> <p>querystring parser</p> <p>Library home page: <a href="https://registry.npmjs.org/qs/-/qs-0.6.6.tgz">https://registry.npmjs.org/qs/-/qs-0.6.6.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/qs/package.json</p> <p> Dependency Hierarchy: - express-4.0.0.tgz (Root Library) - :x: **qs-0.6.6.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/vital-ws/npm-1/commit/2c6a2a3bfebd356a0f80c5e4c83d4252e0efec2c">2c6a2a3bfebd356a0f80c5e4c83d4252e0efec2c</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> The qs module before 1.0.0 in Node.js does not call the compact function for array data, which allows remote attackers to cause a denial of service (memory consumption) by using a large index value to create a sparse array. <p>Publish Date: 2014-10-19 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2014-7191>CVE-2014-7191</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>5.3</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2014-7191">https://nvd.nist.gov/vuln/detail/CVE-2014-7191</a></p> <p>Release Date: 2014-10-19</p> <p>Fix Resolution (qs): 1.0.0</p> <p>Direct dependency fix Resolution (express): 4.8.0</p> </p> <p></p> <p>In order to enable automatic remediation, please create <a target="_blank" href="https://docs.mend.io/bundle/integrations/page/mend_for_github_com.html#MendforGitHub.com-RemediateSettings(remediateSettings)">workflow rules</a></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2016-1000236</summary> ### Vulnerable Library - <b>cookie-signature-1.0.3.tgz</b></p> <p>Sign and unsign cookies</p> <p>Library home page: <a href="https://registry.npmjs.org/cookie-signature/-/cookie-signature-1.0.3.tgz">https://registry.npmjs.org/cookie-signature/-/cookie-signature-1.0.3.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/cookie-signature/package.json</p> <p> Dependency Hierarchy: - express-4.0.0.tgz (Root Library) - :x: **cookie-signature-1.0.3.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/vital-ws/npm-1/commit/2c6a2a3bfebd356a0f80c5e4c83d4252e0efec2c">2c6a2a3bfebd356a0f80c5e4c83d4252e0efec2c</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> Node-cookie-signature before 1.0.6 is affected by a timing attack due to the type of comparison used. <p>Publish Date: 2019-11-19 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2016-1000236>CVE-2016-1000236</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>4.4</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: High - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-92vm-wfm5-mxvv">https://github.com/advisories/GHSA-92vm-wfm5-mxvv</a></p> <p>Release Date: 2019-11-19</p> <p>Fix Resolution (cookie-signature): 1.0.4</p> <p>Direct dependency fix Resolution (express): 4.4.5</p> </p> <p></p> <p>In order to enable automatic remediation, please create <a target="_blank" href="https://docs.mend.io/bundle/integrations/page/mend_for_github_com.html#MendforGitHub.com-RemediateSettings(remediateSettings)">workflow rules</a></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> CVE-2015-1164</summary> ### Vulnerable Library - <b>serve-static-1.0.1.tgz</b></p> <p>Serve static files</p> <p>Library home page: <a href="https://registry.npmjs.org/serve-static/-/serve-static-1.0.1.tgz">https://registry.npmjs.org/serve-static/-/serve-static-1.0.1.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/serve-static/package.json</p> <p> Dependency Hierarchy: - express-4.0.0.tgz (Root Library) - :x: **serve-static-1.0.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/vital-ws/npm-1/commit/2c6a2a3bfebd356a0f80c5e4c83d4252e0efec2c">2c6a2a3bfebd356a0f80c5e4c83d4252e0efec2c</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> Open redirect vulnerability in the serve-static plugin before 1.7.2 for Node.js, when mounted at the root, allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a // (slash slash) followed by a domain in the PATH_INFO to the default URI. <p>Publish Date: 2015-01-21 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2015-1164>CVE-2015-1164</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>3.7</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2015-1164">https://nvd.nist.gov/vuln/detail/CVE-2015-1164</a></p> <p>Release Date: 2015-01-21</p> <p>Fix Resolution (serve-static): 1.7.2</p> <p>Direct dependency fix Resolution (express): 4.10.0</p> </p> <p></p> <p>In order to enable automatic remediation, please create <a target="_blank" href="https://docs.mend.io/bundle/integrations/page/mend_for_github_com.html#MendforGitHub.com-RemediateSettings(remediateSettings)">workflow rules</a></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> CVE-2014-6393</summary> ### Vulnerable Library - <b>express-4.0.0.tgz</b></p> <p>Sinatra inspired web development framework</p> <p>Library home page: <a href="https://registry.npmjs.org/express/-/express-4.0.0.tgz">https://registry.npmjs.org/express/-/express-4.0.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/express/package.json</p> <p> Dependency Hierarchy: - :x: **express-4.0.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/vital-ws/npm-1/commit/2c6a2a3bfebd356a0f80c5e4c83d4252e0efec2c">2c6a2a3bfebd356a0f80c5e4c83d4252e0efec2c</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> The Express web framework before 3.11 and 4.x before 4.5 for Node.js does not provide a charset field in HTTP Content-Type headers in 400 level responses, which might allow remote attackers to conduct cross-site scripting (XSS) attacks via characters in a non-standard encoding. <p>Publish Date: 2017-08-09 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2014-6393>CVE-2014-6393</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>3.7</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6393">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6393</a></p> <p>Release Date: 2017-08-09</p> <p>Fix Resolution: 4.5.0</p> </p> <p></p> <p>In order to enable automatic remediation, please create <a target="_blank" href="https://docs.mend.io/bundle/integrations/page/mend_for_github_com.html#MendforGitHub.com-RemediateSettings(remediateSettings)">workflow rules</a></p> </details> *** <p>:rescue_worker_helmet: Automatic Remediation is available for this issue.</p>
non_defect
express tgz vulnerabilities highest severity is autoclosed vulnerable library express tgz sinatra inspired web development framework library home page a href path to dependency file package json path to vulnerable library node modules express package json found in head commit a href vulnerabilities cve severity cvss dependency type fixed in express version remediation available high qs tgz transitive high mime tgz transitive high qs tgz transitive high detected in multiple dependencies transitive high detected in multiple dependencies transitive medium negotiator tgz transitive medium detected in multiple dependencies transitive medium qs tgz transitive medium debug tgz transitive medium qs tgz transitive medium cookie signature tgz transitive low serve static tgz transitive low express tgz direct details ws vulnerable library qs tgz querystring parser library home page a href path to dependency file package json path to vulnerable library node modules qs package json dependency hierarchy express tgz root library x qs tgz vulnerable library found in head commit a href found in base branch main vulnerability details denial of service extended event loop blocking the qs module does not have an option or default for specifying object depth and when parsing a string representing a deeply nested object will block the event loop for long periods of time publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution qs direct dependency fix resolution express rescue worker helmet automatic remediation is available for this issue cve vulnerable library mime tgz a comprehensive library for mime type mapping library home page a href path to dependency file package json path to vulnerable library node modules mime package json dependency hierarchy express tgz root library type is tgz x mime tgz vulnerable library found in head commit a href found in base branch main vulnerability details the mime module is vulnerable to regular expression denial of service when a mime lookup is performed on untrusted user input publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution mime direct dependency fix resolution express rescue worker helmet automatic remediation is available for this issue cve vulnerable library qs tgz querystring parser library home page a href path to dependency file package json path to vulnerable library node modules qs package json dependency hierarchy express tgz root library x qs tgz vulnerable library found in head commit a href found in base branch main vulnerability details the qs module before does not have an option or default for specifying object depth and when parsing a string representing a deeply nested object will block the event loop for long periods of time an attacker could leverage this to cause a temporary denial of service condition for example in a web application other requests would not be processed while this blocking is occurring publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution qs direct dependency fix resolution express rescue worker helmet automatic remediation is available for this issue cve vulnerable libraries fresh tgz fresh tgz fresh tgz http response freshness testing library home page a href path to dependency file package json path to vulnerable library node modules fresh package json dependency hierarchy express tgz root library x fresh tgz vulnerable library fresh tgz http response freshness testing library home page a href path to dependency file package json path to vulnerable library node modules serve static node modules fresh package json dependency hierarchy express tgz root library serve static tgz send tgz x fresh tgz vulnerable library found in head commit a href found in base branch main vulnerability details fresh is a module used by the express js framework for http response freshness testing it is vulnerable to a regular expression denial of service when it is passed specially crafted input to parse this causes the event loop to be blocked causing a denial of service condition publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution fresh direct dependency fix resolution express fix resolution fresh direct dependency fix resolution express rescue worker helmet automatic remediation is available for this issue cve vulnerable libraries send tgz send tgz send tgz better streaming static file server with range and conditional get support library home page a href path to dependency file package json path to vulnerable library node modules serve static node modules send package json dependency hierarchy express tgz root library serve static tgz x send tgz vulnerable library send tgz better streaming static file server with range and conditional get support library home page a href path to dependency file package json path to vulnerable library node modules send package json dependency hierarchy express tgz root library x send tgz vulnerable library found in head commit a href found in base branch main vulnerability details visionmedia send before for node js uses a partial comparison for verifying whether a directory is within the document root which allows remote attackers to access restricted directories as demonstrated using public restricted under a public directory publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact low availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution send direct dependency fix resolution express fix resolution send direct dependency fix resolution express rescue worker helmet automatic remediation is available for this issue cve vulnerable library negotiator tgz http content negotiation library home page a href path to dependency file package json path to vulnerable library node modules negotiator package json dependency hierarchy express tgz root library accepts tgz x negotiator tgz vulnerable library found in head commit a href found in base branch main vulnerability details negotiator is an http content negotiator for node js and is used by many modules and frameworks including express and koa the header for accept language when parsed by negotiator and earlier is vulnerable to regular expression denial of service via a specially crafted string publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution negotiator direct dependency fix resolution express in order to enable automatic remediation please create cve vulnerable libraries send tgz send tgz send tgz better streaming static file server with range and conditional get support library home page a href path to dependency file package json path to vulnerable library node modules serve static node modules send package json dependency hierarchy express tgz root library serve static tgz x send tgz vulnerable library send tgz better streaming static file server with range and conditional get support library home page a href path to dependency file package json path to vulnerable library node modules send package json dependency hierarchy express tgz root library x send tgz vulnerable library found in head commit a href found in base branch main vulnerability details the send package before for node js allows attackers to obtain the root path via unspecified vectors publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution send direct dependency fix resolution express fix resolution send direct dependency fix resolution express in order to enable automatic remediation please create cve vulnerable library qs tgz querystring parser library home page a href path to dependency file package json path to vulnerable library node modules qs package json dependency hierarchy express tgz root library x qs tgz vulnerable library found in head commit a href found in base branch main vulnerability details the web framework using ljharb s qs module older than and is vulnerable to a dos a malicious user can send a evil request to cause the web framework crash publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution qs direct dependency fix resolution express in order to enable automatic remediation please create cve vulnerable library debug tgz small debugging utility library home page a href path to dependency file package json path to vulnerable library node modules express node modules debug package json dependency hierarchy express tgz root library x debug tgz vulnerable library found in head commit a href found in base branch main vulnerability details the debug module is vulnerable to regular expression denial of service when untrusted user input is passed into the o formatter it takes around characters to block for seconds making this a low severity issue publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution debug direct dependency fix resolution express in order to enable automatic remediation please create cve vulnerable library qs tgz querystring parser library home page a href path to dependency file package json path to vulnerable library node modules qs package json dependency hierarchy express tgz root library x qs tgz vulnerable library found in head commit a href found in base branch main vulnerability details the qs module before in node js does not call the compact function for array data which allows remote attackers to cause a denial of service memory consumption by using a large index value to create a sparse array publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution qs direct dependency fix resolution express in order to enable automatic remediation please create cve vulnerable library cookie signature tgz sign and unsign cookies library home page a href path to dependency file package json path to vulnerable library node modules cookie signature package json dependency hierarchy express tgz root library x cookie signature tgz vulnerable library found in head commit a href found in base branch main vulnerability details node cookie signature before is affected by a timing attack due to the type of comparison used publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required high user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution cookie signature direct dependency fix resolution express in order to enable automatic remediation please create cve vulnerable library serve static tgz serve static files library home page a href path to dependency file package json path to vulnerable library node modules serve static package json dependency hierarchy express tgz root library x serve static tgz vulnerable library found in head commit a href found in base branch main vulnerability details open redirect vulnerability in the serve static plugin before for node js when mounted at the root allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a slash slash followed by a domain in the path info to the default uri publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution serve static direct dependency fix resolution express in order to enable automatic remediation please create cve vulnerable library express tgz sinatra inspired web development framework library home page a href path to dependency file package json path to vulnerable library node modules express package json dependency hierarchy x express tgz vulnerable library found in head commit a href found in base branch main vulnerability details the express web framework before and x before for node js does not provide a charset field in http content type headers in level responses which might allow remote attackers to conduct cross site scripting xss attacks via characters in a non standard encoding publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution in order to enable automatic remediation please create rescue worker helmet automatic remediation is available for this issue
0
126,083
4,972,042,128
IssuesEvent
2016-12-05 20:24:23
TheScienceMuseum/collectionsonline
https://api.github.com/repos/TheScienceMuseum/collectionsonline
opened
Styling of single taxonomy term
enhancement Post-Beta-Launch priority-3
Not sure if something just hasn't loaded for me / but if we only have a sign term it should probably left align. <img width="522" alt="screen shot 2016-12-05 at 20 23 17" src="https://cloud.githubusercontent.com/assets/91365/20901055/b420c1ac-bb28-11e6-8427-0be5babc3622.png">
1.0
Styling of single taxonomy term - Not sure if something just hasn't loaded for me / but if we only have a sign term it should probably left align. <img width="522" alt="screen shot 2016-12-05 at 20 23 17" src="https://cloud.githubusercontent.com/assets/91365/20901055/b420c1ac-bb28-11e6-8427-0be5babc3622.png">
non_defect
styling of single taxonomy term not sure if something just hasn t loaded for me but if we only have a sign term it should probably left align img width alt screen shot at src
0
229,261
7,573,325,125
IssuesEvent
2018-04-23 17:25:52
datahq/datahub-qa
https://api.github.com/repos/datahq/datahub-qa
closed
Possible resource path related issue in Windows
Priority ★★ Severity: Major
Looking at this report, I'm not sure if it's happening because user provided the wrong path to a resource or our code behaves differently in the Windows OS: https://sentry.io/share/issue/18b80085753f44ecae1bbfb641d0d11a/ as you can see a path to a resource was considered as relative to dp.json. ## Tasks * [x] try to reproduce on Windows
1.0
Possible resource path related issue in Windows - Looking at this report, I'm not sure if it's happening because user provided the wrong path to a resource or our code behaves differently in the Windows OS: https://sentry.io/share/issue/18b80085753f44ecae1bbfb641d0d11a/ as you can see a path to a resource was considered as relative to dp.json. ## Tasks * [x] try to reproduce on Windows
non_defect
possible resource path related issue in windows looking at this report i m not sure if it s happening because user provided the wrong path to a resource or our code behaves differently in the windows os as you can see a path to a resource was considered as relative to dp json tasks try to reproduce on windows
0
8,990
2,615,117,423
IssuesEvent
2015-03-01 05:42:47
chrsmith/google-api-java-client
https://api.github.com/repos/chrsmith/google-api-java-client
closed
UnsupportedOperationException when using AndroidXmlParserFactory
auto-migrated Component-XML Milestone-Version1.4.0 Priority-High Type-Defect
``` Version of google-api-java-client (e.g. 1.2.1-alpha)? 1.2.1-alpha Java environment (e.g. Java 6, Android 2.2, App Engine 1.3.7)? Android 2.2 emulator Describe the problem. Set the parser factory to use Android's native XML pull parser using: Xml.parserFactory = new AndroidXmlParserFactory(); And when trying to parser XML for calendar-v2-atom-android-sample I get at runtime: 11-10 21:10:42.203: ERROR/CalendarSample(393): java.lang.UnsupportedOperationException 11-10 21:10:42.203: ERROR/CalendarSample(393): at org.apache.harmony.xml.ExpatPullParser.getPrefix(ExpatPullParser.java:254) 11-10 21:10:42.203: ERROR/CalendarSample(393): at com.google.api.client.xml.Xml.parseElementInternal(Xml.java:168) 11-10 21:10:42.203: ERROR/CalendarSample(393): at com.google.api.client.xml.Xml.parseElement(Xml.java:142) 11-10 21:10:42.203: ERROR/CalendarSample(393): at com.google.api.client.xml.XmlHttpParser.parse(XmlHttpParser.java:70) 11-10 21:10:42.203: ERROR/CalendarSample(393): at com.google.api.client.http.HttpResponse.parseAs(HttpResponse.java:261) 11-10 21:10:42.203: ERROR/CalendarSample(393): at com.google.api.client.sample.calendar.android.model.Feed.executeGet(Feed.java:49 ) How would you expect it to be fixed? ``` Original issue reported on code.google.com by `yan...@google.com` on 10 Nov 2010 at 9:15
1.0
UnsupportedOperationException when using AndroidXmlParserFactory - ``` Version of google-api-java-client (e.g. 1.2.1-alpha)? 1.2.1-alpha Java environment (e.g. Java 6, Android 2.2, App Engine 1.3.7)? Android 2.2 emulator Describe the problem. Set the parser factory to use Android's native XML pull parser using: Xml.parserFactory = new AndroidXmlParserFactory(); And when trying to parser XML for calendar-v2-atom-android-sample I get at runtime: 11-10 21:10:42.203: ERROR/CalendarSample(393): java.lang.UnsupportedOperationException 11-10 21:10:42.203: ERROR/CalendarSample(393): at org.apache.harmony.xml.ExpatPullParser.getPrefix(ExpatPullParser.java:254) 11-10 21:10:42.203: ERROR/CalendarSample(393): at com.google.api.client.xml.Xml.parseElementInternal(Xml.java:168) 11-10 21:10:42.203: ERROR/CalendarSample(393): at com.google.api.client.xml.Xml.parseElement(Xml.java:142) 11-10 21:10:42.203: ERROR/CalendarSample(393): at com.google.api.client.xml.XmlHttpParser.parse(XmlHttpParser.java:70) 11-10 21:10:42.203: ERROR/CalendarSample(393): at com.google.api.client.http.HttpResponse.parseAs(HttpResponse.java:261) 11-10 21:10:42.203: ERROR/CalendarSample(393): at com.google.api.client.sample.calendar.android.model.Feed.executeGet(Feed.java:49 ) How would you expect it to be fixed? ``` Original issue reported on code.google.com by `yan...@google.com` on 10 Nov 2010 at 9:15
defect
unsupportedoperationexception when using androidxmlparserfactory version of google api java client e g alpha alpha java environment e g java android app engine android emulator describe the problem set the parser factory to use android s native xml pull parser using xml parserfactory new androidxmlparserfactory and when trying to parser xml for calendar atom android sample i get at runtime error calendarsample java lang unsupportedoperationexception error calendarsample at org apache harmony xml expatpullparser getprefix expatpullparser java error calendarsample at com google api client xml xml parseelementinternal xml java error calendarsample at com google api client xml xml parseelement xml java error calendarsample at com google api client xml xmlhttpparser parse xmlhttpparser java error calendarsample at com google api client http httpresponse parseas httpresponse java error calendarsample at com google api client sample calendar android model feed executeget feed java how would you expect it to be fixed original issue reported on code google com by yan google com on nov at
1
8,801
2,612,896,978
IssuesEvent
2015-02-27 17:22:43
chrsmith/windows-package-manager
https://api.github.com/repos/chrsmith/windows-package-manager
closed
Does windows-package-manager handle updates?
auto-migrated Milestone-1.13.0 Type-Defect
``` (Great application - just found it today and love it already.) My 'bug' is a usability issue. Users used to package managers in Linux systems will assume that WPM handles updates, but I can't find any mention of that issue. I think it needs to be noted somewhere if WPM does not deal with upgrades, or if this is a planned feature. I guess I'm asking for a features and a roadmap list. ``` Original issue reported on code.google.com by `duncan.l...@gmail.com` on 1 Sep 2010 at 8:45
1.0
Does windows-package-manager handle updates? - ``` (Great application - just found it today and love it already.) My 'bug' is a usability issue. Users used to package managers in Linux systems will assume that WPM handles updates, but I can't find any mention of that issue. I think it needs to be noted somewhere if WPM does not deal with upgrades, or if this is a planned feature. I guess I'm asking for a features and a roadmap list. ``` Original issue reported on code.google.com by `duncan.l...@gmail.com` on 1 Sep 2010 at 8:45
defect
does windows package manager handle updates great application just found it today and love it already my bug is a usability issue users used to package managers in linux systems will assume that wpm handles updates but i can t find any mention of that issue i think it needs to be noted somewhere if wpm does not deal with upgrades or if this is a planned feature i guess i m asking for a features and a roadmap list original issue reported on code google com by duncan l gmail com on sep at
1
70,599
23,259,126,482
IssuesEvent
2022-08-04 12:02:37
primefaces/primeng
https://api.github.com/repos/primefaces/primeng
opened
p-multiselect: Performance fix when selecting all items (10000 records or more) the dropdown hangs
defect
### Describe the bug When you have large data set in a dropdown, let's say 10K records, the dropdown hangs for a while and when it shows up and you click selectAll, you have to wait forever. ### Environment Angular v13 ### Reproducer _No response_ ### Angular version 13 ### PrimeNG version 13.3.3 ### Build / Runtime Angular CLI App ### Language TypeScript ### Node version (for AoT issues node --version) v16.13.2 ### Browser(s) Chrome ### Steps to reproduce the behavior - Go to Multiselect example of PrimeNG - Populate template mode with 10,000 records - Open the dropdown (will see delays) - Once the dropdown is open, click on the select all checkbox (it will take a minute or more). ### Expected behavior With large data sets, the performance should not be impacted. For PrimeReact i see it working smoothly with large dataset(Example: https://www.primefaces.org/primereact/multiselect/)
1.0
p-multiselect: Performance fix when selecting all items (10000 records or more) the dropdown hangs - ### Describe the bug When you have large data set in a dropdown, let's say 10K records, the dropdown hangs for a while and when it shows up and you click selectAll, you have to wait forever. ### Environment Angular v13 ### Reproducer _No response_ ### Angular version 13 ### PrimeNG version 13.3.3 ### Build / Runtime Angular CLI App ### Language TypeScript ### Node version (for AoT issues node --version) v16.13.2 ### Browser(s) Chrome ### Steps to reproduce the behavior - Go to Multiselect example of PrimeNG - Populate template mode with 10,000 records - Open the dropdown (will see delays) - Once the dropdown is open, click on the select all checkbox (it will take a minute or more). ### Expected behavior With large data sets, the performance should not be impacted. For PrimeReact i see it working smoothly with large dataset(Example: https://www.primefaces.org/primereact/multiselect/)
defect
p multiselect performance fix when selecting all items records or more the dropdown hangs describe the bug when you have large data set in a dropdown let s say records the dropdown hangs for a while and when it shows up and you click selectall you have to wait forever environment angular reproducer no response angular version primeng version build runtime angular cli app language typescript node version for aot issues node version browser s chrome steps to reproduce the behavior go to multiselect example of primeng populate template mode with records open the dropdown will see delays once the dropdown is open click on the select all checkbox it will take a minute or more expected behavior with large data sets the performance should not be impacted for primereact i see it working smoothly with large dataset example
1
70,955
23,389,583,211
IssuesEvent
2022-08-11 16:29:12
EnvironmentOntology/envo
https://api.github.com/repos/EnvironmentOntology/envo
closed
Create a termgenie for ENVO
auto-migrated Type-Defect
``` Similar to go.termgenie.org oba.termgenie.org ``` Original issue reported on code.google.com by `cmung...@gmail.com` on 22 Dec 2013 at 6:57
1.0
Create a termgenie for ENVO - ``` Similar to go.termgenie.org oba.termgenie.org ``` Original issue reported on code.google.com by `cmung...@gmail.com` on 22 Dec 2013 at 6:57
defect
create a termgenie for envo similar to go termgenie org oba termgenie org original issue reported on code google com by cmung gmail com on dec at
1
27,908
5,120,243,410
IssuesEvent
2017-01-09 01:45:33
jccastillo0007/eFacturaT
https://api.github.com/repos/jccastillo0007/eFacturaT
closed
Complemento Nomina 1.2 - No acepta la entidad federativa querétaro
bug defect
No sé si está mal nuestro catálogo o el del PAC, pero no acepta Querétaro... y aquí tenemos varias nómina...:(
1.0
Complemento Nomina 1.2 - No acepta la entidad federativa querétaro - No sé si está mal nuestro catálogo o el del PAC, pero no acepta Querétaro... y aquí tenemos varias nómina...:(
defect
complemento nomina no acepta la entidad federativa querétaro no sé si está mal nuestro catálogo o el del pac pero no acepta querétaro y aquí tenemos varias nómina
1
3,845
2,610,070,037
IssuesEvent
2015-02-26 18:20:32
chrsmith/jsjsj122
https://api.github.com/repos/chrsmith/jsjsj122
opened
台州割包茎去哪家医院最好
auto-migrated Priority-Medium Type-Defect
``` 台州割包茎去哪家医院最好【台州五洲生殖医院】24小时健康 咨询热线:0576-88066933-(扣扣800080609)-(微信号tzwzszyy)医院地址:台 州市椒江区枫南路229号(枫南大转盘旁)乘车线路:乘坐104、1 08、118、198及椒江一金清公交车直达枫南小区,乘坐107、105、 109、112、901、 902公交车到星星广场下车,步行即可到院。 诊疗项目:阳痿,早泄,前列腺炎,前列腺增生,龟头炎,�� �精,无精。包皮包茎,精索静脉曲张,淋病等。 台州五洲生殖医院是台州最大的男科医院,权威专家在线免�� �咨询,拥有专业完善的男科检查治疗设备,严格按照国家标� ��收费。尖端医疗设备,与世界同步。权威专家,成就专业典 范。人性化服务,一切以患者为中心。 看男科就选台州五洲生殖医院,专业男科为男人。 ``` ----- Original issue reported on code.google.com by `poweragr...@gmail.com` on 30 May 2014 at 11:53
1.0
台州割包茎去哪家医院最好 - ``` 台州割包茎去哪家医院最好【台州五洲生殖医院】24小时健康 咨询热线:0576-88066933-(扣扣800080609)-(微信号tzwzszyy)医院地址:台 州市椒江区枫南路229号(枫南大转盘旁)乘车线路:乘坐104、1 08、118、198及椒江一金清公交车直达枫南小区,乘坐107、105、 109、112、901、 902公交车到星星广场下车,步行即可到院。 诊疗项目:阳痿,早泄,前列腺炎,前列腺增生,龟头炎,�� �精,无精。包皮包茎,精索静脉曲张,淋病等。 台州五洲生殖医院是台州最大的男科医院,权威专家在线免�� �咨询,拥有专业完善的男科检查治疗设备,严格按照国家标� ��收费。尖端医疗设备,与世界同步。权威专家,成就专业典 范。人性化服务,一切以患者为中心。 看男科就选台州五洲生殖医院,专业男科为男人。 ``` ----- Original issue reported on code.google.com by `poweragr...@gmail.com` on 30 May 2014 at 11:53
defect
台州割包茎去哪家医院最好 台州割包茎去哪家医院最好【台州五洲生殖医院】 咨询热线 微信号tzwzszyy 医院地址 台 (枫南大转盘旁)乘车线路 、 、 、 , 、 、 、 、 、 ,步行即可到院。 诊疗项目:阳痿,早泄,前列腺炎,前列腺增生,龟头炎,�� �精,无精。包皮包茎,精索静脉曲张,淋病等。 台州五洲生殖医院是台州最大的男科医院,权威专家在线免�� �咨询,拥有专业完善的男科检查治疗设备,严格按照国家标� ��收费。尖端医疗设备,与世界同步。权威专家,成就专业典 范。人性化服务,一切以患者为中心。 看男科就选台州五洲生殖医院,专业男科为男人。 original issue reported on code google com by poweragr gmail com on may at
1
60,121
12,058,795,124
IssuesEvent
2020-04-15 18:05:49
home-assistant/brands
https://api.github.com/repos/home-assistant/brands
closed
Kodi is missing brand images
domain-missing has-codeowner
## The problem The Kodi integration does not have brand images in this repository. We recently started this Brands repository, to create a centralized storage of all brand-related images. These images are used on our website and the Home Assistant frontend. The following images are missing and would ideally be added: - `src/kodi/icon.png` - `src/kodi/logo.png` - `src/kodi/icon@2x.png` - `src/kodi/logo@2x.png` For image specifications and requirements, please see [README.md](https://github.com/home-assistant/brands/blob/master/README.md). ## Updating the documentation repository Our documentation repository already has a logo for this integration, however, it does not meet the image requirements of this new Brands repository. If adding images to this repository, please open up a PR to the documentation repository as well, removing the `logo: kodi.png` line from this file: <https://github.com/home-assistant/home-assistant.io/blob/current/source/_integrations/kodi.markdown> **Note**: The documentation PR needs to be opened against the `current` branch. **Note2**: Please leave the actual logo file in the documentation repository. It will be cleaned up differently. ## Additional information For more information about this repository, read the [README.md](https://github.com/home-assistant/brands/blob/master/README.md) file of this repository. It contains information on how this repository works, and image specification and requirements. ## Codeowner mention Hi there, @armills! Mind taking a look at this issue as it is with an integration (kodi) you are listed as a [codeowner](https://github.com/home-assistant/core/blob/dev/homeassistant/components/kodi/manifest.json) for? Thanks! Resolving this issue is not limited to codeowners! If you want to help us out, feel free to resolve this issue! Thanks already!
1.0
Kodi is missing brand images - ## The problem The Kodi integration does not have brand images in this repository. We recently started this Brands repository, to create a centralized storage of all brand-related images. These images are used on our website and the Home Assistant frontend. The following images are missing and would ideally be added: - `src/kodi/icon.png` - `src/kodi/logo.png` - `src/kodi/icon@2x.png` - `src/kodi/logo@2x.png` For image specifications and requirements, please see [README.md](https://github.com/home-assistant/brands/blob/master/README.md). ## Updating the documentation repository Our documentation repository already has a logo for this integration, however, it does not meet the image requirements of this new Brands repository. If adding images to this repository, please open up a PR to the documentation repository as well, removing the `logo: kodi.png` line from this file: <https://github.com/home-assistant/home-assistant.io/blob/current/source/_integrations/kodi.markdown> **Note**: The documentation PR needs to be opened against the `current` branch. **Note2**: Please leave the actual logo file in the documentation repository. It will be cleaned up differently. ## Additional information For more information about this repository, read the [README.md](https://github.com/home-assistant/brands/blob/master/README.md) file of this repository. It contains information on how this repository works, and image specification and requirements. ## Codeowner mention Hi there, @armills! Mind taking a look at this issue as it is with an integration (kodi) you are listed as a [codeowner](https://github.com/home-assistant/core/blob/dev/homeassistant/components/kodi/manifest.json) for? Thanks! Resolving this issue is not limited to codeowners! If you want to help us out, feel free to resolve this issue! Thanks already!
non_defect
kodi is missing brand images the problem the kodi integration does not have brand images in this repository we recently started this brands repository to create a centralized storage of all brand related images these images are used on our website and the home assistant frontend the following images are missing and would ideally be added src kodi icon png src kodi logo png src kodi icon png src kodi logo png for image specifications and requirements please see updating the documentation repository our documentation repository already has a logo for this integration however it does not meet the image requirements of this new brands repository if adding images to this repository please open up a pr to the documentation repository as well removing the logo kodi png line from this file note the documentation pr needs to be opened against the current branch please leave the actual logo file in the documentation repository it will be cleaned up differently additional information for more information about this repository read the file of this repository it contains information on how this repository works and image specification and requirements codeowner mention hi there armills mind taking a look at this issue as it is with an integration kodi you are listed as a for thanks resolving this issue is not limited to codeowners if you want to help us out feel free to resolve this issue thanks already
0
61,158
17,023,620,454
IssuesEvent
2021-07-03 02:57:52
tomhughes/trac-tickets
https://api.github.com/repos/tomhughes/trac-tickets
closed
Potlatch drops a tag on edit of a similar one using suggested popups
Component: potlatch (flash editor) Priority: critical Resolution: wontfix Type: defect
**[Submitted to the original trac issue database at 5.25pm, Sunday, 1st August 2010]** Potlatch quietly looses a tag (ex:"name") when one adds another tag with a similar name (ex:"name:hu"), if one TYPES the exact name of the first tag (type:'name') then SELECTS with the mouse the suggested popup (select:'name:hu') which appears by this point if this sort of edit already occured in that session (I'm editing live, in Firefox 3.5.8). Apparently, at this point both the original tag and the new tag are perfectly correct, and still present. However, if one clicks away ("saving..."), then clicks right back to the edited node, the original tag ("name") is gone, only the new "name:hu" tag remains. Note that the bug is NOT triggered if one types anything else then the exact name of the first tag (ie. type:'nam', select:'name:hu' does not seem to delete the "name" tag, neither does doing the full type:'name:hu'). I find this behavior specially dangerous, myself having apparently "deleted" about 100 original name tags before even realizing what is going on - and a revert loses all newly added tags in this case.
1.0
Potlatch drops a tag on edit of a similar one using suggested popups - **[Submitted to the original trac issue database at 5.25pm, Sunday, 1st August 2010]** Potlatch quietly looses a tag (ex:"name") when one adds another tag with a similar name (ex:"name:hu"), if one TYPES the exact name of the first tag (type:'name') then SELECTS with the mouse the suggested popup (select:'name:hu') which appears by this point if this sort of edit already occured in that session (I'm editing live, in Firefox 3.5.8). Apparently, at this point both the original tag and the new tag are perfectly correct, and still present. However, if one clicks away ("saving..."), then clicks right back to the edited node, the original tag ("name") is gone, only the new "name:hu" tag remains. Note that the bug is NOT triggered if one types anything else then the exact name of the first tag (ie. type:'nam', select:'name:hu' does not seem to delete the "name" tag, neither does doing the full type:'name:hu'). I find this behavior specially dangerous, myself having apparently "deleted" about 100 original name tags before even realizing what is going on - and a revert loses all newly added tags in this case.
defect
potlatch drops a tag on edit of a similar one using suggested popups potlatch quietly looses a tag ex name when one adds another tag with a similar name ex name hu if one types the exact name of the first tag type name then selects with the mouse the suggested popup select name hu which appears by this point if this sort of edit already occured in that session i m editing live in firefox apparently at this point both the original tag and the new tag are perfectly correct and still present however if one clicks away saving then clicks right back to the edited node the original tag name is gone only the new name hu tag remains note that the bug is not triggered if one types anything else then the exact name of the first tag ie type nam select name hu does not seem to delete the name tag neither does doing the full type name hu i find this behavior specially dangerous myself having apparently deleted about original name tags before even realizing what is going on and a revert loses all newly added tags in this case
1
21,078
3,456,625,435
IssuesEvent
2015-12-18 02:51:16
dart-lang/sdk
https://api.github.com/repos/dart-lang/sdk
opened
cps_ir: statement names are unstable and not minified
area-dart2js dart2js-nssa Type-Defect
Statement labels should restart with each new function. L25 is because L1..L24 is used in other functions. This causes names to be longer than necessary, and widespread gratuitous differences when a single function or compilation order changes. ```js findFeed$1: function(id_) { var v0 = J.ArrayIterator$(this.feeds._internal), v1; L25: { while (v0.moveNext$0()) if (P.identical(J.get$id$x(v1 = v0.__interceptors$_current), id_)) { v0 = v1; break L25; } v0 = null; } return v0; } }, ``` The minified code still contains unminified labels: ```js iy:function(a){var z=J.b1(this.c.d),y L25:{while(z.l())if(P.o(J.bX(y=z.d),a)){z=y break L25}z=null}return z}}, ``` There are other problems here: 1. There is only one loop, no nested loops, so no label is necessary. 2. The post-loop returns, so "v0=v1;break;" could be replaced by "return v1"
1.0
cps_ir: statement names are unstable and not minified - Statement labels should restart with each new function. L25 is because L1..L24 is used in other functions. This causes names to be longer than necessary, and widespread gratuitous differences when a single function or compilation order changes. ```js findFeed$1: function(id_) { var v0 = J.ArrayIterator$(this.feeds._internal), v1; L25: { while (v0.moveNext$0()) if (P.identical(J.get$id$x(v1 = v0.__interceptors$_current), id_)) { v0 = v1; break L25; } v0 = null; } return v0; } }, ``` The minified code still contains unminified labels: ```js iy:function(a){var z=J.b1(this.c.d),y L25:{while(z.l())if(P.o(J.bX(y=z.d),a)){z=y break L25}z=null}return z}}, ``` There are other problems here: 1. There is only one loop, no nested loops, so no label is necessary. 2. The post-loop returns, so "v0=v1;break;" could be replaced by "return v1"
defect
cps ir statement names are unstable and not minified statement labels should restart with each new function is because is used in other functions this causes names to be longer than necessary and widespread gratuitous differences when a single function or compilation order changes js findfeed function id var j arrayiterator this feeds internal while movenext if p identical j get id x interceptors current id break null return the minified code still contains unminified labels js iy function a var z j this c d y while z l if p o j bx y z d a z y break z null return z there are other problems here there is only one loop no nested loops so no label is necessary the post loop returns so break could be replaced by return
1
47,605
13,065,855,109
IssuesEvent
2020-07-30 20:32:58
department-of-veterans-affairs/va.gov-team
https://api.github.com/repos/department-of-veterans-affairs/va.gov-team
closed
[COGNITION, SCREENREADER]: Dates SHOULD be spelled out, as documented in the VA design system
508-defect-1 508-issue-cognition 508/Accessibility blocked frontend vsa vsa-ebenefits
# [508-defect-1 :exclamation: Launchblocker](https://github.com/department-of-veterans-affairs/va.gov-team/blob/master/platform/accessibility/guidance/defect-severity-rubric.md#508-defect-1) **Feedback framework** - **❗️ Must** for if the feedback must be applied - **⚠️Should** if the feedback is best practice - **✔️ Consider** for suggestions/enhancements ## Description The [VA design system](https://design.va.gov/content-style-guide/dates-and-numbers#dates-and-years) specifies dates **should** spell out the month. ## Point of Contact **VFS Point of Contact:** Jennifer ## Acceptance Criteria As a screen reader user, I want to understand dates on a page. ## Environment * Operating System: all * Browser: all * Screenreading device: any * Server destination: staging ## Steps to Recreate 1. Enter `<IP ADDRESS>` in browser 2. Start screenreading device listed in Environment 3. Read the content of the page 4. Verify the date is read numerically ## Possible Fixes (optional) Convert the date provided by the database into Month DD, YYYY format ## WCAG or Vendor Guidance (optional) * [VA design system](https://design.va.gov/content-style-guide/dates-and-numbers#dates-and-years) ## Screenshots or Trace Logs ![Screen Shot 2020-04-28 at 2 07 04 PM](https://user-images.githubusercontent.com/57469/80521899-c34e3a80-8959-11ea-83ca-16a6d156e2ab.png)
1.0
[COGNITION, SCREENREADER]: Dates SHOULD be spelled out, as documented in the VA design system - # [508-defect-1 :exclamation: Launchblocker](https://github.com/department-of-veterans-affairs/va.gov-team/blob/master/platform/accessibility/guidance/defect-severity-rubric.md#508-defect-1) **Feedback framework** - **❗️ Must** for if the feedback must be applied - **⚠️Should** if the feedback is best practice - **✔️ Consider** for suggestions/enhancements ## Description The [VA design system](https://design.va.gov/content-style-guide/dates-and-numbers#dates-and-years) specifies dates **should** spell out the month. ## Point of Contact **VFS Point of Contact:** Jennifer ## Acceptance Criteria As a screen reader user, I want to understand dates on a page. ## Environment * Operating System: all * Browser: all * Screenreading device: any * Server destination: staging ## Steps to Recreate 1. Enter `<IP ADDRESS>` in browser 2. Start screenreading device listed in Environment 3. Read the content of the page 4. Verify the date is read numerically ## Possible Fixes (optional) Convert the date provided by the database into Month DD, YYYY format ## WCAG or Vendor Guidance (optional) * [VA design system](https://design.va.gov/content-style-guide/dates-and-numbers#dates-and-years) ## Screenshots or Trace Logs ![Screen Shot 2020-04-28 at 2 07 04 PM](https://user-images.githubusercontent.com/57469/80521899-c34e3a80-8959-11ea-83ca-16a6d156e2ab.png)
defect
dates should be spelled out as documented in the va design system feedback framework ❗️ must for if the feedback must be applied ⚠️should if the feedback is best practice ✔️ consider for suggestions enhancements description the specifies dates should spell out the month point of contact vfs point of contact jennifer acceptance criteria as a screen reader user i want to understand dates on a page environment operating system all browser all screenreading device any server destination staging steps to recreate enter in browser start screenreading device listed in environment read the content of the page verify the date is read numerically possible fixes optional convert the date provided by the database into month dd yyyy format wcag or vendor guidance optional screenshots or trace logs
1
58,976
16,985,598,099
IssuesEvent
2021-06-30 14:04:26
hazelcast/hazelcast
https://api.github.com/repos/hazelcast/hazelcast
opened
should getDistributedObjects include `__sql.catalog` map ?
Module: SQL Team: Core Type: Defect
**Describe the bug** I think this is an internal map for SQL and should be hidden. **Expected behavior** I expect it to be filtered from getDistributedObjects results. **To Reproduce** Steps to reproduce the behavior: 1. Run 5.0 snapshot server(latest) `docker run -p 5701:5701 hazelcast/hazelcast:5.0-SNAPSHOT` 2. Run the following script ```java import com.hazelcast.client.config.ClientConfig; import com.hazelcast.client.HazelcastClient; import com.hazelcast.core.HazelcastInstance; public class Main { public static void main(String[] args) { ClientConfig c = new ClientConfig(); HazelcastInstance h = HazelcastClient.newHazelcastClient(c); System.out.println(h.getDistributedObjects().size()); System.out.println(h.getDistributedObjects().toArray()[0]); } } ```
1.0
should getDistributedObjects include `__sql.catalog` map ? - **Describe the bug** I think this is an internal map for SQL and should be hidden. **Expected behavior** I expect it to be filtered from getDistributedObjects results. **To Reproduce** Steps to reproduce the behavior: 1. Run 5.0 snapshot server(latest) `docker run -p 5701:5701 hazelcast/hazelcast:5.0-SNAPSHOT` 2. Run the following script ```java import com.hazelcast.client.config.ClientConfig; import com.hazelcast.client.HazelcastClient; import com.hazelcast.core.HazelcastInstance; public class Main { public static void main(String[] args) { ClientConfig c = new ClientConfig(); HazelcastInstance h = HazelcastClient.newHazelcastClient(c); System.out.println(h.getDistributedObjects().size()); System.out.println(h.getDistributedObjects().toArray()[0]); } } ```
defect
should getdistributedobjects include sql catalog map describe the bug i think this is an internal map for sql and should be hidden expected behavior i expect it to be filtered from getdistributedobjects results to reproduce steps to reproduce the behavior run snapshot server latest docker run p hazelcast hazelcast snapshot run the following script java import com hazelcast client config clientconfig import com hazelcast client hazelcastclient import com hazelcast core hazelcastinstance public class main public static void main string args clientconfig c new clientconfig hazelcastinstance h hazelcastclient newhazelcastclient c system out println h getdistributedobjects size system out println h getdistributedobjects toarray
1
70,799
15,110,265,625
IssuesEvent
2021-02-08 18:58:53
gwen-bo/BAP-online
https://api.github.com/repos/gwen-bo/BAP-online
closed
Firestore rules
afwerking security
Firestore rules aanpassen/ beter beveiligen vóór productie (!) - regels per collection 1. interactie: (update:true/write:if) 2. users: (read: true/ write: if) 3. auteurs (read: true/ write: false) 4. allow-users (read/write: false) - functie check if data.name is bestaande in allow-users collection: function isAllowedUser() {return exists(/databases/$(database)/documents/allow-users/$(request.resource.data.user));}
True
Firestore rules - Firestore rules aanpassen/ beter beveiligen vóór productie (!) - regels per collection 1. interactie: (update:true/write:if) 2. users: (read: true/ write: if) 3. auteurs (read: true/ write: false) 4. allow-users (read/write: false) - functie check if data.name is bestaande in allow-users collection: function isAllowedUser() {return exists(/databases/$(database)/documents/allow-users/$(request.resource.data.user));}
non_defect
firestore rules firestore rules aanpassen beter beveiligen vóór productie regels per collection interactie update true write if users read true write if auteurs read true write false allow users read write false functie check if data name is bestaande in allow users collection function isalloweduser return exists databases database documents allow users request resource data user
0
67,622
21,033,444,500
IssuesEvent
2022-03-31 04:39:18
vector-im/element-web
https://api.github.com/repos/vector-im/element-web
closed
Changing theme from Dark to Light does not take effect.
T-Defect
### Steps to reproduce https://user-images.githubusercontent.com/63562663/160946884-0d80a580-650f-4f29-8fa7-96a87d77cbaf.mp4 ### Outcome #### What did you expect? Change theme to Light mode #### What happened instead? Dark mode persisted after changing to Light mode ### Operating system Windows ### Application version Version 21H2 ### How did you install the app? https://element.io/get-started ### Homeserver t2l.io ### Will you send logs? No
1.0
Changing theme from Dark to Light does not take effect. - ### Steps to reproduce https://user-images.githubusercontent.com/63562663/160946884-0d80a580-650f-4f29-8fa7-96a87d77cbaf.mp4 ### Outcome #### What did you expect? Change theme to Light mode #### What happened instead? Dark mode persisted after changing to Light mode ### Operating system Windows ### Application version Version 21H2 ### How did you install the app? https://element.io/get-started ### Homeserver t2l.io ### Will you send logs? No
defect
changing theme from dark to light does not take effect steps to reproduce outcome what did you expect change theme to light mode what happened instead dark mode persisted after changing to light mode operating system windows application version version how did you install the app homeserver io will you send logs no
1
321,085
23,838,844,797
IssuesEvent
2022-09-06 08:35:20
alphagov/govuk-prototype-kit
https://api.github.com/repos/alphagov/govuk-prototype-kit
closed
Update accessibility statement
documentation accessibility 🕔 hours
## What With the fix for step by step completed in release v13.0.0, the documentation site is now accessible with all outstanding issues from the accessibility audit addressed and fixed. ## Related documentation GOV.UK Prototype Kit accessibility statement: https://govuk-prototype-kit.herokuapp.com/docs/accessibility ## Who Content designer, Product manager ## Done when - [x] content designer updates accessibility statement - [x] product manager reviews
1.0
Update accessibility statement - ## What With the fix for step by step completed in release v13.0.0, the documentation site is now accessible with all outstanding issues from the accessibility audit addressed and fixed. ## Related documentation GOV.UK Prototype Kit accessibility statement: https://govuk-prototype-kit.herokuapp.com/docs/accessibility ## Who Content designer, Product manager ## Done when - [x] content designer updates accessibility statement - [x] product manager reviews
non_defect
update accessibility statement what with the fix for step by step completed in release the documentation site is now accessible with all outstanding issues from the accessibility audit addressed and fixed related documentation gov uk prototype kit accessibility statement who content designer product manager done when content designer updates accessibility statement product manager reviews
0
55,407
30,737,439,504
IssuesEvent
2023-07-28 08:47:24
flutter/flutter
https://api.github.com/repos/flutter/flutter
opened
FlutterViewController doesn't call deinit when page is closed and result in memory leak problem
from: performance template
<!-- Thank you for using Flutter! If you are looking for support, please check out our documentation or consider asking a question on Stack Overflow: * https://flutter.dev/ * https://api.flutter.dev/ * https://stackoverflow.com/questions/tagged/flutter?sort=frequent If you have found a performance problem, then fill out the template below. Please read our guide to filing a bug first: https://flutter.dev/docs/resources/bug-reports --> ## Steps to Reproduce git@github.com:flutter/samples.git commitId:129818a205274bc7e587192c6546cd856b8d5b0c run samples/add_to_app/multiple_flutters/multiple_flutters_ios on iOS Simulator ![image](https://github.com/flutter/flutter/assets/12041872/adb6d483-8b1c-45b6-a1de-810e3717706f) set a breakpoint in SingleFlutterViewController.swift deinit method ![image](https://github.com/flutter/flutter/assets/12041872/07ec2c2a-1b04-4f69-a5b5-2ce77750aa2f) click Next several Times click Back until return to root page deinit method never get called ## Details <!-- 1. Please tell us exactly how to reproduce the problem you are running into, and how you measured the performance. 2. Please attach a small application (ideally just one main.dart file) that reproduces the problem. You could use https://gist.github.com/ for this. 3. Switch flutter to master channel and run this app on a physical device using profile or release mode. Verify that the performance issue can be reproduced there. The bleeding edge master channel is encouraged here because Flutter is constantly fixing bugs and improving its performance. Your problem in an older Flutter version may have already been solved in the master channel. --> <!-- Please tell us which target platform(s) the problem occurs (Android / iOS / Web / macOS / Linux / Windows) Which target OS version, for Web, browser, is the test system running? Does the problem occur on an emulator/simulator as well as on physical devices? --> ➜ ~ flutter doctor -v [✓] Flutter (Channel stable, 3.10.5, on macOS 12.6.3 21G419 darwin-arm64, locale zh-Hans-CN) • Flutter version 3.10.5 on channel stable at /Users/hky/Flutter/flutter • Upstream repository https://github.com/flutter/flutter.git • Framework revision 796c8ef792 (6 weeks ago), 2023-06-13 15:51:02 -0700 • Engine revision 45f6e00911 • Dart version 3.0.5 • DevTools version 2.23.1 • Pub download mirror https://pub.flutter-io.cn • Flutter download mirror https://storage.flutter-io.cn [✓] Android toolchain - develop for Android devices (Android SDK version 32.0.0) • Android SDK at /Users/hky/Library/Android/sdk • Platform android-33, build-tools 32.0.0 • Java binary at: /Applications/Android Studio.app/Contents/jbr/Contents/Home/bin/java • Java version OpenJDK Runtime Environment (build 11.0.15+0-b2043.56-8887301) • All Android licenses accepted. [✓] Xcode - develop for iOS and macOS (Xcode 14.2) • Xcode at /Applications/Xcode.app/Contents/Developer • Build 14C18 • CocoaPods version 1.12.0 [✓] Chrome - develop for the web • Chrome at /Applications/Google Chrome.app/Contents/MacOS/Google Chrome [✓] Android Studio (version 2022.1) • Android Studio at /Applications/Android Studio.app/Contents • Flutter plugin can be installed from: 🔨 https://plugins.jetbrains.com/plugin/9212-flutter • Dart plugin can be installed from: 🔨 https://plugins.jetbrains.com/plugin/6351-dart • Java version OpenJDK Runtime Environment (build 11.0.15+0-b2043.56-8887301) [✓] VS Code (version 1.80.2) • VS Code at /Applications/Visual Studio Code.app/Contents • Flutter extension version 3.68.0 [✓] Connected device (4 available) • iPhone (mobile) • bb1729dd23771f188c20c685cbe145047bf80609 • ios • iOS 13.3.1 17D50 • iPhone 14 Pro (mobile) • 7D58D3CF-58FA-4597-A62F-20AA63A4535B • ios • com.apple.CoreSimulator.SimRuntime.iOS-16-2 (simulator) • macOS (desktop) • macos • darwin-arm64 • macOS 12.6.3 21G419 darwin-arm64 • Chrome (web) • chrome • web-javascript • Google Chrome 115.0.5790.114 [✓] Network resources • All expected network resources are available. • No issues found! **Target Platform:iOS** **Target OS version/browser:iOS16.2** **Devices:iPhone 14 Pro Simulator** <!-- Run `flutter analyze` and attach any output of that command below. If there are any analysis errors, try resolving them before filing this issue. --> ``` ``` <!-- Finally, paste the output of running `flutter doctor -v` here, with your device plugged in. --> ``` ``` </details>
True
FlutterViewController doesn't call deinit when page is closed and result in memory leak problem - <!-- Thank you for using Flutter! If you are looking for support, please check out our documentation or consider asking a question on Stack Overflow: * https://flutter.dev/ * https://api.flutter.dev/ * https://stackoverflow.com/questions/tagged/flutter?sort=frequent If you have found a performance problem, then fill out the template below. Please read our guide to filing a bug first: https://flutter.dev/docs/resources/bug-reports --> ## Steps to Reproduce git@github.com:flutter/samples.git commitId:129818a205274bc7e587192c6546cd856b8d5b0c run samples/add_to_app/multiple_flutters/multiple_flutters_ios on iOS Simulator ![image](https://github.com/flutter/flutter/assets/12041872/adb6d483-8b1c-45b6-a1de-810e3717706f) set a breakpoint in SingleFlutterViewController.swift deinit method ![image](https://github.com/flutter/flutter/assets/12041872/07ec2c2a-1b04-4f69-a5b5-2ce77750aa2f) click Next several Times click Back until return to root page deinit method never get called ## Details <!-- 1. Please tell us exactly how to reproduce the problem you are running into, and how you measured the performance. 2. Please attach a small application (ideally just one main.dart file) that reproduces the problem. You could use https://gist.github.com/ for this. 3. Switch flutter to master channel and run this app on a physical device using profile or release mode. Verify that the performance issue can be reproduced there. The bleeding edge master channel is encouraged here because Flutter is constantly fixing bugs and improving its performance. Your problem in an older Flutter version may have already been solved in the master channel. --> <!-- Please tell us which target platform(s) the problem occurs (Android / iOS / Web / macOS / Linux / Windows) Which target OS version, for Web, browser, is the test system running? Does the problem occur on an emulator/simulator as well as on physical devices? --> ➜ ~ flutter doctor -v [✓] Flutter (Channel stable, 3.10.5, on macOS 12.6.3 21G419 darwin-arm64, locale zh-Hans-CN) • Flutter version 3.10.5 on channel stable at /Users/hky/Flutter/flutter • Upstream repository https://github.com/flutter/flutter.git • Framework revision 796c8ef792 (6 weeks ago), 2023-06-13 15:51:02 -0700 • Engine revision 45f6e00911 • Dart version 3.0.5 • DevTools version 2.23.1 • Pub download mirror https://pub.flutter-io.cn • Flutter download mirror https://storage.flutter-io.cn [✓] Android toolchain - develop for Android devices (Android SDK version 32.0.0) • Android SDK at /Users/hky/Library/Android/sdk • Platform android-33, build-tools 32.0.0 • Java binary at: /Applications/Android Studio.app/Contents/jbr/Contents/Home/bin/java • Java version OpenJDK Runtime Environment (build 11.0.15+0-b2043.56-8887301) • All Android licenses accepted. [✓] Xcode - develop for iOS and macOS (Xcode 14.2) • Xcode at /Applications/Xcode.app/Contents/Developer • Build 14C18 • CocoaPods version 1.12.0 [✓] Chrome - develop for the web • Chrome at /Applications/Google Chrome.app/Contents/MacOS/Google Chrome [✓] Android Studio (version 2022.1) • Android Studio at /Applications/Android Studio.app/Contents • Flutter plugin can be installed from: 🔨 https://plugins.jetbrains.com/plugin/9212-flutter • Dart plugin can be installed from: 🔨 https://plugins.jetbrains.com/plugin/6351-dart • Java version OpenJDK Runtime Environment (build 11.0.15+0-b2043.56-8887301) [✓] VS Code (version 1.80.2) • VS Code at /Applications/Visual Studio Code.app/Contents • Flutter extension version 3.68.0 [✓] Connected device (4 available) • iPhone (mobile) • bb1729dd23771f188c20c685cbe145047bf80609 • ios • iOS 13.3.1 17D50 • iPhone 14 Pro (mobile) • 7D58D3CF-58FA-4597-A62F-20AA63A4535B • ios • com.apple.CoreSimulator.SimRuntime.iOS-16-2 (simulator) • macOS (desktop) • macos • darwin-arm64 • macOS 12.6.3 21G419 darwin-arm64 • Chrome (web) • chrome • web-javascript • Google Chrome 115.0.5790.114 [✓] Network resources • All expected network resources are available. • No issues found! **Target Platform:iOS** **Target OS version/browser:iOS16.2** **Devices:iPhone 14 Pro Simulator** <!-- Run `flutter analyze` and attach any output of that command below. If there are any analysis errors, try resolving them before filing this issue. --> ``` ``` <!-- Finally, paste the output of running `flutter doctor -v` here, with your device plugged in. --> ``` ``` </details>
non_defect
flutterviewcontroller doesn t call deinit when page is closed and result in memory leak problem thank you for using flutter if you are looking for support please check out our documentation or consider asking a question on stack overflow if you have found a performance problem then fill out the template below please read our guide to filing a bug first steps to reproduce git github com flutter samples git commitid run samples add to app multiple flutters multiple flutters ios on ios simulator set a breakpoint in singleflutterviewcontroller swift deinit method click next several times click back until return to root page deinit method never get called details please tell us exactly how to reproduce the problem you are running into and how you measured the performance please attach a small application ideally just one main dart file that reproduces the problem you could use for this switch flutter to master channel and run this app on a physical device using profile or release mode verify that the performance issue can be reproduced there the bleeding edge master channel is encouraged here because flutter is constantly fixing bugs and improving its performance your problem in an older flutter version may have already been solved in the master channel please tell us which target platform s the problem occurs android ios web macos linux windows which target os version for web browser is the test system running does the problem occur on an emulator simulator as well as on physical devices ➜ flutter doctor v flutter channel stable on macos darwin locale zh hans cn • flutter version on channel stable at users hky flutter flutter • upstream repository • framework revision weeks ago • engine revision • dart version • devtools version • pub download mirror • flutter download mirror android toolchain develop for android devices android sdk version • android sdk at users hky library android sdk • platform android build tools • java binary at applications android studio app contents jbr contents home bin java • java version openjdk runtime environment build • all android licenses accepted xcode develop for ios and macos xcode • xcode at applications xcode app contents developer • build • cocoapods version chrome develop for the web • chrome at applications google chrome app contents macos google chrome android studio version • android studio at applications android studio app contents • flutter plugin can be installed from 🔨 • dart plugin can be installed from 🔨 • java version openjdk runtime environment build vs code version • vs code at applications visual studio code app contents • flutter extension version connected device available • iphone mobile • • ios • ios • iphone pro mobile • • ios • com apple coresimulator simruntime ios simulator • macos desktop • macos • darwin • macos darwin • chrome web • chrome • web javascript • google chrome network resources • all expected network resources are available • no issues found target platform ios target os version browser devices iphone pro simulator run flutter analyze and attach any output of that command below if there are any analysis errors try resolving them before filing this issue
0
60,300
25,080,424,721
IssuesEvent
2022-11-07 18:48:49
hashicorp/terraform-provider-aws
https://api.github.com/repos/hashicorp/terraform-provider-aws
closed
[Bug]: The aws_secretmanager_secret_rotation plan file includes a `tags` field but tags aren't supported
bug service/secretsmanager
### Terraform Core Version 1.3.4 ### AWS Provider Version 4.38.0 ### Affected Resource(s) The `aws_secretsmanager_secret_rotation` resource produces a plan that contains a `tags` field even though the [Rotate Secret API](https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_RotateSecret.html) does not support tagging. This cause a problem for me because when writing policies using [open-policy-agent/conftest](https://github.com/open-policy-agent/conftest), the rule assume that if an aws resource has a `tags` field in the plan output, then the resource supports tagging. Since this resource expose the `tags` field but doesn't support tagging my policy fails. My work around it to add `aws_secretsmanager_secret_rotation` resource to a exception list in my policy code. However, it would be get if I could rely on the presence of a `tags` field to determine when an aws resource supports tagging; Rather than keeping a whitelist/blacklist. ### Expected Behavior I expect that the plan output for an `aws_secretsmanager_secret_rotation` does not include a `tags` field. ### Actual Behavior The plan output for the `aws_secretsmanager_secret_rotation` resource does include a `tags` field. ### Relevant Error/Panic Output Snippet _No response_ ### Terraform Configuration Files ```hcl terraform { required_providers { aws = { source = "hashicorp/aws" version = "4.38.0" } } } provider "aws" { region = "us-east-1" } resource "aws_secretsmanager_secret_rotation" "example" { secret_id = "my-secret-id" rotation_lambda_arn = "arn:aws:lambda:::my_lambda" rotation_rules { automatically_after_days = 30 } } ``` ### Steps to Reproduce The the terraform code above in to a file named `main.tf` # create a plan json ```bash terraform init terraform plan -out plan.bin terraform show -json plan.bin | tee plan.json ``` ### Debug Output The terraform code above produces this snippet of plan output. Notice the `tags` field. ❯ jq '.resource_changes' plan.json ```bash [ { "address": "aws_secretsmanager_secret_rotation.example", "mode": "managed", "type": "aws_secretsmanager_secret_rotation", "name": "example", "provider_name": "registry.terraform.io/hashicorp/aws", "change": { "actions": [ "create" ], "before": null, "after": { "rotation_lambda_arn": "arn:aws:lambda:::my_lambda", "rotation_rules": [ { "automatically_after_days": 30 } ], "secret_id": "my-secret-id", "tags": null }, "after_unknown": { "id": true, "rotation_enabled": true, "rotation_rules": [ {} ] }, "before_sensitive": false, "after_sensitive": { "rotation_rules": [ {} ] } } } ] ``` ### Panic Output _No response_ ### Important Factoids _No response_ ### References _No response_ ### Would you like to implement a fix? Yes
1.0
[Bug]: The aws_secretmanager_secret_rotation plan file includes a `tags` field but tags aren't supported - ### Terraform Core Version 1.3.4 ### AWS Provider Version 4.38.0 ### Affected Resource(s) The `aws_secretsmanager_secret_rotation` resource produces a plan that contains a `tags` field even though the [Rotate Secret API](https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_RotateSecret.html) does not support tagging. This cause a problem for me because when writing policies using [open-policy-agent/conftest](https://github.com/open-policy-agent/conftest), the rule assume that if an aws resource has a `tags` field in the plan output, then the resource supports tagging. Since this resource expose the `tags` field but doesn't support tagging my policy fails. My work around it to add `aws_secretsmanager_secret_rotation` resource to a exception list in my policy code. However, it would be get if I could rely on the presence of a `tags` field to determine when an aws resource supports tagging; Rather than keeping a whitelist/blacklist. ### Expected Behavior I expect that the plan output for an `aws_secretsmanager_secret_rotation` does not include a `tags` field. ### Actual Behavior The plan output for the `aws_secretsmanager_secret_rotation` resource does include a `tags` field. ### Relevant Error/Panic Output Snippet _No response_ ### Terraform Configuration Files ```hcl terraform { required_providers { aws = { source = "hashicorp/aws" version = "4.38.0" } } } provider "aws" { region = "us-east-1" } resource "aws_secretsmanager_secret_rotation" "example" { secret_id = "my-secret-id" rotation_lambda_arn = "arn:aws:lambda:::my_lambda" rotation_rules { automatically_after_days = 30 } } ``` ### Steps to Reproduce The the terraform code above in to a file named `main.tf` # create a plan json ```bash terraform init terraform plan -out plan.bin terraform show -json plan.bin | tee plan.json ``` ### Debug Output The terraform code above produces this snippet of plan output. Notice the `tags` field. ❯ jq '.resource_changes' plan.json ```bash [ { "address": "aws_secretsmanager_secret_rotation.example", "mode": "managed", "type": "aws_secretsmanager_secret_rotation", "name": "example", "provider_name": "registry.terraform.io/hashicorp/aws", "change": { "actions": [ "create" ], "before": null, "after": { "rotation_lambda_arn": "arn:aws:lambda:::my_lambda", "rotation_rules": [ { "automatically_after_days": 30 } ], "secret_id": "my-secret-id", "tags": null }, "after_unknown": { "id": true, "rotation_enabled": true, "rotation_rules": [ {} ] }, "before_sensitive": false, "after_sensitive": { "rotation_rules": [ {} ] } } } ] ``` ### Panic Output _No response_ ### Important Factoids _No response_ ### References _No response_ ### Would you like to implement a fix? Yes
non_defect
the aws secretmanager secret rotation plan file includes a tags field but tags aren t supported terraform core version aws provider version affected resource s the aws secretsmanager secret rotation resource produces a plan that contains a tags field even though the does not support tagging this cause a problem for me because when writing policies using the rule assume that if an aws resource has a tags field in the plan output then the resource supports tagging since this resource expose the tags field but doesn t support tagging my policy fails my work around it to add aws secretsmanager secret rotation resource to a exception list in my policy code however it would be get if i could rely on the presence of a tags field to determine when an aws resource supports tagging rather than keeping a whitelist blacklist expected behavior i expect that the plan output for an aws secretsmanager secret rotation does not include a tags field actual behavior the plan output for the aws secretsmanager secret rotation resource does include a tags field relevant error panic output snippet no response terraform configuration files hcl terraform required providers aws source hashicorp aws version provider aws region us east resource aws secretsmanager secret rotation example secret id my secret id rotation lambda arn arn aws lambda my lambda rotation rules automatically after days steps to reproduce the the terraform code above in to a file named main tf create a plan json bash terraform init terraform plan out plan bin terraform show json plan bin tee plan json debug output the terraform code above produces this snippet of plan output notice the tags field ❯ jq resource changes plan json bash address aws secretsmanager secret rotation example mode managed type aws secretsmanager secret rotation name example provider name registry terraform io hashicorp aws change actions create before null after rotation lambda arn arn aws lambda my lambda rotation rules automatically after days secret id my secret id tags null after unknown id true rotation enabled true rotation rules before sensitive false after sensitive rotation rules panic output no response important factoids no response references no response would you like to implement a fix yes
0
24,024
3,900,020,094
IssuesEvent
2016-04-18 02:06:05
networkx/networkx
https://api.github.com/repos/networkx/networkx
closed
Namespace collision on nx.generators
Defect
It looks like nx.generators is no longer the modules in the folder networkx/generators. Instead it is the contents of networkx/algorithms/community/generators.py Can we rename that file to avoid namespace collisions on the word generators? Maybe it should be moved to the generators directory and called ```community_graphs.py```?
1.0
Namespace collision on nx.generators - It looks like nx.generators is no longer the modules in the folder networkx/generators. Instead it is the contents of networkx/algorithms/community/generators.py Can we rename that file to avoid namespace collisions on the word generators? Maybe it should be moved to the generators directory and called ```community_graphs.py```?
defect
namespace collision on nx generators it looks like nx generators is no longer the modules in the folder networkx generators instead it is the contents of networkx algorithms community generators py can we rename that file to avoid namespace collisions on the word generators maybe it should be moved to the generators directory and called community graphs py
1
46,508
13,055,923,985
IssuesEvent
2020-07-30 03:08:05
icecube-trac/tix2
https://api.github.com/repos/icecube-trac/tix2
opened
cmake/tools - cmake can't find cdk in cvmfs (Trac #1334)
Incomplete Migration Migrated from Trac cmake defect
Migrated from https://code.icecube.wisc.edu/ticket/1334 ```json { "status": "closed", "changetime": "2016-03-18T21:14:15", "description": "morax is picking up cdk in /usr/local, not from cvmfs", "reporter": "nega", "cc": "david.schultz", "resolution": "worksforme", "_ts": "1458335655846260", "component": "cmake", "summary": "cmake/tools - cmake can't find cdk in cvmfs", "priority": "normal", "keywords": "cvmfs cdk", "time": "2015-09-09T03:20:00", "milestone": "", "owner": "nega", "type": "defect" } ```
1.0
cmake/tools - cmake can't find cdk in cvmfs (Trac #1334) - Migrated from https://code.icecube.wisc.edu/ticket/1334 ```json { "status": "closed", "changetime": "2016-03-18T21:14:15", "description": "morax is picking up cdk in /usr/local, not from cvmfs", "reporter": "nega", "cc": "david.schultz", "resolution": "worksforme", "_ts": "1458335655846260", "component": "cmake", "summary": "cmake/tools - cmake can't find cdk in cvmfs", "priority": "normal", "keywords": "cvmfs cdk", "time": "2015-09-09T03:20:00", "milestone": "", "owner": "nega", "type": "defect" } ```
defect
cmake tools cmake can t find cdk in cvmfs trac migrated from json status closed changetime description morax is picking up cdk in usr local not from cvmfs reporter nega cc david schultz resolution worksforme ts component cmake summary cmake tools cmake can t find cdk in cvmfs priority normal keywords cvmfs cdk time milestone owner nega type defect
1
61,368
17,023,677,673
IssuesEvent
2021-07-03 03:15:14
tomhughes/trac-tickets
https://api.github.com/repos/tomhughes/trac-tickets
closed
osm2pgsql does not build on Arch Linux
Component: osm2pgsql Priority: major Resolution: worksforme Type: defect
**[Submitted to the original trac issue database at 10.34pm, Wednesday, 2nd February 2011]** Running yaourt -S osm2pgsql-svn fails with: ``` Checked out revision 25215. SVN checkout done or server timeout ==> Starting make... sed: can't read Makefile.in: No such file or directory Aborting... ==> ERROR: Makepkg was unable to build osm2pgsql-svn. ``` Tried to modify the PKGBUILD to match the manual compilation instructions (attached), it fails with the following error: ``` checking how to hardcode library paths into programs... immediate checking for xml2-config... /usr/bin/xml2-config checking for xml2 libraries... yes checking for zlib compression library... no configure: error: required library not found Aborting... ``` I attach also the config.log file. Manual compilation works just fine, the problem seems to be connected to the Arch build system not finding zlib.
1.0
osm2pgsql does not build on Arch Linux - **[Submitted to the original trac issue database at 10.34pm, Wednesday, 2nd February 2011]** Running yaourt -S osm2pgsql-svn fails with: ``` Checked out revision 25215. SVN checkout done or server timeout ==> Starting make... sed: can't read Makefile.in: No such file or directory Aborting... ==> ERROR: Makepkg was unable to build osm2pgsql-svn. ``` Tried to modify the PKGBUILD to match the manual compilation instructions (attached), it fails with the following error: ``` checking how to hardcode library paths into programs... immediate checking for xml2-config... /usr/bin/xml2-config checking for xml2 libraries... yes checking for zlib compression library... no configure: error: required library not found Aborting... ``` I attach also the config.log file. Manual compilation works just fine, the problem seems to be connected to the Arch build system not finding zlib.
defect
does not build on arch linux running yaourt s svn fails with checked out revision svn checkout done or server timeout starting make sed can t read makefile in no such file or directory aborting error makepkg was unable to build svn tried to modify the pkgbuild to match the manual compilation instructions attached it fails with the following error checking how to hardcode library paths into programs immediate checking for config usr bin config checking for libraries yes checking for zlib compression library no configure error required library not found aborting i attach also the config log file manual compilation works just fine the problem seems to be connected to the arch build system not finding zlib
1
63,263
15,529,840,684
IssuesEvent
2021-03-13 16:45:24
opencv/opencv
https://api.github.com/repos/opencv/opencv
closed
PPC64: Unable to detect CPU features when optimization is disabled
affected: 3.4 bug category: build/install category: core platform: ppc (PowerPC)
which leads to a fatal error during initializing the core module if build option `DCV_ENABLE_INTRINSICS` was off. #### Error message: ```Bash ****************************************************************** * FATAL ERROR: * * This OpenCV build doesn't support current CPU/HW configuration * * * * Use OPENCV_DUMP_CONFIG=1 environment variable for details * ****************************************************************** Required baseline features: ID=200 (VSX) - NOT AVAILABLE terminate called after throwing an instance of 'cv::Exception' what(): OpenCV(4.5.2-pre) /opencv/opencv/modules/core/src/system.cpp:625: error: (-215:Assertion failed) Missing support for required CPU baseline features. Check OpenCV build configuration and required CPU/HW setup. in function 'initialize ```` #### steps to produce build OpenCV with `-DDCV_ENABLE_INTRINSICS=OFF` #### workaround skip baseline validation via environment variable `OPENCV_SKIP_CPU_BASELINE_CHECK`
1.0
PPC64: Unable to detect CPU features when optimization is disabled - which leads to a fatal error during initializing the core module if build option `DCV_ENABLE_INTRINSICS` was off. #### Error message: ```Bash ****************************************************************** * FATAL ERROR: * * This OpenCV build doesn't support current CPU/HW configuration * * * * Use OPENCV_DUMP_CONFIG=1 environment variable for details * ****************************************************************** Required baseline features: ID=200 (VSX) - NOT AVAILABLE terminate called after throwing an instance of 'cv::Exception' what(): OpenCV(4.5.2-pre) /opencv/opencv/modules/core/src/system.cpp:625: error: (-215:Assertion failed) Missing support for required CPU baseline features. Check OpenCV build configuration and required CPU/HW setup. in function 'initialize ```` #### steps to produce build OpenCV with `-DDCV_ENABLE_INTRINSICS=OFF` #### workaround skip baseline validation via environment variable `OPENCV_SKIP_CPU_BASELINE_CHECK`
non_defect
unable to detect cpu features when optimization is disabled which leads to a fatal error during initializing the core module if build option dcv enable intrinsics was off error message bash fatal error this opencv build doesn t support current cpu hw configuration use opencv dump config environment variable for details required baseline features id vsx not available terminate called after throwing an instance of cv exception what opencv pre opencv opencv modules core src system cpp error assertion failed missing support for required cpu baseline features check opencv build configuration and required cpu hw setup in function initialize steps to produce build opencv with ddcv enable intrinsics off workaround skip baseline validation via environment variable opencv skip cpu baseline check
0
96,150
3,965,256,048
IssuesEvent
2016-05-03 07:19:56
Titanburg/band-uniform
https://api.github.com/repos/Titanburg/band-uniform
closed
DEV-5 Research Android Studio
Non-Functional Priority - M Story
As a developer, I want to understand how to use Android Studio, so I can build an app. Priority: M Estimate: 8h Acceptance Criterion: 1. Read information about Android Studio 2. Install Android Studio 3. Create first app.
1.0
DEV-5 Research Android Studio - As a developer, I want to understand how to use Android Studio, so I can build an app. Priority: M Estimate: 8h Acceptance Criterion: 1. Read information about Android Studio 2. Install Android Studio 3. Create first app.
non_defect
dev research android studio as a developer i want to understand how to use android studio so i can build an app priority m estimate acceptance criterion read information about android studio install android studio create first app
0
218,750
17,019,579,971
IssuesEvent
2021-07-02 16:41:48
near/nearcore
https://api.github.com/repos/near/nearcore
closed
Fix all nightly tests
A-testing C-epic S-stale
This issue tracks our progress in fixing all nightly tests. For those tests that are flaky in nature, we should either disable it or find a way to remove the flakiness.
1.0
Fix all nightly tests - This issue tracks our progress in fixing all nightly tests. For those tests that are flaky in nature, we should either disable it or find a way to remove the flakiness.
non_defect
fix all nightly tests this issue tracks our progress in fixing all nightly tests for those tests that are flaky in nature we should either disable it or find a way to remove the flakiness
0
58,763
16,747,818,748
IssuesEvent
2021-06-11 17:58:25
idaholab/moose
https://api.github.com/repos/idaholab/moose
opened
ContactSplit setup PETSc error
P: normal T: defect
## Bug Description <!--A clear and concise description of the problem (Note: A missing feature is not a bug).--> There is a PETSc error when using ContactSplit preconditioner for certain applications. Refs #17501 It seems all PETSc options are not correcly flow into PETSc, and PETSc an not setup a preconditioner. It is likely because we are recreating nonlinear solvers many times. ## Steps to Reproduce <!--Steps to reproduce the behavior (input file, or modifications to an existing input file, etc.)--> It can be repdocued using the following input file and mesh file [test(1).i.txt](https://github.com/idaholab/moose/files/6640222/test.1.i.txt) [contact_mesh(1).inp.zip](https://github.com/idaholab/moose/files/6640224/contact_mesh.1.inp.zip) ## Impact <!--Does this prevent you from getting your work done, or is it more of an annoyance?-->
1.0
ContactSplit setup PETSc error - ## Bug Description <!--A clear and concise description of the problem (Note: A missing feature is not a bug).--> There is a PETSc error when using ContactSplit preconditioner for certain applications. Refs #17501 It seems all PETSc options are not correcly flow into PETSc, and PETSc an not setup a preconditioner. It is likely because we are recreating nonlinear solvers many times. ## Steps to Reproduce <!--Steps to reproduce the behavior (input file, or modifications to an existing input file, etc.)--> It can be repdocued using the following input file and mesh file [test(1).i.txt](https://github.com/idaholab/moose/files/6640222/test.1.i.txt) [contact_mesh(1).inp.zip](https://github.com/idaholab/moose/files/6640224/contact_mesh.1.inp.zip) ## Impact <!--Does this prevent you from getting your work done, or is it more of an annoyance?-->
defect
contactsplit setup petsc error bug description there is a petsc error when using contactsplit preconditioner for certain applications refs it seems all petsc options are not correcly flow into petsc and petsc an not setup a preconditioner it is likely because we are recreating nonlinear solvers many times steps to reproduce it can be repdocued using the following input file and mesh file impact
1
174,569
13,495,578,428
IssuesEvent
2020-09-12 00:18:51
rancher/rke2
https://api.github.com/repos/rancher/rke2
closed
Update To Only Apply Network Policy if in CIS Mode
[zube]: To Test
Currently, the code applies a network policy regardless of whether the user has specified CIS mode or not. This needs to be changed to only apply the policy if in CIS mode. The policy should also allow for DNS to be passed to kube-system namespace.
1.0
Update To Only Apply Network Policy if in CIS Mode - Currently, the code applies a network policy regardless of whether the user has specified CIS mode or not. This needs to be changed to only apply the policy if in CIS mode. The policy should also allow for DNS to be passed to kube-system namespace.
non_defect
update to only apply network policy if in cis mode currently the code applies a network policy regardless of whether the user has specified cis mode or not this needs to be changed to only apply the policy if in cis mode the policy should also allow for dns to be passed to kube system namespace
0
58,020
7,112,817,485
IssuesEvent
2018-01-17 18:17:08
phetsims/masses-and-springs
https://api.github.com/repos/phetsims/masses-and-springs
closed
Reducing floating boxes
design:polish meeting:design
@arouinfar here are some suggestions from @emily-phet - might be worth discussing at a future design meeting. I think there are a few places we could reduce the feeling of many floating control boxes (eg the spring constant controls may not even need a box, also possible the check boxes do not need a box). @emily-phet said: > I was looking again at Masses and Springs. I think it looks a bit overwhelming to me, in large part because each screen has so many different floating boxes. You guys know about “subitizing” I think (human’s ability to accurately know the the number of a small group of objects without individually counting). Most people are pretty good at subitizing up to at least four (e.g., abacus’ are designed to allow calculations without subitizing beyond five). > > When groups of things get larger than four-ish, I think they have the impression of…a lot. Which is not a good thing for sim control panels. In some screens of Masses and Springs, you can have as many as seven floating grey boxes. This feels like “a lot” and I feel like I have to kind of "brace myself" as I dig into figuring out what each one is for. I think if you visually grouped more of these floating boxes, it would help a lot. For example, instead of individual floating boxes along the right side, these could be grouped into one (multicomponent) grey panel. You could also group by having the background colors of some of the boxes be something besides grey. For example, the grey boxes holding the “spring constant” sliders for each spring could be each have the same non-grey color. Maybe that color could also be used for the little grey bar thing that holds the springs up, so that whole top panel piece looks like one thing, distinct from the side panels.
2.0
Reducing floating boxes - @arouinfar here are some suggestions from @emily-phet - might be worth discussing at a future design meeting. I think there are a few places we could reduce the feeling of many floating control boxes (eg the spring constant controls may not even need a box, also possible the check boxes do not need a box). @emily-phet said: > I was looking again at Masses and Springs. I think it looks a bit overwhelming to me, in large part because each screen has so many different floating boxes. You guys know about “subitizing” I think (human’s ability to accurately know the the number of a small group of objects without individually counting). Most people are pretty good at subitizing up to at least four (e.g., abacus’ are designed to allow calculations without subitizing beyond five). > > When groups of things get larger than four-ish, I think they have the impression of…a lot. Which is not a good thing for sim control panels. In some screens of Masses and Springs, you can have as many as seven floating grey boxes. This feels like “a lot” and I feel like I have to kind of "brace myself" as I dig into figuring out what each one is for. I think if you visually grouped more of these floating boxes, it would help a lot. For example, instead of individual floating boxes along the right side, these could be grouped into one (multicomponent) grey panel. You could also group by having the background colors of some of the boxes be something besides grey. For example, the grey boxes holding the “spring constant” sliders for each spring could be each have the same non-grey color. Maybe that color could also be used for the little grey bar thing that holds the springs up, so that whole top panel piece looks like one thing, distinct from the side panels.
non_defect
reducing floating boxes arouinfar here are some suggestions from emily phet might be worth discussing at a future design meeting i think there are a few places we could reduce the feeling of many floating control boxes eg the spring constant controls may not even need a box also possible the check boxes do not need a box emily phet said i was looking again at masses and springs i think it looks a bit overwhelming to me in large part because each screen has so many different floating boxes you guys know about “subitizing” i think human’s ability to accurately know the the number of a small group of objects without individually counting most people are pretty good at subitizing up to at least four e g abacus’ are designed to allow calculations without subitizing beyond five when groups of things get larger than four ish i think they have the impression of…a lot which is not a good thing for sim control panels in some screens of masses and springs you can have as many as seven floating grey boxes this feels like “a lot” and i feel like i have to kind of brace myself as i dig into figuring out what each one is for i think if you visually grouped more of these floating boxes it would help a lot for example instead of individual floating boxes along the right side these could be grouped into one multicomponent grey panel you could also group by having the background colors of some of the boxes be something besides grey for example the grey boxes holding the “spring constant” sliders for each spring could be each have the same non grey color maybe that color could also be used for the little grey bar thing that holds the springs up so that whole top panel piece looks like one thing distinct from the side panels
0
16,295
2,889,333,149
IssuesEvent
2015-06-13 09:54:56
kuribot/boilerpipe
https://api.github.com/repos/kuribot/boilerpipe
closed
Server returned HTTP response code: 403 for URL (SOLVED) please use this codeline.
auto-migrated Priority-Medium Type-Defect
``` Instead of using URLConnection in java, if you use HttpURLConnection we can able to access the requested web page from java. Try the following code HttpURLConnection httpcon = (HttpURLConnection) url.openConnection(); httpcon.addRequestProperty("User-Agent", "Mozilla/4.76"); Normal java using urlConnection wont accept to access the internet. If access the browser it will allow to perform a search without this exception "HTTP response code : 403 for URL" exception caused: de.l3s.boilerpipe.BoilerpipeProcessingException: java.io.IOException: Server returned HTTP response code: 403 for URL: http://petapixel.com/2013/05/13/sony-xperia-zr-smartphone-doubles-as-an-underwat er-camera/ After these changes it's working fine now. The changes was done in de.l3s.boilerpipe.sax.HTMLFetcher.java at public static HTMLDocument fetch(final URL url) method Please cite my name in the code and changes list. Daniel da Silva Souza, University of Brasilia (UnB), Brazil. Best Regards, Daniel Souza ``` Original issue reported on code.google.com by `dssouzadan@gmail.com` on 5 Oct 2013 at 2:37 Attachments: * [HTMLFetcher.java](https://storage.googleapis.com/google-code-attachments/boilerpipe/issue-70/comment-0/HTMLFetcher.java)
1.0
Server returned HTTP response code: 403 for URL (SOLVED) please use this codeline. - ``` Instead of using URLConnection in java, if you use HttpURLConnection we can able to access the requested web page from java. Try the following code HttpURLConnection httpcon = (HttpURLConnection) url.openConnection(); httpcon.addRequestProperty("User-Agent", "Mozilla/4.76"); Normal java using urlConnection wont accept to access the internet. If access the browser it will allow to perform a search without this exception "HTTP response code : 403 for URL" exception caused: de.l3s.boilerpipe.BoilerpipeProcessingException: java.io.IOException: Server returned HTTP response code: 403 for URL: http://petapixel.com/2013/05/13/sony-xperia-zr-smartphone-doubles-as-an-underwat er-camera/ After these changes it's working fine now. The changes was done in de.l3s.boilerpipe.sax.HTMLFetcher.java at public static HTMLDocument fetch(final URL url) method Please cite my name in the code and changes list. Daniel da Silva Souza, University of Brasilia (UnB), Brazil. Best Regards, Daniel Souza ``` Original issue reported on code.google.com by `dssouzadan@gmail.com` on 5 Oct 2013 at 2:37 Attachments: * [HTMLFetcher.java](https://storage.googleapis.com/google-code-attachments/boilerpipe/issue-70/comment-0/HTMLFetcher.java)
defect
server returned http response code for url solved please use this codeline instead of using urlconnection in java if you use httpurlconnection we can able to access the requested web page from java try the following code httpurlconnection httpcon httpurlconnection url openconnection httpcon addrequestproperty user agent mozilla normal java using urlconnection wont accept to access the internet if access the browser it will allow to perform a search without this exception http response code for url exception caused de boilerpipe boilerpipeprocessingexception java io ioexception server returned http response code for url er camera after these changes it s working fine now the changes was done in de boilerpipe sax htmlfetcher java at public static htmldocument fetch final url url method please cite my name in the code and changes list daniel da silva souza university of brasilia unb brazil best regards daniel souza original issue reported on code google com by dssouzadan gmail com on oct at attachments
1
228,955
18,273,022,926
IssuesEvent
2021-10-04 15:35:49
kubernetes-sigs/cluster-api-provider-azure
https://api.github.com/repos/kubernetes-sigs/cluster-api-provider-azure
closed
GPU test is flaky
kind/failing-test
/kind bug [Before submitting an issue, have you checked the [Troubleshooting Guide](https://capz.sigs.k8s.io/topics/troubleshooting.html)?] **What steps did you take and what happened:** [A clear and concise description of what the bug is.] https://testgrid.k8s.io/sig-cluster-lifecycle-cluster-api-provider-azure#capz-postsubmit-capi-e2e-full-main is failing at around 50% rate. The first step in investigating this would be to look at failures and add more details to this issue about what error(s) is(are) happening. **Anything else you would like to add:** [Miscellaneous information that will assist in solving the issue.] **Environment:** - cluster-api-provider-azure version: - Kubernetes version: (use `kubectl version`): - OS (e.g. from `/etc/os-release`):
1.0
GPU test is flaky - /kind bug [Before submitting an issue, have you checked the [Troubleshooting Guide](https://capz.sigs.k8s.io/topics/troubleshooting.html)?] **What steps did you take and what happened:** [A clear and concise description of what the bug is.] https://testgrid.k8s.io/sig-cluster-lifecycle-cluster-api-provider-azure#capz-postsubmit-capi-e2e-full-main is failing at around 50% rate. The first step in investigating this would be to look at failures and add more details to this issue about what error(s) is(are) happening. **Anything else you would like to add:** [Miscellaneous information that will assist in solving the issue.] **Environment:** - cluster-api-provider-azure version: - Kubernetes version: (use `kubectl version`): - OS (e.g. from `/etc/os-release`):
non_defect
gpu test is flaky kind bug what steps did you take and what happened is failing at around rate the first step in investigating this would be to look at failures and add more details to this issue about what error s is are happening anything else you would like to add environment cluster api provider azure version kubernetes version use kubectl version os e g from etc os release
0
51,503
7,707,792,279
IssuesEvent
2018-05-22 00:52:18
chrissimpkins/Crunch
https://api.github.com/repos/chrissimpkins/Crunch
opened
Autoupdate macOS GUI with Homebrew cask
documentation
Homebrew cask now supports the following command which will automatically update the Crunch macOS GUI installed through Homebrew cask to new releases since you last installed/updated: ``` $ homebrew cask upgrade ``` Thanks to @adidalal for this information in https://github.com/chrissimpkins/Crunch/issues/49#issuecomment-390818291. Will update documentation on the README and in the macOS GUI About text. TODO: - [ ] update macOS GUI About text with `homebrew cask upgrade` approach to upgrades - [ ] update README with `homebrew cask upgrade` approach to upgrades
1.0
Autoupdate macOS GUI with Homebrew cask - Homebrew cask now supports the following command which will automatically update the Crunch macOS GUI installed through Homebrew cask to new releases since you last installed/updated: ``` $ homebrew cask upgrade ``` Thanks to @adidalal for this information in https://github.com/chrissimpkins/Crunch/issues/49#issuecomment-390818291. Will update documentation on the README and in the macOS GUI About text. TODO: - [ ] update macOS GUI About text with `homebrew cask upgrade` approach to upgrades - [ ] update README with `homebrew cask upgrade` approach to upgrades
non_defect
autoupdate macos gui with homebrew cask homebrew cask now supports the following command which will automatically update the crunch macos gui installed through homebrew cask to new releases since you last installed updated homebrew cask upgrade thanks to adidalal for this information in will update documentation on the readme and in the macos gui about text todo update macos gui about text with homebrew cask upgrade approach to upgrades update readme with homebrew cask upgrade approach to upgrades
0
46,917
13,056,002,131
IssuesEvent
2020-07-30 03:21:29
icecube-trac/tix2
https://api.github.com/repos/icecube-trac/tix2
opened
Inconsistent segment parameter requirements (Trac #2135)
Incomplete Migration Migrated from Trac combo core defect
Migrated from https://code.icecube.wisc.edu/ticket/2135 ```json { "status": "closed", "changetime": "2019-01-11T21:03:41", "description": "`I3Tray.AddSegment` assumes that segments take two parameters (the tray and a name), but `icetray.traysegment` enforces only that they must have one parameter (the tray):\n\n{{{\n@icetray.traysegment\ndef mySegment(tray):\n\tpass\ntray=I3Tray()\ntray.AddSegment(mySegment)\n}}}\n\nresults in:\n\n{{{\n ...\n File \"/Users/cweaver/Work/IceCube/combo/build/lib/I3Tray.py\", line 224, in AddSegment\n return _segment(self, _name, **kwargs)\nTypeError: mySegment() takes exactly 1 argument (2 given)\n}}}\n\nThis is not caught by [http://code.icecube.wisc.edu/projects/icecube/browser/IceTray/projects/icetray/trunk/python/traysegment.py#L23 the relevant check in icetray.traysegment]. ", "reporter": "cweaver", "cc": "", "resolution": "fixed", "_ts": "1547240621058514", "component": "combo core", "summary": "Inconsistent segment parameter requirements", "priority": "normal", "keywords": "", "time": "2018-02-12T23:26:32", "milestone": "", "owner": "cweaver", "type": "defect" } ```
1.0
Inconsistent segment parameter requirements (Trac #2135) - Migrated from https://code.icecube.wisc.edu/ticket/2135 ```json { "status": "closed", "changetime": "2019-01-11T21:03:41", "description": "`I3Tray.AddSegment` assumes that segments take two parameters (the tray and a name), but `icetray.traysegment` enforces only that they must have one parameter (the tray):\n\n{{{\n@icetray.traysegment\ndef mySegment(tray):\n\tpass\ntray=I3Tray()\ntray.AddSegment(mySegment)\n}}}\n\nresults in:\n\n{{{\n ...\n File \"/Users/cweaver/Work/IceCube/combo/build/lib/I3Tray.py\", line 224, in AddSegment\n return _segment(self, _name, **kwargs)\nTypeError: mySegment() takes exactly 1 argument (2 given)\n}}}\n\nThis is not caught by [http://code.icecube.wisc.edu/projects/icecube/browser/IceTray/projects/icetray/trunk/python/traysegment.py#L23 the relevant check in icetray.traysegment]. ", "reporter": "cweaver", "cc": "", "resolution": "fixed", "_ts": "1547240621058514", "component": "combo core", "summary": "Inconsistent segment parameter requirements", "priority": "normal", "keywords": "", "time": "2018-02-12T23:26:32", "milestone": "", "owner": "cweaver", "type": "defect" } ```
defect
inconsistent segment parameter requirements trac migrated from json status closed changetime description addsegment assumes that segments take two parameters the tray and a name but icetray traysegment enforces only that they must have one parameter the tray n n n icetray traysegment ndef mysegment tray n tpass ntray ntray addsegment mysegment n n nresults in n n n n file users cweaver work icecube combo build lib py line in addsegment n return segment self name kwargs ntypeerror mysegment takes exactly argument given n n nthis is not caught by reporter cweaver cc resolution fixed ts component combo core summary inconsistent segment parameter requirements priority normal keywords time milestone owner cweaver type defect
1
39,923
9,745,409,420
IssuesEvent
2019-06-03 09:33:27
jOOQ/jOOQ
https://api.github.com/repos/jOOQ/jOOQ
closed
Translator loses quoted names
C: Parser E: All Editions P: Medium R: Fixed T: Defect
The current version of the translator is losing quoted names: ![image](https://user-images.githubusercontent.com/734593/58790920-97afbc80-85f1-11e9-9de8-0d480972c760.png) This is because https://github.com/jOOQ/jOOQ/issues/5909 has not yet been applied to the translator.
1.0
Translator loses quoted names - The current version of the translator is losing quoted names: ![image](https://user-images.githubusercontent.com/734593/58790920-97afbc80-85f1-11e9-9de8-0d480972c760.png) This is because https://github.com/jOOQ/jOOQ/issues/5909 has not yet been applied to the translator.
defect
translator loses quoted names the current version of the translator is losing quoted names this is because has not yet been applied to the translator
1
80,295
30,216,726,040
IssuesEvent
2023-07-05 16:04:46
SeleniumHQ/selenium
https://api.github.com/repos/SeleniumHQ/selenium
opened
[🐛 Bug]: `Selenium.Support.StrongNamed` depends on `Selenium.WebDeriver` instead of strong name signed version
I-defect needs-triaging
### What happened? `Selenium.Support.StrongNamed` package (available [here](https://github.com/SeleniumHQ/selenium/releases/download/selenium-4.8.0/selenium-dotnet-strongnamed-4.8.2.zip))depends on `Selenium.WebDeriver` instead of strong name signed version: `Selenium.WebDeriver.StrongNamed`. Also this may cause build issues when a project references both of them, such as `warning MSB3243: No way to resolve conflict...` since the ``Selenium.WebDeriver` comes with `Selenium.Support.StrongNamed` and `Selenium.WebDeriver.StrongNamed` might have a name collision. ### How can we reproduce the issue? ```shell - Download [selenium-dotnet-strongnamed](https://github.com/SeleniumHQ/selenium/releases/download/selenium-4.8.0/selenium-dotnet-strongnamed-4.8.2.zip) - Unpack `Selenium.Support.StrongNamed.nupkg` - Inspect `.nuspec` file - You will see that the package depends on `Selenium.WebDeriver`, not `Selenium.WebDeriver.StrongNamed` ``` ### Relevant log output ```shell N/A ``` ### Operating System Windows ### Selenium version 4.8.2 ### What are the browser(s) and version(s) where you see this issue? N/A ### What are the browser driver(s) and version(s) where you see this issue? N/A ### Are you using Selenium Grid? _No response_
1.0
[🐛 Bug]: `Selenium.Support.StrongNamed` depends on `Selenium.WebDeriver` instead of strong name signed version - ### What happened? `Selenium.Support.StrongNamed` package (available [here](https://github.com/SeleniumHQ/selenium/releases/download/selenium-4.8.0/selenium-dotnet-strongnamed-4.8.2.zip))depends on `Selenium.WebDeriver` instead of strong name signed version: `Selenium.WebDeriver.StrongNamed`. Also this may cause build issues when a project references both of them, such as `warning MSB3243: No way to resolve conflict...` since the ``Selenium.WebDeriver` comes with `Selenium.Support.StrongNamed` and `Selenium.WebDeriver.StrongNamed` might have a name collision. ### How can we reproduce the issue? ```shell - Download [selenium-dotnet-strongnamed](https://github.com/SeleniumHQ/selenium/releases/download/selenium-4.8.0/selenium-dotnet-strongnamed-4.8.2.zip) - Unpack `Selenium.Support.StrongNamed.nupkg` - Inspect `.nuspec` file - You will see that the package depends on `Selenium.WebDeriver`, not `Selenium.WebDeriver.StrongNamed` ``` ### Relevant log output ```shell N/A ``` ### Operating System Windows ### Selenium version 4.8.2 ### What are the browser(s) and version(s) where you see this issue? N/A ### What are the browser driver(s) and version(s) where you see this issue? N/A ### Are you using Selenium Grid? _No response_
defect
selenium support strongnamed depends on selenium webderiver instead of strong name signed version what happened selenium support strongnamed package available on selenium webderiver instead of strong name signed version selenium webderiver strongnamed also this may cause build issues when a project references both of them such as warning no way to resolve conflict since the selenium webderiver comes with selenium support strongnamed and selenium webderiver strongnamed might have a name collision how can we reproduce the issue shell download unpack selenium support strongnamed nupkg inspect nuspec file you will see that the package depends on selenium webderiver not selenium webderiver strongnamed relevant log output shell n a operating system windows selenium version what are the browser s and version s where you see this issue n a what are the browser driver s and version s where you see this issue n a are you using selenium grid no response
1
481,976
13,895,037,113
IssuesEvent
2020-10-19 15:22:31
trezor/trezor-suite
https://api.github.com/repos/trezor/trezor-suite
closed
Empty screen after update succeeds.
Bug High priority
**Info:** - OS: macOS 10.14.6 - Suite Version: macOS, 20.10.1 - Firmware Version: Model T, update to 2.3.4 **Describe the bug** Empty screen in Suite after the firmware update finishes. Clears after the device is unlocked. Not a serious issue, it just looks like Suite is stuck (see screenshot). **Steps to reproduce:** 1. Update firmware 2. Finish updating firmware, device restarts 3. Suite shows empty screen **Expected result:** Expected a screen with further instructions, like unlock your device to continue **Actual result:** Empty screen **Screenshots:** <img width="1156" alt="Screenshot 2020-10-15 at 21 00 43" src="https://user-images.githubusercontent.com/9579260/96174837-378d9200-0f2a-11eb-90ad-55b4cd4241b2.png"> **Note(s):** Nice bug reporting template!
1.0
Empty screen after update succeeds. - **Info:** - OS: macOS 10.14.6 - Suite Version: macOS, 20.10.1 - Firmware Version: Model T, update to 2.3.4 **Describe the bug** Empty screen in Suite after the firmware update finishes. Clears after the device is unlocked. Not a serious issue, it just looks like Suite is stuck (see screenshot). **Steps to reproduce:** 1. Update firmware 2. Finish updating firmware, device restarts 3. Suite shows empty screen **Expected result:** Expected a screen with further instructions, like unlock your device to continue **Actual result:** Empty screen **Screenshots:** <img width="1156" alt="Screenshot 2020-10-15 at 21 00 43" src="https://user-images.githubusercontent.com/9579260/96174837-378d9200-0f2a-11eb-90ad-55b4cd4241b2.png"> **Note(s):** Nice bug reporting template!
non_defect
empty screen after update succeeds info os macos suite version macos firmware version model t update to describe the bug empty screen in suite after the firmware update finishes clears after the device is unlocked not a serious issue it just looks like suite is stuck see screenshot steps to reproduce update firmware finish updating firmware device restarts suite shows empty screen expected result expected a screen with further instructions like unlock your device to continue actual result empty screen screenshots img width alt screenshot at src note s nice bug reporting template
0
62,354
25,966,761,380
IssuesEvent
2022-12-19 07:48:29
Azure/azure-powershell
https://api.github.com/repos/Azure/azure-powershell
closed
Az.Synapse - Set linkedService cmd not working
Service Attention question Synapse
<!-- - Make sure you are able to reproduce this issue on the latest released version of Az - https://www.powershellgallery.com/packages/Az - Please search the existing issues to see if there has been a similar issue filed - For issue related to importing a module, please refer to our troubleshooting guide: - https://github.com/Azure/azure-powershell/blob/master/documentation/troubleshoot-module-load.md --> ## Description The Set-AzSynapseLinkedService command fails in Powershell with the error - Object reference not set to an instance of an object. The same JSON file is copied from the Synapse workspace, tested, and successfully running (when created manually in the synapse workspace) but fails with the Powershell cmd. ## Steps to reproduce ```powershell 1. Create a JSON file with the linked service definition as required 2. Run the cmd - Set-AzSynapseLinkedService -WorkspaceName 'cognitiveservices-costanalysis' -Name 'sample_LS' -DefinitionFile "C:\\Users\\sarajag\\OneDrive - Microsoft\\Desktop\\Cogs\\Synapse\\sample_LS.json" ``` ## Environment data <!-- Please run $PSVersionTable and paste the output in the below code block If running the Docker container image, indicate the tag of the image used and the version of Docker engine--> ``` Major Minor Patch PreReleaseLabel BuildLabel ----- ----- ----- --------------- ---------- 7 1 4 ``` ## Module versions <!-- Please run (Get-Module -ListAvailable) and paste the output in the below code block --> ```powershell ``` ## Debug output <!-- Set $DebugPreference='Continue' before running the repro and paste the resulting debug stream in the below code block ATTENTION: Be sure to remove any sensitive information that may be in the logs --> ``` ModuleType Version PreRelease Name PSEdition ExportedCommands ---------- ------- ---------- ---- --------- ---------------- Script 2.5.3 Az.Accounts Core,Desk {Disable-AzDataCollection, Disable-AzCo… Script 0.16.0 Az.Synapse Core,Desk {Get-AzSynapseSparkJob, Stop-AzSynapseS… Directory: C:\program files\powershell\7\Modules ModuleType Version PreRelease Name PSEdition ExportedCommands ---------- ------- ---------- ---- --------- ---------------- Manifest 7.0.0.0 CimCmdlets Core {Get-CimAssociatedInstance, Get-CimClas… Manifest 1.2.5 Microsoft.PowerShell.Archive Desk {Compress-Archive, Expand-Archive} Manifest 7.0.0.0 Microsoft.PowerShell.Diagnostics Core {Get-WinEvent, New-WinEvent, Get-Counte… Manifest 7.0.0.0 Microsoft.PowerShell.Host Core {Start-Transcript, Stop-Transcript} Manifest 7.0.0.0 Microsoft.PowerShell.Management Core {Add-Content, Clear-Content, Get-Clipbo… Manifest 7.0.0.0 Microsoft.PowerShell.Security Core {Get-Acl, Set-Acl, Get-PfxCertificate, … Manifest 7.0.0.0 Microsoft.PowerShell.Utility Core {Export-Alias, Get-Alias, Import-Alias,… Manifest 7.0.0.0 Microsoft.WSMan.Management Core {Disable-WSManCredSSP, Enable-WSManCred… Script 1.4.7 PackageManagement Desk {Find-Package, Get-Package, Get-Package… Script 2.2.5 PowerShellGet Desk {Find-Command, Find-DSCResource, Find-M… Script 2.0.5 PSDesiredStateConfiguration Core {Configuration, New-DscChecksum, Get-Ds… Script 7.0.0.0 PSDiagnostics Core {Disable-PSTrace, Disable-PSWSManCombin… Script 2.1.0 PSReadLine Desk {Get-PSReadLineKeyHandler, Set-PSReadLi… Binary 2.0.3 ThreadJob Desk Start-ThreadJob Directory: C:\Program Files\WindowsPowerShell\Modules ModuleType Version PreRelease Name PSEdition ExportedCommands ---------- ------- ---------- ---- --------- ---------------- Script 5.3.0 Azure Desk {Get-AzureAutomationCertificate, Get-Az… Script 1.0.1 Microsoft.PowerShell.Operation.Val… Desk {Get-OperationValidation, Invoke-Operat… Script 1.4.7 PackageManagement Desk {Find-Package, Get-Package, Get-Package… Binary 1.0.0.1 PackageManagement Desk {Find-Package, Get-Package, Get-Package… Script 3.4.0 Pester Desk {Describe, Context, It, Should…} Script 2.2.4.1 PowerShellGet Desk {Find-Command, Find-DSCResource, Find-M… Script 1.0.0.1 PowerShellGet Desk {Install-Module, Find-Module, Save-Modu… Script 2.0.0 beta2 PSReadline Desk {Get-PSReadLineKeyHandler, Set-PSReadLi… ``` ## Error output <!-- Please run Resolve-AzError and paste the output in the below code block ATTENTION: Be sure to remove any sensitive information that may be in the logs --> ``` Set-AzSynapseLinkedService: Object reference not set to an instance of an object. ```
1.0
Az.Synapse - Set linkedService cmd not working - <!-- - Make sure you are able to reproduce this issue on the latest released version of Az - https://www.powershellgallery.com/packages/Az - Please search the existing issues to see if there has been a similar issue filed - For issue related to importing a module, please refer to our troubleshooting guide: - https://github.com/Azure/azure-powershell/blob/master/documentation/troubleshoot-module-load.md --> ## Description The Set-AzSynapseLinkedService command fails in Powershell with the error - Object reference not set to an instance of an object. The same JSON file is copied from the Synapse workspace, tested, and successfully running (when created manually in the synapse workspace) but fails with the Powershell cmd. ## Steps to reproduce ```powershell 1. Create a JSON file with the linked service definition as required 2. Run the cmd - Set-AzSynapseLinkedService -WorkspaceName 'cognitiveservices-costanalysis' -Name 'sample_LS' -DefinitionFile "C:\\Users\\sarajag\\OneDrive - Microsoft\\Desktop\\Cogs\\Synapse\\sample_LS.json" ``` ## Environment data <!-- Please run $PSVersionTable and paste the output in the below code block If running the Docker container image, indicate the tag of the image used and the version of Docker engine--> ``` Major Minor Patch PreReleaseLabel BuildLabel ----- ----- ----- --------------- ---------- 7 1 4 ``` ## Module versions <!-- Please run (Get-Module -ListAvailable) and paste the output in the below code block --> ```powershell ``` ## Debug output <!-- Set $DebugPreference='Continue' before running the repro and paste the resulting debug stream in the below code block ATTENTION: Be sure to remove any sensitive information that may be in the logs --> ``` ModuleType Version PreRelease Name PSEdition ExportedCommands ---------- ------- ---------- ---- --------- ---------------- Script 2.5.3 Az.Accounts Core,Desk {Disable-AzDataCollection, Disable-AzCo… Script 0.16.0 Az.Synapse Core,Desk {Get-AzSynapseSparkJob, Stop-AzSynapseS… Directory: C:\program files\powershell\7\Modules ModuleType Version PreRelease Name PSEdition ExportedCommands ---------- ------- ---------- ---- --------- ---------------- Manifest 7.0.0.0 CimCmdlets Core {Get-CimAssociatedInstance, Get-CimClas… Manifest 1.2.5 Microsoft.PowerShell.Archive Desk {Compress-Archive, Expand-Archive} Manifest 7.0.0.0 Microsoft.PowerShell.Diagnostics Core {Get-WinEvent, New-WinEvent, Get-Counte… Manifest 7.0.0.0 Microsoft.PowerShell.Host Core {Start-Transcript, Stop-Transcript} Manifest 7.0.0.0 Microsoft.PowerShell.Management Core {Add-Content, Clear-Content, Get-Clipbo… Manifest 7.0.0.0 Microsoft.PowerShell.Security Core {Get-Acl, Set-Acl, Get-PfxCertificate, … Manifest 7.0.0.0 Microsoft.PowerShell.Utility Core {Export-Alias, Get-Alias, Import-Alias,… Manifest 7.0.0.0 Microsoft.WSMan.Management Core {Disable-WSManCredSSP, Enable-WSManCred… Script 1.4.7 PackageManagement Desk {Find-Package, Get-Package, Get-Package… Script 2.2.5 PowerShellGet Desk {Find-Command, Find-DSCResource, Find-M… Script 2.0.5 PSDesiredStateConfiguration Core {Configuration, New-DscChecksum, Get-Ds… Script 7.0.0.0 PSDiagnostics Core {Disable-PSTrace, Disable-PSWSManCombin… Script 2.1.0 PSReadLine Desk {Get-PSReadLineKeyHandler, Set-PSReadLi… Binary 2.0.3 ThreadJob Desk Start-ThreadJob Directory: C:\Program Files\WindowsPowerShell\Modules ModuleType Version PreRelease Name PSEdition ExportedCommands ---------- ------- ---------- ---- --------- ---------------- Script 5.3.0 Azure Desk {Get-AzureAutomationCertificate, Get-Az… Script 1.0.1 Microsoft.PowerShell.Operation.Val… Desk {Get-OperationValidation, Invoke-Operat… Script 1.4.7 PackageManagement Desk {Find-Package, Get-Package, Get-Package… Binary 1.0.0.1 PackageManagement Desk {Find-Package, Get-Package, Get-Package… Script 3.4.0 Pester Desk {Describe, Context, It, Should…} Script 2.2.4.1 PowerShellGet Desk {Find-Command, Find-DSCResource, Find-M… Script 1.0.0.1 PowerShellGet Desk {Install-Module, Find-Module, Save-Modu… Script 2.0.0 beta2 PSReadline Desk {Get-PSReadLineKeyHandler, Set-PSReadLi… ``` ## Error output <!-- Please run Resolve-AzError and paste the output in the below code block ATTENTION: Be sure to remove any sensitive information that may be in the logs --> ``` Set-AzSynapseLinkedService: Object reference not set to an instance of an object. ```
non_defect
az synapse set linkedservice cmd not working make sure you are able to reproduce this issue on the latest released version of az please search the existing issues to see if there has been a similar issue filed for issue related to importing a module please refer to our troubleshooting guide description the set azsynapselinkedservice command fails in powershell with the error object reference not set to an instance of an object the same json file is copied from the synapse workspace tested and successfully running when created manually in the synapse workspace but fails with the powershell cmd steps to reproduce powershell create a json file with the linked service definition as required run the cmd set azsynapselinkedservice workspacename cognitiveservices costanalysis name sample ls definitionfile c users sarajag onedrive microsoft desktop cogs synapse sample ls json environment data please run psversiontable and paste the output in the below code block if running the docker container image indicate the tag of the image used and the version of docker engine major minor patch prereleaselabel buildlabel module versions powershell debug output set debugpreference continue before running the repro and paste the resulting debug stream in the below code block attention be sure to remove any sensitive information that may be in the logs moduletype version prerelease name psedition exportedcommands script az accounts core desk disable azdatacollection disable azco… script az synapse core desk get azsynapsesparkjob stop azsynapses… directory c program files powershell modules moduletype version prerelease name psedition exportedcommands manifest cimcmdlets core get cimassociatedinstance get cimclas… manifest microsoft powershell archive desk compress archive expand archive manifest microsoft powershell diagnostics core get winevent new winevent get counte… manifest microsoft powershell host core start transcript stop transcript manifest microsoft powershell management core add content clear content get clipbo… manifest microsoft powershell security core get acl set acl get pfxcertificate … manifest microsoft powershell utility core export alias get alias import alias … manifest microsoft wsman management core disable wsmancredssp enable wsmancred… script packagemanagement desk find package get package get package… script powershellget desk find command find dscresource find m… script psdesiredstateconfiguration core configuration new dscchecksum get ds… script psdiagnostics core disable pstrace disable pswsmancombin… script psreadline desk get psreadlinekeyhandler set psreadli… binary threadjob desk start threadjob directory c program files windowspowershell modules moduletype version prerelease name psedition exportedcommands script azure desk get azureautomationcertificate get az… script microsoft powershell operation val… desk get operationvalidation invoke operat… script packagemanagement desk find package get package get package… binary packagemanagement desk find package get package get package… script pester desk describe context it should… script powershellget desk find command find dscresource find m… script powershellget desk install module find module save modu… script psreadline desk get psreadlinekeyhandler set psreadli… error output please run resolve azerror and paste the output in the below code block attention be sure to remove any sensitive information that may be in the logs set azsynapselinkedservice object reference not set to an instance of an object
0
32,101
6,715,067,041
IssuesEvent
2017-10-13 19:30:06
scipy/scipy
https://api.github.com/repos/scipy/scipy
closed
scipy 1.0.0rc1 windows wheels depend on missing msvcp140.dll
defect Official binaries
Importing `scipy.sparse` or `scipy.special` (from 1.0.0rc1 openblas linked wheels) on windows can fail with an ImportError if the target machine does not have msvcp140.dll (part of MS Visual C++ 2015 redistributable package) installed. ### Reproducing code example: ``` pip install scipy==1.0.0rc1 python -c"import scipy.sparse" python -c"import scipy.special" ``` ### Error message: ``` Traceback (most recent call last): File "<string>", line 1, in <module> File "C:\Users\biolab\AppData\Local\Programs\Python\Python36\lib\site-packages\scipy\sparse\__init__.py", line 229, in <module> from .csr import * File "C:\Users\biolab\AppData\Local\Programs\Python\Python36\lib\site-packages\scipy\sparse\csr.py", line 15, in <module> from ._sparsetools import csr_tocsc, csr_tobsr, csr_count_blocks, \ ImportError: DLL load failed: The specified module could not be found. ``` ### Scipy/Numpy/Python version information: ``` 1.0.0rc1 1.13.3 sys.version_info(major=3, minor=6, micro=2, releaselevel='final' , serial=0) ``` Inspecting the sparsetools*.pyd with dependency walker reveals the missing dependency and installing the appropriate redistributable solves the problem. Also putting the msvc*.dll into 'scipy/extra-dll/' directory also seems to work.
1.0
scipy 1.0.0rc1 windows wheels depend on missing msvcp140.dll - Importing `scipy.sparse` or `scipy.special` (from 1.0.0rc1 openblas linked wheels) on windows can fail with an ImportError if the target machine does not have msvcp140.dll (part of MS Visual C++ 2015 redistributable package) installed. ### Reproducing code example: ``` pip install scipy==1.0.0rc1 python -c"import scipy.sparse" python -c"import scipy.special" ``` ### Error message: ``` Traceback (most recent call last): File "<string>", line 1, in <module> File "C:\Users\biolab\AppData\Local\Programs\Python\Python36\lib\site-packages\scipy\sparse\__init__.py", line 229, in <module> from .csr import * File "C:\Users\biolab\AppData\Local\Programs\Python\Python36\lib\site-packages\scipy\sparse\csr.py", line 15, in <module> from ._sparsetools import csr_tocsc, csr_tobsr, csr_count_blocks, \ ImportError: DLL load failed: The specified module could not be found. ``` ### Scipy/Numpy/Python version information: ``` 1.0.0rc1 1.13.3 sys.version_info(major=3, minor=6, micro=2, releaselevel='final' , serial=0) ``` Inspecting the sparsetools*.pyd with dependency walker reveals the missing dependency and installing the appropriate redistributable solves the problem. Also putting the msvc*.dll into 'scipy/extra-dll/' directory also seems to work.
defect
scipy windows wheels depend on missing dll importing scipy sparse or scipy special from openblas linked wheels on windows can fail with an importerror if the target machine does not have dll part of ms visual c redistributable package installed reproducing code example pip install scipy python c import scipy sparse python c import scipy special error message traceback most recent call last file line in file c users biolab appdata local programs python lib site packages scipy sparse init py line in from csr import file c users biolab appdata local programs python lib site packages scipy sparse csr py line in from sparsetools import csr tocsc csr tobsr csr count blocks importerror dll load failed the specified module could not be found scipy numpy python version information sys version info major minor micro releaselevel final serial inspecting the sparsetools pyd with dependency walker reveals the missing dependency and installing the appropriate redistributable solves the problem also putting the msvc dll into scipy extra dll directory also seems to work
1
81,856
31,773,565,799
IssuesEvent
2023-09-12 13:13:42
vector-im/element-x-android
https://api.github.com/repos/vector-im/element-x-android
closed
Reply action: harmonize condition
S-Minor T-Defect O-Uncommon Z-Schedule Z-Polish A-Reply
There are 2 places were we compute if a message can be replied or not: - In the `ActionListPresenter`, [here](https://github.com/vector-im/element-x-android/blob/develop/features/messages/impl/src/main/kotlin/io/element/android/features/messages/impl/actionlist/ActionListPresenter.kt#L100), for the action displayed when long pressing on an Event - and in the `TimelinePresenter` [here](https://github.com/vector-im/element-x-android/blob/develop/features/messages/impl/src/main/kotlin/io/element/android/features/messages/impl/timeline/TimelinePresenter.kt#L111), as a global boolean for the timeline, to enable or not the swipe gesture to trigger the reply mode. All of this is valid, but incomplete. We should create a helper to compute if replying to a message is possible. Also this helper could consider the message type to prevent reply on some of them. If centralized this is easier. Currently under certain circumstance, the reply may be possible on one place and not in the other, i.e. not in the ActionList, but gesture is enabled, or in the ActionList, but gesture is not available.
1.0
Reply action: harmonize condition - There are 2 places were we compute if a message can be replied or not: - In the `ActionListPresenter`, [here](https://github.com/vector-im/element-x-android/blob/develop/features/messages/impl/src/main/kotlin/io/element/android/features/messages/impl/actionlist/ActionListPresenter.kt#L100), for the action displayed when long pressing on an Event - and in the `TimelinePresenter` [here](https://github.com/vector-im/element-x-android/blob/develop/features/messages/impl/src/main/kotlin/io/element/android/features/messages/impl/timeline/TimelinePresenter.kt#L111), as a global boolean for the timeline, to enable or not the swipe gesture to trigger the reply mode. All of this is valid, but incomplete. We should create a helper to compute if replying to a message is possible. Also this helper could consider the message type to prevent reply on some of them. If centralized this is easier. Currently under certain circumstance, the reply may be possible on one place and not in the other, i.e. not in the ActionList, but gesture is enabled, or in the ActionList, but gesture is not available.
defect
reply action harmonize condition there are places were we compute if a message can be replied or not in the actionlistpresenter for the action displayed when long pressing on an event and in the timelinepresenter as a global boolean for the timeline to enable or not the swipe gesture to trigger the reply mode all of this is valid but incomplete we should create a helper to compute if replying to a message is possible also this helper could consider the message type to prevent reply on some of them if centralized this is easier currently under certain circumstance the reply may be possible on one place and not in the other i e not in the actionlist but gesture is enabled or in the actionlist but gesture is not available
1
3,656
6,537,310,443
IssuesEvent
2017-08-31 21:49:58
TerraME/terrame
https://api.github.com/repos/TerraME/terrame
closed
CellularSpace:geometry = true as default?
<No Backward Compatibility> Core task
It is necessary to load `CellularSpace` with `geometry = true` to compute GPM and also to use `Cell:area()`. What about set its default value as `true` and the user that wants to save memory set it to `false`?
True
CellularSpace:geometry = true as default? - It is necessary to load `CellularSpace` with `geometry = true` to compute GPM and also to use `Cell:area()`. What about set its default value as `true` and the user that wants to save memory set it to `false`?
non_defect
cellularspace geometry true as default it is necessary to load cellularspace with geometry true to compute gpm and also to use cell area what about set its default value as true and the user that wants to save memory set it to false
0
80,149
9,983,430,328
IssuesEvent
2019-07-10 12:24:38
mhmdtshref/portfolio
https://api.github.com/repos/mhmdtshref/portfolio
opened
Figma: Create admin app main page
design
Should create a Figma design for the main page of the admin app.
1.0
Figma: Create admin app main page - Should create a Figma design for the main page of the admin app.
non_defect
figma create admin app main page should create a figma design for the main page of the admin app
0
68,574
21,715,236,167
IssuesEvent
2022-05-10 17:13:23
vector-im/element-web
https://api.github.com/repos/vector-im/element-web
opened
The hover state of pills is low contrast and difficult to read
T-Defect
### Steps to reproduce 1. Hover over a pill 2. Notice that the background becomes light, which makes the white text difficult to read ### Outcome #### What did you expect? To not have to :eyes: #### What happened instead? ![image](https://user-images.githubusercontent.com/1342360/167681342-6b4188a8-b86f-47a9-8376-94a8bc5df16a.png) It looks like the related change is https://github.com/matrix-org/matrix-react-sdk/pull/6398. To be clear, I really like the interactivity that hovering over a pill now has! But I think the chosen highlight color should be tweaked. ### Operating system Arch Linux ### Application version Element Nightly version: 2022051001, Olm version: 3.2.8 ### How did you install the app? The AUR ### Homeserver _No response_ ### Will you send logs? No
1.0
The hover state of pills is low contrast and difficult to read - ### Steps to reproduce 1. Hover over a pill 2. Notice that the background becomes light, which makes the white text difficult to read ### Outcome #### What did you expect? To not have to :eyes: #### What happened instead? ![image](https://user-images.githubusercontent.com/1342360/167681342-6b4188a8-b86f-47a9-8376-94a8bc5df16a.png) It looks like the related change is https://github.com/matrix-org/matrix-react-sdk/pull/6398. To be clear, I really like the interactivity that hovering over a pill now has! But I think the chosen highlight color should be tweaked. ### Operating system Arch Linux ### Application version Element Nightly version: 2022051001, Olm version: 3.2.8 ### How did you install the app? The AUR ### Homeserver _No response_ ### Will you send logs? No
defect
the hover state of pills is low contrast and difficult to read steps to reproduce hover over a pill notice that the background becomes light which makes the white text difficult to read outcome what did you expect to not have to eyes what happened instead it looks like the related change is to be clear i really like the interactivity that hovering over a pill now has but i think the chosen highlight color should be tweaked operating system arch linux application version element nightly version olm version how did you install the app the aur homeserver no response will you send logs no
1
78,797
22,408,121,139
IssuesEvent
2022-06-18 09:33:53
python/cpython
https://api.github.com/repos/python/cpython
closed
Parallel build race condition on AIX since python-2.7
type-bug build 3.10 3.9
BPO | [19521](https://bugs.python.org/issue19521) --- | :--- Nosy | @loewis, @ericvw, @haubi, @skrah, @aixtools, @miss-islington, @kadler, @isidentical PRs | <li>python/cpython#682</li><li>python/cpython#21997</li><li>python/cpython#22001</li><li>python/cpython#22002</li> Files | <li>[python-tip-aix-parallel.patch](https://bugs.python.org/file32534/python-tip-aix-parallel.patch "Uploaded as text/plain at 2013-11-07.16:04:53 by @haubi"): Fix parallel build race condition on AIX</li><li>[issue19521-parallel-build-race-on-aix.patch](https://bugs.python.org/file35479/issue19521-parallel-build-race-on-aix.patch "Uploaded as text/plain at 2014-06-04.06:35:58 by @haubi"): patch for 3.4</li><li>[aix-parallel-build-race-refresh.patch](https://bugs.python.org/file45665/aix-parallel-build-race-refresh.patch "Uploaded as text/plain at 2016-11-27.14:26:09 by @ericvw"): Refreshed 2014 patch for tip of CPython</li> <sup>*Note: these values reflect the state of the issue at the time it was migrated and might not reflect the current state.*</sup> <details><summary>Show more details</summary><p> GitHub fields: ```python assignee = None closed_at = None created_at = <Date 2013-11-07.16:04:54.897> labels = ['3.10', 'type-bug', '3.9', 'build'] title = 'Parallel build race condition on AIX since python-2.7' updated_at = <Date 2020-09-10.12:22:11.359> user = 'https://github.com/haubi' ``` bugs.python.org fields: ```python activity = <Date 2020-09-10.12:22:11.359> actor = 'skrah' assignee = 'none' closed = False closed_date = None closer = None components = ['Build'] creation = <Date 2013-11-07.16:04:54.897> creator = 'haubi' dependencies = [] files = ['32534', '35479', '45665'] hgrepos = ['251'] issue_num = 19521 keywords = ['patch'] message_count = 15.0 messages = ['202357', '202379', '202407', '202435', '219742', '281827', '281833', '375626', '375627', '376059', '376063', '376067', '376069', '376070', '376681'] nosy_count = 9.0 nosy_names = ['loewis', 'ericvw', 'haubi', 'skrah', 'David.Edelsohn', 'Michael.Felt', 'miss-islington', 'kadler', 'BTaskaya'] pr_nums = ['682', '21997', '22001', '22002'] priority = 'normal' resolution = 'fixed' stage = 'resolved' status = 'open' superseder = None type = 'behavior' url = 'https://bugs.python.org/issue19521' versions = ['Python 3.9', 'Python 3.10'] ``` </p></details>
1.0
Parallel build race condition on AIX since python-2.7 - BPO | [19521](https://bugs.python.org/issue19521) --- | :--- Nosy | @loewis, @ericvw, @haubi, @skrah, @aixtools, @miss-islington, @kadler, @isidentical PRs | <li>python/cpython#682</li><li>python/cpython#21997</li><li>python/cpython#22001</li><li>python/cpython#22002</li> Files | <li>[python-tip-aix-parallel.patch](https://bugs.python.org/file32534/python-tip-aix-parallel.patch "Uploaded as text/plain at 2013-11-07.16:04:53 by @haubi"): Fix parallel build race condition on AIX</li><li>[issue19521-parallel-build-race-on-aix.patch](https://bugs.python.org/file35479/issue19521-parallel-build-race-on-aix.patch "Uploaded as text/plain at 2014-06-04.06:35:58 by @haubi"): patch for 3.4</li><li>[aix-parallel-build-race-refresh.patch](https://bugs.python.org/file45665/aix-parallel-build-race-refresh.patch "Uploaded as text/plain at 2016-11-27.14:26:09 by @ericvw"): Refreshed 2014 patch for tip of CPython</li> <sup>*Note: these values reflect the state of the issue at the time it was migrated and might not reflect the current state.*</sup> <details><summary>Show more details</summary><p> GitHub fields: ```python assignee = None closed_at = None created_at = <Date 2013-11-07.16:04:54.897> labels = ['3.10', 'type-bug', '3.9', 'build'] title = 'Parallel build race condition on AIX since python-2.7' updated_at = <Date 2020-09-10.12:22:11.359> user = 'https://github.com/haubi' ``` bugs.python.org fields: ```python activity = <Date 2020-09-10.12:22:11.359> actor = 'skrah' assignee = 'none' closed = False closed_date = None closer = None components = ['Build'] creation = <Date 2013-11-07.16:04:54.897> creator = 'haubi' dependencies = [] files = ['32534', '35479', '45665'] hgrepos = ['251'] issue_num = 19521 keywords = ['patch'] message_count = 15.0 messages = ['202357', '202379', '202407', '202435', '219742', '281827', '281833', '375626', '375627', '376059', '376063', '376067', '376069', '376070', '376681'] nosy_count = 9.0 nosy_names = ['loewis', 'ericvw', 'haubi', 'skrah', 'David.Edelsohn', 'Michael.Felt', 'miss-islington', 'kadler', 'BTaskaya'] pr_nums = ['682', '21997', '22001', '22002'] priority = 'normal' resolution = 'fixed' stage = 'resolved' status = 'open' superseder = None type = 'behavior' url = 'https://bugs.python.org/issue19521' versions = ['Python 3.9', 'Python 3.10'] ``` </p></details>
non_defect
parallel build race condition on aix since python bpo nosy loewis ericvw haubi skrah aixtools miss islington kadler isidentical prs python cpython python cpython python cpython python cpython files uploaded as text plain at by haubi fix parallel build race condition on aix uploaded as text plain at by haubi patch for uploaded as text plain at by ericvw refreshed patch for tip of cpython note these values reflect the state of the issue at the time it was migrated and might not reflect the current state show more details github fields python assignee none closed at none created at labels title parallel build race condition on aix since python updated at user bugs python org fields python activity actor skrah assignee none closed false closed date none closer none components creation creator haubi dependencies files hgrepos issue num keywords message count messages nosy count nosy names pr nums priority normal resolution fixed stage resolved status open superseder none type behavior url versions
0
81,013
30,658,770,057
IssuesEvent
2023-07-25 13:48:06
SeleniumHQ/selenium
https://api.github.com/repos/SeleniumHQ/selenium
closed
[🐛 Bug]: Unable to obtain driver using Selenium Manager
R-awaiting answer I-defect
### What happened? C:\Users\<username>\AppData\Local\Temp\selenium-manager4780040182003919112691930970461\selenium-manager.exe Script is unable to obtain driver. Though the selenium-manager.exe is available on above path. Below highlight error is shown. I ran maven clean command, updated the project with latest jar but still didnt work. Jul 25, 2023 6:06:04 PM org.openqa.selenium.remote.service.DriverService findExecutable WARNING: **Unable to obtain driver using Selenium Manager: Error running command: [C:\Users\<username>\AppData\Local\Temp\selenium-manager4780040182003919112691930970461\selenium-manager.exe**, --driver, chromedriver] Build info: version: '4.6.0', revision: '79f1c02ae20' System info: os.name: 'Windows 10', os.arch: 'x86', os.version: '10.0', java.version: '1.8.0_361' Driver info: driver.version: ChromeDriver java.lang.IllegalStateException: The path to the driver executable The path to the driver executable must be set by the webdriver.chrome.driver system property; for more information, see https://chromedriver.chromium.org/. The latest version can be downloaded from https://chromedriver.chromium.org/downloads at org.openqa.selenium.internal.Require$StateChecker.nonNull(Require.java:314) at org.openqa.selenium.remote.service.DriverService.findExecutable(DriverService.java:148) at org.openqa.selenium.chrome.ChromeDriverService.access$000(ChromeDriverService.java:39) at org.openqa.selenium.chrome.ChromeDriverService$Builder.findDefaultExecutable(ChromeDriverService.java:233) at org.openqa.selenium.remote.service.DriverService$Builder.build(DriverService.java:450) at org.openqa.selenium.chrome.ChromeDriverService.createServiceWithConfig(ChromeDriverService.java:142) at org.openqa.selenium.chrome.ChromeDriver.<init>(ChromeDriver.java:70) at scm.utils.BrowserUtils.launch_browser(BrowserUtils.java:48) at scm.stepdefinitions.StepHooks.setup(StepHooks.java:24) ### How can we reproduce the issue? ```shell This is uncertain error which is working fine on other machine. ``` ### Relevant log output ```shell Jul 25, 2023 6:06:04 PM org.openqa.selenium.remote.service.DriverService findExecutable WARNING: **Unable to obtain driver using Selenium Manager: Error running command: [C:\Users\<username>\AppData\Local\Temp\selenium-manager4780040182003919112691930970461\selenium-manager.exe**, --driver, chromedriver] Build info: version: '4.6.0', revision: '79f1c02ae20' System info: os.name: 'Windows 10', os.arch: 'x86', os.version: '10.0', java.version: '1.8.0_361' Driver info: driver.version: ChromeDriver java.lang.IllegalStateException: The path to the driver executable The path to the driver executable must be set by the webdriver.chrome.driver system property; for more information, see https://chromedriver.chromium.org/. The latest version can be downloaded from https://chromedriver.chromium.org/downloads at org.openqa.selenium.internal.Require$StateChecker.nonNull(Require.java:314) at org.openqa.selenium.remote.service.DriverService.findExecutable(DriverService.java:148) at org.openqa.selenium.chrome.ChromeDriverService.access$000(ChromeDriverService.java:39) at org.openqa.selenium.chrome.ChromeDriverService$Builder.findDefaultExecutable(ChromeDriverService.java:233) at org.openqa.selenium.remote.service.DriverService$Builder.build(DriverService.java:450) at org.openqa.selenium.chrome.ChromeDriverService.createServiceWithConfig(ChromeDriverService.java:142) at org.openqa.selenium.chrome.ChromeDriver.<init>(ChromeDriver.java:70) at scm.utils.BrowserUtils.launch_browser(BrowserUtils.java:48) at scm.stepdefinitions.StepHooks.setup(StepHooks.java:24) ``` ### Operating System windows 10 ### Selenium version 4.6 ### What are the browser(s) and version(s) where you see this issue? Chrome Version 115.0.5790.102 (Official Build) (64-bit) ### What are the browser driver(s) and version(s) where you see this issue? Chrome Version 115.0.5790.102 (Official Build) (64-bit) ### Are you using Selenium Grid? No
1.0
[🐛 Bug]: Unable to obtain driver using Selenium Manager - ### What happened? C:\Users\<username>\AppData\Local\Temp\selenium-manager4780040182003919112691930970461\selenium-manager.exe Script is unable to obtain driver. Though the selenium-manager.exe is available on above path. Below highlight error is shown. I ran maven clean command, updated the project with latest jar but still didnt work. Jul 25, 2023 6:06:04 PM org.openqa.selenium.remote.service.DriverService findExecutable WARNING: **Unable to obtain driver using Selenium Manager: Error running command: [C:\Users\<username>\AppData\Local\Temp\selenium-manager4780040182003919112691930970461\selenium-manager.exe**, --driver, chromedriver] Build info: version: '4.6.0', revision: '79f1c02ae20' System info: os.name: 'Windows 10', os.arch: 'x86', os.version: '10.0', java.version: '1.8.0_361' Driver info: driver.version: ChromeDriver java.lang.IllegalStateException: The path to the driver executable The path to the driver executable must be set by the webdriver.chrome.driver system property; for more information, see https://chromedriver.chromium.org/. The latest version can be downloaded from https://chromedriver.chromium.org/downloads at org.openqa.selenium.internal.Require$StateChecker.nonNull(Require.java:314) at org.openqa.selenium.remote.service.DriverService.findExecutable(DriverService.java:148) at org.openqa.selenium.chrome.ChromeDriverService.access$000(ChromeDriverService.java:39) at org.openqa.selenium.chrome.ChromeDriverService$Builder.findDefaultExecutable(ChromeDriverService.java:233) at org.openqa.selenium.remote.service.DriverService$Builder.build(DriverService.java:450) at org.openqa.selenium.chrome.ChromeDriverService.createServiceWithConfig(ChromeDriverService.java:142) at org.openqa.selenium.chrome.ChromeDriver.<init>(ChromeDriver.java:70) at scm.utils.BrowserUtils.launch_browser(BrowserUtils.java:48) at scm.stepdefinitions.StepHooks.setup(StepHooks.java:24) ### How can we reproduce the issue? ```shell This is uncertain error which is working fine on other machine. ``` ### Relevant log output ```shell Jul 25, 2023 6:06:04 PM org.openqa.selenium.remote.service.DriverService findExecutable WARNING: **Unable to obtain driver using Selenium Manager: Error running command: [C:\Users\<username>\AppData\Local\Temp\selenium-manager4780040182003919112691930970461\selenium-manager.exe**, --driver, chromedriver] Build info: version: '4.6.0', revision: '79f1c02ae20' System info: os.name: 'Windows 10', os.arch: 'x86', os.version: '10.0', java.version: '1.8.0_361' Driver info: driver.version: ChromeDriver java.lang.IllegalStateException: The path to the driver executable The path to the driver executable must be set by the webdriver.chrome.driver system property; for more information, see https://chromedriver.chromium.org/. The latest version can be downloaded from https://chromedriver.chromium.org/downloads at org.openqa.selenium.internal.Require$StateChecker.nonNull(Require.java:314) at org.openqa.selenium.remote.service.DriverService.findExecutable(DriverService.java:148) at org.openqa.selenium.chrome.ChromeDriverService.access$000(ChromeDriverService.java:39) at org.openqa.selenium.chrome.ChromeDriverService$Builder.findDefaultExecutable(ChromeDriverService.java:233) at org.openqa.selenium.remote.service.DriverService$Builder.build(DriverService.java:450) at org.openqa.selenium.chrome.ChromeDriverService.createServiceWithConfig(ChromeDriverService.java:142) at org.openqa.selenium.chrome.ChromeDriver.<init>(ChromeDriver.java:70) at scm.utils.BrowserUtils.launch_browser(BrowserUtils.java:48) at scm.stepdefinitions.StepHooks.setup(StepHooks.java:24) ``` ### Operating System windows 10 ### Selenium version 4.6 ### What are the browser(s) and version(s) where you see this issue? Chrome Version 115.0.5790.102 (Official Build) (64-bit) ### What are the browser driver(s) and version(s) where you see this issue? Chrome Version 115.0.5790.102 (Official Build) (64-bit) ### Are you using Selenium Grid? No
defect
unable to obtain driver using selenium manager what happened c users appdata local temp selenium selenium manager exe script is unable to obtain driver though the selenium manager exe is available on above path below highlight error is shown i ran maven clean command updated the project with latest jar but still didnt work jul pm org openqa selenium remote service driverservice findexecutable warning unable to obtain driver using selenium manager error running command build info version revision system info os name windows os arch os version java version driver info driver version chromedriver  lang illegalstateexception the path to the driver executable the path to the driver executable must be set by the webdriver chrome driver system property for more information see the latest version can be downloaded from at org openqa selenium internal require statechecker nonnull require java at org openqa selenium remote service driverservice findexecutable driverservice java at org openqa selenium chrome chromedriverservice access chromedriverservice java at org openqa selenium chrome chromedriverservice builder finddefaultexecutable chromedriverservice java at org openqa selenium remote service driverservice builder build driverservice java at org openqa selenium chrome chromedriverservice createservicewithconfig chromedriverservice java at org openqa selenium chrome chromedriver chromedriver java at scm utils browserutils launch browser browserutils java at scm stepdefinitions stephooks setup stephooks java how can we reproduce the issue shell this is uncertain error which is working fine on other machine relevant log output shell jul pm org openqa selenium remote service driverservice findexecutable warning unable to obtain driver using selenium manager error running command build info version revision system info os name windows os arch os version java version driver info driver version chromedriver  lang illegalstateexception the path to the driver executable the path to the driver executable must be set by the webdriver chrome driver system property for more information see the latest version can be downloaded from at org openqa selenium internal require statechecker nonnull require java at org openqa selenium remote service driverservice findexecutable driverservice java at org openqa selenium chrome chromedriverservice access chromedriverservice java at org openqa selenium chrome chromedriverservice builder finddefaultexecutable chromedriverservice java at org openqa selenium remote service driverservice builder build driverservice java at org openqa selenium chrome chromedriverservice createservicewithconfig chromedriverservice java at org openqa selenium chrome chromedriver chromedriver java at scm utils browserutils launch browser browserutils java at scm stepdefinitions stephooks setup stephooks java operating system windows selenium version what are the browser s and version s where you see this issue chrome version official build bit what are the browser driver s and version s where you see this issue chrome version official build bit are you using selenium grid no
1
154,787
13,577,344,188
IssuesEvent
2020-09-20 00:40:55
holtzmak/Humane-Transport
https://api.github.com/repos/holtzmak/Humane-Transport
opened
Add "Adobe XD vs Figma" Wiki page
documentation
Add a page to the wiki where it will discuss the pros and cons about the UI/UX tools. After the comparison, we will decide which one to use
1.0
Add "Adobe XD vs Figma" Wiki page - Add a page to the wiki where it will discuss the pros and cons about the UI/UX tools. After the comparison, we will decide which one to use
non_defect
add adobe xd vs figma wiki page add a page to the wiki where it will discuss the pros and cons about the ui ux tools after the comparison we will decide which one to use
0
75,366
9,222,950,823
IssuesEvent
2019-03-12 01:12:03
prysmaticlabs/prysm
https://api.github.com/repos/prysmaticlabs/prysm
closed
p2p: Implement PeerInfo and Send to Single Peer
Needs Design
[Design doc](https://docs.google.com/document/d/1cthKuGPreOSQH96Ujt7sArcT-IRICk6b-QcdD0EnLsI/edit) - [ ] Add details to peer info based on requirements by the underlying p2p protocol - [ ] Implement `func (s *Server) Send(msg interface{}, peer Peer)` More details to come through the design.
1.0
p2p: Implement PeerInfo and Send to Single Peer - [Design doc](https://docs.google.com/document/d/1cthKuGPreOSQH96Ujt7sArcT-IRICk6b-QcdD0EnLsI/edit) - [ ] Add details to peer info based on requirements by the underlying p2p protocol - [ ] Implement `func (s *Server) Send(msg interface{}, peer Peer)` More details to come through the design.
non_defect
implement peerinfo and send to single peer add details to peer info based on requirements by the underlying protocol implement func s server send msg interface peer peer more details to come through the design
0
175,766
13,608,865,967
IssuesEvent
2020-09-23 03:35:02
cockroachdb/cockroach
https://api.github.com/repos/cockroachdb/cockroach
closed
kv/kvclient/kvcoord: TestTxnCoordSenderRetries failed
C-test-failure O-robot branch-master
[(kv/kvclient/kvcoord).TestTxnCoordSenderRetries failed](https://teamcity.cockroachdb.com/viewLog.html?buildId=2174486&tab=buildLog) on [master@09bb6460c0ed1a882db95472e2d962dd57a80aaf](https://github.com/cockroachdb/cockroach/commits/09bb6460c0ed1a882db95472e2d962dd57a80aaf): ``` === RUN TestTxnCoordSenderRetries --- FAIL: TestTxnCoordSenderRetries (2.30s) test_log_scope.go:154: test logs captured to: /go/src/github.com/cockroachdb/cockroach/artifacts/logTestTxnCoordSenderRetries950557519 test_log_scope.go:63: use -show-logs to present logs inline === RUN TestTxnCoordSenderRetries/write_too_old_with_multiple_puts_to_same_key --- FAIL: TestTxnCoordSenderRetries/write_too_old_with_multiple_puts_to_same_key (0.01s) dist_sender_server_test.go:2920: expected no txn coord sender auto retries; got 1 ``` <details><summary>More</summary><p> Parameters: - GOFLAGS=-json ``` make stressrace TESTS=TestTxnCoordSenderRetries PKG=./pkg/kv/kvclient/kvcoord TESTTIMEOUT=5m STRESSFLAGS='-timeout 5m' 2>&1 ``` [See this test on roachdash](https://roachdash.crdb.dev/?filter=status%3Aopen+t%3A.%2ATestTxnCoordSenderRetries.%2A&sort=title&restgroup=false&display=lastcommented+project) <sub>powered by [pkg/cmd/internal/issues](https://github.com/cockroachdb/cockroach/tree/master/pkg/cmd/internal/issues)</sub></p></details>
1.0
kv/kvclient/kvcoord: TestTxnCoordSenderRetries failed - [(kv/kvclient/kvcoord).TestTxnCoordSenderRetries failed](https://teamcity.cockroachdb.com/viewLog.html?buildId=2174486&tab=buildLog) on [master@09bb6460c0ed1a882db95472e2d962dd57a80aaf](https://github.com/cockroachdb/cockroach/commits/09bb6460c0ed1a882db95472e2d962dd57a80aaf): ``` === RUN TestTxnCoordSenderRetries --- FAIL: TestTxnCoordSenderRetries (2.30s) test_log_scope.go:154: test logs captured to: /go/src/github.com/cockroachdb/cockroach/artifacts/logTestTxnCoordSenderRetries950557519 test_log_scope.go:63: use -show-logs to present logs inline === RUN TestTxnCoordSenderRetries/write_too_old_with_multiple_puts_to_same_key --- FAIL: TestTxnCoordSenderRetries/write_too_old_with_multiple_puts_to_same_key (0.01s) dist_sender_server_test.go:2920: expected no txn coord sender auto retries; got 1 ``` <details><summary>More</summary><p> Parameters: - GOFLAGS=-json ``` make stressrace TESTS=TestTxnCoordSenderRetries PKG=./pkg/kv/kvclient/kvcoord TESTTIMEOUT=5m STRESSFLAGS='-timeout 5m' 2>&1 ``` [See this test on roachdash](https://roachdash.crdb.dev/?filter=status%3Aopen+t%3A.%2ATestTxnCoordSenderRetries.%2A&sort=title&restgroup=false&display=lastcommented+project) <sub>powered by [pkg/cmd/internal/issues](https://github.com/cockroachdb/cockroach/tree/master/pkg/cmd/internal/issues)</sub></p></details>
non_defect
kv kvclient kvcoord testtxncoordsenderretries failed on run testtxncoordsenderretries fail testtxncoordsenderretries test log scope go test logs captured to go src github com cockroachdb cockroach artifacts test log scope go use show logs to present logs inline run testtxncoordsenderretries write too old with multiple puts to same key fail testtxncoordsenderretries write too old with multiple puts to same key dist sender server test go expected no txn coord sender auto retries got more parameters goflags json make stressrace tests testtxncoordsenderretries pkg pkg kv kvclient kvcoord testtimeout stressflags timeout powered by
0
306,143
26,439,453,515
IssuesEvent
2023-01-15 19:56:57
sundarnagarajan/python_protected_class
https://api.github.com/repos/sundarnagarajan/python_protected_class
opened
Create separate test script for PY3-only tests
Tests
- Test case wrapping async context manager - __aenter__, __aexit__ - See [link](https://www.educative.io/answers/what-is-the-asynchronous-context-manager-in-python) - Test case wrapping coroutine - 'send', 'throw', close'
1.0
Create separate test script for PY3-only tests - - Test case wrapping async context manager - __aenter__, __aexit__ - See [link](https://www.educative.io/answers/what-is-the-asynchronous-context-manager-in-python) - Test case wrapping coroutine - 'send', 'throw', close'
non_defect
create separate test script for only tests test case wrapping async context manager aenter aexit see test case wrapping coroutine send throw close
0
58,643
16,671,045,824
IssuesEvent
2021-06-07 10:54:36
primefaces/primeng
https://api.github.com/repos/primefaces/primeng
closed
Button icon css class not set after it has been initialized
defect
**I'm submitting a ...** ``` [x] bug report => Search github for a similar issue or PR before submitting [ ] feature request => Please check if request is not on the roadmap already https://github.com/primefaces/primeng/wiki/Roadmap [ ] support request => Please do not submit support request here, instead see http://forum.primefaces.org/viewforum.php?f=35 ``` **Plunkr Case (Bug Reports)** https://stackblitz.com/edit/github-akgkdp?file=src/app/app.component.html **Current behavior** Button with pButton directive and icon does not have css class ".p-button .p-button-icon-left" if the text is set after the button has been initialized without text. With the p-button it works as expected. **Expected behavior** The css class for the icon should be added if the button has text. **Minimal reproduction of the problem with instructions** Use button with pButton directive and icon. Set Text after it has been initialized. **What is the motivation / use case for changing the behavior?** I want to add the text for the button dynamically. * **Angular version:** 11.0.0 * **PrimeNG version:** 11.3.0 * **Browser:** [Chrome 91 | Firefox 88 | Edge 90] * **Language:** TypeScript 4.0.2
1.0
Button icon css class not set after it has been initialized - **I'm submitting a ...** ``` [x] bug report => Search github for a similar issue or PR before submitting [ ] feature request => Please check if request is not on the roadmap already https://github.com/primefaces/primeng/wiki/Roadmap [ ] support request => Please do not submit support request here, instead see http://forum.primefaces.org/viewforum.php?f=35 ``` **Plunkr Case (Bug Reports)** https://stackblitz.com/edit/github-akgkdp?file=src/app/app.component.html **Current behavior** Button with pButton directive and icon does not have css class ".p-button .p-button-icon-left" if the text is set after the button has been initialized without text. With the p-button it works as expected. **Expected behavior** The css class for the icon should be added if the button has text. **Minimal reproduction of the problem with instructions** Use button with pButton directive and icon. Set Text after it has been initialized. **What is the motivation / use case for changing the behavior?** I want to add the text for the button dynamically. * **Angular version:** 11.0.0 * **PrimeNG version:** 11.3.0 * **Browser:** [Chrome 91 | Firefox 88 | Edge 90] * **Language:** TypeScript 4.0.2
defect
button icon css class not set after it has been initialized i m submitting a bug report search github for a similar issue or pr before submitting feature request please check if request is not on the roadmap already support request please do not submit support request here instead see plunkr case bug reports current behavior button with pbutton directive and icon does not have css class p button p button icon left if the text is set after the button has been initialized without text with the p button it works as expected expected behavior the css class for the icon should be added if the button has text minimal reproduction of the problem with instructions use button with pbutton directive and icon set text after it has been initialized what is the motivation use case for changing the behavior i want to add the text for the button dynamically angular version primeng version browser language typescript
1
41,248
10,343,662,323
IssuesEvent
2019-09-04 09:26:05
cakephp/cakephp
https://api.github.com/repos/cakephp/cakephp
opened
4.x: Plugin path resolution wrong for templates
defect
This is a (multiple allowed): * [x] bug 4.x ### What you did bin/cake dto generate I tried the Dto plugin in a 4.x app, it errored on the twig file to be found: The following paths were searched: ``` - /.../cake4.local/templates/Dto/ - /.../cake4.local/vendor/dereuromark/cakephp-dto/src/Template/Dto/ (!) - /.../cake4.local/vendor/cakephp/cakephp/templates/Dto/ ``` the path inside the plugin is already `/templates/...` I think it is the App::path() method and this code: ```php if (!empty($plugin)) { return [Plugin::classPath($plugin) . $type . DIRECTORY_SEPARATOR]; } ``` ### What you expected to happen We either need to fix App::path() to also work for these non src (and non PHP class) files. ```php if (!empty($plugin)) { if ($type === 'Template') { return [Plugin::path($plugin) . 'templates' . DIRECTORY_SEPARATOR]; } return [Plugin::classPath($plugin) . $type . DIRECTORY_SEPARATOR]; } ``` But mixing src path generation with other non src paths is a bit weird moving forward. Note the mix of classPath() vs path() usage inside of this wrapper now. The cleaner strategy is to not have the App::path() being used anymore for such root folders. We should use a different method for non class lookup IMO. E.g. - `App::templates(?string $plugin = null)` - `App::locales(?string $plugin = null)` Or we separate the App class similar to Plugin and its path() vs classPath method: - `App::classPath($type, ?$plugin)` for actual classes ("Model/Datasource" etc) inside src/ - `App::path($type, ?$plugin)` for the root folders (and use "templates" instead of "Template") What do people think? A clear and consistent API here would be probably quite helpful.
1.0
4.x: Plugin path resolution wrong for templates - This is a (multiple allowed): * [x] bug 4.x ### What you did bin/cake dto generate I tried the Dto plugin in a 4.x app, it errored on the twig file to be found: The following paths were searched: ``` - /.../cake4.local/templates/Dto/ - /.../cake4.local/vendor/dereuromark/cakephp-dto/src/Template/Dto/ (!) - /.../cake4.local/vendor/cakephp/cakephp/templates/Dto/ ``` the path inside the plugin is already `/templates/...` I think it is the App::path() method and this code: ```php if (!empty($plugin)) { return [Plugin::classPath($plugin) . $type . DIRECTORY_SEPARATOR]; } ``` ### What you expected to happen We either need to fix App::path() to also work for these non src (and non PHP class) files. ```php if (!empty($plugin)) { if ($type === 'Template') { return [Plugin::path($plugin) . 'templates' . DIRECTORY_SEPARATOR]; } return [Plugin::classPath($plugin) . $type . DIRECTORY_SEPARATOR]; } ``` But mixing src path generation with other non src paths is a bit weird moving forward. Note the mix of classPath() vs path() usage inside of this wrapper now. The cleaner strategy is to not have the App::path() being used anymore for such root folders. We should use a different method for non class lookup IMO. E.g. - `App::templates(?string $plugin = null)` - `App::locales(?string $plugin = null)` Or we separate the App class similar to Plugin and its path() vs classPath method: - `App::classPath($type, ?$plugin)` for actual classes ("Model/Datasource" etc) inside src/ - `App::path($type, ?$plugin)` for the root folders (and use "templates" instead of "Template") What do people think? A clear and consistent API here would be probably quite helpful.
defect
x plugin path resolution wrong for templates this is a multiple allowed bug x what you did bin cake dto generate i tried the dto plugin in a x app it errored on the twig file to be found the following paths were searched local templates dto local vendor dereuromark cakephp dto src template dto local vendor cakephp cakephp templates dto the path inside the plugin is already templates i think it is the app path method and this code php if empty plugin return what you expected to happen we either need to fix app path to also work for these non src and non php class files php if empty plugin if type template return return but mixing src path generation with other non src paths is a bit weird moving forward note the mix of classpath vs path usage inside of this wrapper now the cleaner strategy is to not have the app path being used anymore for such root folders we should use a different method for non class lookup imo e g app templates string plugin null app locales string plugin null or we separate the app class similar to plugin and its path vs classpath method app classpath type plugin for actual classes model datasource etc inside src app path type plugin for the root folders and use templates instead of template what do people think a clear and consistent api here would be probably quite helpful
1
73,929
24,868,778,914
IssuesEvent
2022-10-27 13:52:04
SeleniumHQ/selenium
https://api.github.com/repos/SeleniumHQ/selenium
opened
[🐛 Bug]: Unsupported Operation Exception For Getting Default Value From A Disabled Select Box
I-defect needs-triaging
### What happened? [🐛 Bug]: Unsupported Operation Exception For Getting Default Value From A Disabled Select Box Getting java.lang.UnsupportedOperationException: Select element is disabled and may not be used. ### How can we reproduce the issue? ```shell when trying to fetch default value by calling ".getFirstSelectedOption()" function. working fine from selenium 4.3 but not working on later versions ![image](https://user-images.githubusercontent.com/26041357/198302860-9ac57db6-5bde-4bcc-bb95-31b0a406c114.png) ``` ### Relevant log output ```shell java.lang.UnsupportedOperationException: Select element is disabled and may not be used. at org.openqa.selenium.support.ui.Select.<init>(Select.java:53) at framework.pageObjects.Base_Page.performAction(Base_Page.java:228) at framework.productConfig.USS_LVS_Config.initiateConfiguration(USS_LVS_Config.java:93) at framework.productConfig.USS_LVS_Config.provideConfigurationData(USS_LVS_Config.java:167) at tests.stepDef.StepDef_USS_E2E.user_added_from_product_family_from__lvs_uss(StepDef_USS_E2E.java:95) at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) at java.lang.reflect.Method.invoke(Method.java:483) at io.cucumber.java.Invoker.doInvoke(Invoker.java:66) at io.cucumber.java.Invoker.invoke(Invoker.java:24) at io.cucumber.java.AbstractGlueDefinition.invokeMethod(AbstractGlueDefinition.java:47) at io.cucumber.java.JavaStepDefinition.execute(JavaStepDefinition.java:29) at io.cucumber.core.runner.CoreStepDefinition.execute(CoreStepDefinition.java:66) at io.cucumber.core.runner.PickleStepDefinitionMatch.runStep(PickleStepDefinitionMatch.java:63) at io.cucumber.core.runner.ExecutionMode$1.execute(ExecutionMode.java:10) at io.cucumber.core.runner.TestStep.executeStep(TestStep.java:85) at io.cucumber.core.runner.TestStep.run(TestStep.java:57) at io.cucumber.core.runner.PickleStepTestStep.run(PickleStepTestStep.java:51) at io.cucumber.core.runner.TestCase.run(TestCase.java:84) at io.cucumber.core.runner.Runner.runPickle(Runner.java:75) at io.cucumber.junit.PickleRunners$WithStepDescriptions.lambda$run$1(PickleRunners.java:109) at io.cucumber.junit.PickleRunners$WithStepDescriptions$$Lambda$213/1337654882.accept(Unknown Source) at io.cucumber.core.runtime.CucumberExecutionContext.lambda$runTestCase$5(CucumberExecutionContext.java:129) at io.cucumber.core.runtime.CucumberExecutionContext$$Lambda$216/221480761.run(Unknown Source) at io.cucumber.core.runtime.RethrowingThrowableCollector.executeAndThrow(RethrowingThrowableCollector.java:23) at io.cucumber.core.runtime.CucumberExecutionContext.runTestCase(CucumberExecutionContext.java:129) at io.cucumber.junit.PickleRunners$WithStepDescriptions.run(PickleRunners.java:106) at io.cucumber.junit.FeatureRunner.runChild(FeatureRunner.java:144) at io.cucumber.junit.FeatureRunner.runChild(FeatureRunner.java:28) at org.junit.runners.ParentRunner$4.run(ParentRunner.java:331) at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:79) at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:329) at org.junit.runners.ParentRunner.access$100(ParentRunner.java:66) at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:293) at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306) at org.junit.runners.ParentRunner.run(ParentRunner.java:413) at io.cucumber.junit.FeatureRunner.run(FeatureRunner.java:137) at io.cucumber.junit.Cucumber.runChild(Cucumber.java:196) at io.cucumber.junit.Cucumber.runChild(Cucumber.java:89) at org.junit.runners.ParentRunner$4.run(ParentRunner.java:331) at org.apache.maven.surefire.junitcore.pc.Scheduler$1.run(Scheduler.java:398) at java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:511) at java.util.concurrent.FutureTask.run(FutureTask.java:266) at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142) at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617) at java.lang.Thread.run(Thread.java:745) ``` ### Operating System Win 10 ### Selenium version 4.5 ### What are the browser(s) and version(s) where you see this issue? chrome 105 ### What are the browser driver(s) and version(s) where you see this issue? latest by webdrive rmanager ### Are you using Selenium Grid? no
1.0
[🐛 Bug]: Unsupported Operation Exception For Getting Default Value From A Disabled Select Box - ### What happened? [🐛 Bug]: Unsupported Operation Exception For Getting Default Value From A Disabled Select Box Getting java.lang.UnsupportedOperationException: Select element is disabled and may not be used. ### How can we reproduce the issue? ```shell when trying to fetch default value by calling ".getFirstSelectedOption()" function. working fine from selenium 4.3 but not working on later versions ![image](https://user-images.githubusercontent.com/26041357/198302860-9ac57db6-5bde-4bcc-bb95-31b0a406c114.png) ``` ### Relevant log output ```shell java.lang.UnsupportedOperationException: Select element is disabled and may not be used. at org.openqa.selenium.support.ui.Select.<init>(Select.java:53) at framework.pageObjects.Base_Page.performAction(Base_Page.java:228) at framework.productConfig.USS_LVS_Config.initiateConfiguration(USS_LVS_Config.java:93) at framework.productConfig.USS_LVS_Config.provideConfigurationData(USS_LVS_Config.java:167) at tests.stepDef.StepDef_USS_E2E.user_added_from_product_family_from__lvs_uss(StepDef_USS_E2E.java:95) at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) at java.lang.reflect.Method.invoke(Method.java:483) at io.cucumber.java.Invoker.doInvoke(Invoker.java:66) at io.cucumber.java.Invoker.invoke(Invoker.java:24) at io.cucumber.java.AbstractGlueDefinition.invokeMethod(AbstractGlueDefinition.java:47) at io.cucumber.java.JavaStepDefinition.execute(JavaStepDefinition.java:29) at io.cucumber.core.runner.CoreStepDefinition.execute(CoreStepDefinition.java:66) at io.cucumber.core.runner.PickleStepDefinitionMatch.runStep(PickleStepDefinitionMatch.java:63) at io.cucumber.core.runner.ExecutionMode$1.execute(ExecutionMode.java:10) at io.cucumber.core.runner.TestStep.executeStep(TestStep.java:85) at io.cucumber.core.runner.TestStep.run(TestStep.java:57) at io.cucumber.core.runner.PickleStepTestStep.run(PickleStepTestStep.java:51) at io.cucumber.core.runner.TestCase.run(TestCase.java:84) at io.cucumber.core.runner.Runner.runPickle(Runner.java:75) at io.cucumber.junit.PickleRunners$WithStepDescriptions.lambda$run$1(PickleRunners.java:109) at io.cucumber.junit.PickleRunners$WithStepDescriptions$$Lambda$213/1337654882.accept(Unknown Source) at io.cucumber.core.runtime.CucumberExecutionContext.lambda$runTestCase$5(CucumberExecutionContext.java:129) at io.cucumber.core.runtime.CucumberExecutionContext$$Lambda$216/221480761.run(Unknown Source) at io.cucumber.core.runtime.RethrowingThrowableCollector.executeAndThrow(RethrowingThrowableCollector.java:23) at io.cucumber.core.runtime.CucumberExecutionContext.runTestCase(CucumberExecutionContext.java:129) at io.cucumber.junit.PickleRunners$WithStepDescriptions.run(PickleRunners.java:106) at io.cucumber.junit.FeatureRunner.runChild(FeatureRunner.java:144) at io.cucumber.junit.FeatureRunner.runChild(FeatureRunner.java:28) at org.junit.runners.ParentRunner$4.run(ParentRunner.java:331) at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:79) at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:329) at org.junit.runners.ParentRunner.access$100(ParentRunner.java:66) at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:293) at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306) at org.junit.runners.ParentRunner.run(ParentRunner.java:413) at io.cucumber.junit.FeatureRunner.run(FeatureRunner.java:137) at io.cucumber.junit.Cucumber.runChild(Cucumber.java:196) at io.cucumber.junit.Cucumber.runChild(Cucumber.java:89) at org.junit.runners.ParentRunner$4.run(ParentRunner.java:331) at org.apache.maven.surefire.junitcore.pc.Scheduler$1.run(Scheduler.java:398) at java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:511) at java.util.concurrent.FutureTask.run(FutureTask.java:266) at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142) at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617) at java.lang.Thread.run(Thread.java:745) ``` ### Operating System Win 10 ### Selenium version 4.5 ### What are the browser(s) and version(s) where you see this issue? chrome 105 ### What are the browser driver(s) and version(s) where you see this issue? latest by webdrive rmanager ### Are you using Selenium Grid? no
defect
unsupported operation exception for getting default value from a disabled select box what happened unsupported operation exception for getting default value from a disabled select box getting java lang unsupportedoperationexception select element is disabled and may not be used how can we reproduce the issue shell when trying to fetch default value by calling getfirstselectedoption function working fine from selenium but not working on later versions relevant log output shell java lang unsupportedoperationexception select element is disabled and may not be used at org openqa selenium support ui select select java at framework pageobjects base page performaction base page java at framework productconfig uss lvs config initiateconfiguration uss lvs config java at framework productconfig uss lvs config provideconfigurationdata uss lvs config java at tests stepdef stepdef uss user added from product family from lvs uss stepdef uss java at sun reflect nativemethodaccessorimpl native method at sun reflect nativemethodaccessorimpl invoke nativemethodaccessorimpl java at sun reflect delegatingmethodaccessorimpl invoke delegatingmethodaccessorimpl java at java lang reflect method invoke method java at io cucumber java invoker doinvoke invoker java at io cucumber java invoker invoke invoker java at io cucumber java abstractgluedefinition invokemethod abstractgluedefinition java at io cucumber java javastepdefinition execute javastepdefinition java at io cucumber core runner corestepdefinition execute corestepdefinition java at io cucumber core runner picklestepdefinitionmatch runstep picklestepdefinitionmatch java at io cucumber core runner executionmode execute executionmode java at io cucumber core runner teststep executestep teststep java at io cucumber core runner teststep run teststep java at io cucumber core runner picklestepteststep run picklestepteststep java at io cucumber core runner testcase run testcase java at io cucumber core runner runner runpickle runner java at io cucumber junit picklerunners withstepdescriptions lambda run picklerunners java at io cucumber junit picklerunners withstepdescriptions lambda accept unknown source at io cucumber core runtime cucumberexecutioncontext lambda runtestcase cucumberexecutioncontext java at io cucumber core runtime cucumberexecutioncontext lambda run unknown source at io cucumber core runtime rethrowingthrowablecollector executeandthrow rethrowingthrowablecollector java at io cucumber core runtime cucumberexecutioncontext runtestcase cucumberexecutioncontext java at io cucumber junit picklerunners withstepdescriptions run picklerunners java at io cucumber junit featurerunner runchild featurerunner java at io cucumber junit featurerunner runchild featurerunner java at org junit runners parentrunner run parentrunner java at org junit runners parentrunner schedule parentrunner java at org junit runners parentrunner runchildren parentrunner java at org junit runners parentrunner access parentrunner java at org junit runners parentrunner evaluate parentrunner java at org junit runners parentrunner evaluate parentrunner java at org junit runners parentrunner run parentrunner java at io cucumber junit featurerunner run featurerunner java at io cucumber junit cucumber runchild cucumber java at io cucumber junit cucumber runchild cucumber java at org junit runners parentrunner run parentrunner java at org apache maven surefire junitcore pc scheduler run scheduler java at java util concurrent executors runnableadapter call executors java at java util concurrent futuretask run futuretask java at java util concurrent threadpoolexecutor runworker threadpoolexecutor java at java util concurrent threadpoolexecutor worker run threadpoolexecutor java at java lang thread run thread java operating system win selenium version what are the browser s and version s where you see this issue chrome what are the browser driver s and version s where you see this issue latest by webdrive rmanager are you using selenium grid no
1
77,624
9,603,407,634
IssuesEvent
2019-05-10 16:58:45
infor-design/design-system
https://api.github.com/repos/infor-design/design-system
closed
Add dark and contrast variants for uplift theme
for: design
- [x] Uplift dark variant - [x] Uplift high-contrast variant
1.0
Add dark and contrast variants for uplift theme - - [x] Uplift dark variant - [x] Uplift high-contrast variant
non_defect
add dark and contrast variants for uplift theme uplift dark variant uplift high contrast variant
0
27,623
5,060,707,963
IssuesEvent
2016-12-22 13:05:20
OlafvdSpek/xbt
https://api.github.com/repos/OlafvdSpek/xbt
closed
GitHub
auto-migrated Priority-Medium Type-Defect
``` Let`s go to GitHub I create https://github.com/poiuty/xbt I give access rights to this repository. ``` Original issue reported on code.google.com by `df3434er...@gmail.com` on 14 Jul 2015 at 7:03
1.0
GitHub - ``` Let`s go to GitHub I create https://github.com/poiuty/xbt I give access rights to this repository. ``` Original issue reported on code.google.com by `df3434er...@gmail.com` on 14 Jul 2015 at 7:03
defect
github let s go to github i create i give access rights to this repository original issue reported on code google com by gmail com on jul at
1
31,428
5,951,103,473
IssuesEvent
2017-05-26 18:33:51
dotnet/roslyn
https://api.github.com/repos/dotnet/roslyn
closed
/refout and /debug together should be an error
Area-Compilers Documentation
But we have a test that asserts it is OK: ``` c# var outWriter = new StringWriter(CultureInfo.InvariantCulture); var csc = new MockCSharpCompiler(null, dir.Path, new[] { "/nologo", "/out:a.dll", "/refonly", "/debug", "/deterministic", "/doc:doc.xml", "a.cs" }); int exitCode = csc.Run(outWriter); Assert.Equal("", outWriter.ToString()); Assert.Equal(0, exitCode); ```
1.0
/refout and /debug together should be an error - But we have a test that asserts it is OK: ``` c# var outWriter = new StringWriter(CultureInfo.InvariantCulture); var csc = new MockCSharpCompiler(null, dir.Path, new[] { "/nologo", "/out:a.dll", "/refonly", "/debug", "/deterministic", "/doc:doc.xml", "a.cs" }); int exitCode = csc.Run(outWriter); Assert.Equal("", outWriter.ToString()); Assert.Equal(0, exitCode); ```
non_defect
refout and debug together should be an error but we have a test that asserts it is ok c var outwriter new stringwriter cultureinfo invariantculture var csc new mockcsharpcompiler null dir path new nologo out a dll refonly debug deterministic doc doc xml a cs int exitcode csc run outwriter assert equal outwriter tostring assert equal exitcode
0