Unnamed: 0
int64 0
832k
| id
float64 2.49B
32.1B
| type
stringclasses 1
value | created_at
stringlengths 19
19
| repo
stringlengths 4
112
| repo_url
stringlengths 33
141
| action
stringclasses 3
values | title
stringlengths 1
957
| labels
stringlengths 4
1.11k
| body
stringlengths 1
261k
| index
stringclasses 11
values | text_combine
stringlengths 95
261k
| label
stringclasses 2
values | text
stringlengths 96
250k
| binary_label
int64 0
1
|
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
53,070
| 6,677,096,269
|
IssuesEvent
|
2017-10-05 09:05:36
|
elastic/logstash
|
https://api.github.com/repos/elastic/logstash
|
opened
|
Introduce the concept of topics to the DLQ
|
design discuss DLQ enhancement
|
During the SupportSummit developer take-over, I handled two tickets where users wanted to get DLQ entries off disk and into ES ASAP - both users fell short with simple dlq input -> es output configs because the entries had different shapes for one mapping.
**I am proposing that we generate a "topic" that categorises the entry so that dlq ingest pipelines can be built around specific topics to transform them and send onward if the original fault can't be fixed. These categories should be rich in content, e.g. "output/elasticsearch/mapper_parsing_exception/failed to parse/<field>/number_format_exception". Design wise, a tagging mechanism [@metadata][dead_letter_queue][dlq_tags] is a probably more flexible. With a topic generated by `event.get("[@metadata][dead_letter_queue][dlq_tags]").join('/')` or similar.**
General pitfalls:
- The entires cannot be indexed directly unless they all have the same shape.
- The differently shaped entries can't be transformed into a conformal shape for insertion into the original index because information is missing.
- As more plugins get given the ability to write events to the DLQ, the shape of the event will be more different still - as will the variations of the `reason` value.
General problems to solve (see sample entry below):
- While we do have the plugin_type and id, the original target destination for this LS event is lost. The destination should include address/port, index/topic. Some of this may be alleviated by a reference to a centralised config record.
- The actual problem that this event encountered, `mapper_parsing_exception` + `failed to parse [<field>]` + `number_format_exception`, is buried deep in the response from ES.
Sample DLQ metadata entry:
```
"@metadata" => {
"dlq_message" => "true",
"dead_letter_queue" => {
"plugin_type" => "elasticsearch",
"plugin_id" => "08645c9aa7d0c1e40a36b2c83adc6bbd40b1c253-11",
"reason" => "Could not index event to Elasticsearch. status: 400, action: [\"index\",
{:_id=>nil, :_index=>\"logstash-logs-2017.09.28\", :_type=>\"logs\", :_routing=>nil},
2017-09-28T23:54:09.258Z %{host} %{message}], response: {\"index\"=>
{\"_index\"=>\"logstash-logs-2017.09.28\", \"_type\"=>\"logs\", \"_id\"=>
\"AV7K6W7-8Vei4cyktbkL\", \"status\"=>400, \"error\"=>
{\"type\"=>\"mapper_parsing_exception\",
\"reason\"=>\"failed to parse [mysecondfield]\",
\"caused_by\"=>
{\"type\"=>\"number_format_exception\",
\"reason\"=>\"For input string: \\\"abc123\\\"\"}}}}",
"entry_time" => #<Java::OrgLogstash::Timestamp:0x304819e9>
}
}
```
Other Issues:
https://github.com/elastic/logstash/issues/8242
|
1.0
|
Introduce the concept of topics to the DLQ - During the SupportSummit developer take-over, I handled two tickets where users wanted to get DLQ entries off disk and into ES ASAP - both users fell short with simple dlq input -> es output configs because the entries had different shapes for one mapping.
**I am proposing that we generate a "topic" that categorises the entry so that dlq ingest pipelines can be built around specific topics to transform them and send onward if the original fault can't be fixed. These categories should be rich in content, e.g. "output/elasticsearch/mapper_parsing_exception/failed to parse/<field>/number_format_exception". Design wise, a tagging mechanism [@metadata][dead_letter_queue][dlq_tags] is a probably more flexible. With a topic generated by `event.get("[@metadata][dead_letter_queue][dlq_tags]").join('/')` or similar.**
General pitfalls:
- The entires cannot be indexed directly unless they all have the same shape.
- The differently shaped entries can't be transformed into a conformal shape for insertion into the original index because information is missing.
- As more plugins get given the ability to write events to the DLQ, the shape of the event will be more different still - as will the variations of the `reason` value.
General problems to solve (see sample entry below):
- While we do have the plugin_type and id, the original target destination for this LS event is lost. The destination should include address/port, index/topic. Some of this may be alleviated by a reference to a centralised config record.
- The actual problem that this event encountered, `mapper_parsing_exception` + `failed to parse [<field>]` + `number_format_exception`, is buried deep in the response from ES.
Sample DLQ metadata entry:
```
"@metadata" => {
"dlq_message" => "true",
"dead_letter_queue" => {
"plugin_type" => "elasticsearch",
"plugin_id" => "08645c9aa7d0c1e40a36b2c83adc6bbd40b1c253-11",
"reason" => "Could not index event to Elasticsearch. status: 400, action: [\"index\",
{:_id=>nil, :_index=>\"logstash-logs-2017.09.28\", :_type=>\"logs\", :_routing=>nil},
2017-09-28T23:54:09.258Z %{host} %{message}], response: {\"index\"=>
{\"_index\"=>\"logstash-logs-2017.09.28\", \"_type\"=>\"logs\", \"_id\"=>
\"AV7K6W7-8Vei4cyktbkL\", \"status\"=>400, \"error\"=>
{\"type\"=>\"mapper_parsing_exception\",
\"reason\"=>\"failed to parse [mysecondfield]\",
\"caused_by\"=>
{\"type\"=>\"number_format_exception\",
\"reason\"=>\"For input string: \\\"abc123\\\"\"}}}}",
"entry_time" => #<Java::OrgLogstash::Timestamp:0x304819e9>
}
}
```
Other Issues:
https://github.com/elastic/logstash/issues/8242
|
design
|
introduce the concept of topics to the dlq during the supportsummit developer take over i handled two tickets where users wanted to get dlq entries off disk and into es asap both users fell short with simple dlq input es output configs because the entries had different shapes for one mapping i am proposing that we generate a topic that categorises the entry so that dlq ingest pipelines can be built around specific topics to transform them and send onward if the original fault can t be fixed these categories should be rich in content e g output elasticsearch mapper parsing exception failed to parse number format exception design wise a tagging mechanism is a probably more flexible with a topic generated by event get join or similar general pitfalls the entires cannot be indexed directly unless they all have the same shape the differently shaped entries can t be transformed into a conformal shape for insertion into the original index because information is missing as more plugins get given the ability to write events to the dlq the shape of the event will be more different still as will the variations of the reason value general problems to solve see sample entry below while we do have the plugin type and id the original target destination for this ls event is lost the destination should include address port index topic some of this may be alleviated by a reference to a centralised config record the actual problem that this event encountered mapper parsing exception failed to parse number format exception is buried deep in the response from es sample dlq metadata entry metadata dlq message true dead letter queue plugin type elasticsearch plugin id reason could not index event to elasticsearch status action index id nil index logstash logs type logs routing nil host message response index index logstash logs type logs id status error type mapper parsing exception reason failed to parse caused by type number format exception reason for input string entry time other issues
| 1
|
756,576
| 26,477,165,232
|
IssuesEvent
|
2023-01-17 12:04:17
|
helpwave/services
|
https://api.github.com/repos/helpwave/services
|
opened
|
libs not linted in CI
|
bug priority: low
|
### Describe the bug
We only lint each service, but never the libs.
|
1.0
|
libs not linted in CI - ### Describe the bug
We only lint each service, but never the libs.
|
non_design
|
libs not linted in ci describe the bug we only lint each service but never the libs
| 0
|
26,995
| 4,847,546,720
|
IssuesEvent
|
2016-11-10 15:14:38
|
quickapps/cms
|
https://api.github.com/repos/quickapps/cms
|
closed
|
List type fields
|
Defect Resolved
|
The instructions for List Type options states:
> The label is optional: if a line contains a single string, it will be used as key and label.
I found that this is not true if you only use one string null is saved in the value if you use the key|label format it works correctly
|
1.0
|
List type fields - The instructions for List Type options states:
> The label is optional: if a line contains a single string, it will be used as key and label.
I found that this is not true if you only use one string null is saved in the value if you use the key|label format it works correctly
|
non_design
|
list type fields the instructions for list type options states the label is optional if a line contains a single string it will be used as key and label i found that this is not true if you only use one string null is saved in the value if you use the key label format it works correctly
| 0
|
65,313
| 16,195,988,407
|
IssuesEvent
|
2021-05-04 14:37:57
|
tensorflow/tensorflow
|
https://api.github.com/repos/tensorflow/tensorflow
|
closed
|
Fail to build on Linux aarch64
|
stalled stat:awaiting response subtype: ubuntu/linux type:build/install
|
**System information**
- OS Platform and Distribution (e.g., Linux Ubuntu 16.04):Linux Ubuntu devel 21.04
- Mobile device (e.g. iPhone 8, Pixel 2, Samsung Galaxy) if the issue happens on mobile device: N/A
- TensorFlow installed from (source or binary):source
- TensorFlow version:master
- Python version:3.9.4
- Installed using virtualenv? pip? conda?:N/A
- Bazel version (if compiling from source):3.7.2
- GCC/Compiler version (if compiling from source):GCC 10.2.1
- CUDA/cuDNN version:N/A
- GPU model and memory:N/A
**Describe the problem**
I want to build tensorflow on Linux aarch64 platform , and it fails .
Commands :
`./configure `
`bazel build //tensorflow/tools/pip_package:build_pip_package`
Output :
[](https://asciinema.org/a/KsEIoMqtDsDvInf0fbPTxBCBs)
Error message :
ERROR: /root/.cache/bazel/_bazel_root/efb88f6336d9c4a18216fb94287b8d97/external/local_config_cc/BUILD:47:19: in cc_toolchain_suite rule @local_config_cc//:toolchain: cc_toolchain_suite '@local_config_cc//:toolchain' does not contain a toolchain for cpu 'aarch64'
Command : `bazel build //tensorflow/tools/pip_package:build_pip_package --toolchain_resolution_debug`
Output : [](https://asciinema.org/a/hok5YFKqreDYj7X5pLFDIsbVQ)
Logs :
`INFO: ToolchainResolution: Target platform @local_config_platform//:host: Selected execution platform @local_execution_config_platform//:platform, INFO: ToolchainResolution: Target platform @local_config_platform//:host: Selected execution platform @local_execution_config_platform//:platform, INFO: ToolchainResolution: Type @bazel_tools//tools/cpp:toolchain_type: target @local_config_platform//:host: Rejected toolchain @local_config_cc//:cc-compiler-armeabi-v7a; mismatching values: arm, android INFO: ToolchainResolution: Type @bazel_tools//tools/cpp:toolchain_type: target platform @local_config_platform//:host: execution @local_execution_config_platform//:platform: Selected toolchain @local_config_cc//:cc-compiler-piii INFO: ToolchainResolution: Type @bazel_tools//tools/cpp:toolchain_type: target platform @local_config_platform//:host: execution @local_config_platform//:host: Selected toolchain @local_config_cc//:cc-compiler-piii INFO: ToolchainResolution: Type @bazel_tools//tools/cpp:toolchain_type: target @local_config_platform//:host: Rejected toolchain @local_config_cc//:cc-compiler-armeabi-v7a; mismatching values: arm, android INFO: ToolchainResolution: Target platform @local_config_platform//:host: Selected execution platform @local_execution_config_platform//:platform, type @bazel_tools//tools/cpp:toolchain_type -> toolchain @local_config_cc//:cc-compiler-piii INFO: ToolchainResolution: Type @bazel_tools//tools/python:toolchain_type: target @local_config_platform//:host: Rejected toolchain @local_execution_config_python//:py_runtime_pair; mismatching values: platform_constraint INFO: ToolchainResolution: Type @bazel_tools//tools/python:toolchain_type: target platform @local_config_platform//:host: execution @local_execution_config_platform//:platform: Selected toolchain @local_config_python//:py_runtime_pair INFO: ToolchainResolution: Type @bazel_tools//tools/python:toolchain_type: target platform @local_config_platform//:host: execution @local_config_platform//:host: Selected toolchain @local_config_python//:py_runtime_pair INFO: ToolchainResolution: Type @bazel_tools//tools/cpp:toolchain_type: target @local_config_platform//:host: Rejected toolchain @local_config_cc//:cc-compiler-armeabi-v7a; mismatching values: arm, android INFO: ToolchainResolution: Type @bazel_tools//tools/cpp:toolchain_type: target platform @local_config_platform//:host: execution @local_execution_config_platform//:platform: Selected toolchain @local_config_cc//:cc-compiler-piii INFO: ToolchainResolution: Type @bazel_tools//tools/cpp:toolchain_type: target platform @local_config_platform//:host: execution @local_config_platform//:host: Selected toolchain @local_config_cc//:cc-compiler-piii INFO: ToolchainResolution: Type @bazel_tools//tools/cpp:toolchain_type: target @local_config_platform//:host: Rejected toolchain @local_config_cc//:cc-compiler-armeabi-v7a; mismatching values: arm, android INFO: ToolchainResolution: Target platform @local_config_platform//:host: Selected execution platform @local_execution_config_platform//:platform, type @bazel_tools//tools/cpp:toolchain_type -> toolchain @local_config_cc//:cc-compiler-piii, type @bazel_tools//tools/python:toolchain_type -> toolchain @local_config_python//:py_runtime_pair INFO: ToolchainResolution: Removed execution platform @local_config_platform//:host from available execution platforms, it is missing constraint @local_execution_config_platform//:platform_constraint INFO: ToolchainResolution: Target platform @local_config_platform//:host: Selected execution platform @local_execution_config_platform//:platform, INFO: ToolchainResolution: Removed execution platform @local_config_platform//:host from available execution platforms, it is missing constraint @local_execution_config_platform//:platform_constraint`
P.S. Python 3.9.4 is the default and minimal version available in current Ubuntu repo , and I can't add the older repos or the system will be corrupted .
|
1.0
|
Fail to build on Linux aarch64 - **System information**
- OS Platform and Distribution (e.g., Linux Ubuntu 16.04):Linux Ubuntu devel 21.04
- Mobile device (e.g. iPhone 8, Pixel 2, Samsung Galaxy) if the issue happens on mobile device: N/A
- TensorFlow installed from (source or binary):source
- TensorFlow version:master
- Python version:3.9.4
- Installed using virtualenv? pip? conda?:N/A
- Bazel version (if compiling from source):3.7.2
- GCC/Compiler version (if compiling from source):GCC 10.2.1
- CUDA/cuDNN version:N/A
- GPU model and memory:N/A
**Describe the problem**
I want to build tensorflow on Linux aarch64 platform , and it fails .
Commands :
`./configure `
`bazel build //tensorflow/tools/pip_package:build_pip_package`
Output :
[](https://asciinema.org/a/KsEIoMqtDsDvInf0fbPTxBCBs)
Error message :
ERROR: /root/.cache/bazel/_bazel_root/efb88f6336d9c4a18216fb94287b8d97/external/local_config_cc/BUILD:47:19: in cc_toolchain_suite rule @local_config_cc//:toolchain: cc_toolchain_suite '@local_config_cc//:toolchain' does not contain a toolchain for cpu 'aarch64'
Command : `bazel build //tensorflow/tools/pip_package:build_pip_package --toolchain_resolution_debug`
Output : [](https://asciinema.org/a/hok5YFKqreDYj7X5pLFDIsbVQ)
Logs :
`INFO: ToolchainResolution: Target platform @local_config_platform//:host: Selected execution platform @local_execution_config_platform//:platform, INFO: ToolchainResolution: Target platform @local_config_platform//:host: Selected execution platform @local_execution_config_platform//:platform, INFO: ToolchainResolution: Type @bazel_tools//tools/cpp:toolchain_type: target @local_config_platform//:host: Rejected toolchain @local_config_cc//:cc-compiler-armeabi-v7a; mismatching values: arm, android INFO: ToolchainResolution: Type @bazel_tools//tools/cpp:toolchain_type: target platform @local_config_platform//:host: execution @local_execution_config_platform//:platform: Selected toolchain @local_config_cc//:cc-compiler-piii INFO: ToolchainResolution: Type @bazel_tools//tools/cpp:toolchain_type: target platform @local_config_platform//:host: execution @local_config_platform//:host: Selected toolchain @local_config_cc//:cc-compiler-piii INFO: ToolchainResolution: Type @bazel_tools//tools/cpp:toolchain_type: target @local_config_platform//:host: Rejected toolchain @local_config_cc//:cc-compiler-armeabi-v7a; mismatching values: arm, android INFO: ToolchainResolution: Target platform @local_config_platform//:host: Selected execution platform @local_execution_config_platform//:platform, type @bazel_tools//tools/cpp:toolchain_type -> toolchain @local_config_cc//:cc-compiler-piii INFO: ToolchainResolution: Type @bazel_tools//tools/python:toolchain_type: target @local_config_platform//:host: Rejected toolchain @local_execution_config_python//:py_runtime_pair; mismatching values: platform_constraint INFO: ToolchainResolution: Type @bazel_tools//tools/python:toolchain_type: target platform @local_config_platform//:host: execution @local_execution_config_platform//:platform: Selected toolchain @local_config_python//:py_runtime_pair INFO: ToolchainResolution: Type @bazel_tools//tools/python:toolchain_type: target platform @local_config_platform//:host: execution @local_config_platform//:host: Selected toolchain @local_config_python//:py_runtime_pair INFO: ToolchainResolution: Type @bazel_tools//tools/cpp:toolchain_type: target @local_config_platform//:host: Rejected toolchain @local_config_cc//:cc-compiler-armeabi-v7a; mismatching values: arm, android INFO: ToolchainResolution: Type @bazel_tools//tools/cpp:toolchain_type: target platform @local_config_platform//:host: execution @local_execution_config_platform//:platform: Selected toolchain @local_config_cc//:cc-compiler-piii INFO: ToolchainResolution: Type @bazel_tools//tools/cpp:toolchain_type: target platform @local_config_platform//:host: execution @local_config_platform//:host: Selected toolchain @local_config_cc//:cc-compiler-piii INFO: ToolchainResolution: Type @bazel_tools//tools/cpp:toolchain_type: target @local_config_platform//:host: Rejected toolchain @local_config_cc//:cc-compiler-armeabi-v7a; mismatching values: arm, android INFO: ToolchainResolution: Target platform @local_config_platform//:host: Selected execution platform @local_execution_config_platform//:platform, type @bazel_tools//tools/cpp:toolchain_type -> toolchain @local_config_cc//:cc-compiler-piii, type @bazel_tools//tools/python:toolchain_type -> toolchain @local_config_python//:py_runtime_pair INFO: ToolchainResolution: Removed execution platform @local_config_platform//:host from available execution platforms, it is missing constraint @local_execution_config_platform//:platform_constraint INFO: ToolchainResolution: Target platform @local_config_platform//:host: Selected execution platform @local_execution_config_platform//:platform, INFO: ToolchainResolution: Removed execution platform @local_config_platform//:host from available execution platforms, it is missing constraint @local_execution_config_platform//:platform_constraint`
P.S. Python 3.9.4 is the default and minimal version available in current Ubuntu repo , and I can't add the older repos or the system will be corrupted .
|
non_design
|
fail to build on linux system information os platform and distribution e g linux ubuntu linux ubuntu devel mobile device e g iphone pixel samsung galaxy if the issue happens on mobile device n a tensorflow installed from source or binary source tensorflow version master python version installed using virtualenv pip conda n a bazel version if compiling from source gcc compiler version if compiling from source gcc cuda cudnn version n a gpu model and memory n a describe the problem i want to build tensorflow on linux platform and it fails commands configure bazel build tensorflow tools pip package build pip package output error message error root cache bazel bazel root external local config cc build in cc toolchain suite rule local config cc toolchain cc toolchain suite local config cc toolchain does not contain a toolchain for cpu command bazel build tensorflow tools pip package build pip package toolchain resolution debug output logs info toolchainresolution target platform local config platform host selected execution platform local execution config platform platform info toolchainresolution target platform local config platform host selected execution platform local execution config platform platform info toolchainresolution type bazel tools tools cpp toolchain type target local config platform host rejected toolchain local config cc cc compiler armeabi mismatching values arm android info toolchainresolution type bazel tools tools cpp toolchain type target platform local config platform host execution local execution config platform platform selected toolchain local config cc cc compiler piii info toolchainresolution type bazel tools tools cpp toolchain type target platform local config platform host execution local config platform host selected toolchain local config cc cc compiler piii info toolchainresolution type bazel tools tools cpp toolchain type target local config platform host rejected toolchain local config cc cc compiler armeabi mismatching values arm android info toolchainresolution target platform local config platform host selected execution platform local execution config platform platform type bazel tools tools cpp toolchain type toolchain local config cc cc compiler piii info toolchainresolution type bazel tools tools python toolchain type target local config platform host rejected toolchain local execution config python py runtime pair mismatching values platform constraint info toolchainresolution type bazel tools tools python toolchain type target platform local config platform host execution local execution config platform platform selected toolchain local config python py runtime pair info toolchainresolution type bazel tools tools python toolchain type target platform local config platform host execution local config platform host selected toolchain local config python py runtime pair info toolchainresolution type bazel tools tools cpp toolchain type target local config platform host rejected toolchain local config cc cc compiler armeabi mismatching values arm android info toolchainresolution type bazel tools tools cpp toolchain type target platform local config platform host execution local execution config platform platform selected toolchain local config cc cc compiler piii info toolchainresolution type bazel tools tools cpp toolchain type target platform local config platform host execution local config platform host selected toolchain local config cc cc compiler piii info toolchainresolution type bazel tools tools cpp toolchain type target local config platform host rejected toolchain local config cc cc compiler armeabi mismatching values arm android info toolchainresolution target platform local config platform host selected execution platform local execution config platform platform type bazel tools tools cpp toolchain type toolchain local config cc cc compiler piii type bazel tools tools python toolchain type toolchain local config python py runtime pair info toolchainresolution removed execution platform local config platform host from available execution platforms it is missing constraint local execution config platform platform constraint info toolchainresolution target platform local config platform host selected execution platform local execution config platform platform info toolchainresolution removed execution platform local config platform host from available execution platforms it is missing constraint local execution config platform platform constraint p s python is the default and minimal version available in current ubuntu repo and i can t add the older repos or the system will be corrupted
| 0
|
8,698
| 2,878,602,242
|
IssuesEvent
|
2015-06-10 02:42:25
|
18F/govt-wide-patternlibrary
|
https://api.github.com/repos/18F/govt-wide-patternlibrary
|
opened
|
Need more context on 'Charts/Graphs'
|
help wanted visual design
|
Looking for teams to give us a bit more insight on what components of charts and graphs people are looking for. Like styled out bar charts, line graphs, etc?
Would be helpful to get guidance on whether this is about visual guidance and/or also building customizeable interfaces, which will require muchmore front end lift.
|
1.0
|
Need more context on 'Charts/Graphs' - Looking for teams to give us a bit more insight on what components of charts and graphs people are looking for. Like styled out bar charts, line graphs, etc?
Would be helpful to get guidance on whether this is about visual guidance and/or also building customizeable interfaces, which will require muchmore front end lift.
|
design
|
need more context on charts graphs looking for teams to give us a bit more insight on what components of charts and graphs people are looking for like styled out bar charts line graphs etc would be helpful to get guidance on whether this is about visual guidance and or also building customizeable interfaces which will require muchmore front end lift
| 1
|
227,068
| 25,030,717,345
|
IssuesEvent
|
2022-11-04 12:07:59
|
sast-automation-dev/PartsUnlimited-46
|
https://api.github.com/repos/sast-automation-dev/PartsUnlimited-46
|
opened
|
jquery-2.2.0.js: 4 vulnerabilities (highest severity is: 6.1)
|
security vulnerability
|
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jquery-2.2.0.js</b></p></summary>
<p>JavaScript library for DOM operations</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.0/jquery.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.0/jquery.js</a></p>
<p>Path to vulnerable library: /Labfiles/AZ-400T05_Implementing_Application_Infrastructure/Sample.NETCoreWebApp/WebApp1/wwwroot/lib/jquery/dist/jquery.js</p>
<p>
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/PartsUnlimited-46/commit/c19d957e8f5bc2dbac5b6d1f3aaf515eb66f63c4">c19d957e8f5bc2dbac5b6d1f3aaf515eb66f63c4</a></p></details>
## Vulnerabilities
| CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (jquery version) | Remediation Available |
| ------------- | ------------- | ----- | ----- | ----- | ------------- | --- |
| [CVE-2020-11023](https://www.mend.io/vulnerability-database/CVE-2020-11023) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | jquery-2.2.0.js | Direct | jquery - 3.5.0 | ❌ |
| [CVE-2020-11022](https://www.mend.io/vulnerability-database/CVE-2020-11022) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | jquery-2.2.0.js | Direct | jQuery - 3.5.0 | ❌ |
| [CVE-2015-9251](https://www.mend.io/vulnerability-database/CVE-2015-9251) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | jquery-2.2.0.js | Direct | jQuery - v3.0.0 | ❌ |
| [CVE-2019-11358](https://www.mend.io/vulnerability-database/CVE-2019-11358) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | jquery-2.2.0.js | Direct | 3.4.0 | ❌ |
## Details
<details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2020-11023</summary>
### Vulnerable Library - <b>jquery-2.2.0.js</b></p>
<p>JavaScript library for DOM operations</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.0/jquery.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.0/jquery.js</a></p>
<p>Path to vulnerable library: /Labfiles/AZ-400T05_Implementing_Application_Infrastructure/Sample.NETCoreWebApp/WebApp1/wwwroot/lib/jquery/dist/jquery.js</p>
<p>
Dependency Hierarchy:
- :x: **jquery-2.2.0.js** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/PartsUnlimited-46/commit/c19d957e8f5bc2dbac5b6d1f3aaf515eb66f63c4">c19d957e8f5bc2dbac5b6d1f3aaf515eb66f63c4</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
<p>Publish Date: 2020-04-29
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-11023>CVE-2020-11023</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>6.1</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11023">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11023</a></p>
<p>Release Date: 2020-04-29</p>
<p>Fix Resolution: jquery - 3.5.0</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2020-11022</summary>
### Vulnerable Library - <b>jquery-2.2.0.js</b></p>
<p>JavaScript library for DOM operations</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.0/jquery.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.0/jquery.js</a></p>
<p>Path to vulnerable library: /Labfiles/AZ-400T05_Implementing_Application_Infrastructure/Sample.NETCoreWebApp/WebApp1/wwwroot/lib/jquery/dist/jquery.js</p>
<p>
Dependency Hierarchy:
- :x: **jquery-2.2.0.js** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/PartsUnlimited-46/commit/c19d957e8f5bc2dbac5b6d1f3aaf515eb66f63c4">c19d957e8f5bc2dbac5b6d1f3aaf515eb66f63c4</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
<p>Publish Date: 2020-04-29
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-11022>CVE-2020-11022</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>6.1</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/">https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/</a></p>
<p>Release Date: 2020-04-29</p>
<p>Fix Resolution: jQuery - 3.5.0</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2015-9251</summary>
### Vulnerable Library - <b>jquery-2.2.0.js</b></p>
<p>JavaScript library for DOM operations</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.0/jquery.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.0/jquery.js</a></p>
<p>Path to vulnerable library: /Labfiles/AZ-400T05_Implementing_Application_Infrastructure/Sample.NETCoreWebApp/WebApp1/wwwroot/lib/jquery/dist/jquery.js</p>
<p>
Dependency Hierarchy:
- :x: **jquery-2.2.0.js** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/PartsUnlimited-46/commit/c19d957e8f5bc2dbac5b6d1f3aaf515eb66f63c4">c19d957e8f5bc2dbac5b6d1f3aaf515eb66f63c4</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.
<p>Publish Date: 2018-01-18
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2015-9251>CVE-2015-9251</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>6.1</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2015-9251">https://nvd.nist.gov/vuln/detail/CVE-2015-9251</a></p>
<p>Release Date: 2018-01-18</p>
<p>Fix Resolution: jQuery - v3.0.0</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2019-11358</summary>
### Vulnerable Library - <b>jquery-2.2.0.js</b></p>
<p>JavaScript library for DOM operations</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.0/jquery.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.0/jquery.js</a></p>
<p>Path to vulnerable library: /Labfiles/AZ-400T05_Implementing_Application_Infrastructure/Sample.NETCoreWebApp/WebApp1/wwwroot/lib/jquery/dist/jquery.js</p>
<p>
Dependency Hierarchy:
- :x: **jquery-2.2.0.js** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/PartsUnlimited-46/commit/c19d957e8f5bc2dbac5b6d1f3aaf515eb66f63c4">c19d957e8f5bc2dbac5b6d1f3aaf515eb66f63c4</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.
<p>Publish Date: 2019-04-20
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-11358>CVE-2019-11358</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>6.1</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11358">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11358</a></p>
<p>Release Date: 2019-04-20</p>
<p>Fix Resolution: 3.4.0</p>
</p>
<p></p>
</details>
|
True
|
jquery-2.2.0.js: 4 vulnerabilities (highest severity is: 6.1) - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jquery-2.2.0.js</b></p></summary>
<p>JavaScript library for DOM operations</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.0/jquery.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.0/jquery.js</a></p>
<p>Path to vulnerable library: /Labfiles/AZ-400T05_Implementing_Application_Infrastructure/Sample.NETCoreWebApp/WebApp1/wwwroot/lib/jquery/dist/jquery.js</p>
<p>
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/PartsUnlimited-46/commit/c19d957e8f5bc2dbac5b6d1f3aaf515eb66f63c4">c19d957e8f5bc2dbac5b6d1f3aaf515eb66f63c4</a></p></details>
## Vulnerabilities
| CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (jquery version) | Remediation Available |
| ------------- | ------------- | ----- | ----- | ----- | ------------- | --- |
| [CVE-2020-11023](https://www.mend.io/vulnerability-database/CVE-2020-11023) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | jquery-2.2.0.js | Direct | jquery - 3.5.0 | ❌ |
| [CVE-2020-11022](https://www.mend.io/vulnerability-database/CVE-2020-11022) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | jquery-2.2.0.js | Direct | jQuery - 3.5.0 | ❌ |
| [CVE-2015-9251](https://www.mend.io/vulnerability-database/CVE-2015-9251) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | jquery-2.2.0.js | Direct | jQuery - v3.0.0 | ❌ |
| [CVE-2019-11358](https://www.mend.io/vulnerability-database/CVE-2019-11358) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | jquery-2.2.0.js | Direct | 3.4.0 | ❌ |
## Details
<details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2020-11023</summary>
### Vulnerable Library - <b>jquery-2.2.0.js</b></p>
<p>JavaScript library for DOM operations</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.0/jquery.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.0/jquery.js</a></p>
<p>Path to vulnerable library: /Labfiles/AZ-400T05_Implementing_Application_Infrastructure/Sample.NETCoreWebApp/WebApp1/wwwroot/lib/jquery/dist/jquery.js</p>
<p>
Dependency Hierarchy:
- :x: **jquery-2.2.0.js** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/PartsUnlimited-46/commit/c19d957e8f5bc2dbac5b6d1f3aaf515eb66f63c4">c19d957e8f5bc2dbac5b6d1f3aaf515eb66f63c4</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
<p>Publish Date: 2020-04-29
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-11023>CVE-2020-11023</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>6.1</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11023">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11023</a></p>
<p>Release Date: 2020-04-29</p>
<p>Fix Resolution: jquery - 3.5.0</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2020-11022</summary>
### Vulnerable Library - <b>jquery-2.2.0.js</b></p>
<p>JavaScript library for DOM operations</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.0/jquery.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.0/jquery.js</a></p>
<p>Path to vulnerable library: /Labfiles/AZ-400T05_Implementing_Application_Infrastructure/Sample.NETCoreWebApp/WebApp1/wwwroot/lib/jquery/dist/jquery.js</p>
<p>
Dependency Hierarchy:
- :x: **jquery-2.2.0.js** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/PartsUnlimited-46/commit/c19d957e8f5bc2dbac5b6d1f3aaf515eb66f63c4">c19d957e8f5bc2dbac5b6d1f3aaf515eb66f63c4</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
<p>Publish Date: 2020-04-29
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-11022>CVE-2020-11022</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>6.1</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/">https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/</a></p>
<p>Release Date: 2020-04-29</p>
<p>Fix Resolution: jQuery - 3.5.0</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2015-9251</summary>
### Vulnerable Library - <b>jquery-2.2.0.js</b></p>
<p>JavaScript library for DOM operations</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.0/jquery.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.0/jquery.js</a></p>
<p>Path to vulnerable library: /Labfiles/AZ-400T05_Implementing_Application_Infrastructure/Sample.NETCoreWebApp/WebApp1/wwwroot/lib/jquery/dist/jquery.js</p>
<p>
Dependency Hierarchy:
- :x: **jquery-2.2.0.js** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/PartsUnlimited-46/commit/c19d957e8f5bc2dbac5b6d1f3aaf515eb66f63c4">c19d957e8f5bc2dbac5b6d1f3aaf515eb66f63c4</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.
<p>Publish Date: 2018-01-18
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2015-9251>CVE-2015-9251</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>6.1</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2015-9251">https://nvd.nist.gov/vuln/detail/CVE-2015-9251</a></p>
<p>Release Date: 2018-01-18</p>
<p>Fix Resolution: jQuery - v3.0.0</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2019-11358</summary>
### Vulnerable Library - <b>jquery-2.2.0.js</b></p>
<p>JavaScript library for DOM operations</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.0/jquery.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.0/jquery.js</a></p>
<p>Path to vulnerable library: /Labfiles/AZ-400T05_Implementing_Application_Infrastructure/Sample.NETCoreWebApp/WebApp1/wwwroot/lib/jquery/dist/jquery.js</p>
<p>
Dependency Hierarchy:
- :x: **jquery-2.2.0.js** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/PartsUnlimited-46/commit/c19d957e8f5bc2dbac5b6d1f3aaf515eb66f63c4">c19d957e8f5bc2dbac5b6d1f3aaf515eb66f63c4</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.
<p>Publish Date: 2019-04-20
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-11358>CVE-2019-11358</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>6.1</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11358">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11358</a></p>
<p>Release Date: 2019-04-20</p>
<p>Fix Resolution: 3.4.0</p>
</p>
<p></p>
</details>
|
non_design
|
jquery js vulnerabilities highest severity is vulnerable library jquery js javascript library for dom operations library home page a href path to vulnerable library labfiles az implementing application infrastructure sample netcorewebapp wwwroot lib jquery dist jquery js found in head commit a href vulnerabilities cve severity cvss dependency type fixed in jquery version remediation available medium jquery js direct jquery medium jquery js direct jquery medium jquery js direct jquery medium jquery js direct details cve vulnerable library jquery js javascript library for dom operations library home page a href path to vulnerable library labfiles az implementing application infrastructure sample netcorewebapp wwwroot lib jquery dist jquery js dependency hierarchy x jquery js vulnerable library found in head commit a href found in base branch master vulnerability details in jquery versions greater than or equal to and before passing html containing elements from untrusted sources even after sanitizing it to one of jquery s dom manipulation methods i e html append and others may execute untrusted code this problem is patched in jquery publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution jquery cve vulnerable library jquery js javascript library for dom operations library home page a href path to vulnerable library labfiles az implementing application infrastructure sample netcorewebapp wwwroot lib jquery dist jquery js dependency hierarchy x jquery js vulnerable library found in head commit a href found in base branch master vulnerability details in jquery versions greater than or equal to and before passing html from untrusted sources even after sanitizing it to one of jquery s dom manipulation methods i e html append and others may execute untrusted code this problem is patched in jquery publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution jquery cve vulnerable library jquery js javascript library for dom operations library home page a href path to vulnerable library labfiles az implementing application infrastructure sample netcorewebapp wwwroot lib jquery dist jquery js dependency hierarchy x jquery js vulnerable library found in head commit a href found in base branch master vulnerability details jquery before is vulnerable to cross site scripting xss attacks when a cross domain ajax request is performed without the datatype option causing text javascript responses to be executed publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution jquery cve vulnerable library jquery js javascript library for dom operations library home page a href path to vulnerable library labfiles az implementing application infrastructure sample netcorewebapp wwwroot lib jquery dist jquery js dependency hierarchy x jquery js vulnerable library found in head commit a href found in base branch master vulnerability details jquery before as used in drupal backdrop cms and other products mishandles jquery extend true because of object prototype pollution if an unsanitized source object contained an enumerable proto property it could extend the native object prototype publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution
| 0
|
41,886
| 9,090,884,416
|
IssuesEvent
|
2019-02-19 01:31:10
|
phetsims/wave-interference
|
https://api.github.com/repos/phetsims/wave-interference
|
opened
|
StepButton can enable/disable itself
|
dev:code-review
|
Noted while doing something similar in Gas Properties.
In TimeControls.js:
```js
const stepButton = new StepButton( {
...
} );
// Only enable the step button when the model is paused.
model.isRunningProperty.link( isRunning => {stepButton.enabled = !isRunning;} );
```
The listener for `model.isRunningProperty` is unnecessary. StepButton is capable of observing `model.isRunningProperty` itself:
```js
const stepButton = new StepButton( {
isPlayingProperty: model.isRunningProperty
...
} );
|
1.0
|
StepButton can enable/disable itself - Noted while doing something similar in Gas Properties.
In TimeControls.js:
```js
const stepButton = new StepButton( {
...
} );
// Only enable the step button when the model is paused.
model.isRunningProperty.link( isRunning => {stepButton.enabled = !isRunning;} );
```
The listener for `model.isRunningProperty` is unnecessary. StepButton is capable of observing `model.isRunningProperty` itself:
```js
const stepButton = new StepButton( {
isPlayingProperty: model.isRunningProperty
...
} );
|
non_design
|
stepbutton can enable disable itself noted while doing something similar in gas properties in timecontrols js js const stepbutton new stepbutton only enable the step button when the model is paused model isrunningproperty link isrunning stepbutton enabled isrunning the listener for model isrunningproperty is unnecessary stepbutton is capable of observing model isrunningproperty itself js const stepbutton new stepbutton isplayingproperty model isrunningproperty
| 0
|
491,332
| 14,149,322,695
|
IssuesEvent
|
2020-11-11 00:33:29
|
apcountryman/picolibrary-microchip-avr-megaavr
|
https://api.github.com/repos/apcountryman/picolibrary-microchip-avr-megaavr
|
closed
|
Simplify asynchronous serial transmitter implementation
|
priority-normal status-awaiting_approval type-refactoring
|
Simplify asynchronous serial transmitter (`::picolibrary::Microchip::AVR::megaAVR::Asynchronous_Serial::Transmitter`) implementation by leveraging `::picolibrary::Microchip::AVR::megaAVR::Asynchronous_Serial::Basic_Transmitter` and `::picolibrary::Asynchronous_Serial::Transmitter`.
|
1.0
|
Simplify asynchronous serial transmitter implementation - Simplify asynchronous serial transmitter (`::picolibrary::Microchip::AVR::megaAVR::Asynchronous_Serial::Transmitter`) implementation by leveraging `::picolibrary::Microchip::AVR::megaAVR::Asynchronous_Serial::Basic_Transmitter` and `::picolibrary::Asynchronous_Serial::Transmitter`.
|
non_design
|
simplify asynchronous serial transmitter implementation simplify asynchronous serial transmitter picolibrary microchip avr megaavr asynchronous serial transmitter implementation by leveraging picolibrary microchip avr megaavr asynchronous serial basic transmitter and picolibrary asynchronous serial transmitter
| 0
|
117,669
| 15,162,352,275
|
IssuesEvent
|
2021-02-12 10:28:36
|
flutter/flutter
|
https://api.github.com/repos/flutter/flutter
|
closed
|
drawerOpened may be false when opening the drawer by sliding
|
P4 e: device-specific f: material design f: routes found in release: 1.19 framework has reproducible steps waiting for customer response
|
When checking on `onWillPop`, `scaffoldKey.currentState.isDrawerOpen` may report `false` if the drawer was opened by sliding the finger from the edge of the screen.
|
1.0
|
drawerOpened may be false when opening the drawer by sliding - When checking on `onWillPop`, `scaffoldKey.currentState.isDrawerOpen` may report `false` if the drawer was opened by sliding the finger from the edge of the screen.
|
design
|
draweropened may be false when opening the drawer by sliding when checking on onwillpop scaffoldkey currentstate isdraweropen may report false if the drawer was opened by sliding the finger from the edge of the screen
| 1
|
479,889
| 13,807,043,077
|
IssuesEvent
|
2020-10-11 20:15:22
|
vitreo12/AlgaSC
|
https://api.github.com/repos/vitreo12/AlgaSC
|
opened
|
Clock sync for AlgaNode creation / connection
|
high priority
|
Sync to clock (optionally) the creation / connection of AlgaNodes
|
1.0
|
Clock sync for AlgaNode creation / connection - Sync to clock (optionally) the creation / connection of AlgaNodes
|
non_design
|
clock sync for alganode creation connection sync to clock optionally the creation connection of alganodes
| 0
|
167,811
| 20,726,411,495
|
IssuesEvent
|
2022-03-14 02:49:50
|
Thezone1975/send
|
https://api.github.com/repos/Thezone1975/send
|
opened
|
CVE-2022-24433 (High) detected in simple-git-1.113.0.tgz
|
security vulnerability
|
## CVE-2022-24433 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>simple-git-1.113.0.tgz</b></p></summary>
<p>Simple GIT interface for node.js</p>
<p>Library home page: <a href="https://registry.npmjs.org/simple-git/-/simple-git-1.113.0.tgz">https://registry.npmjs.org/simple-git/-/simple-git-1.113.0.tgz</a></p>
<p>Path to dependency file: /send/package.json</p>
<p>Path to vulnerable library: /node_modules/simple-git/package.json</p>
<p>
Dependency Hierarchy:
- lint-staged-8.2.1.tgz (Root Library)
- g-status-2.0.2.tgz
- :x: **simple-git-1.113.0.tgz** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The package simple-git before 3.3.0 are vulnerable to Command Injection via argument injection. When calling the .fetch(remote, branch, handlerFn) function, both the remote and branch parameters are passed to the git fetch subcommand. By injecting some git options it was possible to get arbitrary command execution.
<p>Publish Date: 2022-03-11
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-24433>CVE-2022-24433</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
True
|
CVE-2022-24433 (High) detected in simple-git-1.113.0.tgz - ## CVE-2022-24433 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>simple-git-1.113.0.tgz</b></p></summary>
<p>Simple GIT interface for node.js</p>
<p>Library home page: <a href="https://registry.npmjs.org/simple-git/-/simple-git-1.113.0.tgz">https://registry.npmjs.org/simple-git/-/simple-git-1.113.0.tgz</a></p>
<p>Path to dependency file: /send/package.json</p>
<p>Path to vulnerable library: /node_modules/simple-git/package.json</p>
<p>
Dependency Hierarchy:
- lint-staged-8.2.1.tgz (Root Library)
- g-status-2.0.2.tgz
- :x: **simple-git-1.113.0.tgz** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The package simple-git before 3.3.0 are vulnerable to Command Injection via argument injection. When calling the .fetch(remote, branch, handlerFn) function, both the remote and branch parameters are passed to the git fetch subcommand. By injecting some git options it was possible to get arbitrary command execution.
<p>Publish Date: 2022-03-11
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-24433>CVE-2022-24433</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
non_design
|
cve high detected in simple git tgz cve high severity vulnerability vulnerable library simple git tgz simple git interface for node js library home page a href path to dependency file send package json path to vulnerable library node modules simple git package json dependency hierarchy lint staged tgz root library g status tgz x simple git tgz vulnerable library vulnerability details the package simple git before are vulnerable to command injection via argument injection when calling the fetch remote branch handlerfn function both the remote and branch parameters are passed to the git fetch subcommand by injecting some git options it was possible to get arbitrary command execution publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href step up your open source security game with whitesource
| 0
|
105,850
| 23,127,270,512
|
IssuesEvent
|
2022-07-28 07:10:47
|
swift-nav/libsbp
|
https://api.github.com/repos/swift-nav/libsbp
|
closed
|
Comments only sometimes line up in generated C headers
|
Message/Code Generation
|
e.g.
```
#define SBP_MSG_UART_STATE 0x0018
typedef struct __attribute__((packed)) {
uart_channel_t uart_a; /**< State of UART A */
uart_channel_t uart_b; /**< State of UART B */
uart_channel_t uart_ftdi; /**< State of UART FTDI (USB logger) */
latency_t latency; /**< UART communication latency */
} msg_uart_state_t;
```
Clearly it's trying to align the comments since it uses 3 more spaces after uart_b than uart_ftdi, but it's failing to account for the different lengths of the member types.
|
1.0
|
Comments only sometimes line up in generated C headers - e.g.
```
#define SBP_MSG_UART_STATE 0x0018
typedef struct __attribute__((packed)) {
uart_channel_t uart_a; /**< State of UART A */
uart_channel_t uart_b; /**< State of UART B */
uart_channel_t uart_ftdi; /**< State of UART FTDI (USB logger) */
latency_t latency; /**< UART communication latency */
} msg_uart_state_t;
```
Clearly it's trying to align the comments since it uses 3 more spaces after uart_b than uart_ftdi, but it's failing to account for the different lengths of the member types.
|
non_design
|
comments only sometimes line up in generated c headers e g define sbp msg uart state typedef struct attribute packed uart channel t uart a state of uart a uart channel t uart b state of uart b uart channel t uart ftdi state of uart ftdi usb logger latency t latency uart communication latency msg uart state t clearly it s trying to align the comments since it uses more spaces after uart b than uart ftdi but it s failing to account for the different lengths of the member types
| 0
|
183,888
| 31,779,959,093
|
IssuesEvent
|
2023-09-12 16:42:08
|
jpmorganchase/salt-ds
|
https://api.github.com/repos/jpmorganchase/salt-ds
|
opened
|
Create mega-menu for use with navigation item
|
role: dev 💻 role: design 🎨 role: content 📝
|
## Description
The navigation item should include the option of a mega-menu drop-down.
## Tasks
```[tasklist]
### Checklist
- [ ] Density (HD, MD, LD, TD)
- [ ] Mode (Light, Dark)
- [ ] Fill (Primary, Secondary, Tertiary)
- [ ] State (Default, Hover, Selected/Active, Disabled, Read-only, Other)
- [ ] Controlled API
- [ ] UITK accessibility parity (screen reader + keyboard interactions)
```
```[tasklist]
### Deliverables
- [ ] Characteristics spec
- [ ] Interactions spec, where necessary
- [ ] In Code & Figma (Component + Guide)
- [ ] Supporting site documentation
```
|
1.0
|
Create mega-menu for use with navigation item - ## Description
The navigation item should include the option of a mega-menu drop-down.
## Tasks
```[tasklist]
### Checklist
- [ ] Density (HD, MD, LD, TD)
- [ ] Mode (Light, Dark)
- [ ] Fill (Primary, Secondary, Tertiary)
- [ ] State (Default, Hover, Selected/Active, Disabled, Read-only, Other)
- [ ] Controlled API
- [ ] UITK accessibility parity (screen reader + keyboard interactions)
```
```[tasklist]
### Deliverables
- [ ] Characteristics spec
- [ ] Interactions spec, where necessary
- [ ] In Code & Figma (Component + Guide)
- [ ] Supporting site documentation
```
|
design
|
create mega menu for use with navigation item description the navigation item should include the option of a mega menu drop down tasks checklist density hd md ld td mode light dark fill primary secondary tertiary state default hover selected active disabled read only other controlled api uitk accessibility parity screen reader keyboard interactions deliverables characteristics spec interactions spec where necessary in code figma component guide supporting site documentation
| 1
|
130,005
| 17,971,513,504
|
IssuesEvent
|
2021-09-14 03:02:03
|
AcrossTheCloud/TBA21-client
|
https://api.github.com/repos/AcrossTheCloud/TBA21-client
|
closed
|
Windows alignment of text should be vertically aligned in boxes but isn't
|
bug ux/ui differs from design
|
<img width="408" alt="Screen Shot 2021-09-14 at 12 08 34 pm" src="https://user-images.githubusercontent.com/2288238/133182853-b12c9fd3-bb92-4ef8-bf3d-5cc788b0a78c.png">
|
1.0
|
Windows alignment of text should be vertically aligned in boxes but isn't - <img width="408" alt="Screen Shot 2021-09-14 at 12 08 34 pm" src="https://user-images.githubusercontent.com/2288238/133182853-b12c9fd3-bb92-4ef8-bf3d-5cc788b0a78c.png">
|
design
|
windows alignment of text should be vertically aligned in boxes but isn t img width alt screen shot at pm src
| 1
|
122,242
| 4,828,699,874
|
IssuesEvent
|
2016-11-07 16:54:29
|
meumobi/sitebuilder
|
https://api.github.com/repos/meumobi/sitebuilder
|
opened
|
Push not received
|
bug high priority push notification
|
I've sent push on various sites, with segmented audience and not, but never received push on my ios.
Can't digg further on my investigation due to issue #431
|
1.0
|
Push not received - I've sent push on various sites, with segmented audience and not, but never received push on my ios.
Can't digg further on my investigation due to issue #431
|
non_design
|
push not received i ve sent push on various sites with segmented audience and not but never received push on my ios can t digg further on my investigation due to issue
| 0
|
67,828
| 17,084,679,131
|
IssuesEvent
|
2021-07-08 10:13:22
|
ballerina-platform/ballerina-standard-library
|
https://api.github.com/repos/ballerina-platform/ballerina-standard-library
|
closed
|
Update Build and Release Scripts - Part I
|
Type/Task area/build
|
**Description:**
We have to complete the following three tasks:
1. Remove the `push` trigger from the `pull-request.yml` file
2. Update to Gradle `7.1` version
Use ```gradle wrapper --gradle-version 7.1``` to update to the `7.1` version. Make sure to commit the `gradle/wrapper/gradle-wrapper.jar` file too.
When updating to the latest Gradle version, the `compile` keyword might needed to be changed to `implementation`. (`compile` was deprecated in previous versions and now removed.)
3. Update the `publish-release.yml` to use the GitHub CLI tool (`gh`) instead of shell scripts.
Let's update the list once this task is completed.
- [x] io
- [x] url
- [x] java.arrays
- [x] random
- [x] regex
- [x] task
- [x] time
- [x] xmldata
- [x] crypto
- [x] os
- [x] xslt
- [x] uuid
- [x] log
- [x] cache
- [x] file
- [x] ftp
- [x] mime
- [x] nats
- [x] stan
- [x] tcp
- [x] udp
- [x] auth
- [x] email
- [x] http
- [x] jwt
- [x] oauth2
- [x] graphql
- [x] grpc
- [x] websocket
- [x] websub
- [x] websubhub
- [x] kafka
- [x] rabbitmq
- [x] sql
- [x] java.jdbc
- [x] mysql
- [x] postgresql
- [x] mssql
|
1.0
|
Update Build and Release Scripts - Part I - **Description:**
We have to complete the following three tasks:
1. Remove the `push` trigger from the `pull-request.yml` file
2. Update to Gradle `7.1` version
Use ```gradle wrapper --gradle-version 7.1``` to update to the `7.1` version. Make sure to commit the `gradle/wrapper/gradle-wrapper.jar` file too.
When updating to the latest Gradle version, the `compile` keyword might needed to be changed to `implementation`. (`compile` was deprecated in previous versions and now removed.)
3. Update the `publish-release.yml` to use the GitHub CLI tool (`gh`) instead of shell scripts.
Let's update the list once this task is completed.
- [x] io
- [x] url
- [x] java.arrays
- [x] random
- [x] regex
- [x] task
- [x] time
- [x] xmldata
- [x] crypto
- [x] os
- [x] xslt
- [x] uuid
- [x] log
- [x] cache
- [x] file
- [x] ftp
- [x] mime
- [x] nats
- [x] stan
- [x] tcp
- [x] udp
- [x] auth
- [x] email
- [x] http
- [x] jwt
- [x] oauth2
- [x] graphql
- [x] grpc
- [x] websocket
- [x] websub
- [x] websubhub
- [x] kafka
- [x] rabbitmq
- [x] sql
- [x] java.jdbc
- [x] mysql
- [x] postgresql
- [x] mssql
|
non_design
|
update build and release scripts part i description we have to complete the following three tasks remove the push trigger from the pull request yml file update to gradle version use gradle wrapper gradle version to update to the version make sure to commit the gradle wrapper gradle wrapper jar file too when updating to the latest gradle version the compile keyword might needed to be changed to implementation compile was deprecated in previous versions and now removed update the publish release yml to use the github cli tool gh instead of shell scripts let s update the list once this task is completed io url java arrays random regex task time xmldata crypto os xslt uuid log cache file ftp mime nats stan tcp udp auth email http jwt graphql grpc websocket websub websubhub kafka rabbitmq sql java jdbc mysql postgresql mssql
| 0
|
256,177
| 27,552,723,853
|
IssuesEvent
|
2023-03-07 15:55:14
|
BrianMcDonaldWS/genie
|
https://api.github.com/repos/BrianMcDonaldWS/genie
|
opened
|
CVE-2022-31159 (Medium) detected in aws-java-sdk-s3-1.11.415.jar
|
security vulnerability
|
## CVE-2022-31159 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>aws-java-sdk-s3-1.11.415.jar</b></p></summary>
<p>The AWS Java SDK for Amazon S3 module holds the client classes that are used for communicating with Amazon Simple Storage Service</p>
<p>Library home page: <a href="https://aws.amazon.com/sdkforjava">https://aws.amazon.com/sdkforjava</a></p>
<p>Path to dependency file: /genie-agent/build.gradle</p>
<p>Path to vulnerable library: /root/.gradle/caches/modules-2/files-2.1/com.amazonaws/aws-java-sdk-s3/1.11.415/f8b58cdf4e36f5e26ea4e61a89fb087ec7815d49/aws-java-sdk-s3-1.11.415.jar,/root/.gradle/caches/modules-2/files-2.1/com.amazonaws/aws-java-sdk-s3/1.11.415/f8b58cdf4e36f5e26ea4e61a89fb087ec7815d49/aws-java-sdk-s3-1.11.415.jar</p>
<p>
Dependency Hierarchy:
- spring-cloud-starter-aws-2.2.1.RELEASE.jar (Root Library)
- spring-cloud-aws-context-2.2.1.RELEASE.jar
- spring-cloud-aws-core-2.2.1.RELEASE.jar
- :x: **aws-java-sdk-s3-1.11.415.jar** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The AWS SDK for Java enables Java developers to work with Amazon Web Services. A partial-path traversal issue exists within the `downloadDirectory` method in the AWS S3 TransferManager component of the AWS SDK for Java v1 prior to version 1.12.261. Applications using the SDK control the `destinationDirectory` argument, but S3 object keys are determined by the application that uploaded the objects. The `downloadDirectory` method allows the caller to pass a filesystem object in the object key but contained an issue in the validation logic for the key name. A knowledgeable actor could bypass the validation logic by including a UNIX double-dot in the bucket key. Under certain conditions, this could permit them to retrieve a directory from their S3 bucket that is one level up in the filesystem from their working directory. This issue’s scope is limited to directories whose name prefix matches the destinationDirectory. E.g. for destination directory`/tmp/foo`, the actor can cause a download to `/tmp/foo-bar`, but not `/tmp/bar`. If `com.amazonaws.services.s3.transfer.TransferManager::downloadDirectory` is used to download an untrusted buckets contents, the contents of that bucket can be written outside of the intended destination directory. Version 1.12.261 contains a patch for this issue. As a workaround, when calling `com.amazonaws.services.s3.transfer.TransferManager::downloadDirectory`, pass a `KeyFilter` that forbids `S3ObjectSummary` objects that `getKey` method return a string containing the substring `..` .
<p>Publish Date: 2022-07-15
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-31159>CVE-2022-31159</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/aws/aws-sdk-java/security/advisories/GHSA-c28r-hw5m-5gv3">https://github.com/aws/aws-sdk-java/security/advisories/GHSA-c28r-hw5m-5gv3</a></p>
<p>Release Date: 2022-07-15</p>
<p>Fix Resolution: com.amazonaws:aws-java-sdk-s3:1.12.261</p>
</p>
</details>
<p></p>
|
True
|
CVE-2022-31159 (Medium) detected in aws-java-sdk-s3-1.11.415.jar - ## CVE-2022-31159 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>aws-java-sdk-s3-1.11.415.jar</b></p></summary>
<p>The AWS Java SDK for Amazon S3 module holds the client classes that are used for communicating with Amazon Simple Storage Service</p>
<p>Library home page: <a href="https://aws.amazon.com/sdkforjava">https://aws.amazon.com/sdkforjava</a></p>
<p>Path to dependency file: /genie-agent/build.gradle</p>
<p>Path to vulnerable library: /root/.gradle/caches/modules-2/files-2.1/com.amazonaws/aws-java-sdk-s3/1.11.415/f8b58cdf4e36f5e26ea4e61a89fb087ec7815d49/aws-java-sdk-s3-1.11.415.jar,/root/.gradle/caches/modules-2/files-2.1/com.amazonaws/aws-java-sdk-s3/1.11.415/f8b58cdf4e36f5e26ea4e61a89fb087ec7815d49/aws-java-sdk-s3-1.11.415.jar</p>
<p>
Dependency Hierarchy:
- spring-cloud-starter-aws-2.2.1.RELEASE.jar (Root Library)
- spring-cloud-aws-context-2.2.1.RELEASE.jar
- spring-cloud-aws-core-2.2.1.RELEASE.jar
- :x: **aws-java-sdk-s3-1.11.415.jar** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The AWS SDK for Java enables Java developers to work with Amazon Web Services. A partial-path traversal issue exists within the `downloadDirectory` method in the AWS S3 TransferManager component of the AWS SDK for Java v1 prior to version 1.12.261. Applications using the SDK control the `destinationDirectory` argument, but S3 object keys are determined by the application that uploaded the objects. The `downloadDirectory` method allows the caller to pass a filesystem object in the object key but contained an issue in the validation logic for the key name. A knowledgeable actor could bypass the validation logic by including a UNIX double-dot in the bucket key. Under certain conditions, this could permit them to retrieve a directory from their S3 bucket that is one level up in the filesystem from their working directory. This issue’s scope is limited to directories whose name prefix matches the destinationDirectory. E.g. for destination directory`/tmp/foo`, the actor can cause a download to `/tmp/foo-bar`, but not `/tmp/bar`. If `com.amazonaws.services.s3.transfer.TransferManager::downloadDirectory` is used to download an untrusted buckets contents, the contents of that bucket can be written outside of the intended destination directory. Version 1.12.261 contains a patch for this issue. As a workaround, when calling `com.amazonaws.services.s3.transfer.TransferManager::downloadDirectory`, pass a `KeyFilter` that forbids `S3ObjectSummary` objects that `getKey` method return a string containing the substring `..` .
<p>Publish Date: 2022-07-15
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-31159>CVE-2022-31159</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/aws/aws-sdk-java/security/advisories/GHSA-c28r-hw5m-5gv3">https://github.com/aws/aws-sdk-java/security/advisories/GHSA-c28r-hw5m-5gv3</a></p>
<p>Release Date: 2022-07-15</p>
<p>Fix Resolution: com.amazonaws:aws-java-sdk-s3:1.12.261</p>
</p>
</details>
<p></p>
|
non_design
|
cve medium detected in aws java sdk jar cve medium severity vulnerability vulnerable library aws java sdk jar the aws java sdk for amazon module holds the client classes that are used for communicating with amazon simple storage service library home page a href path to dependency file genie agent build gradle path to vulnerable library root gradle caches modules files com amazonaws aws java sdk aws java sdk jar root gradle caches modules files com amazonaws aws java sdk aws java sdk jar dependency hierarchy spring cloud starter aws release jar root library spring cloud aws context release jar spring cloud aws core release jar x aws java sdk jar vulnerable library vulnerability details the aws sdk for java enables java developers to work with amazon web services a partial path traversal issue exists within the downloaddirectory method in the aws transfermanager component of the aws sdk for java prior to version applications using the sdk control the destinationdirectory argument but object keys are determined by the application that uploaded the objects the downloaddirectory method allows the caller to pass a filesystem object in the object key but contained an issue in the validation logic for the key name a knowledgeable actor could bypass the validation logic by including a unix double dot in the bucket key under certain conditions this could permit them to retrieve a directory from their bucket that is one level up in the filesystem from their working directory this issue’s scope is limited to directories whose name prefix matches the destinationdirectory e g for destination directory tmp foo the actor can cause a download to tmp foo bar but not tmp bar if com amazonaws services transfer transfermanager downloaddirectory is used to download an untrusted buckets contents the contents of that bucket can be written outside of the intended destination directory version contains a patch for this issue as a workaround when calling com amazonaws services transfer transfermanager downloaddirectory pass a keyfilter that forbids objects that getkey method return a string containing the substring publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com amazonaws aws java sdk
| 0
|
9,011
| 6,725,281,776
|
IssuesEvent
|
2017-10-17 04:15:16
|
woocommerce/woocommerce
|
https://api.github.com/repos/woocommerce/woocommerce
|
closed
|
Coupon limit where clause
|
Focus: Performance Type: Bug
|
## Steps to reproduce the issue
1. Set up a coupon with a non-zero value for "Usage limit per user"
2. Add coupon to an order and check out
3. During checkout, [this query](https://github.com/woocommerce/woocommerce/blob/803b31a18cf240368c46633f98fded76ffbd949c/includes/class-wc-cart.php#L1495) will select from the users table with a `WHERE` clause of `1=1`. If the site has enough users, this can use up a lot of memory and potentially cause a fatal PHP error.
I will submit a PR for this shortly.
|
True
|
Coupon limit where clause - ## Steps to reproduce the issue
1. Set up a coupon with a non-zero value for "Usage limit per user"
2. Add coupon to an order and check out
3. During checkout, [this query](https://github.com/woocommerce/woocommerce/blob/803b31a18cf240368c46633f98fded76ffbd949c/includes/class-wc-cart.php#L1495) will select from the users table with a `WHERE` clause of `1=1`. If the site has enough users, this can use up a lot of memory and potentially cause a fatal PHP error.
I will submit a PR for this shortly.
|
non_design
|
coupon limit where clause steps to reproduce the issue set up a coupon with a non zero value for usage limit per user add coupon to an order and check out during checkout will select from the users table with a where clause of if the site has enough users this can use up a lot of memory and potentially cause a fatal php error i will submit a pr for this shortly
| 0
|
812,396
| 30,331,868,572
|
IssuesEvent
|
2023-07-11 07:01:41
|
matrixorigin/matrixone
|
https://api.github.com/repos/matrixorigin/matrixone
|
closed
|
[Feature Request]: implement lower_case_table_names
|
priority/p0 kind/feature source/on-demand doc close
|
### Is there an existing issue for the same feature request?
- [X] I have checked the existing issues.
### Is your feature request related to a problem?
_No response_
### Describe the feature you'd like
https://dev.mysql.com/doc/refman/8.0/en/identifier-case-sensitivity.html
This should be a DB level config as https://github.com/matrixorigin/matrixone/issues/6606
### Describe implementation you've considered
_No response_
### Documentation, Adoption, Use Case, Migration Strategy
_No response_
### Additional information
_No response_
|
1.0
|
[Feature Request]: implement lower_case_table_names - ### Is there an existing issue for the same feature request?
- [X] I have checked the existing issues.
### Is your feature request related to a problem?
_No response_
### Describe the feature you'd like
https://dev.mysql.com/doc/refman/8.0/en/identifier-case-sensitivity.html
This should be a DB level config as https://github.com/matrixorigin/matrixone/issues/6606
### Describe implementation you've considered
_No response_
### Documentation, Adoption, Use Case, Migration Strategy
_No response_
### Additional information
_No response_
|
non_design
|
implement lower case table names is there an existing issue for the same feature request i have checked the existing issues is your feature request related to a problem no response describe the feature you d like this should be a db level config as describe implementation you ve considered no response documentation adoption use case migration strategy no response additional information no response
| 0
|
241,198
| 20,107,507,017
|
IssuesEvent
|
2022-02-07 12:01:29
|
kyma-incubator/reconciler
|
https://api.github.com/repos/kyma-incubator/reconciler
|
opened
|
Testing reconciler changes
|
area/reconciler area/installation test-missing release blocker
|
<!-- Thank you for your contribution. Before you submit the issue:
1. Search open and closed issues for duplicates.
2. Read the contributing guidelines.
-->
**Description**
Implement pipeline building reconciler from the sources and installing kyma. Pipeline should be triggered on reconciler changes: before merging to main and after merging to main. Pipeline should use built from sources to install kyma. There should be 2 pipelines testing latest kyma 2 release (no hardcoded version) and kyma on main. After kyma is provisioned trigger fast integration tests. Pipeline should be mandatory to merge PRs.
AC:
- [ ] pre main mandatory pipeline using reconciler sources to install latest kyma 2 release and running fast integration tests
- [ ] pre main mandatory pipeline using reconciler sources to install main kyma and running fast integration tests
- [ ] post main mandatory pipeline using reconciler sources to install latest kyma 2 release and running fast integration tests
- [ ] post main mandatory pipeline using reconciler sources to install main kyma and running fast integration tests
- [ ] update reconciler pipeline inventory
**Reasons**
It is possible to introduce changes to reconciler itself or to component reconciler containing bugs and get to know about after the merge. there is NO pipeline building reconciler from the sources and using it for installation.
**Attachments**
<!-- Attach any files, links, code samples, or screenshots that will convince us to your idea. -->
|
1.0
|
Testing reconciler changes - <!-- Thank you for your contribution. Before you submit the issue:
1. Search open and closed issues for duplicates.
2. Read the contributing guidelines.
-->
**Description**
Implement pipeline building reconciler from the sources and installing kyma. Pipeline should be triggered on reconciler changes: before merging to main and after merging to main. Pipeline should use built from sources to install kyma. There should be 2 pipelines testing latest kyma 2 release (no hardcoded version) and kyma on main. After kyma is provisioned trigger fast integration tests. Pipeline should be mandatory to merge PRs.
AC:
- [ ] pre main mandatory pipeline using reconciler sources to install latest kyma 2 release and running fast integration tests
- [ ] pre main mandatory pipeline using reconciler sources to install main kyma and running fast integration tests
- [ ] post main mandatory pipeline using reconciler sources to install latest kyma 2 release and running fast integration tests
- [ ] post main mandatory pipeline using reconciler sources to install main kyma and running fast integration tests
- [ ] update reconciler pipeline inventory
**Reasons**
It is possible to introduce changes to reconciler itself or to component reconciler containing bugs and get to know about after the merge. there is NO pipeline building reconciler from the sources and using it for installation.
**Attachments**
<!-- Attach any files, links, code samples, or screenshots that will convince us to your idea. -->
|
non_design
|
testing reconciler changes thank you for your contribution before you submit the issue search open and closed issues for duplicates read the contributing guidelines description implement pipeline building reconciler from the sources and installing kyma pipeline should be triggered on reconciler changes before merging to main and after merging to main pipeline should use built from sources to install kyma there should be pipelines testing latest kyma release no hardcoded version and kyma on main after kyma is provisioned trigger fast integration tests pipeline should be mandatory to merge prs ac pre main mandatory pipeline using reconciler sources to install latest kyma release and running fast integration tests pre main mandatory pipeline using reconciler sources to install main kyma and running fast integration tests post main mandatory pipeline using reconciler sources to install latest kyma release and running fast integration tests post main mandatory pipeline using reconciler sources to install main kyma and running fast integration tests update reconciler pipeline inventory reasons it is possible to introduce changes to reconciler itself or to component reconciler containing bugs and get to know about after the merge there is no pipeline building reconciler from the sources and using it for installation attachments
| 0
|
172,090
| 27,233,053,774
|
IssuesEvent
|
2023-02-21 14:32:42
|
prgrms-web-devcourse/Team-5YES-WuMo-FE
|
https://api.github.com/repos/prgrms-web-devcourse/Team-5YES-WuMo-FE
|
closed
|
모바일 반응형 레이아웃 세팅
|
feature design
|
## 📕 작업 설명
- 모바일 반응형 레이아웃 작업
작업 브랜치: feature/mobile-layout-setting/#1
## 📖 진행 사항
- [ ] 모바일 반응형 레이아웃 작업
|
1.0
|
모바일 반응형 레이아웃 세팅 - ## 📕 작업 설명
- 모바일 반응형 레이아웃 작업
작업 브랜치: feature/mobile-layout-setting/#1
## 📖 진행 사항
- [ ] 모바일 반응형 레이아웃 작업
|
design
|
모바일 반응형 레이아웃 세팅 📕 작업 설명 모바일 반응형 레이아웃 작업 작업 브랜치 feature mobile layout setting 📖 진행 사항 모바일 반응형 레이아웃 작업
| 1
|
114,356
| 14,564,427,648
|
IssuesEvent
|
2020-12-17 05:04:45
|
Opentrons/opentrons
|
https://api.github.com/repos/Opentrons/opentrons
|
opened
|
PD: Triggers that force a user to confirm or cancel loss of changes to a step form
|
:spider: SPDDRS protocol designer
|
### User Story
As a user I want loss of work to be a conscious choice
Example existing modal in PD:

### Acceptance Criteria
**When users will always be asked to save or cancel changes**
- [ ] When a user has made changes to a single form but shift+clicks another step in an attempt to enter batch edit mode
- [ ] When a user has made changes to a batch edit form and tries to exit batch edit mode
- [ ] When a user has made changes to a batch edit form and tries to _**add or remove**_ steps from their selection
- [ ] When a user has made changes to a batch edit form and tries to delete or duplicate
**When a user is asked to confirm their choice as a form of onboarding (aka 'don't show me again' is an option)**
- [ ] When a user saves a batch edit form
- [ ] When a user deletes a selection of steps
|
1.0
|
PD: Triggers that force a user to confirm or cancel loss of changes to a step form - ### User Story
As a user I want loss of work to be a conscious choice
Example existing modal in PD:

### Acceptance Criteria
**When users will always be asked to save or cancel changes**
- [ ] When a user has made changes to a single form but shift+clicks another step in an attempt to enter batch edit mode
- [ ] When a user has made changes to a batch edit form and tries to exit batch edit mode
- [ ] When a user has made changes to a batch edit form and tries to _**add or remove**_ steps from their selection
- [ ] When a user has made changes to a batch edit form and tries to delete or duplicate
**When a user is asked to confirm their choice as a form of onboarding (aka 'don't show me again' is an option)**
- [ ] When a user saves a batch edit form
- [ ] When a user deletes a selection of steps
|
design
|
pd triggers that force a user to confirm or cancel loss of changes to a step form user story as a user i want loss of work to be a conscious choice example existing modal in pd acceptance criteria when users will always be asked to save or cancel changes when a user has made changes to a single form but shift clicks another step in an attempt to enter batch edit mode when a user has made changes to a batch edit form and tries to exit batch edit mode when a user has made changes to a batch edit form and tries to add or remove steps from their selection when a user has made changes to a batch edit form and tries to delete or duplicate when a user is asked to confirm their choice as a form of onboarding aka don t show me again is an option when a user saves a batch edit form when a user deletes a selection of steps
| 1
|
242,840
| 7,849,239,407
|
IssuesEvent
|
2018-06-20 02:20:00
|
kubeflow/kubeflow
|
https://api.github.com/repos/kubeflow/kubeflow
|
closed
|
Batch Prediction Beam Library
|
area/inference priority/p1 release/0.2.0 sprint/2018-05-29-to-06-08 sprint/2018-06-11-to-06-22
|
We'd like to have a story for batch prediction with beam. We will need a library of DoFns to do inference.
Related to:
Batch Prediction using GPUs #251
/assign @yixinshi
|
1.0
|
Batch Prediction Beam Library - We'd like to have a story for batch prediction with beam. We will need a library of DoFns to do inference.
Related to:
Batch Prediction using GPUs #251
/assign @yixinshi
|
non_design
|
batch prediction beam library we d like to have a story for batch prediction with beam we will need a library of dofns to do inference related to batch prediction using gpus assign yixinshi
| 0
|
40,133
| 12,750,677,866
|
IssuesEvent
|
2020-06-27 06:12:24
|
LucasZuk/Carrosserie
|
https://api.github.com/repos/LucasZuk/Carrosserie
|
closed
|
CVE-2012-6708 (Medium) detected in jquery-1.7.1.min.js
|
security vulnerability
|
## CVE-2012-6708 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jquery-1.7.1.min.js</b></p></summary>
<p>JavaScript library for DOM operations</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.7.1/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/1.7.1/jquery.min.js</a></p>
<p>Path to dependency file: /tmp/ws-scm/Carrosserie/wp-content/themes/twentytwenty/node_modules/vm-browserify/example/run/index.html</p>
<p>Path to vulnerable library: /Carrosserie/wp-content/themes/twentytwenty/node_modules/vm-browserify/example/run/index.html</p>
<p>
Dependency Hierarchy:
- :x: **jquery-1.7.1.min.js** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/LucasZuk/Carrosserie/commit/343ec17a4a454a6b094b442cb759631cd6ac5c4c">343ec17a4a454a6b094b442cb759631cd6ac5c4c</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
jQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS) attacks. The jQuery(strInput) function does not differentiate selectors from HTML in a reliable fashion. In vulnerable versions, jQuery determined whether the input was HTML by looking for the '<' character anywhere in the string, giving attackers more flexibility when attempting to construct a malicious payload. In fixed versions, jQuery only deems the input to be HTML if it explicitly starts with the '<' character, limiting exploitability only to attackers who can control the beginning of a string, which is far less common.
<p>Publish Date: 2018-01-18
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2012-6708>CVE-2012-6708</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2012-6708">https://nvd.nist.gov/vuln/detail/CVE-2012-6708</a></p>
<p>Release Date: 2018-01-18</p>
<p>Fix Resolution: jQuery - v1.9.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
True
|
CVE-2012-6708 (Medium) detected in jquery-1.7.1.min.js - ## CVE-2012-6708 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jquery-1.7.1.min.js</b></p></summary>
<p>JavaScript library for DOM operations</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.7.1/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/1.7.1/jquery.min.js</a></p>
<p>Path to dependency file: /tmp/ws-scm/Carrosserie/wp-content/themes/twentytwenty/node_modules/vm-browserify/example/run/index.html</p>
<p>Path to vulnerable library: /Carrosserie/wp-content/themes/twentytwenty/node_modules/vm-browserify/example/run/index.html</p>
<p>
Dependency Hierarchy:
- :x: **jquery-1.7.1.min.js** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/LucasZuk/Carrosserie/commit/343ec17a4a454a6b094b442cb759631cd6ac5c4c">343ec17a4a454a6b094b442cb759631cd6ac5c4c</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
jQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS) attacks. The jQuery(strInput) function does not differentiate selectors from HTML in a reliable fashion. In vulnerable versions, jQuery determined whether the input was HTML by looking for the '<' character anywhere in the string, giving attackers more flexibility when attempting to construct a malicious payload. In fixed versions, jQuery only deems the input to be HTML if it explicitly starts with the '<' character, limiting exploitability only to attackers who can control the beginning of a string, which is far less common.
<p>Publish Date: 2018-01-18
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2012-6708>CVE-2012-6708</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2012-6708">https://nvd.nist.gov/vuln/detail/CVE-2012-6708</a></p>
<p>Release Date: 2018-01-18</p>
<p>Fix Resolution: jQuery - v1.9.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
non_design
|
cve medium detected in jquery min js cve medium severity vulnerability vulnerable library jquery min js javascript library for dom operations library home page a href path to dependency file tmp ws scm carrosserie wp content themes twentytwenty node modules vm browserify example run index html path to vulnerable library carrosserie wp content themes twentytwenty node modules vm browserify example run index html dependency hierarchy x jquery min js vulnerable library found in head commit a href vulnerability details jquery before is vulnerable to cross site scripting xss attacks the jquery strinput function does not differentiate selectors from html in a reliable fashion in vulnerable versions jquery determined whether the input was html by looking for the character anywhere in the string giving attackers more flexibility when attempting to construct a malicious payload in fixed versions jquery only deems the input to be html if it explicitly starts with the character limiting exploitability only to attackers who can control the beginning of a string which is far less common publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution jquery step up your open source security game with whitesource
| 0
|
11,917
| 3,028,451,223
|
IssuesEvent
|
2015-08-04 05:28:11
|
MarlinFirmware/MarlinDev
|
https://api.github.com/repos/MarlinFirmware/MarlinDev
|
opened
|
More parse-able M115
|
Design Concept Hosts & Protocols Needs Feedback
|
Currently the output of `M115` looks like this:
FIRMWARE_NAME:Marlin 1.1 abc-123-de4db33f SOURCE_CODE_URL:https://github.com/MarlinFirmware/Marlin/ PROTOCOL_VERSION:1.0 MACHINE_TYPE:Mendel RepRap EXTRUDER_COUNT:1 UUID:00000000-0000-0000-0000-000000000000
This is hard to parse. It would help to add a delimiter, such as a semicolon, between parts. This results in…
FIRMWARE_NAME:Marlin 1.1 abc-123-de4db33f; SOURCE_CODE_URL:https://github.com/MarlinFirmware/Marlin/; PROTOCOL_VERSION:1.0; MACHINE_TYPE:Mendel RepRap; EXTRUDER_COUNT:1; UUID:00000000-0000-0000-0000-000000000000;
|
1.0
|
More parse-able M115 - Currently the output of `M115` looks like this:
FIRMWARE_NAME:Marlin 1.1 abc-123-de4db33f SOURCE_CODE_URL:https://github.com/MarlinFirmware/Marlin/ PROTOCOL_VERSION:1.0 MACHINE_TYPE:Mendel RepRap EXTRUDER_COUNT:1 UUID:00000000-0000-0000-0000-000000000000
This is hard to parse. It would help to add a delimiter, such as a semicolon, between parts. This results in…
FIRMWARE_NAME:Marlin 1.1 abc-123-de4db33f; SOURCE_CODE_URL:https://github.com/MarlinFirmware/Marlin/; PROTOCOL_VERSION:1.0; MACHINE_TYPE:Mendel RepRap; EXTRUDER_COUNT:1; UUID:00000000-0000-0000-0000-000000000000;
|
design
|
more parse able currently the output of looks like this firmware name marlin abc source code url protocol version machine type mendel reprap extruder count uuid this is hard to parse it would help to add a delimiter such as a semicolon between parts this results in… firmware name marlin abc source code url protocol version machine type mendel reprap extruder count uuid
| 1
|
9,617
| 2,910,501,232
|
IssuesEvent
|
2015-06-21 20:26:04
|
hhroc/yellr-ios
|
https://api.github.com/repos/hhroc/yellr-ios
|
opened
|
Change voting colors
|
design
|
The up-arrow and down-arrow should be grey, unless a vote has been cast. Then, if it is an upvote, then the up arrow should turn green, and the down arrow should turn red if it was a down vote. Additionally, the color of the up/down vote counts should be green/red.
Look at how the Android app does it, as well as the website at yellr.net/local.
|
1.0
|
Change voting colors - The up-arrow and down-arrow should be grey, unless a vote has been cast. Then, if it is an upvote, then the up arrow should turn green, and the down arrow should turn red if it was a down vote. Additionally, the color of the up/down vote counts should be green/red.
Look at how the Android app does it, as well as the website at yellr.net/local.
|
design
|
change voting colors the up arrow and down arrow should be grey unless a vote has been cast then if it is an upvote then the up arrow should turn green and the down arrow should turn red if it was a down vote additionally the color of the up down vote counts should be green red look at how the android app does it as well as the website at yellr net local
| 1
|
80,533
| 10,023,139,704
|
IssuesEvent
|
2019-07-16 18:26:26
|
brave/brave-browser
|
https://api.github.com/repos/brave/brave-browser
|
closed
|
Focus ring on buttons looks odd
|
QA/Yes design feature/user-interface polish priority/P5 release-notes/exclude
|
<!-- Have you searched for similar issues? Before submitting this issue, please check the open issues and add a note before logging a new issue.
PLEASE USE THE TEMPLATE BELOW TO PROVIDE INFORMATION ABOUT THE ISSUE.
INSUFFICIENT INFO WILL GET THE ISSUE CLOSED. IT WILL ONLY BE REOPENED AFTER SUFFICIENT INFO IS PROVIDED-->
## Description
<!--Provide a brief description of the issue-->
Focus ring on buttons look odd
## Actual result:
<!--Please add screenshots if needed-->

## Expected result:
No orange rectangular border should be shown around the button
## Reproduces how often:
<!--[Easily reproduced/Intermittent issue/No steps to reproduce]-->
Easy
## Brave version (brave://version info)
<!--For installed build, please copy Brave, Revision and OS from brave://version and paste here. If building from source please mention it along with brave://version details-->
Brave | 0.63.1 Chromium: 73.0.3683.67 (Official Build) dev (64-bit)
-- | --
Revision | a83fd4f3207ae83412d329a9ca1239dd1e068345-refs/branch-heads/3683@{#760}
OS | Windows 10 OS Build 17134.590
### Reproducible on current release:
- Does it reproduce on brave-browser dev/beta builds?
Yes only on dev
### Website problems only:
- Does the issue resolve itself when disabling Brave Shields?
- Is the issue reproducible on the latest version of Chrome?
### Additional Information
<!--Any additional information, related issues, extra QA steps, configuration or data that might be necessary to reproduce the issue-->
cc: @cezaraugusto @rossmoody
|
1.0
|
Focus ring on buttons looks odd - <!-- Have you searched for similar issues? Before submitting this issue, please check the open issues and add a note before logging a new issue.
PLEASE USE THE TEMPLATE BELOW TO PROVIDE INFORMATION ABOUT THE ISSUE.
INSUFFICIENT INFO WILL GET THE ISSUE CLOSED. IT WILL ONLY BE REOPENED AFTER SUFFICIENT INFO IS PROVIDED-->
## Description
<!--Provide a brief description of the issue-->
Focus ring on buttons look odd
## Actual result:
<!--Please add screenshots if needed-->

## Expected result:
No orange rectangular border should be shown around the button
## Reproduces how often:
<!--[Easily reproduced/Intermittent issue/No steps to reproduce]-->
Easy
## Brave version (brave://version info)
<!--For installed build, please copy Brave, Revision and OS from brave://version and paste here. If building from source please mention it along with brave://version details-->
Brave | 0.63.1 Chromium: 73.0.3683.67 (Official Build) dev (64-bit)
-- | --
Revision | a83fd4f3207ae83412d329a9ca1239dd1e068345-refs/branch-heads/3683@{#760}
OS | Windows 10 OS Build 17134.590
### Reproducible on current release:
- Does it reproduce on brave-browser dev/beta builds?
Yes only on dev
### Website problems only:
- Does the issue resolve itself when disabling Brave Shields?
- Is the issue reproducible on the latest version of Chrome?
### Additional Information
<!--Any additional information, related issues, extra QA steps, configuration or data that might be necessary to reproduce the issue-->
cc: @cezaraugusto @rossmoody
|
design
|
focus ring on buttons looks odd have you searched for similar issues before submitting this issue please check the open issues and add a note before logging a new issue please use the template below to provide information about the issue insufficient info will get the issue closed it will only be reopened after sufficient info is provided description focus ring on buttons look odd actual result expected result no orange rectangular border should be shown around the button reproduces how often easy brave version brave version info brave chromium official build dev bit revision refs branch heads os windows os build reproducible on current release does it reproduce on brave browser dev beta builds yes only on dev website problems only does the issue resolve itself when disabling brave shields is the issue reproducible on the latest version of chrome additional information cc cezaraugusto rossmoody
| 1
|
75,372
| 20,779,189,134
|
IssuesEvent
|
2022-03-16 13:23:12
|
mozilla-mobile/reference-browser
|
https://api.github.com/repos/mozilla-mobile/reference-browser
|
closed
|
Update Sentry tokens for the new client
|
🏗️ build
|
Update Sentry tokens for the new clientAs part of moving to a newer instance of Sentry, we would need to update Sentry tokens in our build system's secrets.
Dependant on https://github.com/mozilla-mobile/android-components/issues/11646.
|
1.0
|
Update Sentry tokens for the new client - Update Sentry tokens for the new clientAs part of moving to a newer instance of Sentry, we would need to update Sentry tokens in our build system's secrets.
Dependant on https://github.com/mozilla-mobile/android-components/issues/11646.
|
non_design
|
update sentry tokens for the new client update sentry tokens for the new clientas part of moving to a newer instance of sentry we would need to update sentry tokens in our build system s secrets dependant on
| 0
|
163,255
| 25,779,989,346
|
IssuesEvent
|
2022-12-09 15:08:10
|
RE-SS3D/SS3D
|
https://api.github.com/repos/RE-SS3D/SS3D
|
closed
|
Add end of round mechanics
|
High Priority Type: Feature Bounty Needs: Documents/Design System: Rounds
|
<!-- Text within these arrows are notes for you and should be deleted. -->
### Summary
Add end of round mechanics.
### Goal
Basically, a trigger to end the round for the players. Sends all players back to lobby.
I think it is tied to a timer currently, but adding a way to trigger it from in-game would be nice too, ~~like from a command console.~~
Currently decided to use a _nuke_ instead.
**BOUNTY: (RAISED TO) $45**
|
1.0
|
Add end of round mechanics - <!-- Text within these arrows are notes for you and should be deleted. -->
### Summary
Add end of round mechanics.
### Goal
Basically, a trigger to end the round for the players. Sends all players back to lobby.
I think it is tied to a timer currently, but adding a way to trigger it from in-game would be nice too, ~~like from a command console.~~
Currently decided to use a _nuke_ instead.
**BOUNTY: (RAISED TO) $45**
|
design
|
add end of round mechanics summary add end of round mechanics goal basically a trigger to end the round for the players sends all players back to lobby i think it is tied to a timer currently but adding a way to trigger it from in game would be nice too like from a command console currently decided to use a nuke instead bounty raised to
| 1
|
51,196
| 10,595,774,186
|
IssuesEvent
|
2019-10-09 19:44:25
|
fdorg/flashdevelop
|
https://api.github.com/repos/fdorg/flashdevelop
|
opened
|
[Haxe][CodeGenerator] Add the generator `Generate constructor with initializer` for `abstract`
|
coderefactor enhancement haxe
|
```haxe
abstract AType(Int) {
$(EntryPoint)
}
```
expected result:
```haxe
abstract AType(Int) {
public function new(value:Int) this = value;
}
```
|
1.0
|
[Haxe][CodeGenerator] Add the generator `Generate constructor with initializer` for `abstract` - ```haxe
abstract AType(Int) {
$(EntryPoint)
}
```
expected result:
```haxe
abstract AType(Int) {
public function new(value:Int) this = value;
}
```
|
non_design
|
add the generator generate constructor with initializer for abstract haxe abstract atype int entrypoint expected result haxe abstract atype int public function new value int this value
| 0
|
17,009
| 3,588,328,781
|
IssuesEvent
|
2016-01-30 23:06:46
|
tgstation/-tg-station
|
https://api.github.com/repos/tgstation/-tg-station
|
closed
|
It's not possible to put the new bras on as a man or a woman from the dresser
|
Bug Needs Reproducing/Testing
|
Important to note that when trying as a woman I was either made into a woman via (I assume) admin intervention or surgery.
Also I don't think it's possible to actually put on any of the female restricted clothing? I just didn't know what the rest of them looked like.
|
1.0
|
It's not possible to put the new bras on as a man or a woman from the dresser - Important to note that when trying as a woman I was either made into a woman via (I assume) admin intervention or surgery.
Also I don't think it's possible to actually put on any of the female restricted clothing? I just didn't know what the rest of them looked like.
|
non_design
|
it s not possible to put the new bras on as a man or a woman from the dresser important to note that when trying as a woman i was either made into a woman via i assume admin intervention or surgery also i don t think it s possible to actually put on any of the female restricted clothing i just didn t know what the rest of them looked like
| 0
|
59,855
| 7,298,785,423
|
IssuesEvent
|
2018-02-26 18:01:08
|
CDLUC3/Make-Data-Count
|
https://api.github.com/repos/CDLUC3/Make-Data-Count
|
closed
|
Decide which repositories to target
|
Log Processing MVP S06: Design Log Processor in progress
|
Need to know which repositories will be the focus:
- Dash
- DataONE
- DataCite
|
1.0
|
Decide which repositories to target - Need to know which repositories will be the focus:
- Dash
- DataONE
- DataCite
|
design
|
decide which repositories to target need to know which repositories will be the focus dash dataone datacite
| 1
|
45,272
| 5,918,795,715
|
IssuesEvent
|
2017-05-22 16:07:41
|
blockstack/blockstack.org
|
https://api.github.com/repos/blockstack/blockstack.org
|
opened
|
design section 2 content
|
design
|
Design section 2 content
- [ ] mobile
- [ ] desktop
Reference
- [#302: home page content](https://github.com/blockstack/blockstack.org/issues/302)
- [#292: design new landing view hero section and illustration](https://github.com/blockstack/blockstack.org/issues/292)
|
1.0
|
design section 2 content - Design section 2 content
- [ ] mobile
- [ ] desktop
Reference
- [#302: home page content](https://github.com/blockstack/blockstack.org/issues/302)
- [#292: design new landing view hero section and illustration](https://github.com/blockstack/blockstack.org/issues/292)
|
design
|
design section content design section content mobile desktop reference
| 1
|
27,134
| 4,282,382,290
|
IssuesEvent
|
2016-07-15 08:55:23
|
e-government-ua/i
|
https://api.github.com/repos/e-government-ua/i
|
closed
|
Ошибка в разделе Документы, если у пользователя еще нет документов
|
bug test _central-js
|
На боевом сервере при переходе в раздел Документы от имени пользователя, у которого еще нет документов вылазит ошибка.

В консоли на локальном фронт-енде лог примерно такой:
```
GET /app/documents/index.html 200 5ms
GET /auth/isAuthenticated 200 1ms
GET /auth/isAuthenticated 200 1ms
GET /app/documents/user/index.html 200 3ms - 261b
GET /api/user/fio 304 1ms
GET /api/user/fio 304 1ms
GET /%7B%7Bads.image%7D%7D 304 13ms
GET /%7B%7Bads.image%7D%7D 304 13ms
GET /auth/isAuthenticated 200 12ms
GET /auth/isAuthenticated 200 12ms
REQUEST { url: 'https://test.igov.org.ua/wf/service/document/getDocuments',
auth: { username: 'activiti-master', password: 'UjhtJnEvf!' },
qs: { nID_Subject: 79367 },
callback: [Function] }
REQUEST { url: 'https://test.igov.org.ua/wf/service/document/getDocumentTypes',
auth: { username: 'activiti-master', password: 'UjhtJnEvf!' },
qs: { nID_Subject: 79367 },
callback: [Function] }
REQUEST make request https://test.igov.org.ua/wf/service/document/getDocuments?nID_Subject=79367
REQUEST make request https://test.igov.org.ua/wf/service/document/getDocumentTypes?nID_Subject=79367
REQUEST onRequestResponse https://test.igov.org.ua/wf/service/document/getDocuments?nID_Subject=79367 200 { server: 'nginx/1.9.5',
date: 'Fri, 08 Jul 2016 10:08:06 GMT',
'content-type': 'application/json;charset=UTF-8',
'content-length': '2',
connection: 'close' }
REQUEST reading response's body
REQUEST finish init function https://test.igov.org.ua/wf/service/document/getDocuments?nID_Subject=79367
REQUEST response end https://test.igov.org.ua/wf/service/document/getDocuments?nID_Subject=79367 200 { server: 'nginx/1.9.5',
date: 'Fri, 08 Jul 2016 10:08:06 GMT',
'content-type': 'application/json;charset=UTF-8',
'content-length': '2',
connection: 'close' }
REQUEST end event https://test.igov.org.ua/wf/service/document/getDocuments?nID_Subject=79367
REQUEST has body https://test.igov.org.ua/wf/service/document/getDocuments?nID_Subject=79367 2
REQUEST emitting complete https://test.igov.org.ua/wf/service/document/getDocuments?nID_Subject=79367
GET /api/documents 200 332ms - 2b
GET /api/documents 200 332ms - 2b
REQUEST onRequestResponse https://test.igov.org.ua/wf/service/document/getDocumentTypes?nID_Subject=79367 200 { server: 'nginx/1.9.5',
date: 'Fri, 08 Jul 2016 10:08:06 GMT',
'content-type': 'application/json;charset=UTF-8',
'content-length': '464',
connection: 'close' }
REQUEST reading response's body
REQUEST finish init function https://test.igov.org.ua/wf/service/document/getDocumentTypes?nID_Subject=79367
REQUEST response end https://test.igov.org.ua/wf/service/document/getDocumentTypes?nID_Subject=79367 200 { server: 'nginx/1.9.5',
date: 'Fri, 08 Jul 2016 10:08:06 GMT',
'content-type': 'application/json;charset=UTF-8',
'content-length': '464',
connection: 'close' }
REQUEST end event https://test.igov.org.ua/wf/service/document/getDocumentTypes?nID_Subject=79367
REQUEST has body https://test.igov.org.ua/wf/service/document/getDocumentTypes?nID_Subject=79367 464
REQUEST emitting complete https://test.igov.org.ua/wf/service/document/getDocumentTypes?nID_Subject=79367
GET /api/documents/search/getDocumentTypes 200 336ms - 464b
GET /api/documents/search/getDocumentTypes 200 336ms - 464b
REQUEST { url: 'https://bankid.privatbank.ua/ResourceService/checked/data',
headers:
{ 'Content-Type': 'application/json',
Authorization: 'Bearer 39fb4dd0-8feb-4daa-a79b-353da8c03896, Id testIgov',
Accept: 'application/json' },
json: true,
body:
{ type: 'physical',
fields:
[ 'firstName',
'middleName',
'lastName',
'phone',
'inn',
'clId',
'clIdText',
'birthDay' ],
scans: [ [Object], [Object] ] },
callback: [Function],
method: 'POST' }
REQUEST make request https://bankid.privatbank.ua/ResourceService/checked/data
REQUEST onRequestResponse https://bankid.privatbank.ua/ResourceService/checked/data 200 { server: 'nginx',
date: 'Fri, 08 Jul 2016 10:08:08 GMT',
'content-type': 'application/json;charset=UTF-8',
'content-length': '588',
connection: 'close',
'cache-control': 'no-cache, no-store, max-age=0, must-revalidate',
pragma: 'no-cache',
expires: '0',
'strict-transport-security': 'max-age=31536000 ; includeSubDomains',
'x-content-type-options': 'nosniff',
'x-frame-options': 'DENY',
'x-xss-protection': '1; mode=block',
'access-control-allow-origin': '*',
'access-control-allow-headers': 'Authorization, content-type',
'access-control-allow-methods': 'GET, OPTIONS, POST',
'access-control-allow-credentials': 'true' }
REQUEST reading response's body
REQUEST finish init function https://bankid.privatbank.ua/ResourceService/checked/data
REQUEST response end https://bankid.privatbank.ua/ResourceService/checked/data 200 { server: 'nginx',
date: 'Fri, 08 Jul 2016 10:08:08 GMT',
'content-type': 'application/json;charset=UTF-8',
'content-length': '588',
connection: 'close',
'cache-control': 'no-cache, no-store, max-age=0, must-revalidate',
pragma: 'no-cache',
expires: '0',
'strict-transport-security': 'max-age=31536000 ; includeSubDomains',
'x-content-type-options': 'nosniff',
'x-frame-options': 'DENY',
'x-xss-protection': '1; mode=block',
'access-control-allow-origin': '*',
'access-control-allow-headers': 'Authorization, content-type',
'access-control-allow-methods': 'GET, OPTIONS, POST',
'access-control-allow-credentials': 'true' }
REQUEST end event https://bankid.privatbank.ua/ResourceService/checked/data
REQUEST has body https://bankid.privatbank.ua/ResourceService/checked/data 588
REQUEST emitting complete https://bankid.privatbank.ua/ResourceService/checked/data
/home/lem8r/bin/iGov/i/central-js/server/api/documents/documents.controller.js:185
bankIDService.scanContentRequest(documentScan.scan.type, documentScan.scan.link, accessToken, function (error, buffer) {
^
TypeError: Cannot read property 'type' of undefined
at uploadScan (/home/lem8r/bin/iGov/i/central-js/server/api/documents/documents.controller.js:185:55)
at async.forEach.req.session.documents.uploaded (/home/lem8r/bin/iGov/i/central-js/server/api/documents/documents.controller.js:222:9)
at /home/lem8r/bin/iGov/i/central-js/node_modules/async/lib/async.js:162:20
at /home/lem8r/bin/iGov/i/central-js/node_modules/async/lib/async.js:230:13
at _arrayEach (/home/lem8r/bin/iGov/i/central-js/node_modules/async/lib/async.js:81:9)
at _each (/home/lem8r/bin/iGov/i/central-js/node_modules/async/lib/async.js:72:13)
at Object.async.forEachOf.async.eachOf (/home/lem8r/bin/iGov/i/central-js/node_modules/async/lib/async.js:229:9)
at Object.async.forEach.async.each (/home/lem8r/bin/iGov/i/central-js/node_modules/async/lib/async.js:206:22)
at doAsyncScansUpload (/home/lem8r/bin/iGov/i/central-js/server/api/documents/documents.controller.js:219:11)
at scansCallback (/home/lem8r/bin/iGov/i/central-js/server/api/documents/documents.controller.js:244:11)
```
|
1.0
|
Ошибка в разделе Документы, если у пользователя еще нет документов - На боевом сервере при переходе в раздел Документы от имени пользователя, у которого еще нет документов вылазит ошибка.

В консоли на локальном фронт-енде лог примерно такой:
```
GET /app/documents/index.html 200 5ms
GET /auth/isAuthenticated 200 1ms
GET /auth/isAuthenticated 200 1ms
GET /app/documents/user/index.html 200 3ms - 261b
GET /api/user/fio 304 1ms
GET /api/user/fio 304 1ms
GET /%7B%7Bads.image%7D%7D 304 13ms
GET /%7B%7Bads.image%7D%7D 304 13ms
GET /auth/isAuthenticated 200 12ms
GET /auth/isAuthenticated 200 12ms
REQUEST { url: 'https://test.igov.org.ua/wf/service/document/getDocuments',
auth: { username: 'activiti-master', password: 'UjhtJnEvf!' },
qs: { nID_Subject: 79367 },
callback: [Function] }
REQUEST { url: 'https://test.igov.org.ua/wf/service/document/getDocumentTypes',
auth: { username: 'activiti-master', password: 'UjhtJnEvf!' },
qs: { nID_Subject: 79367 },
callback: [Function] }
REQUEST make request https://test.igov.org.ua/wf/service/document/getDocuments?nID_Subject=79367
REQUEST make request https://test.igov.org.ua/wf/service/document/getDocumentTypes?nID_Subject=79367
REQUEST onRequestResponse https://test.igov.org.ua/wf/service/document/getDocuments?nID_Subject=79367 200 { server: 'nginx/1.9.5',
date: 'Fri, 08 Jul 2016 10:08:06 GMT',
'content-type': 'application/json;charset=UTF-8',
'content-length': '2',
connection: 'close' }
REQUEST reading response's body
REQUEST finish init function https://test.igov.org.ua/wf/service/document/getDocuments?nID_Subject=79367
REQUEST response end https://test.igov.org.ua/wf/service/document/getDocuments?nID_Subject=79367 200 { server: 'nginx/1.9.5',
date: 'Fri, 08 Jul 2016 10:08:06 GMT',
'content-type': 'application/json;charset=UTF-8',
'content-length': '2',
connection: 'close' }
REQUEST end event https://test.igov.org.ua/wf/service/document/getDocuments?nID_Subject=79367
REQUEST has body https://test.igov.org.ua/wf/service/document/getDocuments?nID_Subject=79367 2
REQUEST emitting complete https://test.igov.org.ua/wf/service/document/getDocuments?nID_Subject=79367
GET /api/documents 200 332ms - 2b
GET /api/documents 200 332ms - 2b
REQUEST onRequestResponse https://test.igov.org.ua/wf/service/document/getDocumentTypes?nID_Subject=79367 200 { server: 'nginx/1.9.5',
date: 'Fri, 08 Jul 2016 10:08:06 GMT',
'content-type': 'application/json;charset=UTF-8',
'content-length': '464',
connection: 'close' }
REQUEST reading response's body
REQUEST finish init function https://test.igov.org.ua/wf/service/document/getDocumentTypes?nID_Subject=79367
REQUEST response end https://test.igov.org.ua/wf/service/document/getDocumentTypes?nID_Subject=79367 200 { server: 'nginx/1.9.5',
date: 'Fri, 08 Jul 2016 10:08:06 GMT',
'content-type': 'application/json;charset=UTF-8',
'content-length': '464',
connection: 'close' }
REQUEST end event https://test.igov.org.ua/wf/service/document/getDocumentTypes?nID_Subject=79367
REQUEST has body https://test.igov.org.ua/wf/service/document/getDocumentTypes?nID_Subject=79367 464
REQUEST emitting complete https://test.igov.org.ua/wf/service/document/getDocumentTypes?nID_Subject=79367
GET /api/documents/search/getDocumentTypes 200 336ms - 464b
GET /api/documents/search/getDocumentTypes 200 336ms - 464b
REQUEST { url: 'https://bankid.privatbank.ua/ResourceService/checked/data',
headers:
{ 'Content-Type': 'application/json',
Authorization: 'Bearer 39fb4dd0-8feb-4daa-a79b-353da8c03896, Id testIgov',
Accept: 'application/json' },
json: true,
body:
{ type: 'physical',
fields:
[ 'firstName',
'middleName',
'lastName',
'phone',
'inn',
'clId',
'clIdText',
'birthDay' ],
scans: [ [Object], [Object] ] },
callback: [Function],
method: 'POST' }
REQUEST make request https://bankid.privatbank.ua/ResourceService/checked/data
REQUEST onRequestResponse https://bankid.privatbank.ua/ResourceService/checked/data 200 { server: 'nginx',
date: 'Fri, 08 Jul 2016 10:08:08 GMT',
'content-type': 'application/json;charset=UTF-8',
'content-length': '588',
connection: 'close',
'cache-control': 'no-cache, no-store, max-age=0, must-revalidate',
pragma: 'no-cache',
expires: '0',
'strict-transport-security': 'max-age=31536000 ; includeSubDomains',
'x-content-type-options': 'nosniff',
'x-frame-options': 'DENY',
'x-xss-protection': '1; mode=block',
'access-control-allow-origin': '*',
'access-control-allow-headers': 'Authorization, content-type',
'access-control-allow-methods': 'GET, OPTIONS, POST',
'access-control-allow-credentials': 'true' }
REQUEST reading response's body
REQUEST finish init function https://bankid.privatbank.ua/ResourceService/checked/data
REQUEST response end https://bankid.privatbank.ua/ResourceService/checked/data 200 { server: 'nginx',
date: 'Fri, 08 Jul 2016 10:08:08 GMT',
'content-type': 'application/json;charset=UTF-8',
'content-length': '588',
connection: 'close',
'cache-control': 'no-cache, no-store, max-age=0, must-revalidate',
pragma: 'no-cache',
expires: '0',
'strict-transport-security': 'max-age=31536000 ; includeSubDomains',
'x-content-type-options': 'nosniff',
'x-frame-options': 'DENY',
'x-xss-protection': '1; mode=block',
'access-control-allow-origin': '*',
'access-control-allow-headers': 'Authorization, content-type',
'access-control-allow-methods': 'GET, OPTIONS, POST',
'access-control-allow-credentials': 'true' }
REQUEST end event https://bankid.privatbank.ua/ResourceService/checked/data
REQUEST has body https://bankid.privatbank.ua/ResourceService/checked/data 588
REQUEST emitting complete https://bankid.privatbank.ua/ResourceService/checked/data
/home/lem8r/bin/iGov/i/central-js/server/api/documents/documents.controller.js:185
bankIDService.scanContentRequest(documentScan.scan.type, documentScan.scan.link, accessToken, function (error, buffer) {
^
TypeError: Cannot read property 'type' of undefined
at uploadScan (/home/lem8r/bin/iGov/i/central-js/server/api/documents/documents.controller.js:185:55)
at async.forEach.req.session.documents.uploaded (/home/lem8r/bin/iGov/i/central-js/server/api/documents/documents.controller.js:222:9)
at /home/lem8r/bin/iGov/i/central-js/node_modules/async/lib/async.js:162:20
at /home/lem8r/bin/iGov/i/central-js/node_modules/async/lib/async.js:230:13
at _arrayEach (/home/lem8r/bin/iGov/i/central-js/node_modules/async/lib/async.js:81:9)
at _each (/home/lem8r/bin/iGov/i/central-js/node_modules/async/lib/async.js:72:13)
at Object.async.forEachOf.async.eachOf (/home/lem8r/bin/iGov/i/central-js/node_modules/async/lib/async.js:229:9)
at Object.async.forEach.async.each (/home/lem8r/bin/iGov/i/central-js/node_modules/async/lib/async.js:206:22)
at doAsyncScansUpload (/home/lem8r/bin/iGov/i/central-js/server/api/documents/documents.controller.js:219:11)
at scansCallback (/home/lem8r/bin/iGov/i/central-js/server/api/documents/documents.controller.js:244:11)
```
|
non_design
|
ошибка в разделе документы если у пользователя еще нет документов на боевом сервере при переходе в раздел документы от имени пользователя у которого еще нет документов вылазит ошибка в консоли на локальном фронт енде лог примерно такой get app documents index html get auth isauthenticated get auth isauthenticated get app documents user index html get api user fio get api user fio get image get image get auth isauthenticated get auth isauthenticated request url auth username activiti master password ujhtjnevf qs nid subject callback request url auth username activiti master password ujhtjnevf qs nid subject callback request make request request make request request onrequestresponse server nginx date fri jul gmt content type application json charset utf content length connection close request reading response s body request finish init function request response end server nginx date fri jul gmt content type application json charset utf content length connection close request end event request has body request emitting complete get api documents get api documents request onrequestresponse server nginx date fri jul gmt content type application json charset utf content length connection close request reading response s body request finish init function request response end server nginx date fri jul gmt content type application json charset utf content length connection close request end event request has body request emitting complete get api documents search getdocumenttypes get api documents search getdocumenttypes request url headers content type application json authorization bearer id testigov accept application json json true body type physical fields firstname middlename lastname phone inn clid clidtext birthday scans callback method post request make request request onrequestresponse server nginx date fri jul gmt content type application json charset utf content length connection close cache control no cache no store max age must revalidate pragma no cache expires strict transport security max age includesubdomains x content type options nosniff x frame options deny x xss protection mode block access control allow origin access control allow headers authorization content type access control allow methods get options post access control allow credentials true request reading response s body request finish init function request response end server nginx date fri jul gmt content type application json charset utf content length connection close cache control no cache no store max age must revalidate pragma no cache expires strict transport security max age includesubdomains x content type options nosniff x frame options deny x xss protection mode block access control allow origin access control allow headers authorization content type access control allow methods get options post access control allow credentials true request end event request has body request emitting complete home bin igov i central js server api documents documents controller js bankidservice scancontentrequest documentscan scan type documentscan scan link accesstoken function error buffer typeerror cannot read property type of undefined at uploadscan home bin igov i central js server api documents documents controller js at async foreach req session documents uploaded home bin igov i central js server api documents documents controller js at home bin igov i central js node modules async lib async js at home bin igov i central js node modules async lib async js at arrayeach home bin igov i central js node modules async lib async js at each home bin igov i central js node modules async lib async js at object async foreachof async eachof home bin igov i central js node modules async lib async js at object async foreach async each home bin igov i central js node modules async lib async js at doasyncscansupload home bin igov i central js server api documents documents controller js at scanscallback home bin igov i central js server api documents documents controller js
| 0
|
28,796
| 4,119,691,112
|
IssuesEvent
|
2016-06-08 15:34:31
|
owncloud/core
|
https://api.github.com/repos/owncloud/core
|
closed
|
Tooltip in federated sharing is not showing the full url.
|
bug design in progress sev4-low
|
### Steps to reproduce
Having admin in serverA and admin in serverB
1. Share a file from admin@serverA with admin@serverB.
2. In ServerB accept the share.
3. In ServerA open the sidebar of the shared file and hover the shared name
### Expected behaviour
Tooltip shows full url.
### Actual behaviour
Tooltip shows the same information.

### Server configuration
**Operating system**:
Ubuntu 14.04
**Web server:**
Apache
**Database:**
MySQL
**PHP version:**
5.5.9
**ownCloud version:** (see ownCloud admin page)
{"installed":true,"maintenance":false,"version":"9.0.0.13","versionstring":"9.0.0 beta 2","edition":"Enterprise"}
**Updated from an older ownCloud or fresh install:**
Fresh
**The content of config/config.php:**
```
```
**Are you using external storage, if yes which one:** local/smb/sftp/...
No.
**Are you using encryption:**
No
**Logs**
```
```
### Client configuration
**browser**
Chrome
|
1.0
|
Tooltip in federated sharing is not showing the full url. - ### Steps to reproduce
Having admin in serverA and admin in serverB
1. Share a file from admin@serverA with admin@serverB.
2. In ServerB accept the share.
3. In ServerA open the sidebar of the shared file and hover the shared name
### Expected behaviour
Tooltip shows full url.
### Actual behaviour
Tooltip shows the same information.

### Server configuration
**Operating system**:
Ubuntu 14.04
**Web server:**
Apache
**Database:**
MySQL
**PHP version:**
5.5.9
**ownCloud version:** (see ownCloud admin page)
{"installed":true,"maintenance":false,"version":"9.0.0.13","versionstring":"9.0.0 beta 2","edition":"Enterprise"}
**Updated from an older ownCloud or fresh install:**
Fresh
**The content of config/config.php:**
```
```
**Are you using external storage, if yes which one:** local/smb/sftp/...
No.
**Are you using encryption:**
No
**Logs**
```
```
### Client configuration
**browser**
Chrome
|
design
|
tooltip in federated sharing is not showing the full url steps to reproduce having admin in servera and admin in serverb share a file from admin servera with admin serverb in serverb accept the share in servera open the sidebar of the shared file and hover the shared name expected behaviour tooltip shows full url actual behaviour tooltip shows the same information server configuration operating system ubuntu web server apache database mysql php version owncloud version see owncloud admin page installed true maintenance false version versionstring beta edition enterprise updated from an older owncloud or fresh install fresh the content of config config php are you using external storage if yes which one local smb sftp no are you using encryption no logs client configuration browser chrome
| 1
|
100,318
| 12,514,717,002
|
IssuesEvent
|
2020-06-03 06:05:11
|
JeschkeLab/DeerLab
|
https://api.github.com/repos/JeschkeLab/DeerLab
|
opened
|
Built-in models information interface
|
design
|
All parametric models in DeerLab when called without inputs return a ``info`` structure which contains the essentials (start values, boundaries, parameter names,...) needed to setup optimization with built-in models and constraints.
### Structure
At the moment `info` looks like this, e.g. for the `dd_gauss` model it is defined as:
```` matlab
info.model = 'Single Gaussian distribution';
info.nparam = nParam;
info.parameters(1).name = 'Center r0';
info.parameters(1).range = [1 20];
info.parameters(1).default = 3.5;
info.parameters(1).units = 'nm';
info.parameters(2).name = 'FWHM w';
info.parameters(2).range = [0.2 5];
info.parameters(2).default = 0.5;
info.parameters(2).units = 'nm';
````
and calling the model function returns
````
struct with fields:
model: 'Single Gaussian distribution'
nparam: 2
parameters: [1×2 struct]
````
While it is a simple data type, extracting the information on the parameters is cumbersome, since for each parameter there is an associated nested structure:
````
1×2 struct array with fields:
name
range
default
units
````
First there is no clear oversight of the parameters due to the nested nature of these structures. Second, extracting the different default values, ranges, and so on for all parameters is cumbersome:
````matlab
info = dd_gauss();
% Get array of start values
par0 = [info.parameters(:).default];
% Get lower/upper bounds
ranges = [info.parameters(:).range];
upper = ranges(2:2:end);
lower = ranges(1:2:end-1);
````
Here I propose an alternative interface.
### Tables
This data fundamental data type from MATLAB provides an interesting candidate for the interface of these models. A table for the `dd_gauss` can be defined similarly as above:
````matlab
structInfo(1,1).Index = 1;
structInfo(1,1).Parameter = 'Center r0';
structInfo(1,1).Units = 'nm';
structInfo(1,1).Start = 3.5;
structInfo(1,1).Upper = 20;
structInfo(1,1).Lower = 1;
structInfo(2,1).Index = 2;
structInfo(2,1).Parameter = 'FWHM w';
structInfo(2,1).Units = 'nm';
structInfo(2,1).Start = 0.5;
structInfo(2,1).Upper = 0.2;
structInfo(2,1).Lower = 5;
info = struct2table(structInfo);
````
but now calling the model function returns a full (and well formatted) table with the full summary of the model parameters:
````
info =
2×6 table
Index Parameter Units Start Upper Lower
_____ _____________ ______ _____ _____ _____
1 {'Center r0'} {'nm'} 3.5 20 1
2 {'FWHM w' } {'nm'} 0.5 0.2 5
````
The retrieval of information would also be largely simplified. For example to reproduce the code above to retrieve the start, upper and lower bound values we need:
````matlab
par0 = info.Start;
lower = info.Lower;
upper = info.Upper;
````
The main difference is that the additional fields `nparam` and `model`, containing the number of parameters and model name cannot be included in the table. The loss of `nparam` is irrelevant as it can be obtained from the number of rows, but the model name cannot be hard-coded into the table.
Therefore, tables appear to be a potential candidate for this interface. Although I would need more thought before implementing this.
|
1.0
|
Built-in models information interface - All parametric models in DeerLab when called without inputs return a ``info`` structure which contains the essentials (start values, boundaries, parameter names,...) needed to setup optimization with built-in models and constraints.
### Structure
At the moment `info` looks like this, e.g. for the `dd_gauss` model it is defined as:
```` matlab
info.model = 'Single Gaussian distribution';
info.nparam = nParam;
info.parameters(1).name = 'Center r0';
info.parameters(1).range = [1 20];
info.parameters(1).default = 3.5;
info.parameters(1).units = 'nm';
info.parameters(2).name = 'FWHM w';
info.parameters(2).range = [0.2 5];
info.parameters(2).default = 0.5;
info.parameters(2).units = 'nm';
````
and calling the model function returns
````
struct with fields:
model: 'Single Gaussian distribution'
nparam: 2
parameters: [1×2 struct]
````
While it is a simple data type, extracting the information on the parameters is cumbersome, since for each parameter there is an associated nested structure:
````
1×2 struct array with fields:
name
range
default
units
````
First there is no clear oversight of the parameters due to the nested nature of these structures. Second, extracting the different default values, ranges, and so on for all parameters is cumbersome:
````matlab
info = dd_gauss();
% Get array of start values
par0 = [info.parameters(:).default];
% Get lower/upper bounds
ranges = [info.parameters(:).range];
upper = ranges(2:2:end);
lower = ranges(1:2:end-1);
````
Here I propose an alternative interface.
### Tables
This data fundamental data type from MATLAB provides an interesting candidate for the interface of these models. A table for the `dd_gauss` can be defined similarly as above:
````matlab
structInfo(1,1).Index = 1;
structInfo(1,1).Parameter = 'Center r0';
structInfo(1,1).Units = 'nm';
structInfo(1,1).Start = 3.5;
structInfo(1,1).Upper = 20;
structInfo(1,1).Lower = 1;
structInfo(2,1).Index = 2;
structInfo(2,1).Parameter = 'FWHM w';
structInfo(2,1).Units = 'nm';
structInfo(2,1).Start = 0.5;
structInfo(2,1).Upper = 0.2;
structInfo(2,1).Lower = 5;
info = struct2table(structInfo);
````
but now calling the model function returns a full (and well formatted) table with the full summary of the model parameters:
````
info =
2×6 table
Index Parameter Units Start Upper Lower
_____ _____________ ______ _____ _____ _____
1 {'Center r0'} {'nm'} 3.5 20 1
2 {'FWHM w' } {'nm'} 0.5 0.2 5
````
The retrieval of information would also be largely simplified. For example to reproduce the code above to retrieve the start, upper and lower bound values we need:
````matlab
par0 = info.Start;
lower = info.Lower;
upper = info.Upper;
````
The main difference is that the additional fields `nparam` and `model`, containing the number of parameters and model name cannot be included in the table. The loss of `nparam` is irrelevant as it can be obtained from the number of rows, but the model name cannot be hard-coded into the table.
Therefore, tables appear to be a potential candidate for this interface. Although I would need more thought before implementing this.
|
design
|
built in models information interface all parametric models in deerlab when called without inputs return a info structure which contains the essentials start values boundaries parameter names needed to setup optimization with built in models and constraints structure at the moment info looks like this e g for the dd gauss model it is defined as matlab info model single gaussian distribution info nparam nparam info parameters name center info parameters range info parameters default info parameters units nm info parameters name fwhm w info parameters range info parameters default info parameters units nm and calling the model function returns struct with fields model single gaussian distribution nparam parameters while it is a simple data type extracting the information on the parameters is cumbersome since for each parameter there is an associated nested structure × struct array with fields name range default units first there is no clear oversight of the parameters due to the nested nature of these structures second extracting the different default values ranges and so on for all parameters is cumbersome matlab info dd gauss get array of start values get lower upper bounds ranges upper ranges end lower ranges end here i propose an alternative interface tables this data fundamental data type from matlab provides an interesting candidate for the interface of these models a table for the dd gauss can be defined similarly as above matlab structinfo index structinfo parameter center structinfo units nm structinfo start structinfo upper structinfo lower structinfo index structinfo parameter fwhm w structinfo units nm structinfo start structinfo upper structinfo lower info structinfo but now calling the model function returns a full and well formatted table with the full summary of the model parameters info × table index parameter units start upper lower center nm fwhm w nm the retrieval of information would also be largely simplified for example to reproduce the code above to retrieve the start upper and lower bound values we need matlab info start lower info lower upper info upper the main difference is that the additional fields nparam and model containing the number of parameters and model name cannot be included in the table the loss of nparam is irrelevant as it can be obtained from the number of rows but the model name cannot be hard coded into the table therefore tables appear to be a potential candidate for this interface although i would need more thought before implementing this
| 1
|
173,779
| 27,523,001,069
|
IssuesEvent
|
2023-03-06 16:10:07
|
department-of-veterans-affairs/va.gov-team
|
https://api.github.com/repos/department-of-veterans-affairs/va.gov-team
|
closed
|
Release to Production
|
frontend design product ux HCE-Checkin
|
## ENGINEERING TASKS
- [x] Merge code to main branch (or flip the feature flag) on day of release
- [x] Conduct prod or staging validation, if necessary
- [ ] Needed
- [ ] Not needed
## RESEARCH TASKS
- [x] Push updated Product Guides to Git, if necessary
## DESIGN TASKS
- [x] Merge final wireframes to Abstract main branch, if necessary
- [x] Merge Sketch files to VA Sketch cloud, if necessary
## PRODUCT TASKS
- [x] Create release notes [here](https://github.com/department-of-veterans-affairs/va.gov-team/blob/master/products/health-care/checkin/release-plan/check-in-release-notes.md)
- [x] Remove corresponding entry from the [Planned Releases page](https://github.com/department-of-veterans-affairs/va.gov-team/blob/master/products/health-care/checkin/release-plan/check-in-planned-releases.md)
- [x] Send release notification via slack in the [check-in-expreience](https://dsva.slack.com/archives/C022AC2STBM) channel
- Text = "Modernized Check-in Production Release on <date>. Release notes can be found here"
- Link = include link to the release notes for the date of the production release
- Call-outs = include call outs to
- Stephen Barrs
- Patrick Bateman
- Shawn Adams
- Jason Woodman
- [x] Send release notification via VA email
- Text = "Modernized Check-in Production Release on <date>. Release notes can be found here"
- Link = include link to the release notes for the date of the production release
- Send email to
- Stephen Barrs
- Patrick Bateman
- Shawn Adams
- Jason Woodman
- Dore Mobley (not in slack)
|
1.0
|
Release to Production - ## ENGINEERING TASKS
- [x] Merge code to main branch (or flip the feature flag) on day of release
- [x] Conduct prod or staging validation, if necessary
- [ ] Needed
- [ ] Not needed
## RESEARCH TASKS
- [x] Push updated Product Guides to Git, if necessary
## DESIGN TASKS
- [x] Merge final wireframes to Abstract main branch, if necessary
- [x] Merge Sketch files to VA Sketch cloud, if necessary
## PRODUCT TASKS
- [x] Create release notes [here](https://github.com/department-of-veterans-affairs/va.gov-team/blob/master/products/health-care/checkin/release-plan/check-in-release-notes.md)
- [x] Remove corresponding entry from the [Planned Releases page](https://github.com/department-of-veterans-affairs/va.gov-team/blob/master/products/health-care/checkin/release-plan/check-in-planned-releases.md)
- [x] Send release notification via slack in the [check-in-expreience](https://dsva.slack.com/archives/C022AC2STBM) channel
- Text = "Modernized Check-in Production Release on <date>. Release notes can be found here"
- Link = include link to the release notes for the date of the production release
- Call-outs = include call outs to
- Stephen Barrs
- Patrick Bateman
- Shawn Adams
- Jason Woodman
- [x] Send release notification via VA email
- Text = "Modernized Check-in Production Release on <date>. Release notes can be found here"
- Link = include link to the release notes for the date of the production release
- Send email to
- Stephen Barrs
- Patrick Bateman
- Shawn Adams
- Jason Woodman
- Dore Mobley (not in slack)
|
design
|
release to production engineering tasks merge code to main branch or flip the feature flag on day of release conduct prod or staging validation if necessary needed not needed research tasks push updated product guides to git if necessary design tasks merge final wireframes to abstract main branch if necessary merge sketch files to va sketch cloud if necessary product tasks create release notes remove corresponding entry from the send release notification via slack in the channel text modernized check in production release on release notes can be found here link include link to the release notes for the date of the production release call outs include call outs to stephen barrs patrick bateman shawn adams jason woodman send release notification via va email text modernized check in production release on release notes can be found here link include link to the release notes for the date of the production release send email to stephen barrs patrick bateman shawn adams jason woodman dore mobley not in slack
| 1
|
129,634
| 17,851,577,838
|
IssuesEvent
|
2021-09-04 06:44:59
|
SuperHouse/OXRS
|
https://api.github.com/repos/SuperHouse/OXRS
|
closed
|
Adding maker designator
|
request maker designator
|
Was hoping to add maker designator for Austin's Creations (AC)
In relation to this page: [https://oxrs.io/glossary/makers.html](https://oxrs.io/glossary/makers.html)
I do have a terribly outdated website: [austinscreations.ca](https://www.austinscreations.ca/)
most of my work is posted on Instagram, and sometimes cross posted to twitter
|
1.0
|
Adding maker designator - Was hoping to add maker designator for Austin's Creations (AC)
In relation to this page: [https://oxrs.io/glossary/makers.html](https://oxrs.io/glossary/makers.html)
I do have a terribly outdated website: [austinscreations.ca](https://www.austinscreations.ca/)
most of my work is posted on Instagram, and sometimes cross posted to twitter
|
design
|
adding maker designator was hoping to add maker designator for austin s creations ac in relation to this page i do have a terribly outdated website most of my work is posted on instagram and sometimes cross posted to twitter
| 1
|
171,284
| 27,091,391,166
|
IssuesEvent
|
2023-02-14 21:24:27
|
department-of-veterans-affairs/vets-design-system-documentation
|
https://api.github.com/repos/department-of-veterans-affairs/vets-design-system-documentation
|
opened
|
Experimental Design - Link - Active variation and Modal variation
|
vsp-design-system-team experimental_design
|
## What
Proposing an additional Link - Active variation and a new Modal variation.
## Purpose
VFS teams have a need to use primary links in modals instead of primary buttons and sometimes alongside secondary buttons. This creates some visual problems with the primary action not having visual prominence.
* We don't have a solution for this issue in Modals, Cards, and potentially other components that we haven't discovered yet in the Design System. Thus teams generally look to me in CollabCycle to tell them what to do. I've been deciding case-by-case which is problematic for consistency.
* Because of the above this issue comes up A LOT which distracts from catching potentially bigger problems in our design reviews
Martha, Josh, Brian, and I met to discuss this and worked through iterations until we agreed on a design.
## Usage
This new Link - Active variation would be used in Modals and could supersede the experimental design request Josh put forward:
https://github.com/department-of-veterans-affairs/vets-design-system-documentation/issues/1459
## Behavior
* The Link - Active variation would be a more visual prominent link style that could be used in content-heavy pages or alongside a secondary button or other form component as it is the same height as those components.
* The modal variation would handle the use case where the primary action needs to be a link instead of a button.
## Examples


## Accessibility
Brian wrote up a document: https://docs.google.com/document/d/1E-YENpg4NExqEgq8MmpJZrRhPpFFmGFT4tsJ53inmGE/edit#heading=h.mvclr4w8v9j7
## Guidance
I'll be the one writing the guidance so I'll get to that when I get to it.
## Research (optional)
We'd add this as Use with Caution variations.
## Code (optional)
No existing code
## Next steps
I'd like to bring this to DSC on 3/3/23.
|
2.0
|
Experimental Design - Link - Active variation and Modal variation - ## What
Proposing an additional Link - Active variation and a new Modal variation.
## Purpose
VFS teams have a need to use primary links in modals instead of primary buttons and sometimes alongside secondary buttons. This creates some visual problems with the primary action not having visual prominence.
* We don't have a solution for this issue in Modals, Cards, and potentially other components that we haven't discovered yet in the Design System. Thus teams generally look to me in CollabCycle to tell them what to do. I've been deciding case-by-case which is problematic for consistency.
* Because of the above this issue comes up A LOT which distracts from catching potentially bigger problems in our design reviews
Martha, Josh, Brian, and I met to discuss this and worked through iterations until we agreed on a design.
## Usage
This new Link - Active variation would be used in Modals and could supersede the experimental design request Josh put forward:
https://github.com/department-of-veterans-affairs/vets-design-system-documentation/issues/1459
## Behavior
* The Link - Active variation would be a more visual prominent link style that could be used in content-heavy pages or alongside a secondary button or other form component as it is the same height as those components.
* The modal variation would handle the use case where the primary action needs to be a link instead of a button.
## Examples


## Accessibility
Brian wrote up a document: https://docs.google.com/document/d/1E-YENpg4NExqEgq8MmpJZrRhPpFFmGFT4tsJ53inmGE/edit#heading=h.mvclr4w8v9j7
## Guidance
I'll be the one writing the guidance so I'll get to that when I get to it.
## Research (optional)
We'd add this as Use with Caution variations.
## Code (optional)
No existing code
## Next steps
I'd like to bring this to DSC on 3/3/23.
|
design
|
experimental design link active variation and modal variation what proposing an additional link active variation and a new modal variation purpose vfs teams have a need to use primary links in modals instead of primary buttons and sometimes alongside secondary buttons this creates some visual problems with the primary action not having visual prominence we don t have a solution for this issue in modals cards and potentially other components that we haven t discovered yet in the design system thus teams generally look to me in collabcycle to tell them what to do i ve been deciding case by case which is problematic for consistency because of the above this issue comes up a lot which distracts from catching potentially bigger problems in our design reviews martha josh brian and i met to discuss this and worked through iterations until we agreed on a design usage this new link active variation would be used in modals and could supersede the experimental design request josh put forward behavior the link active variation would be a more visual prominent link style that could be used in content heavy pages or alongside a secondary button or other form component as it is the same height as those components the modal variation would handle the use case where the primary action needs to be a link instead of a button examples accessibility brian wrote up a document guidance i ll be the one writing the guidance so i ll get to that when i get to it research optional we d add this as use with caution variations code optional no existing code next steps i d like to bring this to dsc on
| 1
|
403,159
| 27,403,052,255
|
IssuesEvent
|
2023-03-01 03:11:53
|
flathub/cc.arduino.IDE2
|
https://api.github.com/repos/flathub/cc.arduino.IDE2
|
closed
|
READ FIRST: NOTICE ABOUT ISSUES
|
documentation
|
The Flathub release is an 3rd party wrapper maintained by the community and is not an officially supported method of installing the IDE.
This does **not** mean that I (the current maintainer) and the Arduino Dev's are not interested in your issues.
If you experience **any** issues with the IDE please report them here first so that I can determine if this is a flatpak issue or an IDE issue and pass it onto the Arduino Devs.
Alternatively you can download an officially supported version of the IDE at https://www.arduino.cc/en/software and test to see if the issue is a flatpak issue yourself or if it truly is an IDE issue.
If your issue is a genuine IDE issue then please report it at: https://github.com/arduino/arduino-ide/issues/
If your issue is a flatpak specific issue please report it at: https://github.com/flathub/cc.arduino.IDE2/issues/
Why is it like this?
Well to keep it simple for everyone.
With the flathub release being an unofficial wrapper there is no official support. To ensure that the best support and experience is given having all IDE issues in regards to the flathub release dealt with here first means that the dev teams don't have to deal with issues that were caused by this release.
Furthermore, by having all issues (related to the flathub release) here I don't have to search through the IDE's issues to find misplaced issues meaning that i can respond to your issues much quicker.
Any questions regarding this should be posted here. Any issues should be created here: https://github.com/flathub/cc.arduino.IDE2/issues/
TLDR:
- Check to ensure your issue hasn't been reported at: https://github.com/flathub/cc.arduino.IDE2/issues/
- Report the issue at: https://github.com/flathub/cc.arduino.IDE2/issues/new
|
1.0
|
READ FIRST: NOTICE ABOUT ISSUES - The Flathub release is an 3rd party wrapper maintained by the community and is not an officially supported method of installing the IDE.
This does **not** mean that I (the current maintainer) and the Arduino Dev's are not interested in your issues.
If you experience **any** issues with the IDE please report them here first so that I can determine if this is a flatpak issue or an IDE issue and pass it onto the Arduino Devs.
Alternatively you can download an officially supported version of the IDE at https://www.arduino.cc/en/software and test to see if the issue is a flatpak issue yourself or if it truly is an IDE issue.
If your issue is a genuine IDE issue then please report it at: https://github.com/arduino/arduino-ide/issues/
If your issue is a flatpak specific issue please report it at: https://github.com/flathub/cc.arduino.IDE2/issues/
Why is it like this?
Well to keep it simple for everyone.
With the flathub release being an unofficial wrapper there is no official support. To ensure that the best support and experience is given having all IDE issues in regards to the flathub release dealt with here first means that the dev teams don't have to deal with issues that were caused by this release.
Furthermore, by having all issues (related to the flathub release) here I don't have to search through the IDE's issues to find misplaced issues meaning that i can respond to your issues much quicker.
Any questions regarding this should be posted here. Any issues should be created here: https://github.com/flathub/cc.arduino.IDE2/issues/
TLDR:
- Check to ensure your issue hasn't been reported at: https://github.com/flathub/cc.arduino.IDE2/issues/
- Report the issue at: https://github.com/flathub/cc.arduino.IDE2/issues/new
|
non_design
|
read first notice about issues the flathub release is an party wrapper maintained by the community and is not an officially supported method of installing the ide this does not mean that i the current maintainer and the arduino dev s are not interested in your issues if you experience any issues with the ide please report them here first so that i can determine if this is a flatpak issue or an ide issue and pass it onto the arduino devs alternatively you can download an officially supported version of the ide at and test to see if the issue is a flatpak issue yourself or if it truly is an ide issue if your issue is a genuine ide issue then please report it at if your issue is a flatpak specific issue please report it at why is it like this well to keep it simple for everyone with the flathub release being an unofficial wrapper there is no official support to ensure that the best support and experience is given having all ide issues in regards to the flathub release dealt with here first means that the dev teams don t have to deal with issues that were caused by this release furthermore by having all issues related to the flathub release here i don t have to search through the ide s issues to find misplaced issues meaning that i can respond to your issues much quicker any questions regarding this should be posted here any issues should be created here tldr check to ensure your issue hasn t been reported at report the issue at
| 0
|
49,255
| 13,186,549,484
|
IssuesEvent
|
2020-08-13 00:31:35
|
icecube-trac/tix3
|
https://api.github.com/repos/icecube-trac/tix3
|
opened
|
[simprod-scripts] GenerateAtmosphericNeutrinos bug (Trac #1050)
|
Incomplete Migration Migrated from Trac combo simulation defect
|
<details>
<summary><em>Migrated from <a href="https://code.icecube.wisc.edu/ticket/1050">https://code.icecube.wisc.edu/ticket/1050</a>, reported by david.schultz and owned by olivas</em></summary>
<p>
```json
{
"status": "closed",
"changetime": "2016-03-18T21:14:03",
"description": "The error:\n\n{{{\n File \"/data/user/edvorak/metaprojects/icesim/TRUNK_7_13_15/build/lib/icecube/simprod/segments/GenerateNeutrinos.py\", line 305, in GenerateAtmosphericNeutrinos\n propagators[k] = base_propagators[k]\nTypeError: Invalid index type\n}}}\n\nhttp://code.icecube.wisc.edu/projects/icecube/browser/IceCube/projects/simprod-scripts/trunk/python/segments/GenerateNeutrinos.py#L298\n\nget_propagators() returns a C++ map, which doesn't support the full dict syntax apparently?\n\n{{{\nfor k in base_propagators:\n propagators[k] = base_propagators[k]\n}}}\n\n`k` is apparently not what you think it is. I'm guessing using `.keys()` might solve this, but not sure.\n",
"reporter": "david.schultz",
"cc": "david.schultz, juancarlos",
"resolution": "fixed",
"_ts": "1458335643235016",
"component": "combo simulation",
"summary": "[simprod-scripts] GenerateAtmosphericNeutrinos bug",
"priority": "critical",
"keywords": "",
"time": "2015-07-14T20:12:12",
"milestone": "",
"owner": "olivas",
"type": "defect"
}
```
</p>
</details>
|
1.0
|
[simprod-scripts] GenerateAtmosphericNeutrinos bug (Trac #1050) - <details>
<summary><em>Migrated from <a href="https://code.icecube.wisc.edu/ticket/1050">https://code.icecube.wisc.edu/ticket/1050</a>, reported by david.schultz and owned by olivas</em></summary>
<p>
```json
{
"status": "closed",
"changetime": "2016-03-18T21:14:03",
"description": "The error:\n\n{{{\n File \"/data/user/edvorak/metaprojects/icesim/TRUNK_7_13_15/build/lib/icecube/simprod/segments/GenerateNeutrinos.py\", line 305, in GenerateAtmosphericNeutrinos\n propagators[k] = base_propagators[k]\nTypeError: Invalid index type\n}}}\n\nhttp://code.icecube.wisc.edu/projects/icecube/browser/IceCube/projects/simprod-scripts/trunk/python/segments/GenerateNeutrinos.py#L298\n\nget_propagators() returns a C++ map, which doesn't support the full dict syntax apparently?\n\n{{{\nfor k in base_propagators:\n propagators[k] = base_propagators[k]\n}}}\n\n`k` is apparently not what you think it is. I'm guessing using `.keys()` might solve this, but not sure.\n",
"reporter": "david.schultz",
"cc": "david.schultz, juancarlos",
"resolution": "fixed",
"_ts": "1458335643235016",
"component": "combo simulation",
"summary": "[simprod-scripts] GenerateAtmosphericNeutrinos bug",
"priority": "critical",
"keywords": "",
"time": "2015-07-14T20:12:12",
"milestone": "",
"owner": "olivas",
"type": "defect"
}
```
</p>
</details>
|
non_design
|
generateatmosphericneutrinos bug trac migrated from json status closed changetime description the error n n n file data user edvorak metaprojects icesim trunk build lib icecube simprod segments generateneutrinos py line in generateatmosphericneutrinos n propagators base propagators ntypeerror invalid index type n n n returns a c map which doesn t support the full dict syntax apparently n n nfor k in base propagators n propagators base propagators n n n k is apparently not what you think it is i m guessing using keys might solve this but not sure n reporter david schultz cc david schultz juancarlos resolution fixed ts component combo simulation summary generateatmosphericneutrinos bug priority critical keywords time milestone owner olivas type defect
| 0
|
28,147
| 5,200,163,050
|
IssuesEvent
|
2017-01-23 22:56:51
|
jccastillo0007/eFacturaT
|
https://api.github.com/repos/jccastillo0007/eFacturaT
|
opened
|
Optibelt - el PDF en web está incompleto, ya que no muestra datos extra a nivel pro.
|
bug defect
|
Hay que arreglarlo
|
1.0
|
Optibelt - el PDF en web está incompleto, ya que no muestra datos extra a nivel pro. - Hay que arreglarlo
|
non_design
|
optibelt el pdf en web está incompleto ya que no muestra datos extra a nivel pro hay que arreglarlo
| 0
|
74,533
| 9,084,289,072
|
IssuesEvent
|
2019-02-18 02:47:51
|
TNRIS/data.tnris.org
|
https://api.github.com/repos/TNRIS/data.tnris.org
|
closed
|
archer/jack Image Remake Test
|
Design Ideas
|
Could we test the two images I've adapted to 16:9 for Archer Jack Counties Lidar?
They are on the vault under the data.tnris.org folder. ID for the collection is
cd8246cf-99fa-4504-b178-8c6ddecc1c02
|
1.0
|
archer/jack Image Remake Test - Could we test the two images I've adapted to 16:9 for Archer Jack Counties Lidar?
They are on the vault under the data.tnris.org folder. ID for the collection is
cd8246cf-99fa-4504-b178-8c6ddecc1c02
|
design
|
archer jack image remake test could we test the two images i ve adapted to for archer jack counties lidar they are on the vault under the data tnris org folder id for the collection is
| 1
|
321,897
| 23,877,373,449
|
IssuesEvent
|
2022-09-07 20:29:19
|
DisciplinasProgramacao/projeto1-grupo-1-lpm
|
https://api.github.com/repos/DisciplinasProgramacao/projeto1-grupo-1-lpm
|
closed
|
Cadastrar compromissos periódicos
|
documentation enhancement
|
Cadastrar compromissos periódicos. Por exemplo, cadastrar uma ida ao Pilates em 16/08/2022, e repetir a cada 7 dias por 15 vezes.
|
1.0
|
Cadastrar compromissos periódicos - Cadastrar compromissos periódicos. Por exemplo, cadastrar uma ida ao Pilates em 16/08/2022, e repetir a cada 7 dias por 15 vezes.
|
non_design
|
cadastrar compromissos periódicos cadastrar compromissos periódicos por exemplo cadastrar uma ida ao pilates em e repetir a cada dias por vezes
| 0
|
14,090
| 8,823,348,177
|
IssuesEvent
|
2019-01-02 13:17:44
|
elastic/kibana
|
https://api.github.com/repos/elastic/kibana
|
closed
|
[ML] Changing to time-picker Job list refresh control is not intuitive
|
:ml :ml-config usability
|
Found in 6.4.0-SNAPSHOT (pre BC1)
Now that the Job List page uses the Kibana time-picker to control its refresh rate, there are usability concerns around the how the end-user will know if their data is recent. This will hit existing end-users who are accustomed to more regular refreshing and new users as the list does not update as quickly in some circumstances. It is not obvious that the rate of refresh can be adjusted or that it is now timer based.
Two suggestions would help the end-user know if they are seeing recent info
1. A visual indicator showing a countdown to next refresh or time since last refresh
2. Ability to manually refresh the list without having to reload the whole page. This could be per job or all jobs.
@lcawl Can we please make it clear in docs that the refresh rate of the page is controlled by the Kibana time picker
ping @elastic/ml-ui
|
True
|
[ML] Changing to time-picker Job list refresh control is not intuitive - Found in 6.4.0-SNAPSHOT (pre BC1)
Now that the Job List page uses the Kibana time-picker to control its refresh rate, there are usability concerns around the how the end-user will know if their data is recent. This will hit existing end-users who are accustomed to more regular refreshing and new users as the list does not update as quickly in some circumstances. It is not obvious that the rate of refresh can be adjusted or that it is now timer based.
Two suggestions would help the end-user know if they are seeing recent info
1. A visual indicator showing a countdown to next refresh or time since last refresh
2. Ability to manually refresh the list without having to reload the whole page. This could be per job or all jobs.
@lcawl Can we please make it clear in docs that the refresh rate of the page is controlled by the Kibana time picker
ping @elastic/ml-ui
|
non_design
|
changing to time picker job list refresh control is not intuitive found in snapshot pre now that the job list page uses the kibana time picker to control its refresh rate there are usability concerns around the how the end user will know if their data is recent this will hit existing end users who are accustomed to more regular refreshing and new users as the list does not update as quickly in some circumstances it is not obvious that the rate of refresh can be adjusted or that it is now timer based two suggestions would help the end user know if they are seeing recent info a visual indicator showing a countdown to next refresh or time since last refresh ability to manually refresh the list without having to reload the whole page this could be per job or all jobs lcawl can we please make it clear in docs that the refresh rate of the page is controlled by the kibana time picker ping elastic ml ui
| 0
|
13,536
| 3,152,305,792
|
IssuesEvent
|
2015-09-16 13:15:45
|
JMurk/OAM-Activity-Manager
|
https://api.github.com/repos/JMurk/OAM-Activity-Manager
|
closed
|
OAM - Remove Work Activity Look Up Activity
|
design low priority
|
We can now remove the "Work Activity Look Up" activity from the activity manager since it has been migrated into it's own application.
|
1.0
|
OAM - Remove Work Activity Look Up Activity - We can now remove the "Work Activity Look Up" activity from the activity manager since it has been migrated into it's own application.
|
design
|
oam remove work activity look up activity we can now remove the work activity look up activity from the activity manager since it has been migrated into it s own application
| 1
|
95,891
| 12,058,369,095
|
IssuesEvent
|
2020-04-15 17:20:20
|
cds-snc/notification-api
|
https://api.github.com/repos/cds-snc/notification-api
|
closed
|
Branding technical debt clean up phase 1
|
Design Dev:computer: SPIKE
|
**Story**
When uploading branding for a service I want to be able to be able to use the french FIP just like the english one and easy to use, and to one day support different branding for different templates in a service.
**What?**
- Branding needs some fixing, can we make a plan on how to accomplish this without breaking stuff?
Rough plan
- [ ] Clean up the branding system to use the same code for every message
- [ ] Clean up code and technical debt relating to preview
- [ ] Make default dynamic
- [ ] Allow banner heigh to be dynamic
- [ ] Get us back down to one branding option, replaces FIP
- [ ] Tim?
**Why?**
-Branding causes a lot of problems
- We don't want to manage branding for users forever.
- Cleaning up branding allows us to potentially make it more self serve or at the very least easier for SRE to manage
|
1.0
|
Branding technical debt clean up phase 1 - **Story**
When uploading branding for a service I want to be able to be able to use the french FIP just like the english one and easy to use, and to one day support different branding for different templates in a service.
**What?**
- Branding needs some fixing, can we make a plan on how to accomplish this without breaking stuff?
Rough plan
- [ ] Clean up the branding system to use the same code for every message
- [ ] Clean up code and technical debt relating to preview
- [ ] Make default dynamic
- [ ] Allow banner heigh to be dynamic
- [ ] Get us back down to one branding option, replaces FIP
- [ ] Tim?
**Why?**
-Branding causes a lot of problems
- We don't want to manage branding for users forever.
- Cleaning up branding allows us to potentially make it more self serve or at the very least easier for SRE to manage
|
design
|
branding technical debt clean up phase story when uploading branding for a service i want to be able to be able to use the french fip just like the english one and easy to use and to one day support different branding for different templates in a service what branding needs some fixing can we make a plan on how to accomplish this without breaking stuff rough plan clean up the branding system to use the same code for every message clean up code and technical debt relating to preview make default dynamic allow banner heigh to be dynamic get us back down to one branding option replaces fip tim why branding causes a lot of problems we don t want to manage branding for users forever cleaning up branding allows us to potentially make it more self serve or at the very least easier for sre to manage
| 1
|
17,529
| 12,414,464,726
|
IssuesEvent
|
2020-05-22 14:35:26
|
edgi-govdata-archiving/EEW_Planning
|
https://api.github.com/repos/edgi-govdata-archiving/EEW_Planning
|
closed
|
Give Casey Zoom account access
|
coordination infrastructure
|
Give Casey access to EDGI zoom account
┆Issue is synchronized with this [Trello card](https://trello.com/c/OW8RlEVC)
|
1.0
|
Give Casey Zoom account access - Give Casey access to EDGI zoom account
┆Issue is synchronized with this [Trello card](https://trello.com/c/OW8RlEVC)
|
non_design
|
give casey zoom account access give casey access to edgi zoom account ┆issue is synchronized with this
| 0
|
573,300
| 17,023,624,754
|
IssuesEvent
|
2021-07-03 02:59:19
|
tomhughes/trac-tickets
|
https://api.github.com/repos/tomhughes/trac-tickets
|
closed
|
[landcover] render hotel areas
|
Component: mapnik Priority: major Resolution: duplicate Type: enhancement
|
**[Submitted to the original trac issue database at 9.25pm, Friday, 20th August 2010]**
http://www.openstreetmap.org/?lat=28.38634&lon=-81.50292&zoom=17&layers=M
Here the hotels are not rendered as areas, while the landuse areas are. Perhaps a grayish pink (cross between residential and commercial) would be best.
|
1.0
|
[landcover] render hotel areas - **[Submitted to the original trac issue database at 9.25pm, Friday, 20th August 2010]**
http://www.openstreetmap.org/?lat=28.38634&lon=-81.50292&zoom=17&layers=M
Here the hotels are not rendered as areas, while the landuse areas are. Perhaps a grayish pink (cross between residential and commercial) would be best.
|
non_design
|
render hotel areas here the hotels are not rendered as areas while the landuse areas are perhaps a grayish pink cross between residential and commercial would be best
| 0
|
16,991
| 5,315,510,032
|
IssuesEvent
|
2017-02-13 17:29:33
|
devtools-html/perf.html
|
https://api.github.com/repos/devtools-html/perf.html
|
opened
|
Create types for units of time and dimensions.
|
code cleanup timeline timeline flame chart
|
The flame chart uses a variety of timing and dimensions units. Make this explicit with flow typing.
|
1.0
|
Create types for units of time and dimensions. - The flame chart uses a variety of timing and dimensions units. Make this explicit with flow typing.
|
non_design
|
create types for units of time and dimensions the flame chart uses a variety of timing and dimensions units make this explicit with flow typing
| 0
|
154,682
| 24,329,787,583
|
IssuesEvent
|
2022-09-30 18:14:31
|
Opentrons/opentrons
|
https://api.github.com/repos/Opentrons/opentrons
|
closed
|
PD Code Cleanup: Nullsy only when you really want to handle both null and undefined
|
refactor protocol designer
|
With @b-cooper - review where we use ` != null` or ` == null` in PD and make sure that it's not over-protecting for cases where values are never `undefined` and always `null` or non-nullsy, or visa-versa.
|
1.0
|
PD Code Cleanup: Nullsy only when you really want to handle both null and undefined - With @b-cooper - review where we use ` != null` or ` == null` in PD and make sure that it's not over-protecting for cases where values are never `undefined` and always `null` or non-nullsy, or visa-versa.
|
design
|
pd code cleanup nullsy only when you really want to handle both null and undefined with b cooper review where we use null or null in pd and make sure that it s not over protecting for cases where values are never undefined and always null or non nullsy or visa versa
| 1
|
96,384
| 12,126,278,054
|
IssuesEvent
|
2020-04-22 16:45:55
|
DataONEorg/dataone-web
|
https://api.github.com/repos/DataONEorg/dataone-web
|
closed
|
Change data illustration on bottom of homepage
|
design status: in progress
|
The "Universal access to data" section should have a different visual than the graph/chart illustration.
|
1.0
|
Change data illustration on bottom of homepage - The "Universal access to data" section should have a different visual than the graph/chart illustration.
|
design
|
change data illustration on bottom of homepage the universal access to data section should have a different visual than the graph chart illustration
| 1
|
81,712
| 10,168,719,523
|
IssuesEvent
|
2019-08-07 21:36:41
|
microsoft/vscode
|
https://api.github.com/repos/microsoft/vscode
|
closed
|
Bug to view File Explorer Button of side bar.
|
*as-designed
|
Issue Type: <b>Bug</b>
he file explorer button is hidden when I go to any other option on the left side panel (for example search or extensions) and I can only show the panel again by pressing Ctrl + Shift + E (This only works if I have a file open) otherwise I have to close and reopen the visual code application
VS Code version: Code 1.36.1 (2213894ea0415ee8c85c5eea0d0ff81ecc191529, 2019-07-08T22:55:08.091Z)
OS version: Linux x64 4.15.0-56-generic
<details>
<summary>System Info</summary>
|Item|Value|
|---|---|
|CPUs|Intel(R) Core(TM) i5-8250U CPU @ 1.60GHz (8 x 2965)|
|GPU Status|2d_canvas: enabled<br>flash_3d: enabled<br>flash_stage3d: enabled<br>flash_stage3d_baseline: enabled<br>gpu_compositing: enabled<br>multiple_raster_threads: enabled_on<br>native_gpu_memory_buffers: disabled_software<br>oop_rasterization: disabled_off<br>protected_video_decode: unavailable_off<br>rasterization: disabled_software<br>skia_deferred_display_list: disabled_off<br>skia_renderer: disabled_off<br>surface_synchronization: enabled_on<br>video_decode: unavailable_off<br>viz_display_compositor: disabled_off<br>webgl: enabled<br>webgl2: enabled|
|Load (avg)|1, 1, 1|
|Memory (System)|11.08GB (4.47GB free)|
|Process Argv|--unity-launch|
|Screen Reader|no|
|VM|0%|
</details>
<!-- generated by issue reporter -->
|
1.0
|
Bug to view File Explorer Button of side bar. - Issue Type: <b>Bug</b>
he file explorer button is hidden when I go to any other option on the left side panel (for example search or extensions) and I can only show the panel again by pressing Ctrl + Shift + E (This only works if I have a file open) otherwise I have to close and reopen the visual code application
VS Code version: Code 1.36.1 (2213894ea0415ee8c85c5eea0d0ff81ecc191529, 2019-07-08T22:55:08.091Z)
OS version: Linux x64 4.15.0-56-generic
<details>
<summary>System Info</summary>
|Item|Value|
|---|---|
|CPUs|Intel(R) Core(TM) i5-8250U CPU @ 1.60GHz (8 x 2965)|
|GPU Status|2d_canvas: enabled<br>flash_3d: enabled<br>flash_stage3d: enabled<br>flash_stage3d_baseline: enabled<br>gpu_compositing: enabled<br>multiple_raster_threads: enabled_on<br>native_gpu_memory_buffers: disabled_software<br>oop_rasterization: disabled_off<br>protected_video_decode: unavailable_off<br>rasterization: disabled_software<br>skia_deferred_display_list: disabled_off<br>skia_renderer: disabled_off<br>surface_synchronization: enabled_on<br>video_decode: unavailable_off<br>viz_display_compositor: disabled_off<br>webgl: enabled<br>webgl2: enabled|
|Load (avg)|1, 1, 1|
|Memory (System)|11.08GB (4.47GB free)|
|Process Argv|--unity-launch|
|Screen Reader|no|
|VM|0%|
</details>
<!-- generated by issue reporter -->
|
design
|
bug to view file explorer button of side bar issue type bug he file explorer button is hidden when i go to any other option on the left side panel for example search or extensions and i can only show the panel again by pressing ctrl shift e this only works if i have a file open otherwise i have to close and reopen the visual code application vs code version code os version linux generic system info item value cpus intel r core tm cpu x gpu status canvas enabled flash enabled flash enabled flash baseline enabled gpu compositing enabled multiple raster threads enabled on native gpu memory buffers disabled software oop rasterization disabled off protected video decode unavailable off rasterization disabled software skia deferred display list disabled off skia renderer disabled off surface synchronization enabled on video decode unavailable off viz display compositor disabled off webgl enabled enabled load avg memory system free process argv unity launch screen reader no vm
| 1
|
369,756
| 10,917,311,207
|
IssuesEvent
|
2019-11-21 14:57:01
|
eclipse-emfcloud/emfcloud-modelserver
|
https://api.github.com/repos/eclipse-emfcloud/emfcloud-modelserver
|
opened
|
Support undo/redo API
|
high priority
|
- [ ] undo and redo commands on the `edit` endpoint
- [ ] on undo, compute the inverse of the command that was undone and send that to subscribers for incremental update notification
- [ ] on redo, send the redone command to subscribers
- [ ] ensure that the save API tells the `CommandStack` that save was done
- [ ] if undo returns to the last savepoint, notify subscribers about dirty state change (command-stack listener)
|
1.0
|
Support undo/redo API - - [ ] undo and redo commands on the `edit` endpoint
- [ ] on undo, compute the inverse of the command that was undone and send that to subscribers for incremental update notification
- [ ] on redo, send the redone command to subscribers
- [ ] ensure that the save API tells the `CommandStack` that save was done
- [ ] if undo returns to the last savepoint, notify subscribers about dirty state change (command-stack listener)
|
non_design
|
support undo redo api undo and redo commands on the edit endpoint on undo compute the inverse of the command that was undone and send that to subscribers for incremental update notification on redo send the redone command to subscribers ensure that the save api tells the commandstack that save was done if undo returns to the last savepoint notify subscribers about dirty state change command stack listener
| 0
|
23,397
| 3,839,465,859
|
IssuesEvent
|
2016-04-03 03:39:36
|
ddayguerrero/soen341
|
https://api.github.com/repos/ddayguerrero/soen341
|
closed
|
#33 Create descriptions of entities in the class diagram (UML)
|
design
|
From the word document:
"4.2 Validity and clarity and completeness of the class descriptions for each subsystem."
Work closely with @ddayguerrero who's doing issue 32.
|
1.0
|
#33 Create descriptions of entities in the class diagram (UML) - From the word document:
"4.2 Validity and clarity and completeness of the class descriptions for each subsystem."
Work closely with @ddayguerrero who's doing issue 32.
|
design
|
create descriptions of entities in the class diagram uml from the word document validity and clarity and completeness of the class descriptions for each subsystem work closely with ddayguerrero who s doing issue
| 1
|
60,387
| 12,102,190,084
|
IssuesEvent
|
2020-04-20 16:18:13
|
dotnet/roslyn-analyzers
|
https://api.github.com/repos/dotnet/roslyn-analyzers
|
opened
|
CA1062 not firing if '?.' is used on the previous line
|
Area-Microsoft.CodeQuality.Analyzers Bug DataFlow
|
#### Analyzer package
[Microsoft.CodeAnalysis.FxCopAnalyzers](https://www.nuget.org/packages/Microsoft.CodeAnalysis.FxCopAnalyzers)
#### Package Version
v3.0.0-beta3.final (latest pre-release)
#### Diagnostic ID
Example: [CA1062](https://docs.microsoft.com/en-us/visualstudio/code-quality/ca1062?view=vs-2019)
#### Repro steps
```csharp
namespace CA1062Test
{
public static class Thing
{
public static void Fn(int[] items)
{
var l1 = items?.Length;
// This should fire a CA1062, but it does not.
var l2 = items.Length;
}
}
}
```
#### Expected behavior
CA1062 on line declaring `l2`
#### Actual behavior
No CA1062
|
1.0
|
CA1062 not firing if '?.' is used on the previous line - #### Analyzer package
[Microsoft.CodeAnalysis.FxCopAnalyzers](https://www.nuget.org/packages/Microsoft.CodeAnalysis.FxCopAnalyzers)
#### Package Version
v3.0.0-beta3.final (latest pre-release)
#### Diagnostic ID
Example: [CA1062](https://docs.microsoft.com/en-us/visualstudio/code-quality/ca1062?view=vs-2019)
#### Repro steps
```csharp
namespace CA1062Test
{
public static class Thing
{
public static void Fn(int[] items)
{
var l1 = items?.Length;
// This should fire a CA1062, but it does not.
var l2 = items.Length;
}
}
}
```
#### Expected behavior
CA1062 on line declaring `l2`
#### Actual behavior
No CA1062
|
non_design
|
not firing if is used on the previous line analyzer package package version final latest pre release diagnostic id example repro steps csharp namespace public static class thing public static void fn int items var items length this should fire a but it does not var items length expected behavior on line declaring actual behavior no
| 0
|
25,251
| 3,926,381,026
|
IssuesEvent
|
2016-04-22 23:20:35
|
angular/angular.io
|
https://api.github.com/repos/angular/angular.io
|
closed
|
Changing between typescript and javascript causes flash of restyle
|
design love
|
The issue described above can be viewed here:

The restyling is most visible on the navigation toolbar, and the language switch dropdown.
This issue appears on https://angular.io/docs/ts/latest/quickstart.html, and the other pages that are accessible from the sidebar.
|
1.0
|
Changing between typescript and javascript causes flash of restyle - The issue described above can be viewed here:

The restyling is most visible on the navigation toolbar, and the language switch dropdown.
This issue appears on https://angular.io/docs/ts/latest/quickstart.html, and the other pages that are accessible from the sidebar.
|
design
|
changing between typescript and javascript causes flash of restyle the issue described above can be viewed here the restyling is most visible on the navigation toolbar and the language switch dropdown this issue appears on and the other pages that are accessible from the sidebar
| 1
|
25,151
| 4,229,782,287
|
IssuesEvent
|
2016-07-04 09:16:28
|
hazelcast/hazelcast
|
https://api.github.com/repos/hazelcast/hazelcast
|
closed
|
no-op multiple entry operations should update `get` and `hit` count
|
Team: Core Type: Defect
|
`AbstractMultipleEntryOperation` increments put/remove counts when entries are updated/removed
but if an `EntryProcessor` does only `get` then `get`/`hit` count is not updated.
Stats updated when entry added/updated;
https://github.com/hazelcast/hazelcast/blob/master/hazelcast/src/main/java/com/hazelcast/map/impl/operation/AbstractMultipleEntryOperation.java#L157
Stats updated when entry removed;
https://github.com/hazelcast/hazelcast/blob/master/hazelcast/src/main/java/com/hazelcast/map/impl/operation/AbstractMultipleEntryOperation.java#L146
|
1.0
|
no-op multiple entry operations should update `get` and `hit` count - `AbstractMultipleEntryOperation` increments put/remove counts when entries are updated/removed
but if an `EntryProcessor` does only `get` then `get`/`hit` count is not updated.
Stats updated when entry added/updated;
https://github.com/hazelcast/hazelcast/blob/master/hazelcast/src/main/java/com/hazelcast/map/impl/operation/AbstractMultipleEntryOperation.java#L157
Stats updated when entry removed;
https://github.com/hazelcast/hazelcast/blob/master/hazelcast/src/main/java/com/hazelcast/map/impl/operation/AbstractMultipleEntryOperation.java#L146
|
non_design
|
no op multiple entry operations should update get and hit count abstractmultipleentryoperation increments put remove counts when entries are updated removed but if an entryprocessor does only get then get hit count is not updated stats updated when entry added updated stats updated when entry removed
| 0
|
99,801
| 11,162,974,805
|
IssuesEvent
|
2019-12-26 20:07:42
|
graphql-python/graphene
|
https://api.github.com/repos/graphql-python/graphene
|
closed
|
Example in types/objecttypes is out of date
|
📖 documentation
|
1. namedtuple is not created correctly
2. result object is not subscriptable as result['data']
3. result data key is incorrect (my_best_friend -> myBestFriend)
|
1.0
|
Example in types/objecttypes is out of date - 1. namedtuple is not created correctly
2. result object is not subscriptable as result['data']
3. result data key is incorrect (my_best_friend -> myBestFriend)
|
non_design
|
example in types objecttypes is out of date namedtuple is not created correctly result object is not subscriptable as result result data key is incorrect my best friend mybestfriend
| 0
|
36,261
| 5,040,681,546
|
IssuesEvent
|
2016-12-19 07:05:09
|
tbeu/Modelica
|
https://api.github.com/repos/tbeu/Modelica
|
closed
|
Simulation of ModelicaTest.Fluid.TestComponents.Pipes.DynamicPipeWithNominalLaminarFlow fails1
|
bug ModelicaTest
|
**Reported by otter on 16 Oct 2010 22:25 UTC**
Simulation of
```
ModelicaTest.Fluid.TestComponents.Pipes.DynamicPipeWithNominalLaminarFlow
```
fails with the assert (which is present in the text layer of the model):
```
abs(pipeN10.mediums[1].p-pipeN10nParallel10.mediums[1].p) < 1
The following error was detected at time: 0
!!!Incorrect pressure for nParallel>1!!!
Error: Failed to start model.
```
There are 3 dynamic pipes with 10,20,10 nodes that are just attached to boundary conditions. All are initialized in steady-state.
If the "assert" is removed, initialization also fails, since the nonlinear solver does not converge.
From the 3 circuits, the first (pipeN10) initializes in steady-state (if the others are removed).
The second one (pipeN20) fails as well as the
third one (pipeN10nParallel10)
Migrated-From: https://trac.modelica.org/Modelica/ticket/437
|
1.0
|
Simulation of ModelicaTest.Fluid.TestComponents.Pipes.DynamicPipeWithNominalLaminarFlow fails1 - **Reported by otter on 16 Oct 2010 22:25 UTC**
Simulation of
```
ModelicaTest.Fluid.TestComponents.Pipes.DynamicPipeWithNominalLaminarFlow
```
fails with the assert (which is present in the text layer of the model):
```
abs(pipeN10.mediums[1].p-pipeN10nParallel10.mediums[1].p) < 1
The following error was detected at time: 0
!!!Incorrect pressure for nParallel>1!!!
Error: Failed to start model.
```
There are 3 dynamic pipes with 10,20,10 nodes that are just attached to boundary conditions. All are initialized in steady-state.
If the "assert" is removed, initialization also fails, since the nonlinear solver does not converge.
From the 3 circuits, the first (pipeN10) initializes in steady-state (if the others are removed).
The second one (pipeN20) fails as well as the
third one (pipeN10nParallel10)
Migrated-From: https://trac.modelica.org/Modelica/ticket/437
|
non_design
|
simulation of modelicatest fluid testcomponents pipes dynamicpipewithnominallaminarflow reported by otter on oct utc simulation of modelicatest fluid testcomponents pipes dynamicpipewithnominallaminarflow fails with the assert which is present in the text layer of the model abs mediums p mediums p the following error was detected at time incorrect pressure for nparallel error failed to start model there are dynamic pipes with nodes that are just attached to boundary conditions all are initialized in steady state if the assert is removed initialization also fails since the nonlinear solver does not converge from the circuits the first initializes in steady state if the others are removed the second one fails as well as the third one migrated from
| 0
|
26,561
| 12,425,317,577
|
IssuesEvent
|
2020-05-24 15:47:58
|
openshift/odo
|
https://api.github.com/repos/openshift/odo
|
closed
|
parameters in services are not stored as secret
|
area/service kind/feature lifecycle/rotten
|
[kind/Enhancement]
<!--
Welcome! - We kindly ask you to:
1. Fill out the issue template below
2. Use the Google group if you have a question rather than a bug or feature request.
The group is at: https://groups.google.com/forum/#!forum/odo-users
Thanks for understanding, and for contributing to the project!
-->
## Which functionality do you think we should update/improve?
when a `postgres` service is created from the webconsole then the environment variables are reference of secret
```
$ oc set env po/postgresql-1-kth7q --list
# pods/postgresql-1-kth7q, container postgresql
# POSTGRESQL_USER from secret postgresql, key database-user
# POSTGRESQL_PASSWORD from secret postgresql, key database-password
# POSTGRESQL_DATABASE from secret postgresql, key database-name
```
but when the same service is created using odo cli the environment variable are shown in plain text
```
$ oc set env po/postgresql-a33a18a0-c5ac-11e9-bcbd-0242ac110009-1-2fvtc --list
# pods/postgresql-a33a18a0-c5ac-11e9-bcbd-0242ac110009-1-2fvtc, container postgresql
POSTGRESQL_PASSWORD=changeme
POSTGRESQL_USER=admin
POSTGRESQL_DATABASE=admin
```
## Why is this needed?
Could be a security aspect we should consider
|
1.0
|
parameters in services are not stored as secret - [kind/Enhancement]
<!--
Welcome! - We kindly ask you to:
1. Fill out the issue template below
2. Use the Google group if you have a question rather than a bug or feature request.
The group is at: https://groups.google.com/forum/#!forum/odo-users
Thanks for understanding, and for contributing to the project!
-->
## Which functionality do you think we should update/improve?
when a `postgres` service is created from the webconsole then the environment variables are reference of secret
```
$ oc set env po/postgresql-1-kth7q --list
# pods/postgresql-1-kth7q, container postgresql
# POSTGRESQL_USER from secret postgresql, key database-user
# POSTGRESQL_PASSWORD from secret postgresql, key database-password
# POSTGRESQL_DATABASE from secret postgresql, key database-name
```
but when the same service is created using odo cli the environment variable are shown in plain text
```
$ oc set env po/postgresql-a33a18a0-c5ac-11e9-bcbd-0242ac110009-1-2fvtc --list
# pods/postgresql-a33a18a0-c5ac-11e9-bcbd-0242ac110009-1-2fvtc, container postgresql
POSTGRESQL_PASSWORD=changeme
POSTGRESQL_USER=admin
POSTGRESQL_DATABASE=admin
```
## Why is this needed?
Could be a security aspect we should consider
|
non_design
|
parameters in services are not stored as secret welcome we kindly ask you to fill out the issue template below use the google group if you have a question rather than a bug or feature request the group is at thanks for understanding and for contributing to the project which functionality do you think we should update improve when a postgres service is created from the webconsole then the environment variables are reference of secret oc set env po postgresql list pods postgresql container postgresql postgresql user from secret postgresql key database user postgresql password from secret postgresql key database password postgresql database from secret postgresql key database name but when the same service is created using odo cli the environment variable are shown in plain text oc set env po postgresql bcbd list pods postgresql bcbd container postgresql postgresql password changeme postgresql user admin postgresql database admin why is this needed could be a security aspect we should consider
| 0
|
305,070
| 23,097,020,318
|
IssuesEvent
|
2022-07-26 20:40:06
|
build-trust/ockam
|
https://api.github.com/repos/build-trust/ockam
|
closed
|
Links used in PR templates are missing from the website
|
Type: Documentation
|
The contributor guides we link to in our [Pull Request template](https://github.com/build-trust/ockam/blob/develop/.github/PULL_REQUEST_TEMPLATE.md) re-direct to our homepage on the new website:
* https://www.ockam.io/learn/how-to-guides/high-performance-team/conduct/
* https://www.ockam.io/learn/how-to-guides/contributing/CONTRIBUTING
* https://www.ockam.io/learn/how-to-guides/contributing/cla/
|
1.0
|
Links used in PR templates are missing from the website - The contributor guides we link to in our [Pull Request template](https://github.com/build-trust/ockam/blob/develop/.github/PULL_REQUEST_TEMPLATE.md) re-direct to our homepage on the new website:
* https://www.ockam.io/learn/how-to-guides/high-performance-team/conduct/
* https://www.ockam.io/learn/how-to-guides/contributing/CONTRIBUTING
* https://www.ockam.io/learn/how-to-guides/contributing/cla/
|
non_design
|
links used in pr templates are missing from the website the contributor guides we link to in our re direct to our homepage on the new website
| 0
|
15,679
| 2,868,983,276
|
IssuesEvent
|
2015-06-05 22:22:10
|
dart-lang/sdk
|
https://api.github.com/repos/dart-lang/sdk
|
closed
|
Validate the SDK constraint when checking if the lockfile is up-to-date
|
Area-Pub Priority-Unassigned Triaged Type-Defect
|
Currently, if "pub get" is run with one version of the SDK and then later the SDK upgrades to a version that's no longer valid, future "pub get"s won't necessarily validate the SDK constraint.
One possible solution would be to save the intersection of all SDK constraints to the lockfile and check the current version against that.
|
1.0
|
Validate the SDK constraint when checking if the lockfile is up-to-date - Currently, if "pub get" is run with one version of the SDK and then later the SDK upgrades to a version that's no longer valid, future "pub get"s won't necessarily validate the SDK constraint.
One possible solution would be to save the intersection of all SDK constraints to the lockfile and check the current version against that.
|
non_design
|
validate the sdk constraint when checking if the lockfile is up to date currently if quot pub get quot is run with one version of the sdk and then later the sdk upgrades to a version that s no longer valid future quot pub get quot s won t necessarily validate the sdk constraint one possible solution would be to save the intersection of all sdk constraints to the lockfile and check the current version against that
| 0
|
134,643
| 19,296,152,443
|
IssuesEvent
|
2021-12-12 16:17:36
|
glennl-msft/WAF_PnP_Demo3
|
https://api.github.com/repos/glennl-msft/WAF_PnP_Demo3
|
opened
|
Secure your configuration information: Remove platform specific information from HTTP headers, do not expose security details in error messages,etc
|
Security Application Design Design
|
<a href="https://docs.microsoft.com/azure/architecture/framework/security/design-app-dependencies#configuration-security">Secure your configuration information: Remove platform specific information from HTTP headers, do not expose security details in error messages,etc</a>
|
2.0
|
Secure your configuration information: Remove platform specific information from HTTP headers, do not expose security details in error messages,etc - <a href="https://docs.microsoft.com/azure/architecture/framework/security/design-app-dependencies#configuration-security">Secure your configuration information: Remove platform specific information from HTTP headers, do not expose security details in error messages,etc</a>
|
design
|
secure your configuration information remove platform specific information from http headers do not expose security details in error messages etc
| 1
|
268,179
| 20,261,045,982
|
IssuesEvent
|
2022-02-15 07:27:48
|
marmelab/react-admin
|
https://api.github.com/repos/marmelab/react-admin
|
closed
|
DateInput parse and format does not display the value in the input
|
bug documentation
|
<!-- Please do not submit support requests or "How to" questions here. For that,
- go to Stack Overflow: https://stackoverflow.com/questions/tagged/react-admin) for community support, or
- use the Professional Support (https://marmelab.com/ra-enterprise/#support) if you're an Enterprise Edition subscriber. -->
# What you were expecting:
<!-- Describe what the behavior would be without the bug. -->
**When entered manually:**
- `DateInput` should work normally, shown in the docs's gif: https://marmelab.com/react-admin/Inputs.html#dateinput.
**When entered via the browser's datepicker:**
- `DateInput` should also reflect the selected date.
# What happened instead:
<!-- Describe how the bug manifests. -->
**When entered manually:**
- `DateInput` does not let me enter the full year (in `YYYY` format).
https://user-images.githubusercontent.com/31163334/120006297-59e0a580-c00b-11eb-9823-152e52bea6c5.mov
> Here, I tried to enter `02 03 2021` directly from the input field.
**When entered via the browser's datepicker:**
- `DateInput` shows a blank date (`mm/dd/yy`, literally)
https://user-images.githubusercontent.com/31163334/120007694-c3ad7f00-c00c-11eb-9ee5-421feddd4b26.mov
# Steps to reproduce:
<!-- Please explain the steps required to duplicate the issue, especially if you are able to provide a sample application. -->
1. Use the example from the docs in the [Transforming Input value to and from record section](https://marmelab.com/react-admin/Inputs.html#transforming-input-value-tofrom-record) :).
2. Enter any date manually, for example, type `02 03 2021`. See that the input does not reflect what you type.
3. Or, select the date picker, select any date, and then click anything to remove the focus. See that the input becomes `mm/dd/yy` literally.
# Related code:
```tsx
<DateInput
label="Start from"
source="startFrom"
defaultValue={new Date()}
format={dateFormatter}
parse={dateParser}
/>
```
where `dateParser` and `dateFormatter` is the following (straight copy-paste from the [docs](https://marmelab.com/react-admin/Inputs.html#transforming-input-value-tofrom-record)):
```ts
const dateFormatter = (v) => {
// v is a `Date` object
if (!(v instanceof Date) || Number.isNaN(v)) return;
const pad = "00";
const yy = v.getFullYear().toString();
const mm = (v.getMonth() + 1).toString();
const dd = v.getDate().toString();
return `${yy}-${(pad + mm).slice(-2)}-${(pad + dd).slice(-2)}`;
};
const dateParser = (v) => {
// v is a string of "YYYY-MM-DD" format
const match = /(\d{4})-(\d{2})-(\d{2})/.exec(v);
if (match === null) return;
const d = new Date(
match[1],
parseInt(match[2], 10) - 1,
match[3]
);
if (Number.isNaN(d)) return;
return d;
};
```
# Other information:
Looks like a regression in the version `3.15.2`.
Visual bug because the form validation (`required()`) works just fine.
# Environment
* React-admin version: 3.15.2
* Last version that did not exhibit the issue (if applicable): 3.14.2 works
* React version: 16.13.1
* Browser: Microsoft Edge
* Stack trace (in case of a JS error):
|
1.0
|
DateInput parse and format does not display the value in the input - <!-- Please do not submit support requests or "How to" questions here. For that,
- go to Stack Overflow: https://stackoverflow.com/questions/tagged/react-admin) for community support, or
- use the Professional Support (https://marmelab.com/ra-enterprise/#support) if you're an Enterprise Edition subscriber. -->
# What you were expecting:
<!-- Describe what the behavior would be without the bug. -->
**When entered manually:**
- `DateInput` should work normally, shown in the docs's gif: https://marmelab.com/react-admin/Inputs.html#dateinput.
**When entered via the browser's datepicker:**
- `DateInput` should also reflect the selected date.
# What happened instead:
<!-- Describe how the bug manifests. -->
**When entered manually:**
- `DateInput` does not let me enter the full year (in `YYYY` format).
https://user-images.githubusercontent.com/31163334/120006297-59e0a580-c00b-11eb-9823-152e52bea6c5.mov
> Here, I tried to enter `02 03 2021` directly from the input field.
**When entered via the browser's datepicker:**
- `DateInput` shows a blank date (`mm/dd/yy`, literally)
https://user-images.githubusercontent.com/31163334/120007694-c3ad7f00-c00c-11eb-9ee5-421feddd4b26.mov
# Steps to reproduce:
<!-- Please explain the steps required to duplicate the issue, especially if you are able to provide a sample application. -->
1. Use the example from the docs in the [Transforming Input value to and from record section](https://marmelab.com/react-admin/Inputs.html#transforming-input-value-tofrom-record) :).
2. Enter any date manually, for example, type `02 03 2021`. See that the input does not reflect what you type.
3. Or, select the date picker, select any date, and then click anything to remove the focus. See that the input becomes `mm/dd/yy` literally.
# Related code:
```tsx
<DateInput
label="Start from"
source="startFrom"
defaultValue={new Date()}
format={dateFormatter}
parse={dateParser}
/>
```
where `dateParser` and `dateFormatter` is the following (straight copy-paste from the [docs](https://marmelab.com/react-admin/Inputs.html#transforming-input-value-tofrom-record)):
```ts
const dateFormatter = (v) => {
// v is a `Date` object
if (!(v instanceof Date) || Number.isNaN(v)) return;
const pad = "00";
const yy = v.getFullYear().toString();
const mm = (v.getMonth() + 1).toString();
const dd = v.getDate().toString();
return `${yy}-${(pad + mm).slice(-2)}-${(pad + dd).slice(-2)}`;
};
const dateParser = (v) => {
// v is a string of "YYYY-MM-DD" format
const match = /(\d{4})-(\d{2})-(\d{2})/.exec(v);
if (match === null) return;
const d = new Date(
match[1],
parseInt(match[2], 10) - 1,
match[3]
);
if (Number.isNaN(d)) return;
return d;
};
```
# Other information:
Looks like a regression in the version `3.15.2`.
Visual bug because the form validation (`required()`) works just fine.
# Environment
* React-admin version: 3.15.2
* Last version that did not exhibit the issue (if applicable): 3.14.2 works
* React version: 16.13.1
* Browser: Microsoft Edge
* Stack trace (in case of a JS error):
|
non_design
|
dateinput parse and format does not display the value in the input please do not submit support requests or how to questions here for that go to stack overflow for community support or use the professional support if you re an enterprise edition subscriber what you were expecting when entered manually dateinput should work normally shown in the docs s gif when entered via the browser s datepicker dateinput should also reflect the selected date what happened instead when entered manually dateinput does not let me enter the full year in yyyy format here i tried to enter directly from the input field when entered via the browser s datepicker dateinput shows a blank date mm dd yy literally steps to reproduce use the example from the docs in the enter any date manually for example type see that the input does not reflect what you type or select the date picker select any date and then click anything to remove the focus see that the input becomes mm dd yy literally related code tsx dateinput label start from source startfrom defaultvalue new date format dateformatter parse dateparser where dateparser and dateformatter is the following straight copy paste from the ts const dateformatter v v is a date object if v instanceof date number isnan v return const pad const yy v getfullyear tostring const mm v getmonth tostring const dd v getdate tostring return yy pad mm slice pad dd slice const dateparser v v is a string of yyyy mm dd format const match d d d exec v if match null return const d new date match parseint match match if number isnan d return return d other information looks like a regression in the version visual bug because the form validation required works just fine environment react admin version last version that did not exhibit the issue if applicable works react version browser microsoft edge stack trace in case of a js error
| 0
|
127,196
| 5,025,830,002
|
IssuesEvent
|
2016-12-15 10:29:17
|
9705395/Examen
|
https://api.github.com/repos/9705395/Examen
|
closed
|
Toevoegen cursussen
|
high-priority
|
### Huidige situatie
Alleen de cursussen van dit jaar zijn vermeld.
### Nieuwe situatie
Ook de cursussen voor nieuwere jaren moeten toegevoegd worden.
### Reden wijziging
Nieuw cursusjaar
[Nieuw Cursusjaar.csv.zip](https://github.com/9705395/Examen/files/654267/Nieuw.Cursusjaar.csv.zip)
|
1.0
|
Toevoegen cursussen - ### Huidige situatie
Alleen de cursussen van dit jaar zijn vermeld.
### Nieuwe situatie
Ook de cursussen voor nieuwere jaren moeten toegevoegd worden.
### Reden wijziging
Nieuw cursusjaar
[Nieuw Cursusjaar.csv.zip](https://github.com/9705395/Examen/files/654267/Nieuw.Cursusjaar.csv.zip)
|
non_design
|
toevoegen cursussen huidige situatie alleen de cursussen van dit jaar zijn vermeld nieuwe situatie ook de cursussen voor nieuwere jaren moeten toegevoegd worden reden wijziging nieuw cursusjaar
| 0
|
451,137
| 32,009,574,506
|
IssuesEvent
|
2023-09-21 17:01:28
|
rooch-network/rooch
|
https://api.github.com/repos/rooch-network/rooch
|
closed
|
Considering adding brew formula for downloading Rooch binary directly?
|
documentation devops
|
Should we consider adding a brew formula for downloading the Rooch binary directly?
|
1.0
|
Considering adding brew formula for downloading Rooch binary directly? - Should we consider adding a brew formula for downloading the Rooch binary directly?
|
non_design
|
considering adding brew formula for downloading rooch binary directly should we consider adding a brew formula for downloading the rooch binary directly
| 0
|
407,780
| 11,937,310,750
|
IssuesEvent
|
2020-04-02 11:57:28
|
metabase/metabase
|
https://api.github.com/repos/metabase/metabase
|
closed
|
Zooming-in yields fks->join-information does not match schema
|
.Need More Info Priority:P3 Querying/GUI Type:Bug
|
Getting a
Output of fks->join-information does not match schema: [0;33m [nil nil {:pk-field-id (not (integer? nil))}] [0m
When zooming-in on the value of an aggregated cell using a query built by Metabase.
What additional information can I contribute to help reproduce this issue?
|
1.0
|
Zooming-in yields fks->join-information does not match schema - Getting a
Output of fks->join-information does not match schema: [0;33m [nil nil {:pk-field-id (not (integer? nil))}] [0m
When zooming-in on the value of an aggregated cell using a query built by Metabase.
What additional information can I contribute to help reproduce this issue?
|
non_design
|
zooming in yields fks join information does not match schema getting a output of fks join information does not match schema when zooming in on the value of an aggregated cell using a query built by metabase what additional information can i contribute to help reproduce this issue
| 0
|
12,649
| 5,222,561,135
|
IssuesEvent
|
2017-01-27 08:53:15
|
JimBobSquarePants/ImageSharp
|
https://api.github.com/repos/JimBobSquarePants/ImageSharp
|
closed
|
Could not load signature of ImageSharp.Image`1[TColor]:To due to: Could not load file or assembly or one of its dependencies.
|
area:build help needed
|
Hello!
Awesome project you have here! Can't wait to have a first release :)
I'm on OSX, and I'm using MonoDevelop on a project compiled against Mono / .NET 4.5.
I downloaded every DLL (in the net45 folder) from the pre-releases here https://www.myget.org/gallery/imagesharp except the ImageSharp.Drawing which I won't use.
Everything compiles but when I try to call a method I got this error message:
"Could not load signature of ImageSharp.Image`1[TColor]:To due to: Could not load file or assembly or one of its dependencies."
Any idea of what could be causing this?
Thanks!
|
1.0
|
Could not load signature of ImageSharp.Image`1[TColor]:To due to: Could not load file or assembly or one of its dependencies. - Hello!
Awesome project you have here! Can't wait to have a first release :)
I'm on OSX, and I'm using MonoDevelop on a project compiled against Mono / .NET 4.5.
I downloaded every DLL (in the net45 folder) from the pre-releases here https://www.myget.org/gallery/imagesharp except the ImageSharp.Drawing which I won't use.
Everything compiles but when I try to call a method I got this error message:
"Could not load signature of ImageSharp.Image`1[TColor]:To due to: Could not load file or assembly or one of its dependencies."
Any idea of what could be causing this?
Thanks!
|
non_design
|
could not load signature of imagesharp image to due to could not load file or assembly or one of its dependencies hello awesome project you have here can t wait to have a first release i m on osx and i m using monodevelop on a project compiled against mono net i downloaded every dll in the folder from the pre releases here except the imagesharp drawing which i won t use everything compiles but when i try to call a method i got this error message could not load signature of imagesharp image to due to could not load file or assembly or one of its dependencies any idea of what could be causing this thanks
| 0
|
99,343
| 12,418,948,052
|
IssuesEvent
|
2020-05-23 02:58:43
|
retaildevcrews/webvalidate
|
https://api.github.com/repos/retaildevcrews/webvalidate
|
opened
|
Move WebV to Microsoft github
|
Design Review Documentation Enhancement WebV
|
## Description:
- To increase visibility and sharing of WebV, move the repo to github/Microsoft
## Tasks
- Remove most of the helium specific tests from webv so that it is more general purpose
- Add tests against a public API
- Come up with a strategy for using WebV in Helium
- Could move the test files to each language repo and use the -v option
- Could fork the repo and sync when code changes are made
- this works well when you add files to the fork, but is a nightmare if you change any shared files
- Other?
|
1.0
|
Move WebV to Microsoft github - ## Description:
- To increase visibility and sharing of WebV, move the repo to github/Microsoft
## Tasks
- Remove most of the helium specific tests from webv so that it is more general purpose
- Add tests against a public API
- Come up with a strategy for using WebV in Helium
- Could move the test files to each language repo and use the -v option
- Could fork the repo and sync when code changes are made
- this works well when you add files to the fork, but is a nightmare if you change any shared files
- Other?
|
design
|
move webv to microsoft github description to increase visibility and sharing of webv move the repo to github microsoft tasks remove most of the helium specific tests from webv so that it is more general purpose add tests against a public api come up with a strategy for using webv in helium could move the test files to each language repo and use the v option could fork the repo and sync when code changes are made this works well when you add files to the fork but is a nightmare if you change any shared files other
| 1
|
35,162
| 4,631,296,287
|
IssuesEvent
|
2016-09-28 15:06:40
|
xiaohanyu/org-site
|
https://api.github.com/repos/xiaohanyu/org-site
|
closed
|
Theme and design refinement
|
design enhancement
|
Design
----------
Current theme still has lots flaws and bugs, which may need some refinement and
redesign. For example, the TOC anchor doesn't locate to the right section due to
css margin.
Implementation
----------
Pluskid's blog is really a good design using bootstrap, see
http://freemind.pluskid.org/, I'll import some elements from it.
|
1.0
|
Theme and design refinement - Design
----------
Current theme still has lots flaws and bugs, which may need some refinement and
redesign. For example, the TOC anchor doesn't locate to the right section due to
css margin.
Implementation
----------
Pluskid's blog is really a good design using bootstrap, see
http://freemind.pluskid.org/, I'll import some elements from it.
|
design
|
theme and design refinement design current theme still has lots flaws and bugs which may need some refinement and redesign for example the toc anchor doesn t locate to the right section due to css margin implementation pluskid s blog is really a good design using bootstrap see i ll import some elements from it
| 1
|
770,791
| 27,056,843,859
|
IssuesEvent
|
2023-02-13 16:43:41
|
matrixorigin/matrixone
|
https://api.github.com/repos/matrixorigin/matrixone
|
closed
|
[Feature Request]: Examination points for distributed cluster of MO
|
priority/p0 kind/feature source/on-demand component/distributed tae
|
### Is there an existing issue for the same feature request?
- [X] I have checked the existing issues.
### Is your feature request related to a problem?
_No response_
### Describe the feature you'd like
In 0.6.0, MO will provide these features as following in distributed level:
- [ ] #3685
- [ ] #3728
- [ ] #3729
- [ ] #3727
- [ ] #3730
- [x] #3115
- [x] #3116
- [x] #3940
This issue will be broken down into several more sub-feature issues:
#3685 #3727 #3728 #3729 #3730 #3115 #3116 #3527 #2716 #2759 #2757 #2758 #3516 #3505 #3528 #3790
### Describe implementation you've considered
_No response_
### Documentation, Adoption, Use Case, Migration Strategy
_No response_
### Additional information
_No response_
|
1.0
|
[Feature Request]: Examination points for distributed cluster of MO - ### Is there an existing issue for the same feature request?
- [X] I have checked the existing issues.
### Is your feature request related to a problem?
_No response_
### Describe the feature you'd like
In 0.6.0, MO will provide these features as following in distributed level:
- [ ] #3685
- [ ] #3728
- [ ] #3729
- [ ] #3727
- [ ] #3730
- [x] #3115
- [x] #3116
- [x] #3940
This issue will be broken down into several more sub-feature issues:
#3685 #3727 #3728 #3729 #3730 #3115 #3116 #3527 #2716 #2759 #2757 #2758 #3516 #3505 #3528 #3790
### Describe implementation you've considered
_No response_
### Documentation, Adoption, Use Case, Migration Strategy
_No response_
### Additional information
_No response_
|
non_design
|
examination points for distributed cluster of mo is there an existing issue for the same feature request i have checked the existing issues is your feature request related to a problem no response describe the feature you d like in mo will provide these features as following in distributed level this issue will be broken down into several more sub feature issues describe implementation you ve considered no response documentation adoption use case migration strategy no response additional information no response
| 0
|
91,548
| 15,856,524,207
|
IssuesEvent
|
2021-04-08 02:32:44
|
rammatzkvosky/cwa-website
|
https://api.github.com/repos/rammatzkvosky/cwa-website
|
opened
|
CVE-2020-7733 (High) detected in ua-parser-js-0.7.17.tgz
|
security vulnerability
|
## CVE-2020-7733 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>ua-parser-js-0.7.17.tgz</b></p></summary>
<p>Lightweight JavaScript-based user-agent string parser</p>
<p>Library home page: <a href="https://registry.npmjs.org/ua-parser-js/-/ua-parser-js-0.7.17.tgz">https://registry.npmjs.org/ua-parser-js/-/ua-parser-js-0.7.17.tgz</a></p>
<p>Path to dependency file: cwa-website/package.json</p>
<p>Path to vulnerable library: cwa-website/node_modules/ua-parser-js/package.json</p>
<p>
Dependency Hierarchy:
- browser-sync-2.26.7.tgz (Root Library)
- :x: **ua-parser-js-0.7.17.tgz** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The package ua-parser-js before 0.7.22 are vulnerable to Regular Expression Denial of Service (ReDoS) via the regex for Redmi Phones and Mi Pad Tablets UA.
<p>Publish Date: 2020-09-16
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7733>CVE-2020-7733</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7733">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7733</a></p>
<p>Release Date: 2020-07-21</p>
<p>Fix Resolution: 0.7.22</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"ua-parser-js","packageVersion":"0.7.17","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"browser-sync:2.26.7;ua-parser-js:0.7.17","isMinimumFixVersionAvailable":true,"minimumFixVersion":"0.7.22"}],"baseBranches":[],"vulnerabilityIdentifier":"CVE-2020-7733","vulnerabilityDetails":"The package ua-parser-js before 0.7.22 are vulnerable to Regular Expression Denial of Service (ReDoS) via the regex for Redmi Phones and Mi Pad Tablets UA.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7733","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> -->
|
True
|
CVE-2020-7733 (High) detected in ua-parser-js-0.7.17.tgz - ## CVE-2020-7733 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>ua-parser-js-0.7.17.tgz</b></p></summary>
<p>Lightweight JavaScript-based user-agent string parser</p>
<p>Library home page: <a href="https://registry.npmjs.org/ua-parser-js/-/ua-parser-js-0.7.17.tgz">https://registry.npmjs.org/ua-parser-js/-/ua-parser-js-0.7.17.tgz</a></p>
<p>Path to dependency file: cwa-website/package.json</p>
<p>Path to vulnerable library: cwa-website/node_modules/ua-parser-js/package.json</p>
<p>
Dependency Hierarchy:
- browser-sync-2.26.7.tgz (Root Library)
- :x: **ua-parser-js-0.7.17.tgz** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The package ua-parser-js before 0.7.22 are vulnerable to Regular Expression Denial of Service (ReDoS) via the regex for Redmi Phones and Mi Pad Tablets UA.
<p>Publish Date: 2020-09-16
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7733>CVE-2020-7733</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7733">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7733</a></p>
<p>Release Date: 2020-07-21</p>
<p>Fix Resolution: 0.7.22</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"ua-parser-js","packageVersion":"0.7.17","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"browser-sync:2.26.7;ua-parser-js:0.7.17","isMinimumFixVersionAvailable":true,"minimumFixVersion":"0.7.22"}],"baseBranches":[],"vulnerabilityIdentifier":"CVE-2020-7733","vulnerabilityDetails":"The package ua-parser-js before 0.7.22 are vulnerable to Regular Expression Denial of Service (ReDoS) via the regex for Redmi Phones and Mi Pad Tablets UA.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7733","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> -->
|
non_design
|
cve high detected in ua parser js tgz cve high severity vulnerability vulnerable library ua parser js tgz lightweight javascript based user agent string parser library home page a href path to dependency file cwa website package json path to vulnerable library cwa website node modules ua parser js package json dependency hierarchy browser sync tgz root library x ua parser js tgz vulnerable library vulnerability details the package ua parser js before are vulnerable to regular expression denial of service redos via the regex for redmi phones and mi pad tablets ua publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree browser sync ua parser js isminimumfixversionavailable true minimumfixversion basebranches vulnerabilityidentifier cve vulnerabilitydetails the package ua parser js before are vulnerable to regular expression denial of service redos via the regex for redmi phones and mi pad tablets ua vulnerabilityurl
| 0
|
94,077
| 11,846,930,878
|
IssuesEvent
|
2020-03-24 11:04:16
|
LiskHQ/lisk-desktop
|
https://api.github.com/repos/LiskHQ/lisk-desktop
|
closed
|
Inform user to initialize account, before registering as delegate
|
type: bug type: design
|
### Expected behavior
The user should be informed, that the delegate registration fails, if the account is not initialises.
### Actual behavior
It was reported that it is not possible to register as a delegate with an uninitialised account, without further information why it fails.
After initialising the account, a delegate could be registered successfully.
### Steps to reproduce
Create new testnet account.
Send at least 25 LSK to this account.
Login to Lisk Desktop with the new account and try to register a delegate.
### Which version(s) does this affect? (Environment, OS, etc...)
|
1.0
|
Inform user to initialize account, before registering as delegate - ### Expected behavior
The user should be informed, that the delegate registration fails, if the account is not initialises.
### Actual behavior
It was reported that it is not possible to register as a delegate with an uninitialised account, without further information why it fails.
After initialising the account, a delegate could be registered successfully.
### Steps to reproduce
Create new testnet account.
Send at least 25 LSK to this account.
Login to Lisk Desktop with the new account and try to register a delegate.
### Which version(s) does this affect? (Environment, OS, etc...)
|
design
|
inform user to initialize account before registering as delegate expected behavior the user should be informed that the delegate registration fails if the account is not initialises actual behavior it was reported that it is not possible to register as a delegate with an uninitialised account without further information why it fails after initialising the account a delegate could be registered successfully steps to reproduce create new testnet account send at least lsk to this account login to lisk desktop with the new account and try to register a delegate which version s does this affect environment os etc
| 1
|
193,981
| 22,261,769,311
|
IssuesEvent
|
2022-06-10 01:37:31
|
nanopathi/linux-4.19.72_CVE-2020-14381
|
https://api.github.com/repos/nanopathi/linux-4.19.72_CVE-2020-14381
|
reopened
|
CVE-2019-17666 (High) detected in linuxlinux-4.19.237
|
security vulnerability
|
## CVE-2019-17666 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linuxlinux-4.19.237</b></p></summary>
<p>
<p>The Linux Kernel</p>
<p>Library home page: <a href=https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux>https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux</a></p>
<p>Found in HEAD commit: <a href="https://github.com/nanopathi/linux-4.19.72_CVE-2020-14381/commit/10c7b674d65d46240997df9855fe104bdf05229c">10c7b674d65d46240997df9855fe104bdf05229c</a></p>
<p>Found in base branch: <b>master</b></p></p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary>
<p></p>
<p>
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.
<p>Publish Date: 2019-10-17
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-17666>CVE-2019-17666</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Adjacent
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2019-17666">https://nvd.nist.gov/vuln/detail/CVE-2019-17666</a></p>
<p>Release Date: 2019-10-24</p>
<p>Fix Resolution: linux - 5.3.9.1-1;linux-lts - 4.19.82-1;linux-zen - 5.3.9.1-1;linux-hardened - 5.3.7.b-1</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
True
|
CVE-2019-17666 (High) detected in linuxlinux-4.19.237 - ## CVE-2019-17666 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linuxlinux-4.19.237</b></p></summary>
<p>
<p>The Linux Kernel</p>
<p>Library home page: <a href=https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux>https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux</a></p>
<p>Found in HEAD commit: <a href="https://github.com/nanopathi/linux-4.19.72_CVE-2020-14381/commit/10c7b674d65d46240997df9855fe104bdf05229c">10c7b674d65d46240997df9855fe104bdf05229c</a></p>
<p>Found in base branch: <b>master</b></p></p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary>
<p></p>
<p>
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.
<p>Publish Date: 2019-10-17
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-17666>CVE-2019-17666</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Adjacent
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2019-17666">https://nvd.nist.gov/vuln/detail/CVE-2019-17666</a></p>
<p>Release Date: 2019-10-24</p>
<p>Fix Resolution: linux - 5.3.9.1-1;linux-lts - 4.19.82-1;linux-zen - 5.3.9.1-1;linux-hardened - 5.3.7.b-1</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
non_design
|
cve high detected in linuxlinux cve high severity vulnerability vulnerable library linuxlinux the linux kernel library home page a href found in head commit a href found in base branch master vulnerable source files vulnerability details rtl noa ie in drivers net wireless realtek rtlwifi ps c in the linux kernel through lacks a certain upper bound check leading to a buffer overflow publish date url a href cvss score details base score metrics exploitability metrics attack vector adjacent attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution linux linux lts linux zen linux hardened b step up your open source security game with whitesource
| 0
|
83,542
| 7,874,507,848
|
IssuesEvent
|
2018-06-25 17:17:11
|
brave/browser-laptop
|
https://api.github.com/repos/brave/browser-laptop
|
closed
|
Manual test run on OS X for 0.23.x (Beta Channel)
|
OS/macOS release-notes/exclude tests
|
## Per release specialty tests
- [x] Context-menu search items doesn't use DDG if the private tab search engine is DDG. ([#14530](https://github.com/brave/browser-laptop/issues/14530))
- [x] Pinned tabs shift when closing tabs (before animating). ([#14528](https://github.com/brave/browser-laptop/issues/14528))
- [x] Private tab doesn't allow torrent download. ([#14524](https://github.com/brave/browser-laptop/issues/14524))
- [ ] Allow $SITE to run flash notifications should not appear on tor tabs. ([#14480](https://github.com/brave/browser-laptop/issues/14480))
- [x] Closing the last tab on full tabstrip and moving mouse away does not restore tab width. ([#14477](https://github.com/brave/browser-laptop/issues/14477))
- [ ] Include EasyPrivacy by default. ([#14476](https://github.com/brave/browser-laptop/issues/14476))
- [x] Clicking inside url bar but not directly on url string does not focus. ([#14473](https://github.com/brave/browser-laptop/issues/14473))
- [x] Tab doesn't stop loading indicator when opening a torrent in tor private tab. ([#14472](https://github.com/brave/browser-laptop/issues/14472))
- [ ] Preferences menu icons looks smaller compared to the current icons set. ([#14458](https://github.com/brave/browser-laptop/issues/14458))
- [ ] Contribution notification displays 'undefined' instead of 'BAT'. ([#14417](https://github.com/brave/browser-laptop/issues/14417))
- [x] Save file/Export file renames to Downloads instead of actual file name. ([#14407](https://github.com/brave/browser-laptop/issues/14407))
- [x] Learn more link on Private or Tor tab opens a regular tab. ([#14400](https://github.com/brave/browser-laptop/issues/14400))
- [x] Tor connection crashed after upgrade. ([#14399](https://github.com/brave/browser-laptop/issues/14399))
- [x] Private tab icon is overlapping on the favicon when there are too many tabs opened. ([#14373](https://github.com/brave/browser-laptop/issues/14373))
- [x] Brave Stopped playing Facebook videos. ([#14358](https://github.com/brave/browser-laptop/issues/14358))
- [x] Visiting Netflix in a private tab shows Widevine notification on normal tabs. ([#14227](https://github.com/brave/browser-laptop/issues/14227))
- [x] No immediate visual feedback from URL bar before page starts to load. ([#14207](https://github.com/brave/browser-laptop/issues/14207))
- [ ] WebRTC block sometimes not working on private tabs running tor. ([#14174](https://github.com/brave/browser-laptop/issues/14174))
- [ ] WebRTC not fully disabled with Tor. ([#14091](https://github.com/brave/browser-laptop/issues/14091))
- [ ] Block referer based on eTLD+1 instead of full origin. ([#13779](https://github.com/brave/browser-laptop/issues/13779))
- [x] Closing fixed-width tabs and then moving mouse away animates tabs past bounds of tab-bar. ([#12566](https://github.com/brave/browser-laptop/issues/12566))
- [ ] Download bar cannot be closed with an active download. ([#11923](https://github.com/brave/browser-laptop/issues/11923))
- [ ] Replace moment with date-fns for date helpers. ([#11061](https://github.com/brave/browser-laptop/issues/11061))
- [ ] Replace all CSS and l10n selectors with data-test-id for webdriver tests. ([#8735](https://github.com/brave/browser-laptop/issues/8735))
- [x] Tab size change should have transition animation. ([#7001](https://github.com/brave/browser-laptop/issues/7001))
## Installer
- [ ] Check that installer is close to the size of last release.
- [ ] Check signature: If OS Run `spctl --assess --verbose /Applications/Brave.app/` and make sure it returns `accepted`. If Windows right click on the installer exe and go to Properties, go to the Digital Signatures tab and double click on the signature. Make sure it says "The digital signature is OK" in the popup window.
- [ ] Check Brave, muon, and libchromiumcontent version in `about:brave` and make sure it is EXACTLY as expected.
## Last changeset test
- [ ] Test what is covered by the last changeset (you can find this by clicking on the SHA in about:brave)
## Data
- [ ] Make sure that data from the last version appears in the new version OK
- [ ] With data from the last version, test that
- [ ] cookies are preserved
- [ ] pinned tabs can be opened
- [ ] pinned tabs can be unpinned
- [ ] unpinned tabs can be re-pinned
- [ ] opened tabs can be reloaded
- [ ] bookmarks on the bookmark toolbar can be opened
- [ ] bookmarks in the bookmark folder toolbar can be opened
## About pages
- [ ] Test that about:adblock loads
- [ ] Test that about:autofill loads
- [ ] Test that about:bookmarks loads bookmarks
- [ ] Test that about:downloads loads downloads
- [ ] Test that about:extensions loads
- [ ] Test that about:history loads history
- [ ] Test that about:passwords loads
- [ ] Test that about:styles loads
- [ ] Test that about:welcome loads
- [ ] Test that about:preferences changing a preference takes effect right away
- [ ] Test that about:preferences language change takes effect on re-start
## Bookmarks
- [ ] Test that creating a bookmark on the bookmarks toolbar with the star button works
- [ ] Test that creating a bookmark on the bookmarks toolbar by dragging the un/lock icon works
- [ ] Test that creating a bookmark folder on the bookmarks toolbar works
- [ ] Test that moving a bookmark into a folder by drag and drop on the bookmarks folder works
- [ ] Test that clicking a bookmark in the toolbar loads the bookmark.
- [ ] Test that clicking a bookmark in a bookmark toolbar folder loads the bookmark.
- [ ] Test that a bookmark on the bookmark toolbar can be removed via context menu
- [ ] Test that a bookmark in a bookmark folder on the bookmark toolbar can be removed via context menu
- [ ] Test that a bookmark subfolder can be removed via context menu
- [ ] Test that a bookmark folder on the bookmark toolbar can be removed via context menu
## Context menus
- [ ] Make sure context menu items in the URL bar work
- [ ] Make sure context menu items on content work with no selected text
- [ ] Make sure context menu items on content work with selected text
- [ ] Make sure context menu items on content work inside an editable control on `about:styles` (input, textarea, or contenteditable)
## Find on page
- [ ] Ensure search box is shown with shortcut
- [ ] Test successful find
- [ ] Test forward and backward find navigation
- [ ] Test failed find shows 0 results
- [ ] Test match case find
## Keyboard Shortcuts
- [ ] Open a new window: `Command` + `N` (macOS) || `Ctrl` + `N` (Win/Linux)
- [ ] Open a new tab: `Command` + `T` (macOS) || `Ctrl` + `T` (Win/Linux)
- [ ] Open a new private tab: `Command` + `Shift` + `P` (macOS) || `Ctrl` + `Shift` + `P` (Win/Linux)
- [ ] Reopen the latest closed tab: `Command` + `Shift` + `t` (macOS) || `Ctrl` + `Shift` + `t` (Win/Linux)
- [ ] Reopen the latest closed window: `Command` + `Shift` + `Option` + `T` (macOS) || `Ctrl` + `Shift` + `Alt` + `T` (Win/Linux)
- [ ] Jump to the next tab: `Command` + `Option` + `->` (macOS) || `Ctrl` + `PgDn` (Win/Linux)
- [ ] Jump to the previous tab: `Command` + `Option` + `<-` (macOS) || `Ctrl` + `PgUp` (Win/Linux)
- [ ] Jump to the next tab: `Ctrl` + `Tab` (macOS/Win/Linux)
- [ ] Jump to the previous tab: `Ctrl` + `Shift` + `Tab` (macOS/Win/Linux)
- [ ] Open Brave preferences: `Command` + `,` (macOS) || `Ctrl` + `,` (Win/Linux)
- [ ] Jump into the URL bar: `Command` + `L` (macOS) || `Ctrl` + `L` (Win/Linux)
- [ ] Reload page: `Command` + `R` (macOS) || `Ctrl` + `R` (Win/Linux)
- [ ] Select All: `Command` + `A` (macOS) || `Ctrl` + `A` (Win/Linux)
- [ ] Copying text: `Command` + `C` (macOS) || `Ctrl` + `C` (Win/Linux)
- [ ] Pasting text: `Command` + `V` (macOS) || `Ctrl` + `V` (Win/Linux)
- [ ] Minimize Brave: `Command` + `M` (macOS) || `Ctrl` + `M` (Win/Linux)
- [ ] Quit Brave: `Command` + `Q` (macOS) || `Ctrl` + `Q` (Win/Linux)
## Tabs, Pinning and Tear off tabs
- [ ] Test that tabs are pinnable
- [ ] Test that tabs are unpinnable
- [ ] Test that tabs are draggable to same tabset
- [ ] Test that tabs are draggable to alternate tabset
- [ ] Test that tabs can be teared off into a new window
- [ ] Test that you are able to reattach a tab that is teared off into a new window
- [ ] Test that tab pages can be closed
- [ ] Test that tab pages can be muted
- [ ] Test that tabs can be cloned
## Downloads
- [ ] Test downloading a file works and that all actions on the download item works
## Fullscreen
- [ ] Test that entering full screen window works View -> Toggle Full Screen. And exit back (Not Esc)
- [ ] Test that entering HTML5 full screen works. And Esc to go back. (youtube.com)
## Zoom
- [ ] Test zoom in / out shortcut works
- [ ] Test hamburger menu zooms
- [ ] Test zoom saved when you close the browser and restore on a single site
- [ ] Test zoom saved when you navigate within a single origin site
- [ ] Test that navigating to a different origin resets the zoom
## Printing
- [ ] Test that you can print a PDF
## Extensions/Plugins tests
- [ ] Enable each extension one by one under `about:preferences#extensions` and ensure that the browser doesn't become unresponsive
### Widevine
- [ ] Test that you can log into Netflix and start a show
### Flash tests
- [ ] Test that flash placeholder appears on http://www.homestarrunner.com
- [ ] Test with flash enabled in preferences, auto play option is shown when visiting http://www.homestarrunner.com
## Autofill tests
- [ ] Test that autofill works on http://www.roboform.com/filling-test-all-fields
- [ ] Verify clicking `Next` button on https://www.paypal.com/signin doesn't crash the browser
## Geolocation
- [ ] Check that https://developer.mozilla.org/en-US/docs/Web/API/Geolocation/Using_geolocation is blocked due to cross-origin iframes
- [ ] Check that https://browserleaks.com/geo works and shows correct location
- [ ] Check that https://html5demos.com/geo/ works but doesn't require an accurate location
## Crash Reporting
- [ ] Check that loading `chrome://crash` causes the new tab to crash
- [ ] Check that `chrome://crashes` lists all the crashes and includes both Crash Report ID & Local Crash ID
- [ ] Verify the crash ID matches the report on brave stats
## Performance test
_Each start should take less than 7 seconds_
- [ ] Enable only sync (new sync group).
- [ ] Enable only sync with a large sync group (many entries).
- [ ] Enable only payments.
- [ ] Only import a large set of bookmarks.
- [ ] Combine sync, payments, and a large set of bookmarks.
## Bravery settings
- [ ] Check that HTTPS Everywhere works by loading http://https-everywhere.badssl.com/
- [ ] Turning HTTPS Everywhere off and shields off both disable the redirect to https://https-everywhere.badssl.com/
- [ ] Check that ad replacement works on http://slashdot.org
- [ ] Check that toggling to blocking and allow ads works as expected
- [ ] Test that clicking through a cert error in https://badssl.com/ works
- [ ] Test that Safe Browsing works (https://www.raisegame.com/)
- [ ] Turning Safe Browsing off and shields off both disable safe browsing for https://www.raisegame.com/
- [ ] Visit https://brianbondy.com/ and then turn on script blocking, nothing should load. Allow it from the script blocking UI in the URL bar and it should work
- [ ] Test that about:preferences default Bravery settings take effect on pages with no site settings
- [ ] Test that 3rd party storage results are blank at https://jsfiddle.net/7ke9r14a/9/ when 3rd party cookies are blocked and not blank when 3rd party cookies are unblocked
### Fingerprint Tests
- [ ] Visit https://jsfiddle.net/bkf50r8v/13/, ensure 3 blocked items are listed in shields. Result window should show `got canvas fingerprint 0` and `got webgl fingerprint 00`
- [ ] Test that audio fingerprint is blocked at https://audiofingerprint.openwpm.com/ only when `Block all fingerprinting protection` is on
- [ ] Test that Brave browser isn't detected on https://extensions.inrialpes.fr/brave/
- [ ] Test that https://diafygi.github.io/webrtc-ips/ doesn't leak IP address when `Block all fingerprinting protection` is on
## Content tests
- [ ] Go to https://brianbondy.com/ and click on the twitter icon on the top right. Test that context menus work in the new twitter tab
- [ ] Load twitter and click on a tweet so the popup div shows. Click to dismiss and repeat with another div. Make sure it shows
- [ ] Go to https://www.bennish.net/web-notifications.html and test that clicking on 'Show' pops up a notification asking for permission. Make sure that clicking 'Deny' leads to no notifications being shown
- [ ] Go to https://trac.torproject.org/projects/tor/login and make sure that the password can be saved. Make sure the saved password shows up in `about:passwords`. Then reload https://trac.torproject.org/projects/tor/login and make sure the saved credentials aren't autofilled instead shows saved id as a dropdown under the login field
- [ ] Open `about:styles` and type some misspellings on a textbox, make sure they are underlined.
- [ ] Make sure that right clicking on a word with suggestions gives a suggestion and that clicking on the suggestion replaces the text
- [ ] Make sure that Command + Click (Control + Click on Windows, Control + Click on Ubuntu) on a link opens a new tab but does NOT switch to it. Click on it and make sure it is already loaded
- [ ] Open an email on http://mail.google.com/ or inbox.google.com and click on a link. Make sure it works
- [ ] Test that PDF is loaded over https at https://basicattentiontoken.org/BasicAttentionTokenWhitePaper-4.pdf
- [ ] Test that PDF is loaded over http at http://www.pdf995.com/samples/pdf.pdf
- [ ] Test that https://mixed-script.badssl.com/ shows up as grey not red (no mixed content scripts are run).
- [ ] Test that hovering the cursor over a link changes the cursor into a pointer (hand)
- [ ] Visit https://dlptest.com/ftp-test/ and ensure that basic authentication is working by clicking on ftp://ftp.dlptest.com/ and ensuring you're prompted for credentials
- [ ] Test that WebSockets are working by ensuring http://slither.io/ runs once "Play" has been clicked.
## Ledger
- [ ] Verify wallet is auto created after enabling payments
- [ ] Verify monthly budget and account balance shows correct BAT and USD value
- [ ] Click on `add funds` and click on each currency and verify it shows wallet address and QR Code
- [ ] Verify that Brave BAT wallet address can be copied
- [ ] Verify adding funds via any of the currencies flows into BAT Wallet after specified amount of time
- [ ] Verify adding funds to an existing wallet with amount, adjusts the BAT value appropriately
- [ ] Change min visit and min time in advance setting and verify if the publisher list gets updated based on new setting
- [ ] Visit nytimes.com for a few seconds and make sure it shows up in the Payments table
- [ ] Check that disabling payments and enabling them again does not lose state
- [ ] Generate 500 ledger table entries using `npm run add-simulated-synopsis-visits 500`
- [ ] ensure that disabling/enabling Brave Payments several times doesn't cause any issues
- [ ] visit `about:preferences` and switch through all the available preference pages including Payments and ensure they're loading without issues
- [ ] ensure that loading/viewing `about:preferences#payments` doesn't cause the CPU to reach 100% of usage and cause performance issues
- [ ] ensure that both `Minimum page time` & `Minimum visits` work correctly with the large list of ledger entries
- [ ] ensure that you can sort the ledger table using `Site`, `Include`, `Views`, `Time Spent` and `%`
- [ ] Upgrade from older version
- [ ] Verify the wallet isn't corrupted upon upgrade (balance is retained and wallet backup code isn't corrupted)
- [ ] Verify publishers list is not lost after upgrade
### Ledger Media (To be verified on YouTube and Twitch)
- [ ] Visit any YouTube/Twitch video in a normal/session tab and ensure the video publisher name is listed in ledger table
- [ ] Visit any YouTube/Twitch video in a private tab and ensure the video publisher name is not listed in ledger table
- [ ] Visit any live YouTube/Twitch video and ensure the time spent is shown under ledger table
- [ ] Visit any embeded YouTube/Twitch video and ensure the video publisher name is listed in ledger table
- [ ] Ensure total time spent is correctly calculated for each publisher video
- [ ] Ensure total time spent is correctly calculated when switching to YouTube/Twitch video from an embeded video
- [ ] Ensure YouTube/Twitch publishers are not listed when `Allow contributions to video` is disabled in adavanced settings
- [ ] Ensure existing YouTube/Twitch publishers are not lost when `Allow contributions to video` is disabled in adavanced settings
- [ ] Ensure YouTube/Twitch publishers is listed but not included when `auto-include` is disabled
- [ ] Update Advanced settings to different time/visit value and ensure YouTube/Twitch videos are added to ledger table once criteria is met
- [ ] Perform a contribution while YouTube/Twitch channels are included on the ledger. Ensure the channels are listed on the contribution statement
- [ ] Verify that you are able to delete YouTube/Twitch publishers from ledger table
- [ ] Verify that you are able to re-add YouTube/Twitch publishers to ledger table
- [ ] Verify if you minimize a Twitch video (Stream/VOD) and navigate around the site, the video is counted in ledger
## Sync
- [ ] Verify you are able to sync two devices using the secret code
- [ ] Visit a site on device 1 and change shield setting, ensure that the saved site preference is synced to device 2
- [ ] Enable Browsing history sync on device 1, ensure the history is shown on device 2
- [ ] Clear browsing history on device 1, ensure the history is sync back on device 1 from device 2
- [ ] Import/Add bookmarks on device 1, ensure it is synced on device 2
- [ ] Ensure imported bookmark folder structure is maintained on device 2
- [ ] Ensure bookmark favicons are shown after sync
## Session storage
Do not forget to make a backup of your entire `~/Library/Application\ Support/Brave` folder.
- [ ] Temporarily move away your `~/Library/Application\ Support/Brave/session-store-1` and test that clean session storage works. (`%appdata%\Brave` in Windows, `./config/brave` in Ubuntu)
- [ ] Test that windows and tabs restore when closed, including active tab.
- [ ] Move away your entire `~/Library/Application\ Support/Brave` folder (`%appdata%\Brave` in Windows, `./config/brave` in Ubuntu)
## Cookie and Cache
- [ ] Make a backup of your profile, turn on all clearing in preferences and shut down. Make sure when you bring the browser back up everything is gone that is specified.
- [ ] Go to http://samy.pl/evercookie/ and set an evercookie. Check that going to prefs, clearing site data and cache, and going back to the Evercookie site does not remember the old evercookie value.
## Update tests
- [ ] Test that updating using `BRAVE_UPDATE_VERSION=0.8.3` env variable works correctly.
- [ ] Test that using `BRAVE_ENABLE_PREVIEW_UPDATES=TRUE` env variable works and prompts for preview build updates.
|
1.0
|
Manual test run on OS X for 0.23.x (Beta Channel) - ## Per release specialty tests
- [x] Context-menu search items doesn't use DDG if the private tab search engine is DDG. ([#14530](https://github.com/brave/browser-laptop/issues/14530))
- [x] Pinned tabs shift when closing tabs (before animating). ([#14528](https://github.com/brave/browser-laptop/issues/14528))
- [x] Private tab doesn't allow torrent download. ([#14524](https://github.com/brave/browser-laptop/issues/14524))
- [ ] Allow $SITE to run flash notifications should not appear on tor tabs. ([#14480](https://github.com/brave/browser-laptop/issues/14480))
- [x] Closing the last tab on full tabstrip and moving mouse away does not restore tab width. ([#14477](https://github.com/brave/browser-laptop/issues/14477))
- [ ] Include EasyPrivacy by default. ([#14476](https://github.com/brave/browser-laptop/issues/14476))
- [x] Clicking inside url bar but not directly on url string does not focus. ([#14473](https://github.com/brave/browser-laptop/issues/14473))
- [x] Tab doesn't stop loading indicator when opening a torrent in tor private tab. ([#14472](https://github.com/brave/browser-laptop/issues/14472))
- [ ] Preferences menu icons looks smaller compared to the current icons set. ([#14458](https://github.com/brave/browser-laptop/issues/14458))
- [ ] Contribution notification displays 'undefined' instead of 'BAT'. ([#14417](https://github.com/brave/browser-laptop/issues/14417))
- [x] Save file/Export file renames to Downloads instead of actual file name. ([#14407](https://github.com/brave/browser-laptop/issues/14407))
- [x] Learn more link on Private or Tor tab opens a regular tab. ([#14400](https://github.com/brave/browser-laptop/issues/14400))
- [x] Tor connection crashed after upgrade. ([#14399](https://github.com/brave/browser-laptop/issues/14399))
- [x] Private tab icon is overlapping on the favicon when there are too many tabs opened. ([#14373](https://github.com/brave/browser-laptop/issues/14373))
- [x] Brave Stopped playing Facebook videos. ([#14358](https://github.com/brave/browser-laptop/issues/14358))
- [x] Visiting Netflix in a private tab shows Widevine notification on normal tabs. ([#14227](https://github.com/brave/browser-laptop/issues/14227))
- [x] No immediate visual feedback from URL bar before page starts to load. ([#14207](https://github.com/brave/browser-laptop/issues/14207))
- [ ] WebRTC block sometimes not working on private tabs running tor. ([#14174](https://github.com/brave/browser-laptop/issues/14174))
- [ ] WebRTC not fully disabled with Tor. ([#14091](https://github.com/brave/browser-laptop/issues/14091))
- [ ] Block referer based on eTLD+1 instead of full origin. ([#13779](https://github.com/brave/browser-laptop/issues/13779))
- [x] Closing fixed-width tabs and then moving mouse away animates tabs past bounds of tab-bar. ([#12566](https://github.com/brave/browser-laptop/issues/12566))
- [ ] Download bar cannot be closed with an active download. ([#11923](https://github.com/brave/browser-laptop/issues/11923))
- [ ] Replace moment with date-fns for date helpers. ([#11061](https://github.com/brave/browser-laptop/issues/11061))
- [ ] Replace all CSS and l10n selectors with data-test-id for webdriver tests. ([#8735](https://github.com/brave/browser-laptop/issues/8735))
- [x] Tab size change should have transition animation. ([#7001](https://github.com/brave/browser-laptop/issues/7001))
## Installer
- [ ] Check that installer is close to the size of last release.
- [ ] Check signature: If OS Run `spctl --assess --verbose /Applications/Brave.app/` and make sure it returns `accepted`. If Windows right click on the installer exe and go to Properties, go to the Digital Signatures tab and double click on the signature. Make sure it says "The digital signature is OK" in the popup window.
- [ ] Check Brave, muon, and libchromiumcontent version in `about:brave` and make sure it is EXACTLY as expected.
## Last changeset test
- [ ] Test what is covered by the last changeset (you can find this by clicking on the SHA in about:brave)
## Data
- [ ] Make sure that data from the last version appears in the new version OK
- [ ] With data from the last version, test that
- [ ] cookies are preserved
- [ ] pinned tabs can be opened
- [ ] pinned tabs can be unpinned
- [ ] unpinned tabs can be re-pinned
- [ ] opened tabs can be reloaded
- [ ] bookmarks on the bookmark toolbar can be opened
- [ ] bookmarks in the bookmark folder toolbar can be opened
## About pages
- [ ] Test that about:adblock loads
- [ ] Test that about:autofill loads
- [ ] Test that about:bookmarks loads bookmarks
- [ ] Test that about:downloads loads downloads
- [ ] Test that about:extensions loads
- [ ] Test that about:history loads history
- [ ] Test that about:passwords loads
- [ ] Test that about:styles loads
- [ ] Test that about:welcome loads
- [ ] Test that about:preferences changing a preference takes effect right away
- [ ] Test that about:preferences language change takes effect on re-start
## Bookmarks
- [ ] Test that creating a bookmark on the bookmarks toolbar with the star button works
- [ ] Test that creating a bookmark on the bookmarks toolbar by dragging the un/lock icon works
- [ ] Test that creating a bookmark folder on the bookmarks toolbar works
- [ ] Test that moving a bookmark into a folder by drag and drop on the bookmarks folder works
- [ ] Test that clicking a bookmark in the toolbar loads the bookmark.
- [ ] Test that clicking a bookmark in a bookmark toolbar folder loads the bookmark.
- [ ] Test that a bookmark on the bookmark toolbar can be removed via context menu
- [ ] Test that a bookmark in a bookmark folder on the bookmark toolbar can be removed via context menu
- [ ] Test that a bookmark subfolder can be removed via context menu
- [ ] Test that a bookmark folder on the bookmark toolbar can be removed via context menu
## Context menus
- [ ] Make sure context menu items in the URL bar work
- [ ] Make sure context menu items on content work with no selected text
- [ ] Make sure context menu items on content work with selected text
- [ ] Make sure context menu items on content work inside an editable control on `about:styles` (input, textarea, or contenteditable)
## Find on page
- [ ] Ensure search box is shown with shortcut
- [ ] Test successful find
- [ ] Test forward and backward find navigation
- [ ] Test failed find shows 0 results
- [ ] Test match case find
## Keyboard Shortcuts
- [ ] Open a new window: `Command` + `N` (macOS) || `Ctrl` + `N` (Win/Linux)
- [ ] Open a new tab: `Command` + `T` (macOS) || `Ctrl` + `T` (Win/Linux)
- [ ] Open a new private tab: `Command` + `Shift` + `P` (macOS) || `Ctrl` + `Shift` + `P` (Win/Linux)
- [ ] Reopen the latest closed tab: `Command` + `Shift` + `t` (macOS) || `Ctrl` + `Shift` + `t` (Win/Linux)
- [ ] Reopen the latest closed window: `Command` + `Shift` + `Option` + `T` (macOS) || `Ctrl` + `Shift` + `Alt` + `T` (Win/Linux)
- [ ] Jump to the next tab: `Command` + `Option` + `->` (macOS) || `Ctrl` + `PgDn` (Win/Linux)
- [ ] Jump to the previous tab: `Command` + `Option` + `<-` (macOS) || `Ctrl` + `PgUp` (Win/Linux)
- [ ] Jump to the next tab: `Ctrl` + `Tab` (macOS/Win/Linux)
- [ ] Jump to the previous tab: `Ctrl` + `Shift` + `Tab` (macOS/Win/Linux)
- [ ] Open Brave preferences: `Command` + `,` (macOS) || `Ctrl` + `,` (Win/Linux)
- [ ] Jump into the URL bar: `Command` + `L` (macOS) || `Ctrl` + `L` (Win/Linux)
- [ ] Reload page: `Command` + `R` (macOS) || `Ctrl` + `R` (Win/Linux)
- [ ] Select All: `Command` + `A` (macOS) || `Ctrl` + `A` (Win/Linux)
- [ ] Copying text: `Command` + `C` (macOS) || `Ctrl` + `C` (Win/Linux)
- [ ] Pasting text: `Command` + `V` (macOS) || `Ctrl` + `V` (Win/Linux)
- [ ] Minimize Brave: `Command` + `M` (macOS) || `Ctrl` + `M` (Win/Linux)
- [ ] Quit Brave: `Command` + `Q` (macOS) || `Ctrl` + `Q` (Win/Linux)
## Tabs, Pinning and Tear off tabs
- [ ] Test that tabs are pinnable
- [ ] Test that tabs are unpinnable
- [ ] Test that tabs are draggable to same tabset
- [ ] Test that tabs are draggable to alternate tabset
- [ ] Test that tabs can be teared off into a new window
- [ ] Test that you are able to reattach a tab that is teared off into a new window
- [ ] Test that tab pages can be closed
- [ ] Test that tab pages can be muted
- [ ] Test that tabs can be cloned
## Downloads
- [ ] Test downloading a file works and that all actions on the download item works
## Fullscreen
- [ ] Test that entering full screen window works View -> Toggle Full Screen. And exit back (Not Esc)
- [ ] Test that entering HTML5 full screen works. And Esc to go back. (youtube.com)
## Zoom
- [ ] Test zoom in / out shortcut works
- [ ] Test hamburger menu zooms
- [ ] Test zoom saved when you close the browser and restore on a single site
- [ ] Test zoom saved when you navigate within a single origin site
- [ ] Test that navigating to a different origin resets the zoom
## Printing
- [ ] Test that you can print a PDF
## Extensions/Plugins tests
- [ ] Enable each extension one by one under `about:preferences#extensions` and ensure that the browser doesn't become unresponsive
### Widevine
- [ ] Test that you can log into Netflix and start a show
### Flash tests
- [ ] Test that flash placeholder appears on http://www.homestarrunner.com
- [ ] Test with flash enabled in preferences, auto play option is shown when visiting http://www.homestarrunner.com
## Autofill tests
- [ ] Test that autofill works on http://www.roboform.com/filling-test-all-fields
- [ ] Verify clicking `Next` button on https://www.paypal.com/signin doesn't crash the browser
## Geolocation
- [ ] Check that https://developer.mozilla.org/en-US/docs/Web/API/Geolocation/Using_geolocation is blocked due to cross-origin iframes
- [ ] Check that https://browserleaks.com/geo works and shows correct location
- [ ] Check that https://html5demos.com/geo/ works but doesn't require an accurate location
## Crash Reporting
- [ ] Check that loading `chrome://crash` causes the new tab to crash
- [ ] Check that `chrome://crashes` lists all the crashes and includes both Crash Report ID & Local Crash ID
- [ ] Verify the crash ID matches the report on brave stats
## Performance test
_Each start should take less than 7 seconds_
- [ ] Enable only sync (new sync group).
- [ ] Enable only sync with a large sync group (many entries).
- [ ] Enable only payments.
- [ ] Only import a large set of bookmarks.
- [ ] Combine sync, payments, and a large set of bookmarks.
## Bravery settings
- [ ] Check that HTTPS Everywhere works by loading http://https-everywhere.badssl.com/
- [ ] Turning HTTPS Everywhere off and shields off both disable the redirect to https://https-everywhere.badssl.com/
- [ ] Check that ad replacement works on http://slashdot.org
- [ ] Check that toggling to blocking and allow ads works as expected
- [ ] Test that clicking through a cert error in https://badssl.com/ works
- [ ] Test that Safe Browsing works (https://www.raisegame.com/)
- [ ] Turning Safe Browsing off and shields off both disable safe browsing for https://www.raisegame.com/
- [ ] Visit https://brianbondy.com/ and then turn on script blocking, nothing should load. Allow it from the script blocking UI in the URL bar and it should work
- [ ] Test that about:preferences default Bravery settings take effect on pages with no site settings
- [ ] Test that 3rd party storage results are blank at https://jsfiddle.net/7ke9r14a/9/ when 3rd party cookies are blocked and not blank when 3rd party cookies are unblocked
### Fingerprint Tests
- [ ] Visit https://jsfiddle.net/bkf50r8v/13/, ensure 3 blocked items are listed in shields. Result window should show `got canvas fingerprint 0` and `got webgl fingerprint 00`
- [ ] Test that audio fingerprint is blocked at https://audiofingerprint.openwpm.com/ only when `Block all fingerprinting protection` is on
- [ ] Test that Brave browser isn't detected on https://extensions.inrialpes.fr/brave/
- [ ] Test that https://diafygi.github.io/webrtc-ips/ doesn't leak IP address when `Block all fingerprinting protection` is on
## Content tests
- [ ] Go to https://brianbondy.com/ and click on the twitter icon on the top right. Test that context menus work in the new twitter tab
- [ ] Load twitter and click on a tweet so the popup div shows. Click to dismiss and repeat with another div. Make sure it shows
- [ ] Go to https://www.bennish.net/web-notifications.html and test that clicking on 'Show' pops up a notification asking for permission. Make sure that clicking 'Deny' leads to no notifications being shown
- [ ] Go to https://trac.torproject.org/projects/tor/login and make sure that the password can be saved. Make sure the saved password shows up in `about:passwords`. Then reload https://trac.torproject.org/projects/tor/login and make sure the saved credentials aren't autofilled instead shows saved id as a dropdown under the login field
- [ ] Open `about:styles` and type some misspellings on a textbox, make sure they are underlined.
- [ ] Make sure that right clicking on a word with suggestions gives a suggestion and that clicking on the suggestion replaces the text
- [ ] Make sure that Command + Click (Control + Click on Windows, Control + Click on Ubuntu) on a link opens a new tab but does NOT switch to it. Click on it and make sure it is already loaded
- [ ] Open an email on http://mail.google.com/ or inbox.google.com and click on a link. Make sure it works
- [ ] Test that PDF is loaded over https at https://basicattentiontoken.org/BasicAttentionTokenWhitePaper-4.pdf
- [ ] Test that PDF is loaded over http at http://www.pdf995.com/samples/pdf.pdf
- [ ] Test that https://mixed-script.badssl.com/ shows up as grey not red (no mixed content scripts are run).
- [ ] Test that hovering the cursor over a link changes the cursor into a pointer (hand)
- [ ] Visit https://dlptest.com/ftp-test/ and ensure that basic authentication is working by clicking on ftp://ftp.dlptest.com/ and ensuring you're prompted for credentials
- [ ] Test that WebSockets are working by ensuring http://slither.io/ runs once "Play" has been clicked.
## Ledger
- [ ] Verify wallet is auto created after enabling payments
- [ ] Verify monthly budget and account balance shows correct BAT and USD value
- [ ] Click on `add funds` and click on each currency and verify it shows wallet address and QR Code
- [ ] Verify that Brave BAT wallet address can be copied
- [ ] Verify adding funds via any of the currencies flows into BAT Wallet after specified amount of time
- [ ] Verify adding funds to an existing wallet with amount, adjusts the BAT value appropriately
- [ ] Change min visit and min time in advance setting and verify if the publisher list gets updated based on new setting
- [ ] Visit nytimes.com for a few seconds and make sure it shows up in the Payments table
- [ ] Check that disabling payments and enabling them again does not lose state
- [ ] Generate 500 ledger table entries using `npm run add-simulated-synopsis-visits 500`
- [ ] ensure that disabling/enabling Brave Payments several times doesn't cause any issues
- [ ] visit `about:preferences` and switch through all the available preference pages including Payments and ensure they're loading without issues
- [ ] ensure that loading/viewing `about:preferences#payments` doesn't cause the CPU to reach 100% of usage and cause performance issues
- [ ] ensure that both `Minimum page time` & `Minimum visits` work correctly with the large list of ledger entries
- [ ] ensure that you can sort the ledger table using `Site`, `Include`, `Views`, `Time Spent` and `%`
- [ ] Upgrade from older version
- [ ] Verify the wallet isn't corrupted upon upgrade (balance is retained and wallet backup code isn't corrupted)
- [ ] Verify publishers list is not lost after upgrade
### Ledger Media (To be verified on YouTube and Twitch)
- [ ] Visit any YouTube/Twitch video in a normal/session tab and ensure the video publisher name is listed in ledger table
- [ ] Visit any YouTube/Twitch video in a private tab and ensure the video publisher name is not listed in ledger table
- [ ] Visit any live YouTube/Twitch video and ensure the time spent is shown under ledger table
- [ ] Visit any embeded YouTube/Twitch video and ensure the video publisher name is listed in ledger table
- [ ] Ensure total time spent is correctly calculated for each publisher video
- [ ] Ensure total time spent is correctly calculated when switching to YouTube/Twitch video from an embeded video
- [ ] Ensure YouTube/Twitch publishers are not listed when `Allow contributions to video` is disabled in adavanced settings
- [ ] Ensure existing YouTube/Twitch publishers are not lost when `Allow contributions to video` is disabled in adavanced settings
- [ ] Ensure YouTube/Twitch publishers is listed but not included when `auto-include` is disabled
- [ ] Update Advanced settings to different time/visit value and ensure YouTube/Twitch videos are added to ledger table once criteria is met
- [ ] Perform a contribution while YouTube/Twitch channels are included on the ledger. Ensure the channels are listed on the contribution statement
- [ ] Verify that you are able to delete YouTube/Twitch publishers from ledger table
- [ ] Verify that you are able to re-add YouTube/Twitch publishers to ledger table
- [ ] Verify if you minimize a Twitch video (Stream/VOD) and navigate around the site, the video is counted in ledger
## Sync
- [ ] Verify you are able to sync two devices using the secret code
- [ ] Visit a site on device 1 and change shield setting, ensure that the saved site preference is synced to device 2
- [ ] Enable Browsing history sync on device 1, ensure the history is shown on device 2
- [ ] Clear browsing history on device 1, ensure the history is sync back on device 1 from device 2
- [ ] Import/Add bookmarks on device 1, ensure it is synced on device 2
- [ ] Ensure imported bookmark folder structure is maintained on device 2
- [ ] Ensure bookmark favicons are shown after sync
## Session storage
Do not forget to make a backup of your entire `~/Library/Application\ Support/Brave` folder.
- [ ] Temporarily move away your `~/Library/Application\ Support/Brave/session-store-1` and test that clean session storage works. (`%appdata%\Brave` in Windows, `./config/brave` in Ubuntu)
- [ ] Test that windows and tabs restore when closed, including active tab.
- [ ] Move away your entire `~/Library/Application\ Support/Brave` folder (`%appdata%\Brave` in Windows, `./config/brave` in Ubuntu)
## Cookie and Cache
- [ ] Make a backup of your profile, turn on all clearing in preferences and shut down. Make sure when you bring the browser back up everything is gone that is specified.
- [ ] Go to http://samy.pl/evercookie/ and set an evercookie. Check that going to prefs, clearing site data and cache, and going back to the Evercookie site does not remember the old evercookie value.
## Update tests
- [ ] Test that updating using `BRAVE_UPDATE_VERSION=0.8.3` env variable works correctly.
- [ ] Test that using `BRAVE_ENABLE_PREVIEW_UPDATES=TRUE` env variable works and prompts for preview build updates.
|
non_design
|
manual test run on os x for x beta channel per release specialty tests context menu search items doesn t use ddg if the private tab search engine is ddg pinned tabs shift when closing tabs before animating private tab doesn t allow torrent download allow site to run flash notifications should not appear on tor tabs closing the last tab on full tabstrip and moving mouse away does not restore tab width include easyprivacy by default clicking inside url bar but not directly on url string does not focus tab doesn t stop loading indicator when opening a torrent in tor private tab preferences menu icons looks smaller compared to the current icons set contribution notification displays undefined instead of bat save file export file renames to downloads instead of actual file name learn more link on private or tor tab opens a regular tab tor connection crashed after upgrade private tab icon is overlapping on the favicon when there are too many tabs opened brave stopped playing facebook videos visiting netflix in a private tab shows widevine notification on normal tabs no immediate visual feedback from url bar before page starts to load webrtc block sometimes not working on private tabs running tor webrtc not fully disabled with tor block referer based on etld instead of full origin closing fixed width tabs and then moving mouse away animates tabs past bounds of tab bar download bar cannot be closed with an active download replace moment with date fns for date helpers replace all css and selectors with data test id for webdriver tests tab size change should have transition animation installer check that installer is close to the size of last release check signature if os run spctl assess verbose applications brave app and make sure it returns accepted if windows right click on the installer exe and go to properties go to the digital signatures tab and double click on the signature make sure it says the digital signature is ok in the popup window check brave muon and libchromiumcontent version in about brave and make sure it is exactly as expected last changeset test test what is covered by the last changeset you can find this by clicking on the sha in about brave data make sure that data from the last version appears in the new version ok with data from the last version test that cookies are preserved pinned tabs can be opened pinned tabs can be unpinned unpinned tabs can be re pinned opened tabs can be reloaded bookmarks on the bookmark toolbar can be opened bookmarks in the bookmark folder toolbar can be opened about pages test that about adblock loads test that about autofill loads test that about bookmarks loads bookmarks test that about downloads loads downloads test that about extensions loads test that about history loads history test that about passwords loads test that about styles loads test that about welcome loads test that about preferences changing a preference takes effect right away test that about preferences language change takes effect on re start bookmarks test that creating a bookmark on the bookmarks toolbar with the star button works test that creating a bookmark on the bookmarks toolbar by dragging the un lock icon works test that creating a bookmark folder on the bookmarks toolbar works test that moving a bookmark into a folder by drag and drop on the bookmarks folder works test that clicking a bookmark in the toolbar loads the bookmark test that clicking a bookmark in a bookmark toolbar folder loads the bookmark test that a bookmark on the bookmark toolbar can be removed via context menu test that a bookmark in a bookmark folder on the bookmark toolbar can be removed via context menu test that a bookmark subfolder can be removed via context menu test that a bookmark folder on the bookmark toolbar can be removed via context menu context menus make sure context menu items in the url bar work make sure context menu items on content work with no selected text make sure context menu items on content work with selected text make sure context menu items on content work inside an editable control on about styles input textarea or contenteditable find on page ensure search box is shown with shortcut test successful find test forward and backward find navigation test failed find shows results test match case find keyboard shortcuts open a new window command n macos ctrl n win linux open a new tab command t macos ctrl t win linux open a new private tab command shift p macos ctrl shift p win linux reopen the latest closed tab command shift t macos ctrl shift t win linux reopen the latest closed window command shift option t macos ctrl shift alt t win linux jump to the next tab command option macos ctrl pgdn win linux jump to the previous tab command option macos ctrl pgup win linux jump to the next tab ctrl tab macos win linux jump to the previous tab ctrl shift tab macos win linux open brave preferences command macos ctrl win linux jump into the url bar command l macos ctrl l win linux reload page command r macos ctrl r win linux select all command a macos ctrl a win linux copying text command c macos ctrl c win linux pasting text command v macos ctrl v win linux minimize brave command m macos ctrl m win linux quit brave command q macos ctrl q win linux tabs pinning and tear off tabs test that tabs are pinnable test that tabs are unpinnable test that tabs are draggable to same tabset test that tabs are draggable to alternate tabset test that tabs can be teared off into a new window test that you are able to reattach a tab that is teared off into a new window test that tab pages can be closed test that tab pages can be muted test that tabs can be cloned downloads test downloading a file works and that all actions on the download item works fullscreen test that entering full screen window works view toggle full screen and exit back not esc test that entering full screen works and esc to go back youtube com zoom test zoom in out shortcut works test hamburger menu zooms test zoom saved when you close the browser and restore on a single site test zoom saved when you navigate within a single origin site test that navigating to a different origin resets the zoom printing test that you can print a pdf extensions plugins tests enable each extension one by one under about preferences extensions and ensure that the browser doesn t become unresponsive widevine test that you can log into netflix and start a show flash tests test that flash placeholder appears on test with flash enabled in preferences auto play option is shown when visiting autofill tests test that autofill works on verify clicking next button on doesn t crash the browser geolocation check that is blocked due to cross origin iframes check that works and shows correct location check that works but doesn t require an accurate location crash reporting check that loading chrome crash causes the new tab to crash check that chrome crashes lists all the crashes and includes both crash report id local crash id verify the crash id matches the report on brave stats performance test each start should take less than seconds enable only sync new sync group enable only sync with a large sync group many entries enable only payments only import a large set of bookmarks combine sync payments and a large set of bookmarks bravery settings check that https everywhere works by loading turning https everywhere off and shields off both disable the redirect to check that ad replacement works on check that toggling to blocking and allow ads works as expected test that clicking through a cert error in works test that safe browsing works turning safe browsing off and shields off both disable safe browsing for visit and then turn on script blocking nothing should load allow it from the script blocking ui in the url bar and it should work test that about preferences default bravery settings take effect on pages with no site settings test that party storage results are blank at when party cookies are blocked and not blank when party cookies are unblocked fingerprint tests visit ensure blocked items are listed in shields result window should show got canvas fingerprint and got webgl fingerprint test that audio fingerprint is blocked at only when block all fingerprinting protection is on test that brave browser isn t detected on test that doesn t leak ip address when block all fingerprinting protection is on content tests go to and click on the twitter icon on the top right test that context menus work in the new twitter tab load twitter and click on a tweet so the popup div shows click to dismiss and repeat with another div make sure it shows go to and test that clicking on show pops up a notification asking for permission make sure that clicking deny leads to no notifications being shown go to and make sure that the password can be saved make sure the saved password shows up in about passwords then reload and make sure the saved credentials aren t autofilled instead shows saved id as a dropdown under the login field open about styles and type some misspellings on a textbox make sure they are underlined make sure that right clicking on a word with suggestions gives a suggestion and that clicking on the suggestion replaces the text make sure that command click control click on windows control click on ubuntu on a link opens a new tab but does not switch to it click on it and make sure it is already loaded open an email on or inbox google com and click on a link make sure it works test that pdf is loaded over https at test that pdf is loaded over http at test that shows up as grey not red no mixed content scripts are run test that hovering the cursor over a link changes the cursor into a pointer hand visit and ensure that basic authentication is working by clicking on ftp ftp dlptest com and ensuring you re prompted for credentials test that websockets are working by ensuring runs once play has been clicked ledger verify wallet is auto created after enabling payments verify monthly budget and account balance shows correct bat and usd value click on add funds and click on each currency and verify it shows wallet address and qr code verify that brave bat wallet address can be copied verify adding funds via any of the currencies flows into bat wallet after specified amount of time verify adding funds to an existing wallet with amount adjusts the bat value appropriately change min visit and min time in advance setting and verify if the publisher list gets updated based on new setting visit nytimes com for a few seconds and make sure it shows up in the payments table check that disabling payments and enabling them again does not lose state generate ledger table entries using npm run add simulated synopsis visits ensure that disabling enabling brave payments several times doesn t cause any issues visit about preferences and switch through all the available preference pages including payments and ensure they re loading without issues ensure that loading viewing about preferences payments doesn t cause the cpu to reach of usage and cause performance issues ensure that both minimum page time minimum visits work correctly with the large list of ledger entries ensure that you can sort the ledger table using site include views time spent and upgrade from older version verify the wallet isn t corrupted upon upgrade balance is retained and wallet backup code isn t corrupted verify publishers list is not lost after upgrade ledger media to be verified on youtube and twitch visit any youtube twitch video in a normal session tab and ensure the video publisher name is listed in ledger table visit any youtube twitch video in a private tab and ensure the video publisher name is not listed in ledger table visit any live youtube twitch video and ensure the time spent is shown under ledger table visit any embeded youtube twitch video and ensure the video publisher name is listed in ledger table ensure total time spent is correctly calculated for each publisher video ensure total time spent is correctly calculated when switching to youtube twitch video from an embeded video ensure youtube twitch publishers are not listed when allow contributions to video is disabled in adavanced settings ensure existing youtube twitch publishers are not lost when allow contributions to video is disabled in adavanced settings ensure youtube twitch publishers is listed but not included when auto include is disabled update advanced settings to different time visit value and ensure youtube twitch videos are added to ledger table once criteria is met perform a contribution while youtube twitch channels are included on the ledger ensure the channels are listed on the contribution statement verify that you are able to delete youtube twitch publishers from ledger table verify that you are able to re add youtube twitch publishers to ledger table verify if you minimize a twitch video stream vod and navigate around the site the video is counted in ledger sync verify you are able to sync two devices using the secret code visit a site on device and change shield setting ensure that the saved site preference is synced to device enable browsing history sync on device ensure the history is shown on device clear browsing history on device ensure the history is sync back on device from device import add bookmarks on device ensure it is synced on device ensure imported bookmark folder structure is maintained on device ensure bookmark favicons are shown after sync session storage do not forget to make a backup of your entire library application support brave folder temporarily move away your library application support brave session store and test that clean session storage works appdata brave in windows config brave in ubuntu test that windows and tabs restore when closed including active tab move away your entire library application support brave folder appdata brave in windows config brave in ubuntu cookie and cache make a backup of your profile turn on all clearing in preferences and shut down make sure when you bring the browser back up everything is gone that is specified go to and set an evercookie check that going to prefs clearing site data and cache and going back to the evercookie site does not remember the old evercookie value update tests test that updating using brave update version env variable works correctly test that using brave enable preview updates true env variable works and prompts for preview build updates
| 0
|
146,215
| 23,031,877,848
|
IssuesEvent
|
2022-07-22 14:38:40
|
coder/coder
|
https://api.github.com/repos/coder/coder
|
closed
|
Add icons to the workspace resources
|
design
|
Initial proposal:
<img width="1347" alt="Screen Shot 2022-07-20 at 13 57 51" src="https://user-images.githubusercontent.com/3165839/180040046-a63b8797-8a6b-43e8-829b-38e9c34784b4.png">
Discord discussion:
https://discord.com/channels/747933592273027093/991429648200245358/999314552560824441
Notes:
- Drop the color changes
- Try to make it more simple
- Increase the contrast and make it more visible
- The plan is to still keep using the text
|
1.0
|
Add icons to the workspace resources - Initial proposal:
<img width="1347" alt="Screen Shot 2022-07-20 at 13 57 51" src="https://user-images.githubusercontent.com/3165839/180040046-a63b8797-8a6b-43e8-829b-38e9c34784b4.png">
Discord discussion:
https://discord.com/channels/747933592273027093/991429648200245358/999314552560824441
Notes:
- Drop the color changes
- Try to make it more simple
- Increase the contrast and make it more visible
- The plan is to still keep using the text
|
design
|
add icons to the workspace resources initial proposal img width alt screen shot at src discord discussion notes drop the color changes try to make it more simple increase the contrast and make it more visible the plan is to still keep using the text
| 1
|
178,188
| 29,512,923,470
|
IssuesEvent
|
2023-06-04 06:11:43
|
SeSACTHON-Winner/SeSACTHON-Front
|
https://api.github.com/repos/SeSACTHON-Winner/SeSACTHON-Front
|
opened
|
[Feat] - Navigation기능 삭제 & MapAnnotation 뷰 만들기
|
Design
|
## To Do
- [ ] Navigation기능 삭제
- [ ] MapAnnotation 뷰 만들기
|
1.0
|
[Feat] - Navigation기능 삭제 & MapAnnotation 뷰 만들기 - ## To Do
- [ ] Navigation기능 삭제
- [ ] MapAnnotation 뷰 만들기
|
design
|
navigation기능 삭제 mapannotation 뷰 만들기 to do navigation기능 삭제 mapannotation 뷰 만들기
| 1
|
125,177
| 4,953,650,519
|
IssuesEvent
|
2016-12-01 15:36:32
|
department-of-veterans-affairs/vets-website
|
https://api.github.com/repos/department-of-veterans-affairs/vets-website
|
opened
|
FL Header consistencies
|
enhancement FL low-priority
|
Couple of header size inconsistencies. Please check the following
- [ ] Page headers should be `h1` instead of `h3`
- [ ] Service and Facility Locator on search page
- [ ] Name of facility on detail page
- [ ] In detail page, sidebar headings should use `h4 highlight` class
- [ ] View on Map
- [ ] Hours of Operation
- [ ] Access to Care
- [ ] In detail page, Services header should be `h2` We probably need to make a `h2 highlight`
- [ ] All border-bottom color should be primary blue
cc @melwoodard
|
1.0
|
FL Header consistencies - Couple of header size inconsistencies. Please check the following
- [ ] Page headers should be `h1` instead of `h3`
- [ ] Service and Facility Locator on search page
- [ ] Name of facility on detail page
- [ ] In detail page, sidebar headings should use `h4 highlight` class
- [ ] View on Map
- [ ] Hours of Operation
- [ ] Access to Care
- [ ] In detail page, Services header should be `h2` We probably need to make a `h2 highlight`
- [ ] All border-bottom color should be primary blue
cc @melwoodard
|
non_design
|
fl header consistencies couple of header size inconsistencies please check the following page headers should be instead of service and facility locator on search page name of facility on detail page in detail page sidebar headings should use highlight class view on map hours of operation access to care in detail page services header should be we probably need to make a highlight all border bottom color should be primary blue cc melwoodard
| 0
|
150,316
| 19,603,608,856
|
IssuesEvent
|
2022-01-06 06:06:57
|
snykiotcubedev/react-17.0.2
|
https://api.github.com/repos/snykiotcubedev/react-17.0.2
|
opened
|
CVE-2021-3803 (High) detected in nth-check-1.0.1.tgz, nth-check-1.0.2.tgz
|
security vulnerability
|
## CVE-2021-3803 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>nth-check-1.0.1.tgz</b>, <b>nth-check-1.0.2.tgz</b></p></summary>
<p>
<details><summary><b>nth-check-1.0.1.tgz</b></p></summary>
<p>performant nth-check parser & compiler</p>
<p>Library home page: <a href="https://registry.npmjs.org/nth-check/-/nth-check-1.0.1.tgz">https://registry.npmjs.org/nth-check/-/nth-check-1.0.1.tgz</a></p>
<p>
Dependency Hierarchy:
- react-scripts-1.1.4.tgz (Root Library)
- html-webpack-plugin-2.29.0.tgz
- pretty-error-2.1.1.tgz
- renderkid-2.0.1.tgz
- css-select-1.2.0.tgz
- :x: **nth-check-1.0.1.tgz** (Vulnerable Library)
</details>
<details><summary><b>nth-check-1.0.2.tgz</b></p></summary>
<p>performant nth-check parser & compiler</p>
<p>Library home page: <a href="https://registry.npmjs.org/nth-check/-/nth-check-1.0.2.tgz">https://registry.npmjs.org/nth-check/-/nth-check-1.0.2.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/nth-check/package.json</p>
<p>
Dependency Hierarchy:
- react-scripts-3.4.1.tgz (Root Library)
- html-webpack-plugin-4.0.0-beta.11.tgz
- pretty-error-2.1.1.tgz
- renderkid-2.0.3.tgz
- css-select-1.2.0.tgz
- :x: **nth-check-1.0.2.tgz** (Vulnerable Library)
</details>
<p>Found in HEAD commit: <a href="https://github.com/snykiotcubedev/react-17.0.2/commit/c546697344431dcd6c04b4fea877c488ef3a6ad5">c546697344431dcd6c04b4fea877c488ef3a6ad5</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
nth-check is vulnerable to Inefficient Regular Expression Complexity
<p>Publish Date: 2021-09-17
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-3803>CVE-2021-3803</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/fb55/nth-check/compare/v2.0.0...v2.0.1">https://github.com/fb55/nth-check/compare/v2.0.0...v2.0.1</a></p>
<p>Release Date: 2021-09-17</p>
<p>Fix Resolution: nth-check - v2.0.1</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
True
|
CVE-2021-3803 (High) detected in nth-check-1.0.1.tgz, nth-check-1.0.2.tgz - ## CVE-2021-3803 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>nth-check-1.0.1.tgz</b>, <b>nth-check-1.0.2.tgz</b></p></summary>
<p>
<details><summary><b>nth-check-1.0.1.tgz</b></p></summary>
<p>performant nth-check parser & compiler</p>
<p>Library home page: <a href="https://registry.npmjs.org/nth-check/-/nth-check-1.0.1.tgz">https://registry.npmjs.org/nth-check/-/nth-check-1.0.1.tgz</a></p>
<p>
Dependency Hierarchy:
- react-scripts-1.1.4.tgz (Root Library)
- html-webpack-plugin-2.29.0.tgz
- pretty-error-2.1.1.tgz
- renderkid-2.0.1.tgz
- css-select-1.2.0.tgz
- :x: **nth-check-1.0.1.tgz** (Vulnerable Library)
</details>
<details><summary><b>nth-check-1.0.2.tgz</b></p></summary>
<p>performant nth-check parser & compiler</p>
<p>Library home page: <a href="https://registry.npmjs.org/nth-check/-/nth-check-1.0.2.tgz">https://registry.npmjs.org/nth-check/-/nth-check-1.0.2.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/nth-check/package.json</p>
<p>
Dependency Hierarchy:
- react-scripts-3.4.1.tgz (Root Library)
- html-webpack-plugin-4.0.0-beta.11.tgz
- pretty-error-2.1.1.tgz
- renderkid-2.0.3.tgz
- css-select-1.2.0.tgz
- :x: **nth-check-1.0.2.tgz** (Vulnerable Library)
</details>
<p>Found in HEAD commit: <a href="https://github.com/snykiotcubedev/react-17.0.2/commit/c546697344431dcd6c04b4fea877c488ef3a6ad5">c546697344431dcd6c04b4fea877c488ef3a6ad5</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
nth-check is vulnerable to Inefficient Regular Expression Complexity
<p>Publish Date: 2021-09-17
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-3803>CVE-2021-3803</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/fb55/nth-check/compare/v2.0.0...v2.0.1">https://github.com/fb55/nth-check/compare/v2.0.0...v2.0.1</a></p>
<p>Release Date: 2021-09-17</p>
<p>Fix Resolution: nth-check - v2.0.1</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
non_design
|
cve high detected in nth check tgz nth check tgz cve high severity vulnerability vulnerable libraries nth check tgz nth check tgz nth check tgz performant nth check parser compiler library home page a href dependency hierarchy react scripts tgz root library html webpack plugin tgz pretty error tgz renderkid tgz css select tgz x nth check tgz vulnerable library nth check tgz performant nth check parser compiler library home page a href path to dependency file package json path to vulnerable library node modules nth check package json dependency hierarchy react scripts tgz root library html webpack plugin beta tgz pretty error tgz renderkid tgz css select tgz x nth check tgz vulnerable library found in head commit a href found in base branch main vulnerability details nth check is vulnerable to inefficient regular expression complexity publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution nth check step up your open source security game with whitesource
| 0
|
96,918
| 28,050,602,753
|
IssuesEvent
|
2023-03-29 05:15:38
|
PaddlePaddle/Paddle
|
https://api.github.com/repos/PaddlePaddle/Paddle
|
closed
|
在MacOS下编译Paddle无法重复make
|
status/following-up type/build PFCC
|
### 问题描述 Issue Description
```bash
make -j$(nproc)
```
```
[ 0%] copy_if_different /Users/wangxin/repos/Paddle/build/paddle/phi/kernels/declarations.h
[ 0%] copy_if_different /Users/wangxin/repos/Paddle/build/paddle/fluid/inference/api/paddle_inference_pass.h
[ 0%] Built target extern_zlib
[ 0%] copy_if_different /Users/wangxin/repos/Paddle/build/paddle/fluid/operators/jit/kernels.h
[ 0%] Built target extern_eigen3
[ 1%] Built target extern_gflags
[ 2%] Built target extern_threadpool
[ 2%] copy_if_different /Users/wangxin/repos/Paddle/build/paddle/fluid/pybind/pybind.h
[ 2%] copy_if_different /Users/wangxin/repos/Paddle/build/paddle/phi/ops/compat/signatures.h
[ 2%] Built target extern_dlpack
[ 2%] Built target copy_paddle_inference_pass_command
[ 2%] Built target copy_declarations_command
[ 2%] Built target copy_kernels_command
[ 2%] Built target copy_signatures_command
[ 2%] Built target copy_pybind_command
[ 2%] Built target extern_lapack
[ 2%] Built target extern_warpctc
[ 3%] Built target extern_warprnnt
[ 3%] Built target extern_utf8proc
[ 4%] Built target extern_openblas
[ 4%] Built target extern_cryptopp
[ 4%] Built target extern_pybind
[ 4%] Built target extern_pocketfft
[ 4%] Built target extern_protobuf
...
adding 'paddle/vision/transforms/__init__.py'
adding 'paddle/vision/transforms/functional.py'
adding 'paddle/vision/transforms/functional_cv2.py'
adding 'paddle/vision/transforms/functional_pil.py'
adding 'paddle/vision/transforms/functional_tensor.py'
adding 'paddle/vision/transforms/transforms.py'
adding 'paddlepaddle-0.0.0.data/scripts/paddle'
adding 'paddlepaddle-0.0.0.dist-info/LICENSE'
adding 'paddlepaddle-0.0.0.dist-info/METADATA'
adding 'paddlepaddle-0.0.0.dist-info/WHEEL'
adding 'paddlepaddle-0.0.0.dist-info/entry_points.txt'
adding 'paddlepaddle-0.0.0.dist-info/top_level.txt'
adding 'paddlepaddle-0.0.0.dist-info/RECORD'
removing build/bdist.macosx-11.1-arm64/wheel
[100%] Built target paddle_python
```
```bash
make -j$(nproc)
```
```
[ 0%] copy_if_different /Users/wangxin/repos/Paddle/build/paddle/fluid/pybind/pybind.h
[ 0%] Built target extern_zlib
[ 0%] copy_if_different /Users/wangxin/repos/Paddle/build/paddle/phi/ops/compat/signatures.h
[ 0%] copy_if_different /Users/wangxin/repos/Paddle/build/paddle/fluid/operators/jit/kernels.h
[ 1%] Built target extern_gflags
[ 1%] copy_if_different /Users/wangxin/repos/Paddle/build/paddle/phi/kernels/declarations.h
[ 1%] Built target extern_eigen3
[ 1%] Built target extern_dlpack
[ 2%] Built target extern_threadpool
[ 2%] copy_if_different /Users/wangxin/repos/Paddle/build/paddle/fluid/inference/api/paddle_inference_pass.h
[ 2%] Built target copy_signatures_command
[ 2%] Built target copy_pybind_command
[ 2%] Built target copy_kernels_command
[ 2%] Built target copy_declarations_command
[ 2%] Built target extern_warpctc
[ 2%] Built target copy_paddle_inference_pass_command
[ 3%] Built target extern_openblas
[ 4%] Built target extern_warprnnt
[ 4%] Built target extern_utf8proc
[ 4%] Built target extern_lapack
[ 4%] Built target extern_pybind
[ 4%] Built target extern_cryptopp
...
[100%] Built target inference_lib_dist
error: /Applications/Xcode.app/Contents/Developer/Toolchains/XcodeDefault.xctoolchain/usr/bin/install_name_tool: for: /Users/wangxin/repos/Paddle/build/python/paddle/fluid/libpaddle.so (for architecture arm64) option "-add_rpath @loader_path/../libs/" would duplicate path, file already has LC_RPATH for: @loader_path/../libs/
Traceback (most recent call last):
File "/Users/wangxin/repos/Paddle/build/python/setup.py", line 668, in <module>
raise Exception("patch libpaddle.%s failed, command: %s" % (ext_name, command))
Exception: patch libpaddle..dylib failed, command: install_name_tool -add_rpath '@loader_path/../libs/' /Users/wangxin/repos/Paddle/build/python/paddle/fluid/libpaddle.so
copying /Users/wangxin/repos/Paddle/paddle/fluid/inference/*.h -> /Users/wangxin/repos/Paddle/build/paddle_install_dir/paddle/fluid/inference
make[2]: *** [python/build/.timestamp] Error 1
make[1]: *** [python/CMakeFiles/paddle_python.dir/all] Error 2
make[1]: *** Waiting for unfinished jobs....
```
### 版本&环境信息 Version & Environment Information
Paddle version: N/A
Paddle With CUDA: N/A
OS: macOS 13.2.1
GCC version: N/A
Clang version: 14.0.0 (clang-1400.0.29.202)
CMake version: version 3.25.2
Libc version: N/A
Python version: 3.10.9
CUDA version: N/A
cuDNN version: N/A
Nvidia driver version: N/A
Nvidia driver List: N/A
|
1.0
|
在MacOS下编译Paddle无法重复make - ### 问题描述 Issue Description
```bash
make -j$(nproc)
```
```
[ 0%] copy_if_different /Users/wangxin/repos/Paddle/build/paddle/phi/kernels/declarations.h
[ 0%] copy_if_different /Users/wangxin/repos/Paddle/build/paddle/fluid/inference/api/paddle_inference_pass.h
[ 0%] Built target extern_zlib
[ 0%] copy_if_different /Users/wangxin/repos/Paddle/build/paddle/fluid/operators/jit/kernels.h
[ 0%] Built target extern_eigen3
[ 1%] Built target extern_gflags
[ 2%] Built target extern_threadpool
[ 2%] copy_if_different /Users/wangxin/repos/Paddle/build/paddle/fluid/pybind/pybind.h
[ 2%] copy_if_different /Users/wangxin/repos/Paddle/build/paddle/phi/ops/compat/signatures.h
[ 2%] Built target extern_dlpack
[ 2%] Built target copy_paddle_inference_pass_command
[ 2%] Built target copy_declarations_command
[ 2%] Built target copy_kernels_command
[ 2%] Built target copy_signatures_command
[ 2%] Built target copy_pybind_command
[ 2%] Built target extern_lapack
[ 2%] Built target extern_warpctc
[ 3%] Built target extern_warprnnt
[ 3%] Built target extern_utf8proc
[ 4%] Built target extern_openblas
[ 4%] Built target extern_cryptopp
[ 4%] Built target extern_pybind
[ 4%] Built target extern_pocketfft
[ 4%] Built target extern_protobuf
...
adding 'paddle/vision/transforms/__init__.py'
adding 'paddle/vision/transforms/functional.py'
adding 'paddle/vision/transforms/functional_cv2.py'
adding 'paddle/vision/transforms/functional_pil.py'
adding 'paddle/vision/transforms/functional_tensor.py'
adding 'paddle/vision/transforms/transforms.py'
adding 'paddlepaddle-0.0.0.data/scripts/paddle'
adding 'paddlepaddle-0.0.0.dist-info/LICENSE'
adding 'paddlepaddle-0.0.0.dist-info/METADATA'
adding 'paddlepaddle-0.0.0.dist-info/WHEEL'
adding 'paddlepaddle-0.0.0.dist-info/entry_points.txt'
adding 'paddlepaddle-0.0.0.dist-info/top_level.txt'
adding 'paddlepaddle-0.0.0.dist-info/RECORD'
removing build/bdist.macosx-11.1-arm64/wheel
[100%] Built target paddle_python
```
```bash
make -j$(nproc)
```
```
[ 0%] copy_if_different /Users/wangxin/repos/Paddle/build/paddle/fluid/pybind/pybind.h
[ 0%] Built target extern_zlib
[ 0%] copy_if_different /Users/wangxin/repos/Paddle/build/paddle/phi/ops/compat/signatures.h
[ 0%] copy_if_different /Users/wangxin/repos/Paddle/build/paddle/fluid/operators/jit/kernels.h
[ 1%] Built target extern_gflags
[ 1%] copy_if_different /Users/wangxin/repos/Paddle/build/paddle/phi/kernels/declarations.h
[ 1%] Built target extern_eigen3
[ 1%] Built target extern_dlpack
[ 2%] Built target extern_threadpool
[ 2%] copy_if_different /Users/wangxin/repos/Paddle/build/paddle/fluid/inference/api/paddle_inference_pass.h
[ 2%] Built target copy_signatures_command
[ 2%] Built target copy_pybind_command
[ 2%] Built target copy_kernels_command
[ 2%] Built target copy_declarations_command
[ 2%] Built target extern_warpctc
[ 2%] Built target copy_paddle_inference_pass_command
[ 3%] Built target extern_openblas
[ 4%] Built target extern_warprnnt
[ 4%] Built target extern_utf8proc
[ 4%] Built target extern_lapack
[ 4%] Built target extern_pybind
[ 4%] Built target extern_cryptopp
...
[100%] Built target inference_lib_dist
error: /Applications/Xcode.app/Contents/Developer/Toolchains/XcodeDefault.xctoolchain/usr/bin/install_name_tool: for: /Users/wangxin/repos/Paddle/build/python/paddle/fluid/libpaddle.so (for architecture arm64) option "-add_rpath @loader_path/../libs/" would duplicate path, file already has LC_RPATH for: @loader_path/../libs/
Traceback (most recent call last):
File "/Users/wangxin/repos/Paddle/build/python/setup.py", line 668, in <module>
raise Exception("patch libpaddle.%s failed, command: %s" % (ext_name, command))
Exception: patch libpaddle..dylib failed, command: install_name_tool -add_rpath '@loader_path/../libs/' /Users/wangxin/repos/Paddle/build/python/paddle/fluid/libpaddle.so
copying /Users/wangxin/repos/Paddle/paddle/fluid/inference/*.h -> /Users/wangxin/repos/Paddle/build/paddle_install_dir/paddle/fluid/inference
make[2]: *** [python/build/.timestamp] Error 1
make[1]: *** [python/CMakeFiles/paddle_python.dir/all] Error 2
make[1]: *** Waiting for unfinished jobs....
```
### 版本&环境信息 Version & Environment Information
Paddle version: N/A
Paddle With CUDA: N/A
OS: macOS 13.2.1
GCC version: N/A
Clang version: 14.0.0 (clang-1400.0.29.202)
CMake version: version 3.25.2
Libc version: N/A
Python version: 3.10.9
CUDA version: N/A
cuDNN version: N/A
Nvidia driver version: N/A
Nvidia driver List: N/A
|
non_design
|
在macos下编译paddle无法重复make 问题描述 issue description bash make j nproc copy if different users wangxin repos paddle build paddle phi kernels declarations h copy if different users wangxin repos paddle build paddle fluid inference api paddle inference pass h built target extern zlib copy if different users wangxin repos paddle build paddle fluid operators jit kernels h built target extern built target extern gflags built target extern threadpool copy if different users wangxin repos paddle build paddle fluid pybind pybind h copy if different users wangxin repos paddle build paddle phi ops compat signatures h built target extern dlpack built target copy paddle inference pass command built target copy declarations command built target copy kernels command built target copy signatures command built target copy pybind command built target extern lapack built target extern warpctc built target extern warprnnt built target extern built target extern openblas built target extern cryptopp built target extern pybind built target extern pocketfft built target extern protobuf adding paddle vision transforms init py adding paddle vision transforms functional py adding paddle vision transforms functional py adding paddle vision transforms functional pil py adding paddle vision transforms functional tensor py adding paddle vision transforms transforms py adding paddlepaddle data scripts paddle adding paddlepaddle dist info license adding paddlepaddle dist info metadata adding paddlepaddle dist info wheel adding paddlepaddle dist info entry points txt adding paddlepaddle dist info top level txt adding paddlepaddle dist info record removing build bdist macosx wheel built target paddle python bash make j nproc copy if different users wangxin repos paddle build paddle fluid pybind pybind h built target extern zlib copy if different users wangxin repos paddle build paddle phi ops compat signatures h copy if different users wangxin repos paddle build paddle fluid operators jit kernels h built target extern gflags copy if different users wangxin repos paddle build paddle phi kernels declarations h built target extern built target extern dlpack built target extern threadpool copy if different users wangxin repos paddle build paddle fluid inference api paddle inference pass h built target copy signatures command built target copy pybind command built target copy kernels command built target copy declarations command built target extern warpctc built target copy paddle inference pass command built target extern openblas built target extern warprnnt built target extern built target extern lapack built target extern pybind built target extern cryptopp built target inference lib dist error applications xcode app contents developer toolchains xcodedefault xctoolchain usr bin install name tool for users wangxin repos paddle build python paddle fluid libpaddle so for architecture option add rpath loader path libs would duplicate path file already has lc rpath for loader path libs traceback most recent call last file users wangxin repos paddle build python setup py line in raise exception patch libpaddle s failed command s ext name command exception patch libpaddle dylib failed command install name tool add rpath loader path libs users wangxin repos paddle build python paddle fluid libpaddle so copying users wangxin repos paddle paddle fluid inference h users wangxin repos paddle build paddle install dir paddle fluid inference make error make error make waiting for unfinished jobs 版本 环境信息 version environment information paddle version n a paddle with cuda n a os macos gcc version n a clang version clang cmake version version libc version n a python version cuda version n a cudnn version n a nvidia driver version n a nvidia driver list n a
| 0
|
380,047
| 26,399,381,939
|
IssuesEvent
|
2023-01-12 22:58:26
|
chatwoot/chatwoot
|
https://api.github.com/repos/chatwoot/chatwoot
|
closed
|
yaml key duplication results in not all calls appearing in API docs
|
documentation
|
I've noticed that some duplicate keys appear in the swagger paths yaml files. This results in only one of the duplicated calls appearing in the final swagger.json.
Some examples of this:
https://github.com/chatwoot/chatwoot/blob/2880f4942a03a4a4ee40b023d00ae24da99e8ab7/swagger/paths/index.yml#L4-L8
https://github.com/chatwoot/chatwoot/blob/2880f4942a03a4a4ee40b023d00ae24da99e8ab7/swagger/paths/conversation/index_or_create.yml#L1-L81
Possible solution for the first instance of the issue:
````
# Inboxes
/accounts/{account_id}/inboxes:
get:
$ref: ./inboxes/index.yml
post:
$ref: ./inboxes/create.yml
````
The second one is more difficult since I don't think swagger can differentiate between two GET calls with different query parameters and request bodies. This could possibly require a change in the API path.
|
1.0
|
yaml key duplication results in not all calls appearing in API docs - I've noticed that some duplicate keys appear in the swagger paths yaml files. This results in only one of the duplicated calls appearing in the final swagger.json.
Some examples of this:
https://github.com/chatwoot/chatwoot/blob/2880f4942a03a4a4ee40b023d00ae24da99e8ab7/swagger/paths/index.yml#L4-L8
https://github.com/chatwoot/chatwoot/blob/2880f4942a03a4a4ee40b023d00ae24da99e8ab7/swagger/paths/conversation/index_or_create.yml#L1-L81
Possible solution for the first instance of the issue:
````
# Inboxes
/accounts/{account_id}/inboxes:
get:
$ref: ./inboxes/index.yml
post:
$ref: ./inboxes/create.yml
````
The second one is more difficult since I don't think swagger can differentiate between two GET calls with different query parameters and request bodies. This could possibly require a change in the API path.
|
non_design
|
yaml key duplication results in not all calls appearing in api docs i ve noticed that some duplicate keys appear in the swagger paths yaml files this results in only one of the duplicated calls appearing in the final swagger json some examples of this possible solution for the first instance of the issue inboxes accounts account id inboxes get ref inboxes index yml post ref inboxes create yml the second one is more difficult since i don t think swagger can differentiate between two get calls with different query parameters and request bodies this could possibly require a change in the api path
| 0
|
213,859
| 24,022,466,862
|
IssuesEvent
|
2022-09-15 08:47:57
|
sast-automation-dev/vulnado-25
|
https://api.github.com/repos/sast-automation-dev/vulnado-25
|
opened
|
spring-boot-starter-web-2.1.2.RELEASE.jar: 68 vulnerabilities (highest severity is: 9.8)
|
security vulnerability
|
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>spring-boot-starter-web-2.1.2.RELEASE.jar</b></p></summary>
<p></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-web/5.1.4.RELEASE/spring-web-5.1.4.RELEASE.jar</p>
<p>
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/vulnado-25/commit/8124ec9320e9726976350f7385af80f7e6c3021d">8124ec9320e9726976350f7385af80f7e6c3021d</a></p></details>
## Vulnerabilities
| CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in | Remediation Available |
| ------------- | ------------- | ----- | ----- | ----- | --- | --- |
| [CVE-2019-14540](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-14540) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | ✅ |
| [CVE-2019-17531](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-17531) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | ✅ |
| [CVE-2016-1000027](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-1000027) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | spring-web-5.1.4.RELEASE.jar | Transitive | 2.1.15.RELEASE | ✅ |
| [CVE-2019-16335](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-16335) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.8.jar | Transitive | 2.1.10.RELEASE | ✅ |
| [CVE-2019-17267](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-17267) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.8.jar | Transitive | 2.1.10.RELEASE | ✅ |
| [CVE-2020-8840](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-8840) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | ✅ |
| [CVE-2019-16942](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-16942) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | ✅ |
| [CVE-2019-16943](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-16943) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | ✅ |
| [CVE-2019-14893](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-14893) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.8.jar | Transitive | 2.1.10.RELEASE | ✅ |
| [CVE-2019-14892](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-14892) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.8.jar | Transitive | 2.1.10.RELEASE | ✅ |
| [CVE-2020-9546](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-9546) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | ✅ |
| [CVE-2020-9547](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-9547) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | ✅ |
| [CVE-2019-14379](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-14379) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.8.jar | Transitive | 2.1.10.RELEASE | ✅ |
| [CVE-2020-9548](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-9548) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | ✅ |
| [CVE-2019-20330](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-20330) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | ✅ |
| [CVE-2020-10968](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-10968) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | jackson-databind-2.9.8.jar | Transitive | 2.1.6.RELEASE | ✅ |
| [CVE-2020-10969](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-10969) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | ✅ |
| [CVE-2020-11111](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11111) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | ✅ |
| [CVE-2020-11113](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11113) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | ✅ |
| [CVE-2020-11112](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11112) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | ✅ |
| [CVE-2020-10672](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-10672) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | ✅ |
| [CVE-2020-10673](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-10673) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | ✅ |
| [CVE-2019-0232](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-0232) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | tomcat-embed-core-9.0.14.jar | Transitive | 2.1.5.RELEASE | ✅ |
| [CVE-2020-11619](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11619) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | ✅ |
| [CVE-2020-35728](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-35728) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | ✅ |
| [CVE-2020-36189](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36189) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | ✅ |
| [CVE-2020-36188](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36188) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | ✅ |
| [CVE-2020-11620](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11620) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | ✅ |
| [CVE-2020-36181](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36181) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | ✅ |
| [CVE-2020-36180](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36180) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | ✅ |
| [CVE-2020-35490](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-35490) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | ✅ |
| [CVE-2020-36183](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36183) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | ✅ |
| [CVE-2020-36182](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36182) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | ✅ |
| [CVE-2020-36185](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36185) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | ✅ |
| [CVE-2020-35491](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-35491) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | ✅ |
| [CVE-2020-36184](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36184) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | ✅ |
| [CVE-2020-36187](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36187) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | ✅ |
| [CVE-2020-36186](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36186) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | ✅ |
| [CVE-2021-20190](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-20190) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | ✅ |
| [CVE-2020-36179](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36179) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | ✅ |
| [CVE-2020-24616](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-24616) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | ✅ |
| [CVE-2020-14060](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-14060) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | ✅ |
| [CVE-2020-14061](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-14061) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | ✅ |
| [CVE-2020-14062](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-14062) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | ✅ |
| [CVE-2020-24750](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-24750) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | ✅ |
| [CVE-2020-14195](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-14195) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | ✅ |
| [CVE-2019-12086](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-12086) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | jackson-databind-2.9.8.jar | Transitive | 2.1.6.RELEASE | ✅ |
| [CVE-2020-25649](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-25649) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | ✅ |
| [CVE-2020-5398](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-5398) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | spring-web-5.1.4.RELEASE.jar | Transitive | 2.1.12.RELEASE | ✅ |
| [CVE-2019-10072](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-10072) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | tomcat-embed-core-9.0.14.jar | Transitive | 2.1.6.RELEASE | ✅ |
| [CVE-2019-14439](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-14439) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | jackson-databind-2.9.8.jar | Transitive | 2.1.10.RELEASE | ✅ |
| [CVE-2021-25122](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-25122) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | tomcat-embed-core-9.0.14.jar | Transitive | 2.1.7.RELEASE | ✅ |
| [CVE-2019-17563](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-17563) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | tomcat-embed-core-9.0.14.jar | Transitive | 2.1.7.RELEASE | ✅ |
| [CVE-2020-11996](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11996) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | tomcat-embed-core-9.0.14.jar | Transitive | 2.1.7.RELEASE | ✅ |
| [CVE-2020-13934](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-13934) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | tomcat-embed-core-9.0.14.jar | Transitive | 2.1.7.RELEASE | ✅ |
| [CVE-2020-13935](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-13935) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | tomcat-embed-websocket-9.0.14.jar | Transitive | 2.1.13.RELEASE | ✅ |
| [CVE-2020-9484](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-9484) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.0 | tomcat-embed-core-9.0.14.jar | Transitive | 2.1.7.RELEASE | ✅ |
| [CVE-2021-25329](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-25329) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.0 | tomcat-embed-core-9.0.14.jar | Transitive | 2.1.7.RELEASE | ✅ |
| [CVE-2020-5421](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-5421) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.5 | spring-web-5.1.4.RELEASE.jar | Transitive | 2.1.17.RELEASE | ✅ |
| [CVE-2019-0221](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-0221) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | tomcat-embed-core-9.0.14.jar | Transitive | 2.1.5.RELEASE | ✅ |
| [CVE-2019-10219](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-10219) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | hibernate-validator-6.0.14.Final.jar | Transitive | 2.1.10.RELEASE | ✅ |
| [CVE-2019-12814](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-12814) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.9 | jackson-databind-2.9.8.jar | Transitive | 2.1.10.RELEASE | ✅ |
| [CVE-2019-12384](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-12384) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.9 | jackson-databind-2.9.8.jar | Transitive | 2.1.10.RELEASE | ✅ |
| [CVE-2021-24122](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-24122) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.9 | tomcat-embed-core-9.0.14.jar | Transitive | 2.1.7.RELEASE | ✅ |
| [CVE-2020-10693](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-10693) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.3 | hibernate-validator-6.0.14.Final.jar | Transitive | 2.1.15.RELEASE | ✅ |
| [CVE-2019-10202](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-10202) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 4.9 | jackson-databind-2.9.8.jar | Transitive | N/A | ❌ |
| [CVE-2020-1935](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-1935) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 4.8 | tomcat-embed-core-9.0.14.jar | Transitive | 2.1.7.RELEASE | ✅ |
| [CVE-2020-13943](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-13943) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 4.3 | tomcat-embed-core-9.0.14.jar | Transitive | 2.1.7.RELEASE | ✅ |
## Details
> Partial details (18 vulnerabilities) are displayed below due to a content size limitation in GitHub. To view information on the remaining vulnerabilities, navigate to the Mend Application.<br>
<details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-14540</summary>
### Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p>
<p>
Dependency Hierarchy:
- spring-boot-starter-web-2.1.2.RELEASE.jar (Root Library)
- spring-boot-starter-json-2.1.2.RELEASE.jar
- :x: **jackson-databind-2.9.8.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/vulnado-25/commit/8124ec9320e9726976350f7385af80f7e6c3021d">8124ec9320e9726976350f7385af80f7e6c3021d</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to com.zaxxer.hikari.HikariConfig.
<p>Publish Date: 2019-09-15
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-14540>CVE-2019-14540</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14540">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14540</a></p>
<p>Release Date: 2019-09-15</p>
<p>Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.redhat-00005</p>
<p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.2.0.RELEASE</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-17531</summary>
### Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p>
<p>
Dependency Hierarchy:
- spring-boot-starter-web-2.1.2.RELEASE.jar (Root Library)
- spring-boot-starter-json-2.1.2.RELEASE.jar
- :x: **jackson-databind-2.9.8.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/vulnado-25/commit/8124ec9320e9726976350f7385af80f7e6c3021d">8124ec9320e9726976350f7385af80f7e6c3021d</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the apache-log4j-extra (version 1.2.x) jar in the classpath, and an attacker can provide a JNDI service to access, it is possible to make the service execute a malicious payload.
<p>Publish Date: 2019-10-12
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-17531>CVE-2019-17531</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17531">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17531</a></p>
<p>Release Date: 2019-10-12</p>
<p>Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.redhat-00002</p>
<p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.2.0.RELEASE</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2016-1000027</summary>
### Vulnerable Library - <b>spring-web-5.1.4.RELEASE.jar</b></p>
<p>Spring Web</p>
<p>Library home page: <a href="https://github.com/spring-projects/spring-framework">https://github.com/spring-projects/spring-framework</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-web/5.1.4.RELEASE/spring-web-5.1.4.RELEASE.jar</p>
<p>
Dependency Hierarchy:
- spring-boot-starter-web-2.1.2.RELEASE.jar (Root Library)
- :x: **spring-web-5.1.4.RELEASE.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/vulnado-25/commit/8124ec9320e9726976350f7385af80f7e6c3021d">8124ec9320e9726976350f7385af80f7e6c3021d</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Pivotal Spring Framework 4.1.4 suffers from a potential remote code execution (RCE) issue if used for Java deserialization of untrusted data. Depending on how the library is implemented within a product, this issue may or not occur, and authentication may be required.
<p>Publish Date: 2020-01-02
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-1000027>CVE-2016-1000027</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2020-01-02</p>
<p>Fix Resolution (org.springframework:spring-web): 5.1.16.RELEASE</p>
<p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.1.15.RELEASE</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-16335</summary>
### Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p>
<p>
Dependency Hierarchy:
- spring-boot-starter-web-2.1.2.RELEASE.jar (Root Library)
- spring-boot-starter-json-2.1.2.RELEASE.jar
- :x: **jackson-databind-2.9.8.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/vulnado-25/commit/8124ec9320e9726976350f7385af80f7e6c3021d">8124ec9320e9726976350f7385af80f7e6c3021d</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to com.zaxxer.hikari.HikariDataSource. This is a different vulnerability than CVE-2019-14540.
<p>Publish Date: 2019-09-15
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-16335>CVE-2019-16335</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2019-09-15</p>
<p>Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.9.3-redhat-00001</p>
<p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.1.10.RELEASE</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-17267</summary>
### Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p>
<p>
Dependency Hierarchy:
- spring-boot-starter-web-2.1.2.RELEASE.jar (Root Library)
- spring-boot-starter-json-2.1.2.RELEASE.jar
- :x: **jackson-databind-2.9.8.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/vulnado-25/commit/8124ec9320e9726976350f7385af80f7e6c3021d">8124ec9320e9726976350f7385af80f7e6c3021d</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to net.sf.ehcache.hibernate.EhcacheJtaTransactionManagerLookup.
<p>Publish Date: 2019-10-07
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-17267>CVE-2019-17267</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2019-10-07</p>
<p>Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.9.3-redhat-00001</p>
<p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.1.10.RELEASE</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-8840</summary>
### Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p>
<p>
Dependency Hierarchy:
- spring-boot-starter-web-2.1.2.RELEASE.jar (Root Library)
- spring-boot-starter-json-2.1.2.RELEASE.jar
- :x: **jackson-databind-2.9.8.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/vulnado-25/commit/8124ec9320e9726976350f7385af80f7e6c3021d">8124ec9320e9726976350f7385af80f7e6c3021d</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
FasterXML jackson-databind 2.0.0 through 2.9.10.2 lacks certain xbean-reflect/JNDI blocking, as demonstrated by org.apache.xbean.propertyeditor.JndiConverter.
<p>Publish Date: 2020-02-10
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-8840>CVE-2020-8840</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2020-02-10</p>
<p>Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.redhat-00005</p>
<p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.2.0.RELEASE</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-16942</summary>
### Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p>
<p>
Dependency Hierarchy:
- spring-boot-starter-web-2.1.2.RELEASE.jar (Root Library)
- spring-boot-starter-json-2.1.2.RELEASE.jar
- :x: **jackson-databind-2.9.8.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/vulnado-25/commit/8124ec9320e9726976350f7385af80f7e6c3021d">8124ec9320e9726976350f7385af80f7e6c3021d</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the commons-dbcp (1.4) jar in the classpath, and an attacker can find an RMI service endpoint to access, it is possible to make the service execute a malicious payload. This issue exists because of org.apache.commons.dbcp.datasources.SharedPoolDataSource and org.apache.commons.dbcp.datasources.PerUserPoolDataSource mishandling.
<p>Publish Date: 2019-10-01
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-16942>CVE-2019-16942</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16942">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16942</a></p>
<p>Release Date: 2019-10-01</p>
<p>Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.redhat-00002</p>
<p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.2.0.RELEASE</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-16943</summary>
### Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p>
<p>
Dependency Hierarchy:
- spring-boot-starter-web-2.1.2.RELEASE.jar (Root Library)
- spring-boot-starter-json-2.1.2.RELEASE.jar
- :x: **jackson-databind-2.9.8.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/vulnado-25/commit/8124ec9320e9726976350f7385af80f7e6c3021d">8124ec9320e9726976350f7385af80f7e6c3021d</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the p6spy (3.8.6) jar in the classpath, and an attacker can find an RMI service endpoint to access, it is possible to make the service execute a malicious payload. This issue exists because of com.p6spy.engine.spy.P6DataSource mishandling.
<p>Publish Date: 2019-10-01
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-16943>CVE-2019-16943</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16943">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16943</a></p>
<p>Release Date: 2019-10-01</p>
<p>Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.redhat-00002</p>
<p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.2.0.RELEASE</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-14893</summary>
### Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p>
<p>
Dependency Hierarchy:
- spring-boot-starter-web-2.1.2.RELEASE.jar (Root Library)
- spring-boot-starter-json-2.1.2.RELEASE.jar
- :x: **jackson-databind-2.9.8.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/vulnado-25/commit/8124ec9320e9726976350f7385af80f7e6c3021d">8124ec9320e9726976350f7385af80f7e6c3021d</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
A flaw was discovered in FasterXML jackson-databind in all versions before 2.9.10 and 2.10.0, where it would permit polymorphic deserialization of malicious objects using the xalan JNDI gadget when used in conjunction with polymorphic type handling methods such as `enableDefaultTyping()` or when @JsonTypeInfo is using `Id.CLASS` or `Id.MINIMAL_CLASS` or in any other way which ObjectMapper.readValue might instantiate objects from unsafe sources. An attacker could use this flaw to execute arbitrary code.
<p>Publish Date: 2020-03-02
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-14893>CVE-2019-14893</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14893">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14893</a></p>
<p>Release Date: 2020-03-02</p>
<p>Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10</p>
<p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.1.10.RELEASE</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-14892</summary>
### Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p>
<p>
Dependency Hierarchy:
- spring-boot-starter-web-2.1.2.RELEASE.jar (Root Library)
- spring-boot-starter-json-2.1.2.RELEASE.jar
- :x: **jackson-databind-2.9.8.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/vulnado-25/commit/8124ec9320e9726976350f7385af80f7e6c3021d">8124ec9320e9726976350f7385af80f7e6c3021d</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
A flaw was discovered in jackson-databind in versions before 2.9.10, 2.8.11.5 and 2.6.7.3, where it would permit polymorphic deserialization of a malicious object using commons-configuration 1 and 2 JNDI classes. An attacker could use this flaw to execute arbitrary code.
<p>Publish Date: 2020-03-02
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-14892>CVE-2019-14892</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2020-09-04</p>
<p>Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.9.3-redhat-00001</p>
<p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.1.10.RELEASE</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-9546</summary>
### Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p>
<p>
Dependency Hierarchy:
- spring-boot-starter-web-2.1.2.RELEASE.jar (Root Library)
- spring-boot-starter-json-2.1.2.RELEASE.jar
- :x: **jackson-databind-2.9.8.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/vulnado-25/commit/8124ec9320e9726976350f7385af80f7e6c3021d">8124ec9320e9726976350f7385af80f7e6c3021d</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.hadoop.shaded.com.zaxxer.hikari.HikariConfig (aka shaded hikari-config).
<p>Publish Date: 2020-03-02
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-9546>CVE-2020-9546</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9546">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9546</a></p>
<p>Release Date: 2020-03-02</p>
<p>Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.redhat-00005</p>
<p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.2.0.RELEASE</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-9547</summary>
### Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p>
<p>
Dependency Hierarchy:
- spring-boot-starter-web-2.1.2.RELEASE.jar (Root Library)
- spring-boot-starter-json-2.1.2.RELEASE.jar
- :x: **jackson-databind-2.9.8.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/vulnado-25/commit/8124ec9320e9726976350f7385af80f7e6c3021d">8124ec9320e9726976350f7385af80f7e6c3021d</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to com.ibatis.sqlmap.engine.transaction.jta.JtaTransactionConfig (aka ibatis-sqlmap).
<p>Publish Date: 2020-03-02
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-9547>CVE-2020-9547</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9547">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9547</a></p>
<p>Release Date: 2020-03-02</p>
<p>Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.redhat-00005</p>
<p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.2.0.RELEASE</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-14379</summary>
### Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p>
<p>
Dependency Hierarchy:
- spring-boot-starter-web-2.1.2.RELEASE.jar (Root Library)
- spring-boot-starter-json-2.1.2.RELEASE.jar
- :x: **jackson-databind-2.9.8.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/vulnado-25/commit/8124ec9320e9726976350f7385af80f7e6c3021d">8124ec9320e9726976350f7385af80f7e6c3021d</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
SubTypeValidator.java in FasterXML jackson-databind before 2.9.9.2 mishandles default typing when ehcache is used (because of net.sf.ehcache.transaction.manager.DefaultTransactionManagerLookup), leading to remote code execution.
<p>Publish Date: 2019-07-29
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-14379>CVE-2019-14379</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14379">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14379</a></p>
<p>Release Date: 2019-07-29</p>
<p>Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.9.2</p>
<p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.1.10.RELEASE</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-9548</summary>
### Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p>
<p>
Dependency Hierarchy:
- spring-boot-starter-web-2.1.2.RELEASE.jar (Root Library)
- spring-boot-starter-json-2.1.2.RELEASE.jar
- :x: **jackson-databind-2.9.8.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/vulnado-25/commit/8124ec9320e9726976350f7385af80f7e6c3021d">8124ec9320e9726976350f7385af80f7e6c3021d</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPConfig (aka anteros-core).
<p>Publish Date: 2020-03-02
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-9548>CVE-2020-9548</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9548">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9548</a></p>
<p>Release Date: 2020-03-02</p>
<p>Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.redhat-00005</p>
<p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.2.0.RELEASE</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-20330</summary>
### Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p>
<p>
Dependency Hierarchy:
- spring-boot-starter-web-2.1.2.RELEASE.jar (Root Library)
- spring-boot-starter-json-2.1.2.RELEASE.jar
- :x: **jackson-databind-2.9.8.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/vulnado-25/commit/8124ec9320e9726976350f7385af80f7e6c3021d">8124ec9320e9726976350f7385af80f7e6c3021d</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
FasterXML jackson-databind 2.x before 2.9.10.2 lacks certain net.sf.ehcache blocking.
<p>Publish Date: 2020-01-03
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-20330>CVE-2019-20330</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2020-01-03</p>
<p>Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.redhat-00005</p>
<p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.2.0.RELEASE</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-10968</summary>
### Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p>
<p>
Dependency Hierarchy:
- spring-boot-starter-web-2.1.2.RELEASE.jar (Root Library)
- spring-boot-starter-json-2.1.2.RELEASE.jar
- :x: **jackson-databind-2.9.8.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/vulnado-25/commit/8124ec9320e9726976350f7385af80f7e6c3021d">8124ec9320e9726976350f7385af80f7e6c3021d</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.aoju.bus.proxy.provider.remoting.RmiProvider (aka bus-proxy).
<p>Publish Date: 2020-03-26
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-10968>CVE-2020-10968</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>8.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-10968">https://nvd.nist.gov/vuln/detail/CVE-2020-10968</a></p>
<p>Release Date: 2020-03-26</p>
<p>Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.8.redhat-00002</p>
<p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.1.6.RELEASE</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-10969</summary>
### Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p>
<p>
Dependency Hierarchy:
- spring-boot-starter-web-2.1.2.RELEASE.jar (Root Library)
- spring-boot-starter-json-2.1.2.RELEASE.jar
- :x: **jackson-databind-2.9.8.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/vulnado-25/commit/8124ec9320e9726976350f7385af80f7e6c3021d">8124ec9320e9726976350f7385af80f7e6c3021d</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to javax.swing.JEditorPane.
<p>Publish Date: 2020-03-26
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-10969>CVE-2020-10969</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>8.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10969">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10969</a></p>
<p>Release Date: 2020-03-26</p>
<p>Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.redhat-00005</p>
<p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.2.0.RELEASE</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-11111</summary>
### Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p>
<p>
Dependency Hierarchy:
- spring-boot-starter-web-2.1.2.RELEASE.jar (Root Library)
- spring-boot-starter-json-2.1.2.RELEASE.jar
- :x: **jackson-databind-2.9.8.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/vulnado-25/commit/8124ec9320e9726976350f7385af80f7e6c3021d">8124ec9320e9726976350f7385af80f7e6c3021d</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.activemq.* (aka activemq-jms, activemq-core, activemq-pool, and activemq-pool-jms).
<p>Publish Date: 2020-03-31
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11111>CVE-2020-11111</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>8.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11113">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11113</a></p>
<p>Release Date: 2020-03-31</p>
<p>Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.redhat-00005</p>
<p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.2.0.RELEASE</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details>
***
<p>:rescue_worker_helmet: Automatic Remediation is available for this issue.</p>
|
True
|
spring-boot-starter-web-2.1.2.RELEASE.jar: 68 vulnerabilities (highest severity is: 9.8) - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>spring-boot-starter-web-2.1.2.RELEASE.jar</b></p></summary>
<p></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-web/5.1.4.RELEASE/spring-web-5.1.4.RELEASE.jar</p>
<p>
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/vulnado-25/commit/8124ec9320e9726976350f7385af80f7e6c3021d">8124ec9320e9726976350f7385af80f7e6c3021d</a></p></details>
## Vulnerabilities
| CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in | Remediation Available |
| ------------- | ------------- | ----- | ----- | ----- | --- | --- |
| [CVE-2019-14540](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-14540) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | ✅ |
| [CVE-2019-17531](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-17531) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | ✅ |
| [CVE-2016-1000027](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-1000027) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | spring-web-5.1.4.RELEASE.jar | Transitive | 2.1.15.RELEASE | ✅ |
| [CVE-2019-16335](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-16335) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.8.jar | Transitive | 2.1.10.RELEASE | ✅ |
| [CVE-2019-17267](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-17267) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.8.jar | Transitive | 2.1.10.RELEASE | ✅ |
| [CVE-2020-8840](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-8840) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | ✅ |
| [CVE-2019-16942](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-16942) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | ✅ |
| [CVE-2019-16943](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-16943) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | ✅ |
| [CVE-2019-14893](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-14893) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.8.jar | Transitive | 2.1.10.RELEASE | ✅ |
| [CVE-2019-14892](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-14892) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.8.jar | Transitive | 2.1.10.RELEASE | ✅ |
| [CVE-2020-9546](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-9546) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | ✅ |
| [CVE-2020-9547](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-9547) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | ✅ |
| [CVE-2019-14379](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-14379) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.8.jar | Transitive | 2.1.10.RELEASE | ✅ |
| [CVE-2020-9548](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-9548) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | ✅ |
| [CVE-2019-20330](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-20330) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | ✅ |
| [CVE-2020-10968](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-10968) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | jackson-databind-2.9.8.jar | Transitive | 2.1.6.RELEASE | ✅ |
| [CVE-2020-10969](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-10969) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | ✅ |
| [CVE-2020-11111](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11111) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | ✅ |
| [CVE-2020-11113](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11113) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | ✅ |
| [CVE-2020-11112](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11112) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | ✅ |
| [CVE-2020-10672](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-10672) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | ✅ |
| [CVE-2020-10673](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-10673) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | ✅ |
| [CVE-2019-0232](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-0232) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | tomcat-embed-core-9.0.14.jar | Transitive | 2.1.5.RELEASE | ✅ |
| [CVE-2020-11619](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11619) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | ✅ |
| [CVE-2020-35728](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-35728) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | ✅ |
| [CVE-2020-36189](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36189) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | ✅ |
| [CVE-2020-36188](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36188) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | ✅ |
| [CVE-2020-11620](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11620) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | ✅ |
| [CVE-2020-36181](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36181) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | ✅ |
| [CVE-2020-36180](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36180) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | ✅ |
| [CVE-2020-35490](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-35490) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | ✅ |
| [CVE-2020-36183](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36183) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | ✅ |
| [CVE-2020-36182](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36182) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | ✅ |
| [CVE-2020-36185](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36185) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | ✅ |
| [CVE-2020-35491](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-35491) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | ✅ |
| [CVE-2020-36184](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36184) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | ✅ |
| [CVE-2020-36187](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36187) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | ✅ |
| [CVE-2020-36186](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36186) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | ✅ |
| [CVE-2021-20190](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-20190) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | ✅ |
| [CVE-2020-36179](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36179) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | ✅ |
| [CVE-2020-24616](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-24616) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | ✅ |
| [CVE-2020-14060](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-14060) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | ✅ |
| [CVE-2020-14061](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-14061) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | ✅ |
| [CVE-2020-14062](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-14062) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | ✅ |
| [CVE-2020-24750](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-24750) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | ✅ |
| [CVE-2020-14195](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-14195) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | ✅ |
| [CVE-2019-12086](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-12086) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | jackson-databind-2.9.8.jar | Transitive | 2.1.6.RELEASE | ✅ |
| [CVE-2020-25649](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-25649) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | ✅ |
| [CVE-2020-5398](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-5398) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | spring-web-5.1.4.RELEASE.jar | Transitive | 2.1.12.RELEASE | ✅ |
| [CVE-2019-10072](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-10072) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | tomcat-embed-core-9.0.14.jar | Transitive | 2.1.6.RELEASE | ✅ |
| [CVE-2019-14439](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-14439) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | jackson-databind-2.9.8.jar | Transitive | 2.1.10.RELEASE | ✅ |
| [CVE-2021-25122](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-25122) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | tomcat-embed-core-9.0.14.jar | Transitive | 2.1.7.RELEASE | ✅ |
| [CVE-2019-17563](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-17563) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | tomcat-embed-core-9.0.14.jar | Transitive | 2.1.7.RELEASE | ✅ |
| [CVE-2020-11996](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11996) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | tomcat-embed-core-9.0.14.jar | Transitive | 2.1.7.RELEASE | ✅ |
| [CVE-2020-13934](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-13934) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | tomcat-embed-core-9.0.14.jar | Transitive | 2.1.7.RELEASE | ✅ |
| [CVE-2020-13935](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-13935) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | tomcat-embed-websocket-9.0.14.jar | Transitive | 2.1.13.RELEASE | ✅ |
| [CVE-2020-9484](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-9484) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.0 | tomcat-embed-core-9.0.14.jar | Transitive | 2.1.7.RELEASE | ✅ |
| [CVE-2021-25329](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-25329) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.0 | tomcat-embed-core-9.0.14.jar | Transitive | 2.1.7.RELEASE | ✅ |
| [CVE-2020-5421](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-5421) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.5 | spring-web-5.1.4.RELEASE.jar | Transitive | 2.1.17.RELEASE | ✅ |
| [CVE-2019-0221](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-0221) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | tomcat-embed-core-9.0.14.jar | Transitive | 2.1.5.RELEASE | ✅ |
| [CVE-2019-10219](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-10219) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | hibernate-validator-6.0.14.Final.jar | Transitive | 2.1.10.RELEASE | ✅ |
| [CVE-2019-12814](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-12814) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.9 | jackson-databind-2.9.8.jar | Transitive | 2.1.10.RELEASE | ✅ |
| [CVE-2019-12384](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-12384) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.9 | jackson-databind-2.9.8.jar | Transitive | 2.1.10.RELEASE | ✅ |
| [CVE-2021-24122](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-24122) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.9 | tomcat-embed-core-9.0.14.jar | Transitive | 2.1.7.RELEASE | ✅ |
| [CVE-2020-10693](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-10693) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.3 | hibernate-validator-6.0.14.Final.jar | Transitive | 2.1.15.RELEASE | ✅ |
| [CVE-2019-10202](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-10202) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 4.9 | jackson-databind-2.9.8.jar | Transitive | N/A | ❌ |
| [CVE-2020-1935](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-1935) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 4.8 | tomcat-embed-core-9.0.14.jar | Transitive | 2.1.7.RELEASE | ✅ |
| [CVE-2020-13943](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-13943) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 4.3 | tomcat-embed-core-9.0.14.jar | Transitive | 2.1.7.RELEASE | ✅ |
## Details
> Partial details (18 vulnerabilities) are displayed below due to a content size limitation in GitHub. To view information on the remaining vulnerabilities, navigate to the Mend Application.<br>
<details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-14540</summary>
### Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p>
<p>
Dependency Hierarchy:
- spring-boot-starter-web-2.1.2.RELEASE.jar (Root Library)
- spring-boot-starter-json-2.1.2.RELEASE.jar
- :x: **jackson-databind-2.9.8.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/vulnado-25/commit/8124ec9320e9726976350f7385af80f7e6c3021d">8124ec9320e9726976350f7385af80f7e6c3021d</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to com.zaxxer.hikari.HikariConfig.
<p>Publish Date: 2019-09-15
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-14540>CVE-2019-14540</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14540">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14540</a></p>
<p>Release Date: 2019-09-15</p>
<p>Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.redhat-00005</p>
<p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.2.0.RELEASE</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-17531</summary>
### Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p>
<p>
Dependency Hierarchy:
- spring-boot-starter-web-2.1.2.RELEASE.jar (Root Library)
- spring-boot-starter-json-2.1.2.RELEASE.jar
- :x: **jackson-databind-2.9.8.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/vulnado-25/commit/8124ec9320e9726976350f7385af80f7e6c3021d">8124ec9320e9726976350f7385af80f7e6c3021d</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the apache-log4j-extra (version 1.2.x) jar in the classpath, and an attacker can provide a JNDI service to access, it is possible to make the service execute a malicious payload.
<p>Publish Date: 2019-10-12
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-17531>CVE-2019-17531</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17531">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17531</a></p>
<p>Release Date: 2019-10-12</p>
<p>Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.redhat-00002</p>
<p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.2.0.RELEASE</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2016-1000027</summary>
### Vulnerable Library - <b>spring-web-5.1.4.RELEASE.jar</b></p>
<p>Spring Web</p>
<p>Library home page: <a href="https://github.com/spring-projects/spring-framework">https://github.com/spring-projects/spring-framework</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-web/5.1.4.RELEASE/spring-web-5.1.4.RELEASE.jar</p>
<p>
Dependency Hierarchy:
- spring-boot-starter-web-2.1.2.RELEASE.jar (Root Library)
- :x: **spring-web-5.1.4.RELEASE.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/vulnado-25/commit/8124ec9320e9726976350f7385af80f7e6c3021d">8124ec9320e9726976350f7385af80f7e6c3021d</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Pivotal Spring Framework 4.1.4 suffers from a potential remote code execution (RCE) issue if used for Java deserialization of untrusted data. Depending on how the library is implemented within a product, this issue may or not occur, and authentication may be required.
<p>Publish Date: 2020-01-02
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-1000027>CVE-2016-1000027</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2020-01-02</p>
<p>Fix Resolution (org.springframework:spring-web): 5.1.16.RELEASE</p>
<p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.1.15.RELEASE</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-16335</summary>
### Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p>
<p>
Dependency Hierarchy:
- spring-boot-starter-web-2.1.2.RELEASE.jar (Root Library)
- spring-boot-starter-json-2.1.2.RELEASE.jar
- :x: **jackson-databind-2.9.8.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/vulnado-25/commit/8124ec9320e9726976350f7385af80f7e6c3021d">8124ec9320e9726976350f7385af80f7e6c3021d</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to com.zaxxer.hikari.HikariDataSource. This is a different vulnerability than CVE-2019-14540.
<p>Publish Date: 2019-09-15
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-16335>CVE-2019-16335</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2019-09-15</p>
<p>Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.9.3-redhat-00001</p>
<p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.1.10.RELEASE</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-17267</summary>
### Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p>
<p>
Dependency Hierarchy:
- spring-boot-starter-web-2.1.2.RELEASE.jar (Root Library)
- spring-boot-starter-json-2.1.2.RELEASE.jar
- :x: **jackson-databind-2.9.8.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/vulnado-25/commit/8124ec9320e9726976350f7385af80f7e6c3021d">8124ec9320e9726976350f7385af80f7e6c3021d</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to net.sf.ehcache.hibernate.EhcacheJtaTransactionManagerLookup.
<p>Publish Date: 2019-10-07
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-17267>CVE-2019-17267</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2019-10-07</p>
<p>Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.9.3-redhat-00001</p>
<p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.1.10.RELEASE</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-8840</summary>
### Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p>
<p>
Dependency Hierarchy:
- spring-boot-starter-web-2.1.2.RELEASE.jar (Root Library)
- spring-boot-starter-json-2.1.2.RELEASE.jar
- :x: **jackson-databind-2.9.8.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/vulnado-25/commit/8124ec9320e9726976350f7385af80f7e6c3021d">8124ec9320e9726976350f7385af80f7e6c3021d</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
FasterXML jackson-databind 2.0.0 through 2.9.10.2 lacks certain xbean-reflect/JNDI blocking, as demonstrated by org.apache.xbean.propertyeditor.JndiConverter.
<p>Publish Date: 2020-02-10
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-8840>CVE-2020-8840</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2020-02-10</p>
<p>Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.redhat-00005</p>
<p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.2.0.RELEASE</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-16942</summary>
### Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p>
<p>
Dependency Hierarchy:
- spring-boot-starter-web-2.1.2.RELEASE.jar (Root Library)
- spring-boot-starter-json-2.1.2.RELEASE.jar
- :x: **jackson-databind-2.9.8.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/vulnado-25/commit/8124ec9320e9726976350f7385af80f7e6c3021d">8124ec9320e9726976350f7385af80f7e6c3021d</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the commons-dbcp (1.4) jar in the classpath, and an attacker can find an RMI service endpoint to access, it is possible to make the service execute a malicious payload. This issue exists because of org.apache.commons.dbcp.datasources.SharedPoolDataSource and org.apache.commons.dbcp.datasources.PerUserPoolDataSource mishandling.
<p>Publish Date: 2019-10-01
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-16942>CVE-2019-16942</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16942">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16942</a></p>
<p>Release Date: 2019-10-01</p>
<p>Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.redhat-00002</p>
<p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.2.0.RELEASE</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-16943</summary>
### Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p>
<p>
Dependency Hierarchy:
- spring-boot-starter-web-2.1.2.RELEASE.jar (Root Library)
- spring-boot-starter-json-2.1.2.RELEASE.jar
- :x: **jackson-databind-2.9.8.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/vulnado-25/commit/8124ec9320e9726976350f7385af80f7e6c3021d">8124ec9320e9726976350f7385af80f7e6c3021d</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the p6spy (3.8.6) jar in the classpath, and an attacker can find an RMI service endpoint to access, it is possible to make the service execute a malicious payload. This issue exists because of com.p6spy.engine.spy.P6DataSource mishandling.
<p>Publish Date: 2019-10-01
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-16943>CVE-2019-16943</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16943">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16943</a></p>
<p>Release Date: 2019-10-01</p>
<p>Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.redhat-00002</p>
<p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.2.0.RELEASE</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-14893</summary>
### Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p>
<p>
Dependency Hierarchy:
- spring-boot-starter-web-2.1.2.RELEASE.jar (Root Library)
- spring-boot-starter-json-2.1.2.RELEASE.jar
- :x: **jackson-databind-2.9.8.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/vulnado-25/commit/8124ec9320e9726976350f7385af80f7e6c3021d">8124ec9320e9726976350f7385af80f7e6c3021d</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
A flaw was discovered in FasterXML jackson-databind in all versions before 2.9.10 and 2.10.0, where it would permit polymorphic deserialization of malicious objects using the xalan JNDI gadget when used in conjunction with polymorphic type handling methods such as `enableDefaultTyping()` or when @JsonTypeInfo is using `Id.CLASS` or `Id.MINIMAL_CLASS` or in any other way which ObjectMapper.readValue might instantiate objects from unsafe sources. An attacker could use this flaw to execute arbitrary code.
<p>Publish Date: 2020-03-02
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-14893>CVE-2019-14893</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14893">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14893</a></p>
<p>Release Date: 2020-03-02</p>
<p>Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10</p>
<p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.1.10.RELEASE</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-14892</summary>
### Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p>
<p>
Dependency Hierarchy:
- spring-boot-starter-web-2.1.2.RELEASE.jar (Root Library)
- spring-boot-starter-json-2.1.2.RELEASE.jar
- :x: **jackson-databind-2.9.8.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/vulnado-25/commit/8124ec9320e9726976350f7385af80f7e6c3021d">8124ec9320e9726976350f7385af80f7e6c3021d</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
A flaw was discovered in jackson-databind in versions before 2.9.10, 2.8.11.5 and 2.6.7.3, where it would permit polymorphic deserialization of a malicious object using commons-configuration 1 and 2 JNDI classes. An attacker could use this flaw to execute arbitrary code.
<p>Publish Date: 2020-03-02
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-14892>CVE-2019-14892</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2020-09-04</p>
<p>Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.9.3-redhat-00001</p>
<p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.1.10.RELEASE</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-9546</summary>
### Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p>
<p>
Dependency Hierarchy:
- spring-boot-starter-web-2.1.2.RELEASE.jar (Root Library)
- spring-boot-starter-json-2.1.2.RELEASE.jar
- :x: **jackson-databind-2.9.8.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/vulnado-25/commit/8124ec9320e9726976350f7385af80f7e6c3021d">8124ec9320e9726976350f7385af80f7e6c3021d</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.hadoop.shaded.com.zaxxer.hikari.HikariConfig (aka shaded hikari-config).
<p>Publish Date: 2020-03-02
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-9546>CVE-2020-9546</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9546">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9546</a></p>
<p>Release Date: 2020-03-02</p>
<p>Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.redhat-00005</p>
<p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.2.0.RELEASE</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-9547</summary>
### Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p>
<p>
Dependency Hierarchy:
- spring-boot-starter-web-2.1.2.RELEASE.jar (Root Library)
- spring-boot-starter-json-2.1.2.RELEASE.jar
- :x: **jackson-databind-2.9.8.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/vulnado-25/commit/8124ec9320e9726976350f7385af80f7e6c3021d">8124ec9320e9726976350f7385af80f7e6c3021d</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to com.ibatis.sqlmap.engine.transaction.jta.JtaTransactionConfig (aka ibatis-sqlmap).
<p>Publish Date: 2020-03-02
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-9547>CVE-2020-9547</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9547">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9547</a></p>
<p>Release Date: 2020-03-02</p>
<p>Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.redhat-00005</p>
<p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.2.0.RELEASE</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-14379</summary>
### Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p>
<p>
Dependency Hierarchy:
- spring-boot-starter-web-2.1.2.RELEASE.jar (Root Library)
- spring-boot-starter-json-2.1.2.RELEASE.jar
- :x: **jackson-databind-2.9.8.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/vulnado-25/commit/8124ec9320e9726976350f7385af80f7e6c3021d">8124ec9320e9726976350f7385af80f7e6c3021d</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
SubTypeValidator.java in FasterXML jackson-databind before 2.9.9.2 mishandles default typing when ehcache is used (because of net.sf.ehcache.transaction.manager.DefaultTransactionManagerLookup), leading to remote code execution.
<p>Publish Date: 2019-07-29
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-14379>CVE-2019-14379</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14379">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14379</a></p>
<p>Release Date: 2019-07-29</p>
<p>Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.9.2</p>
<p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.1.10.RELEASE</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-9548</summary>
### Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p>
<p>
Dependency Hierarchy:
- spring-boot-starter-web-2.1.2.RELEASE.jar (Root Library)
- spring-boot-starter-json-2.1.2.RELEASE.jar
- :x: **jackson-databind-2.9.8.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/vulnado-25/commit/8124ec9320e9726976350f7385af80f7e6c3021d">8124ec9320e9726976350f7385af80f7e6c3021d</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPConfig (aka anteros-core).
<p>Publish Date: 2020-03-02
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-9548>CVE-2020-9548</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9548">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9548</a></p>
<p>Release Date: 2020-03-02</p>
<p>Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.redhat-00005</p>
<p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.2.0.RELEASE</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-20330</summary>
### Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p>
<p>
Dependency Hierarchy:
- spring-boot-starter-web-2.1.2.RELEASE.jar (Root Library)
- spring-boot-starter-json-2.1.2.RELEASE.jar
- :x: **jackson-databind-2.9.8.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/vulnado-25/commit/8124ec9320e9726976350f7385af80f7e6c3021d">8124ec9320e9726976350f7385af80f7e6c3021d</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
FasterXML jackson-databind 2.x before 2.9.10.2 lacks certain net.sf.ehcache blocking.
<p>Publish Date: 2020-01-03
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-20330>CVE-2019-20330</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2020-01-03</p>
<p>Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.redhat-00005</p>
<p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.2.0.RELEASE</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-10968</summary>
### Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p>
<p>
Dependency Hierarchy:
- spring-boot-starter-web-2.1.2.RELEASE.jar (Root Library)
- spring-boot-starter-json-2.1.2.RELEASE.jar
- :x: **jackson-databind-2.9.8.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/vulnado-25/commit/8124ec9320e9726976350f7385af80f7e6c3021d">8124ec9320e9726976350f7385af80f7e6c3021d</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.aoju.bus.proxy.provider.remoting.RmiProvider (aka bus-proxy).
<p>Publish Date: 2020-03-26
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-10968>CVE-2020-10968</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>8.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-10968">https://nvd.nist.gov/vuln/detail/CVE-2020-10968</a></p>
<p>Release Date: 2020-03-26</p>
<p>Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.8.redhat-00002</p>
<p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.1.6.RELEASE</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-10969</summary>
### Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p>
<p>
Dependency Hierarchy:
- spring-boot-starter-web-2.1.2.RELEASE.jar (Root Library)
- spring-boot-starter-json-2.1.2.RELEASE.jar
- :x: **jackson-databind-2.9.8.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/vulnado-25/commit/8124ec9320e9726976350f7385af80f7e6c3021d">8124ec9320e9726976350f7385af80f7e6c3021d</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to javax.swing.JEditorPane.
<p>Publish Date: 2020-03-26
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-10969>CVE-2020-10969</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>8.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10969">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10969</a></p>
<p>Release Date: 2020-03-26</p>
<p>Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.redhat-00005</p>
<p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.2.0.RELEASE</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-11111</summary>
### Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p>
<p>
Dependency Hierarchy:
- spring-boot-starter-web-2.1.2.RELEASE.jar (Root Library)
- spring-boot-starter-json-2.1.2.RELEASE.jar
- :x: **jackson-databind-2.9.8.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/vulnado-25/commit/8124ec9320e9726976350f7385af80f7e6c3021d">8124ec9320e9726976350f7385af80f7e6c3021d</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.activemq.* (aka activemq-jms, activemq-core, activemq-pool, and activemq-pool-jms).
<p>Publish Date: 2020-03-31
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11111>CVE-2020-11111</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>8.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11113">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11113</a></p>
<p>Release Date: 2020-03-31</p>
<p>Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.redhat-00005</p>
<p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.2.0.RELEASE</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details>
***
<p>:rescue_worker_helmet: Automatic Remediation is available for this issue.</p>
|
non_design
|
spring boot starter web release jar vulnerabilities highest severity is vulnerable library spring boot starter web release jar path to dependency file pom xml path to vulnerable library home wss scanner repository org springframework spring web release spring web release jar found in head commit a href vulnerabilities cve severity cvss dependency type fixed in remediation available high jackson databind jar transitive release high jackson databind jar transitive release high spring web release jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high tomcat embed core jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high spring web release jar transitive release high tomcat embed core jar transitive release high jackson databind jar transitive release high tomcat embed core jar transitive release high tomcat embed core jar transitive release high tomcat embed core jar transitive release high tomcat embed core jar transitive release high tomcat embed websocket jar transitive release high tomcat embed core jar transitive release high tomcat embed core jar transitive release medium spring web release jar transitive release medium tomcat embed core jar transitive release medium hibernate validator final jar transitive release medium jackson databind jar transitive release medium jackson databind jar transitive release medium tomcat embed core jar transitive release medium hibernate validator final jar transitive release medium jackson databind jar transitive n a medium tomcat embed core jar transitive release medium tomcat embed core jar transitive release details partial details vulnerabilities are displayed below due to a content size limitation in github to view information on the remaining vulnerabilities navigate to the mend application cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy spring boot starter web release jar root library spring boot starter json release jar x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details a polymorphic typing issue was discovered in fasterxml jackson databind before it is related to com zaxxer hikari hikariconfig publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson core jackson databind redhat direct dependency fix resolution org springframework boot spring boot starter web release rescue worker helmet automatic remediation is available for this issue cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy spring boot starter web release jar root library spring boot starter json release jar x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details a polymorphic typing issue was discovered in fasterxml jackson databind through when default typing is enabled either globally or for a specific property for an externally exposed json endpoint and the service has the apache extra version x jar in the classpath and an attacker can provide a jndi service to access it is possible to make the service execute a malicious payload publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson core jackson databind redhat direct dependency fix resolution org springframework boot spring boot starter web release rescue worker helmet automatic remediation is available for this issue cve vulnerable library spring web release jar spring web library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository org springframework spring web release spring web release jar dependency hierarchy spring boot starter web release jar root library x spring web release jar vulnerable library found in head commit a href found in base branch master vulnerability details pivotal spring framework suffers from a potential remote code execution rce issue if used for java deserialization of untrusted data depending on how the library is implemented within a product this issue may or not occur and authentication may be required publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version release date fix resolution org springframework spring web release direct dependency fix resolution org springframework boot spring boot starter web release rescue worker helmet automatic remediation is available for this issue cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy spring boot starter web release jar root library spring boot starter json release jar x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details a polymorphic typing issue was discovered in fasterxml jackson databind before it is related to com zaxxer hikari hikaridatasource this is a different vulnerability than cve publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version release date fix resolution com fasterxml jackson core jackson databind redhat direct dependency fix resolution org springframework boot spring boot starter web release rescue worker helmet automatic remediation is available for this issue cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy spring boot starter web release jar root library spring boot starter json release jar x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details a polymorphic typing issue was discovered in fasterxml jackson databind before it is related to net sf ehcache hibernate ehcachejtatransactionmanagerlookup publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version release date fix resolution com fasterxml jackson core jackson databind redhat direct dependency fix resolution org springframework boot spring boot starter web release rescue worker helmet automatic remediation is available for this issue cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy spring boot starter web release jar root library spring boot starter json release jar x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details fasterxml jackson databind through lacks certain xbean reflect jndi blocking as demonstrated by org apache xbean propertyeditor jndiconverter publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version release date fix resolution com fasterxml jackson core jackson databind redhat direct dependency fix resolution org springframework boot spring boot starter web release rescue worker helmet automatic remediation is available for this issue cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy spring boot starter web release jar root library spring boot starter json release jar x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details a polymorphic typing issue was discovered in fasterxml jackson databind through when default typing is enabled either globally or for a specific property for an externally exposed json endpoint and the service has the commons dbcp jar in the classpath and an attacker can find an rmi service endpoint to access it is possible to make the service execute a malicious payload this issue exists because of org apache commons dbcp datasources sharedpooldatasource and org apache commons dbcp datasources peruserpooldatasource mishandling publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson core jackson databind redhat direct dependency fix resolution org springframework boot spring boot starter web release rescue worker helmet automatic remediation is available for this issue cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy spring boot starter web release jar root library spring boot starter json release jar x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details a polymorphic typing issue was discovered in fasterxml jackson databind through when default typing is enabled either globally or for a specific property for an externally exposed json endpoint and the service has the jar in the classpath and an attacker can find an rmi service endpoint to access it is possible to make the service execute a malicious payload this issue exists because of com engine spy mishandling publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson core jackson databind redhat direct dependency fix resolution org springframework boot spring boot starter web release rescue worker helmet automatic remediation is available for this issue cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy spring boot starter web release jar root library spring boot starter json release jar x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details a flaw was discovered in fasterxml jackson databind in all versions before and where it would permit polymorphic deserialization of malicious objects using the xalan jndi gadget when used in conjunction with polymorphic type handling methods such as enabledefaulttyping or when jsontypeinfo is using id class or id minimal class or in any other way which objectmapper readvalue might instantiate objects from unsafe sources an attacker could use this flaw to execute arbitrary code publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson core jackson databind direct dependency fix resolution org springframework boot spring boot starter web release rescue worker helmet automatic remediation is available for this issue cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy spring boot starter web release jar root library spring boot starter json release jar x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details a flaw was discovered in jackson databind in versions before and where it would permit polymorphic deserialization of a malicious object using commons configuration and jndi classes an attacker could use this flaw to execute arbitrary code publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version release date fix resolution com fasterxml jackson core jackson databind redhat direct dependency fix resolution org springframework boot spring boot starter web release rescue worker helmet automatic remediation is available for this issue cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy spring boot starter web release jar root library spring boot starter json release jar x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details fasterxml jackson databind x before mishandles the interaction between serialization gadgets and typing related to org apache hadoop shaded com zaxxer hikari hikariconfig aka shaded hikari config publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson core jackson databind redhat direct dependency fix resolution org springframework boot spring boot starter web release rescue worker helmet automatic remediation is available for this issue cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy spring boot starter web release jar root library spring boot starter json release jar x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details fasterxml jackson databind x before mishandles the interaction between serialization gadgets and typing related to com ibatis sqlmap engine transaction jta jtatransactionconfig aka ibatis sqlmap publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson core jackson databind redhat direct dependency fix resolution org springframework boot spring boot starter web release rescue worker helmet automatic remediation is available for this issue cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy spring boot starter web release jar root library spring boot starter json release jar x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details subtypevalidator java in fasterxml jackson databind before mishandles default typing when ehcache is used because of net sf ehcache transaction manager defaulttransactionmanagerlookup leading to remote code execution publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson core jackson databind direct dependency fix resolution org springframework boot spring boot starter web release rescue worker helmet automatic remediation is available for this issue cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy spring boot starter web release jar root library spring boot starter json release jar x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details fasterxml jackson databind x before mishandles the interaction between serialization gadgets and typing related to br com anteros dbcp anterosdbcpconfig aka anteros core publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson core jackson databind redhat direct dependency fix resolution org springframework boot spring boot starter web release rescue worker helmet automatic remediation is available for this issue cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy spring boot starter web release jar root library spring boot starter json release jar x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details fasterxml jackson databind x before lacks certain net sf ehcache blocking publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version release date fix resolution com fasterxml jackson core jackson databind redhat direct dependency fix resolution org springframework boot spring boot starter web release rescue worker helmet automatic remediation is available for this issue cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy spring boot starter web release jar root library spring boot starter json release jar x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details fasterxml jackson databind x before mishandles the interaction between serialization gadgets and typing related to org aoju bus proxy provider remoting rmiprovider aka bus proxy publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson core jackson databind redhat direct dependency fix resolution org springframework boot spring boot starter web release rescue worker helmet automatic remediation is available for this issue cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy spring boot starter web release jar root library spring boot starter json release jar x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details fasterxml jackson databind x before mishandles the interaction between serialization gadgets and typing related to javax swing jeditorpane publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson core jackson databind redhat direct dependency fix resolution org springframework boot spring boot starter web release rescue worker helmet automatic remediation is available for this issue cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy spring boot starter web release jar root library spring boot starter json release jar x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details fasterxml jackson databind x before mishandles the interaction between serialization gadgets and typing related to org apache activemq aka activemq jms activemq core activemq pool and activemq pool jms publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson core jackson databind redhat direct dependency fix resolution org springframework boot spring boot starter web release rescue worker helmet automatic remediation is available for this issue rescue worker helmet automatic remediation is available for this issue
| 0
|
410,789
| 27,802,254,879
|
IssuesEvent
|
2023-03-17 16:43:09
|
Sarahsparxx/mywebclass-simulation
|
https://api.github.com/repos/Sarahsparxx/mywebclass-simulation
|
opened
|
Select appropriate testing methods and tools
|
documentation
|
Select appropriate testing methods and tools based on the project requirements
|
1.0
|
Select appropriate testing methods and tools - Select appropriate testing methods and tools based on the project requirements
|
non_design
|
select appropriate testing methods and tools select appropriate testing methods and tools based on the project requirements
| 0
|
35,229
| 4,641,468,645
|
IssuesEvent
|
2016-09-30 05:02:48
|
tor4kichi/Hohoema
|
https://api.github.com/repos/tor4kichi/Hohoema
|
closed
|
お気に入りの追加可能数の表示
|
ui_design
|
お気に入りに追加できるアイテム数が把握できないので、管理が難しいです。
(ローカルへのお気に入り保存はここでは扱いません)
FavManagerに上限数はまとめてあります。
```
public const uint FAV_USER_MAX_COUNT = 50;
public const uint PREMIUM_FAV_USER_MAX_COUNT = 400;
public const uint FAV_MYLIST_MAX_COUNT = 20;
public const uint PREMIUM_FAV_MYLIST_MAX_COUNT = 50;
public const uint FAV_TAG_MAX_COUNT = 10;
public const uint PREMIUM_FAV_TAG_MAX_COUNT = 10;
```
お気に入り管理画面で「登録数 / 上限数」を表示する?
|
1.0
|
お気に入りの追加可能数の表示 - お気に入りに追加できるアイテム数が把握できないので、管理が難しいです。
(ローカルへのお気に入り保存はここでは扱いません)
FavManagerに上限数はまとめてあります。
```
public const uint FAV_USER_MAX_COUNT = 50;
public const uint PREMIUM_FAV_USER_MAX_COUNT = 400;
public const uint FAV_MYLIST_MAX_COUNT = 20;
public const uint PREMIUM_FAV_MYLIST_MAX_COUNT = 50;
public const uint FAV_TAG_MAX_COUNT = 10;
public const uint PREMIUM_FAV_TAG_MAX_COUNT = 10;
```
お気に入り管理画面で「登録数 / 上限数」を表示する?
|
design
|
お気に入りの追加可能数の表示 お気に入りに追加できるアイテム数が把握できないので、管理が難しいです。 (ローカルへのお気に入り保存はここでは扱いません) favmanagerに上限数はまとめてあります。 public const uint fav user max count public const uint premium fav user max count public const uint fav mylist max count public const uint premium fav mylist max count public const uint fav tag max count public const uint premium fav tag max count お気に入り管理画面で「登録数 上限数」を表示する?
| 1
|
42,546
| 5,474,754,974
|
IssuesEvent
|
2017-03-11 03:08:20
|
RobotLocomotion/drake
|
https://api.github.com/repos/RobotLocomotion/drake
|
closed
|
Doxygen Style Guide
|
priority: backlog team: software core type: design
|
# Problem Definition
[Doxygen](http://www.stack.nl/~dimitri/doxygen/) supports numerous documentation styles. As an example, [this page](http://www.stack.nl/~dimitri/doxygen/manual/docblocks.html) lists four different ways to create a documentation block. For the same reasons we adopted a [C++ style guide](http://drake002.csail.mit.edu/drake/sphinx/code_style_guide.html#c-style), we need to adopt a Doxygen style guide.
I'll start conversation started by pointing to:
1. [Mozilla Developer Network's Doxygen style guide](https://developer.mozilla.org/en-US/docs/Mozilla/Developer_guide/Interface_development_guide/Commenting_IDL_for_better_documentation) — a possible model to follow.
2. https://github.com/RobotLocomotion/drake/pull/2023#issuecomment-207096198 — a possible exception to the model
3. https://github.com/sherm1/drake/blob/add-common-nicetypename/drake/common/nice_type_name.h — actual example of compact style.
# Descriptions for Non-Public-API Code
Drake contains code that's not part of the public API and thus should not be commented using Doxygen, but should still be commented for developers to read. One example is method `GetActuatorEffortLimit()` in `RigidBodyTreeURDF.cpp`. We need to define a best practice on to document this code. One option is to apply the same comment style for things like parameters, exceptions, and return values, but simply prefix each line with `//`.
# Wish List
- [ ] Update `cpplint` and `clang-format` to enforce a Doxygen style guide.
|
1.0
|
Doxygen Style Guide - # Problem Definition
[Doxygen](http://www.stack.nl/~dimitri/doxygen/) supports numerous documentation styles. As an example, [this page](http://www.stack.nl/~dimitri/doxygen/manual/docblocks.html) lists four different ways to create a documentation block. For the same reasons we adopted a [C++ style guide](http://drake002.csail.mit.edu/drake/sphinx/code_style_guide.html#c-style), we need to adopt a Doxygen style guide.
I'll start conversation started by pointing to:
1. [Mozilla Developer Network's Doxygen style guide](https://developer.mozilla.org/en-US/docs/Mozilla/Developer_guide/Interface_development_guide/Commenting_IDL_for_better_documentation) — a possible model to follow.
2. https://github.com/RobotLocomotion/drake/pull/2023#issuecomment-207096198 — a possible exception to the model
3. https://github.com/sherm1/drake/blob/add-common-nicetypename/drake/common/nice_type_name.h — actual example of compact style.
# Descriptions for Non-Public-API Code
Drake contains code that's not part of the public API and thus should not be commented using Doxygen, but should still be commented for developers to read. One example is method `GetActuatorEffortLimit()` in `RigidBodyTreeURDF.cpp`. We need to define a best practice on to document this code. One option is to apply the same comment style for things like parameters, exceptions, and return values, but simply prefix each line with `//`.
# Wish List
- [ ] Update `cpplint` and `clang-format` to enforce a Doxygen style guide.
|
design
|
doxygen style guide problem definition supports numerous documentation styles as an example lists four different ways to create a documentation block for the same reasons we adopted a we need to adopt a doxygen style guide i ll start conversation started by pointing to — a possible model to follow — a possible exception to the model — actual example of compact style descriptions for non public api code drake contains code that s not part of the public api and thus should not be commented using doxygen but should still be commented for developers to read one example is method getactuatoreffortlimit in rigidbodytreeurdf cpp we need to define a best practice on to document this code one option is to apply the same comment style for things like parameters exceptions and return values but simply prefix each line with wish list update cpplint and clang format to enforce a doxygen style guide
| 1
|
130,881
| 5,134,861,457
|
IssuesEvent
|
2017-01-11 10:23:50
|
DRDD2016/sparkn2
|
https://api.github.com/repos/DRDD2016/sparkn2
|
closed
|
Loading app state
|
priority 2
|
Want to be able to hydrate app state at various points, primarily on initial login.
State items include:
* Fetching phone contacts
|
1.0
|
Loading app state - Want to be able to hydrate app state at various points, primarily on initial login.
State items include:
* Fetching phone contacts
|
non_design
|
loading app state want to be able to hydrate app state at various points primarily on initial login state items include fetching phone contacts
| 0
|
152,216
| 23,932,692,028
|
IssuesEvent
|
2022-09-10 19:43:38
|
rohmishra/personal_website
|
https://api.github.com/repos/rohmishra/personal_website
|
reopened
|
Impovement: Who am I needs more visual highlights
|
Design Needed
|
**Is your feature request related to a problem? Please describe.**
Current "Who am I" is way too simple. It has only 2 lines
**Describe the solution you'd like**
MORE INTERACTIVITY
**Describe alternatives you've considered**
_*DESIGN NEEDED*_
**Additional context**
_Examples go here_
|
1.0
|
Impovement: Who am I needs more visual highlights - **Is your feature request related to a problem? Please describe.**
Current "Who am I" is way too simple. It has only 2 lines
**Describe the solution you'd like**
MORE INTERACTIVITY
**Describe alternatives you've considered**
_*DESIGN NEEDED*_
**Additional context**
_Examples go here_
|
design
|
impovement who am i needs more visual highlights is your feature request related to a problem please describe current who am i is way too simple it has only lines describe the solution you d like more interactivity describe alternatives you ve considered design needed additional context examples go here
| 1
|
97,788
| 12,261,836,382
|
IssuesEvent
|
2020-05-06 20:50:58
|
Princeton-CDH/mep-django
|
https://api.github.com/repos/Princeton-CDH/mep-django
|
closed
|
Make the text inside the breadcrumb horizontally centered to make it look visually correct
|
awaiting design testing site≠design
|
All the text inside the breadcrumb containers are still off-centered – any way to fix that so they are horizontally centered?
- Level of importance: It's just killing me visually, may not be noticed by the user, the user may not be affected in any way.
|
2.0
|
Make the text inside the breadcrumb horizontally centered to make it look visually correct - All the text inside the breadcrumb containers are still off-centered – any way to fix that so they are horizontally centered?
- Level of importance: It's just killing me visually, may not be noticed by the user, the user may not be affected in any way.
|
design
|
make the text inside the breadcrumb horizontally centered to make it look visually correct all the text inside the breadcrumb containers are still off centered – any way to fix that so they are horizontally centered level of importance it s just killing me visually may not be noticed by the user the user may not be affected in any way
| 1
|
139,748
| 18,853,783,638
|
IssuesEvent
|
2021-11-12 01:43:31
|
peterwkc85/selenium-loadable-component
|
https://api.github.com/repos/peterwkc85/selenium-loadable-component
|
opened
|
WS-2017-3734 (Medium) detected in httpclient-4.5.1.jar
|
security vulnerability
|
## WS-2017-3734 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>httpclient-4.5.1.jar</b></p></summary>
<p>Apache HttpComponents Client</p>
<p>Path to dependency file: /selenium-loadable-component/pom.xml</p>
<p>Path to vulnerable library: /root/.m2/repository/org/apache/httpcomponents/httpclient/4.5.1/httpclient-4.5.1.jar</p>
<p>
Dependency Hierarchy:
- selenide-3.5.1.jar (Root Library)
- selenium-java-2.53.0.jar
- selenium-chrome-driver-2.53.0.jar
- selenium-remote-driver-2.53.0.jar
- :x: **httpclient-4.5.1.jar** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Apache httpclient before 4.5.3 are vulnerable to Directory Traversal. The user-provided path was able to override the specified host, resulting in giving network access to a sensitive environment.
<p>Publish Date: 2017-01-21
<p>URL: <a href=https://github.com/apache/httpcomponents-client/commit/0554271750599756d4946c0d7ba43d04b1a7b220>WS-2017-3734</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://issues.apache.org/jira/browse/HTTPCLIENT-1803">https://issues.apache.org/jira/browse/HTTPCLIENT-1803</a></p>
<p>Release Date: 2017-01-21</p>
<p>Fix Resolution: org.apache.httpcomponents:httpclient:4.5.3</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
True
|
WS-2017-3734 (Medium) detected in httpclient-4.5.1.jar - ## WS-2017-3734 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>httpclient-4.5.1.jar</b></p></summary>
<p>Apache HttpComponents Client</p>
<p>Path to dependency file: /selenium-loadable-component/pom.xml</p>
<p>Path to vulnerable library: /root/.m2/repository/org/apache/httpcomponents/httpclient/4.5.1/httpclient-4.5.1.jar</p>
<p>
Dependency Hierarchy:
- selenide-3.5.1.jar (Root Library)
- selenium-java-2.53.0.jar
- selenium-chrome-driver-2.53.0.jar
- selenium-remote-driver-2.53.0.jar
- :x: **httpclient-4.5.1.jar** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Apache httpclient before 4.5.3 are vulnerable to Directory Traversal. The user-provided path was able to override the specified host, resulting in giving network access to a sensitive environment.
<p>Publish Date: 2017-01-21
<p>URL: <a href=https://github.com/apache/httpcomponents-client/commit/0554271750599756d4946c0d7ba43d04b1a7b220>WS-2017-3734</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://issues.apache.org/jira/browse/HTTPCLIENT-1803">https://issues.apache.org/jira/browse/HTTPCLIENT-1803</a></p>
<p>Release Date: 2017-01-21</p>
<p>Fix Resolution: org.apache.httpcomponents:httpclient:4.5.3</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
non_design
|
ws medium detected in httpclient jar ws medium severity vulnerability vulnerable library httpclient jar apache httpcomponents client path to dependency file selenium loadable component pom xml path to vulnerable library root repository org apache httpcomponents httpclient httpclient jar dependency hierarchy selenide jar root library selenium java jar selenium chrome driver jar selenium remote driver jar x httpclient jar vulnerable library vulnerability details apache httpclient before are vulnerable to directory traversal the user provided path was able to override the specified host resulting in giving network access to a sensitive environment publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org apache httpcomponents httpclient step up your open source security game with whitesource
| 0
|
532,799
| 15,571,683,158
|
IssuesEvent
|
2021-03-17 05:32:16
|
wso2/integration-studio
|
https://api.github.com/repos/wso2/integration-studio
|
closed
|
Target is not getting saved in call mediator
|
8.0.0 Priority/High Type/Bug
|
**Description:**
1. Add a call mediator.
2. Add source and target configuration in the source view
3. Switch to design view
Target is getting removed from the config. When we add to config to source view, it is not getting saved in the capp.
**Affected Product Version:**
8.0.0 Alpha
**OS, DB, other environment details and versions:**
MacOS
Ubuntu 20.04
|
1.0
|
Target is not getting saved in call mediator - **Description:**
1. Add a call mediator.
2. Add source and target configuration in the source view
3. Switch to design view
Target is getting removed from the config. When we add to config to source view, it is not getting saved in the capp.
**Affected Product Version:**
8.0.0 Alpha
**OS, DB, other environment details and versions:**
MacOS
Ubuntu 20.04
|
non_design
|
target is not getting saved in call mediator description add a call mediator add source and target configuration in the source view switch to design view target is getting removed from the config when we add to config to source view it is not getting saved in the capp affected product version alpha os db other environment details and versions macos ubuntu
| 0
|
95,019
| 11,948,767,356
|
IssuesEvent
|
2020-04-03 12:30:18
|
mozilla-mobile/fenix
|
https://api.github.com/repos/mozilla-mobile/fenix
|
closed
|
[Fenix] Use Metropolis font for headers, buttons, and snackbars
|
P2 eng:qa:needed eng:ready ux:visual-design
|
Since we are unable to use Sharp Sans, we will be using Metropolis instead for headers, buttons, and snackbars. Please see reference below @colintheshots
Font location: https://github.com/chrismsimpson/Metropolis





|
1.0
|
[Fenix] Use Metropolis font for headers, buttons, and snackbars - Since we are unable to use Sharp Sans, we will be using Metropolis instead for headers, buttons, and snackbars. Please see reference below @colintheshots
Font location: https://github.com/chrismsimpson/Metropolis





|
design
|
use metropolis font for headers buttons and snackbars since we are unable to use sharp sans we will be using metropolis instead for headers buttons and snackbars please see reference below colintheshots font location
| 1
|
169,685
| 20,841,861,438
|
IssuesEvent
|
2022-03-21 01:42:25
|
prafullkotecha/fabmedical
|
https://api.github.com/repos/prafullkotecha/fabmedical
|
opened
|
CVE-2021-44906 (High) detected in multiple libraries
|
security vulnerability
|
## CVE-2021-44906 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>minimist-0.0.8.tgz</b>, <b>minimist-0.0.10.tgz</b>, <b>minimist-1.2.0.tgz</b></p></summary>
<p>
<details><summary><b>minimist-0.0.8.tgz</b></p></summary>
<p>parse argument options</p>
<p>Library home page: <a href="https://registry.npmjs.org/minimist/-/minimist-0.0.8.tgz">https://registry.npmjs.org/minimist/-/minimist-0.0.8.tgz</a></p>
<p>
Dependency Hierarchy:
- karma-4.1.0.tgz (Root Library)
- chokidar-2.1.8.tgz
- fsevents-1.2.9.tgz
- node-pre-gyp-0.12.0.tgz
- mkdirp-0.5.1.tgz
- :x: **minimist-0.0.8.tgz** (Vulnerable Library)
</details>
<details><summary><b>minimist-0.0.10.tgz</b></p></summary>
<p>parse argument options</p>
<p>Library home page: <a href="https://registry.npmjs.org/minimist/-/minimist-0.0.10.tgz">https://registry.npmjs.org/minimist/-/minimist-0.0.10.tgz</a></p>
<p>Path to dependency file: /content-web/package.json</p>
<p>Path to vulnerable library: /content-web/node_modules/optimist/node_modules/minimist/package.json</p>
<p>
Dependency Hierarchy:
- karma-4.1.0.tgz (Root Library)
- optimist-0.6.1.tgz
- :x: **minimist-0.0.10.tgz** (Vulnerable Library)
</details>
<details><summary><b>minimist-1.2.0.tgz</b></p></summary>
<p>parse argument options</p>
<p>Library home page: <a href="https://registry.npmjs.org/minimist/-/minimist-1.2.0.tgz">https://registry.npmjs.org/minimist/-/minimist-1.2.0.tgz</a></p>
<p>
Dependency Hierarchy:
- karma-4.1.0.tgz (Root Library)
- chokidar-2.1.8.tgz
- fsevents-1.2.9.tgz
- node-pre-gyp-0.12.0.tgz
- rc-1.2.8.tgz
- :x: **minimist-1.2.0.tgz** (Vulnerable Library)
</details>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Minimist <=1.2.5 is vulnerable to Prototype Pollution via file index.js, function setKey() (lines 69-95).
<p>Publish Date: 2022-03-17
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-44906>CVE-2021-44906</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44906">https://nvd.nist.gov/vuln/detail/CVE-2021-44906</a></p>
<p>Release Date: 2022-03-17</p>
<p>Fix Resolution: BumperLane.Public.Service.Contracts - 0.23.35.214-prerelease;cloudscribe.templates - 5.2.0;Virteom.Tenant.Mobile.Bluetooth - 0.21.29.159-prerelease;ShowingVault.DotNet.Sdk - 0.13.41.190-prerelease;Envisia.DotNet.Templates - 3.0.1;Yarnpkg.Yarn - 0.26.1;Virteom.Tenant.Mobile.Framework.UWP - 0.20.41.103-prerelease;Virteom.Tenant.Mobile.Framework.iOS - 0.20.41.103-prerelease;BumperLane.Public.Api.V2.ClientModule - 0.23.35.214-prerelease;VueJS.NetCore - 1.1.1;Dianoga - 4.0.0,3.0.0-RC02;Virteom.Tenant.Mobile.Bluetooth.iOS - 0.20.41.103-prerelease;Virteom.Public.Utilities - 0.23.37.212-prerelease;Indianadavy.VueJsWebAPITemplate.CSharp - 1.0.1;NorDroN.AngularTemplate - 0.1.6;Virteom.Tenant.Mobile.Framework - 0.21.29.159-prerelease;Virteom.Tenant.Mobile.Bluetooth.Android - 0.20.41.103-prerelease;z4a-dotnet-scaffold - 1.0.0.2;Raml.Parser - 1.0.7;CoreVueWebTest - 3.0.101;dotnetng.template - 1.0.0.4;SitecoreMaster.TrueDynamicPlaceholders - 1.0.3;Virteom.Tenant.Mobile.Framework.Android - 0.20.41.103-prerelease;Fable.Template.Elmish.React - 0.1.6;BlazorPolyfill.Build - 6.0.100.2;Fable.Snowpack.Template - 2.1.0;BumperLane.Public.Api.Client - 0.23.35.214-prerelease;Yarn.MSBuild - 0.22.0,0.24.6;Blazor.TailwindCSS.BUnit - 1.0.2;Bridge.AWS - 0.3.30.36;tslint - 5.6.0;SAFE.Template - 3.0.1;GR.PageRender.Razor - 1.8.0;MIDIator.WebClient - 1.0.105</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
True
|
CVE-2021-44906 (High) detected in multiple libraries - ## CVE-2021-44906 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>minimist-0.0.8.tgz</b>, <b>minimist-0.0.10.tgz</b>, <b>minimist-1.2.0.tgz</b></p></summary>
<p>
<details><summary><b>minimist-0.0.8.tgz</b></p></summary>
<p>parse argument options</p>
<p>Library home page: <a href="https://registry.npmjs.org/minimist/-/minimist-0.0.8.tgz">https://registry.npmjs.org/minimist/-/minimist-0.0.8.tgz</a></p>
<p>
Dependency Hierarchy:
- karma-4.1.0.tgz (Root Library)
- chokidar-2.1.8.tgz
- fsevents-1.2.9.tgz
- node-pre-gyp-0.12.0.tgz
- mkdirp-0.5.1.tgz
- :x: **minimist-0.0.8.tgz** (Vulnerable Library)
</details>
<details><summary><b>minimist-0.0.10.tgz</b></p></summary>
<p>parse argument options</p>
<p>Library home page: <a href="https://registry.npmjs.org/minimist/-/minimist-0.0.10.tgz">https://registry.npmjs.org/minimist/-/minimist-0.0.10.tgz</a></p>
<p>Path to dependency file: /content-web/package.json</p>
<p>Path to vulnerable library: /content-web/node_modules/optimist/node_modules/minimist/package.json</p>
<p>
Dependency Hierarchy:
- karma-4.1.0.tgz (Root Library)
- optimist-0.6.1.tgz
- :x: **minimist-0.0.10.tgz** (Vulnerable Library)
</details>
<details><summary><b>minimist-1.2.0.tgz</b></p></summary>
<p>parse argument options</p>
<p>Library home page: <a href="https://registry.npmjs.org/minimist/-/minimist-1.2.0.tgz">https://registry.npmjs.org/minimist/-/minimist-1.2.0.tgz</a></p>
<p>
Dependency Hierarchy:
- karma-4.1.0.tgz (Root Library)
- chokidar-2.1.8.tgz
- fsevents-1.2.9.tgz
- node-pre-gyp-0.12.0.tgz
- rc-1.2.8.tgz
- :x: **minimist-1.2.0.tgz** (Vulnerable Library)
</details>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Minimist <=1.2.5 is vulnerable to Prototype Pollution via file index.js, function setKey() (lines 69-95).
<p>Publish Date: 2022-03-17
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-44906>CVE-2021-44906</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44906">https://nvd.nist.gov/vuln/detail/CVE-2021-44906</a></p>
<p>Release Date: 2022-03-17</p>
<p>Fix Resolution: BumperLane.Public.Service.Contracts - 0.23.35.214-prerelease;cloudscribe.templates - 5.2.0;Virteom.Tenant.Mobile.Bluetooth - 0.21.29.159-prerelease;ShowingVault.DotNet.Sdk - 0.13.41.190-prerelease;Envisia.DotNet.Templates - 3.0.1;Yarnpkg.Yarn - 0.26.1;Virteom.Tenant.Mobile.Framework.UWP - 0.20.41.103-prerelease;Virteom.Tenant.Mobile.Framework.iOS - 0.20.41.103-prerelease;BumperLane.Public.Api.V2.ClientModule - 0.23.35.214-prerelease;VueJS.NetCore - 1.1.1;Dianoga - 4.0.0,3.0.0-RC02;Virteom.Tenant.Mobile.Bluetooth.iOS - 0.20.41.103-prerelease;Virteom.Public.Utilities - 0.23.37.212-prerelease;Indianadavy.VueJsWebAPITemplate.CSharp - 1.0.1;NorDroN.AngularTemplate - 0.1.6;Virteom.Tenant.Mobile.Framework - 0.21.29.159-prerelease;Virteom.Tenant.Mobile.Bluetooth.Android - 0.20.41.103-prerelease;z4a-dotnet-scaffold - 1.0.0.2;Raml.Parser - 1.0.7;CoreVueWebTest - 3.0.101;dotnetng.template - 1.0.0.4;SitecoreMaster.TrueDynamicPlaceholders - 1.0.3;Virteom.Tenant.Mobile.Framework.Android - 0.20.41.103-prerelease;Fable.Template.Elmish.React - 0.1.6;BlazorPolyfill.Build - 6.0.100.2;Fable.Snowpack.Template - 2.1.0;BumperLane.Public.Api.Client - 0.23.35.214-prerelease;Yarn.MSBuild - 0.22.0,0.24.6;Blazor.TailwindCSS.BUnit - 1.0.2;Bridge.AWS - 0.3.30.36;tslint - 5.6.0;SAFE.Template - 3.0.1;GR.PageRender.Razor - 1.8.0;MIDIator.WebClient - 1.0.105</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
non_design
|
cve high detected in multiple libraries cve high severity vulnerability vulnerable libraries minimist tgz minimist tgz minimist tgz minimist tgz parse argument options library home page a href dependency hierarchy karma tgz root library chokidar tgz fsevents tgz node pre gyp tgz mkdirp tgz x minimist tgz vulnerable library minimist tgz parse argument options library home page a href path to dependency file content web package json path to vulnerable library content web node modules optimist node modules minimist package json dependency hierarchy karma tgz root library optimist tgz x minimist tgz vulnerable library minimist tgz parse argument options library home page a href dependency hierarchy karma tgz root library chokidar tgz fsevents tgz node pre gyp tgz rc tgz x minimist tgz vulnerable library found in base branch master vulnerability details minimist is vulnerable to prototype pollution via file index js function setkey lines publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution bumperlane public service contracts prerelease cloudscribe templates virteom tenant mobile bluetooth prerelease showingvault dotnet sdk prerelease envisia dotnet templates yarnpkg yarn virteom tenant mobile framework uwp prerelease virteom tenant mobile framework ios prerelease bumperlane public api clientmodule prerelease vuejs netcore dianoga virteom tenant mobile bluetooth ios prerelease virteom public utilities prerelease indianadavy vuejswebapitemplate csharp nordron angulartemplate virteom tenant mobile framework prerelease virteom tenant mobile bluetooth android prerelease dotnet scaffold raml parser corevuewebtest dotnetng template sitecoremaster truedynamicplaceholders virteom tenant mobile framework android prerelease fable template elmish react blazorpolyfill build fable snowpack template bumperlane public api client prerelease yarn msbuild blazor tailwindcss bunit bridge aws tslint safe template gr pagerender razor midiator webclient step up your open source security game with whitesource
| 0
|
50,477
| 6,393,560,848
|
IssuesEvent
|
2017-08-04 07:51:12
|
alphagov/govuk-frontend
|
https://api.github.com/repos/alphagov/govuk-frontend
|
closed
|
Make all form elements the same height
|
design
|
If our form elements were the same height it would make it much easier to maintain a vertical rhythm and to create horizontal form layouts where necessary.
For example, we sometimes need to align buttons to the right of form fields (eg. search boxes). They'd look a lot nicer if they were the same height.
I'm thinking of the following elements in particular: radios, checkboxes, text fields, select boxes, type-aheads, buttons.
|
1.0
|
Make all form elements the same height - If our form elements were the same height it would make it much easier to maintain a vertical rhythm and to create horizontal form layouts where necessary.
For example, we sometimes need to align buttons to the right of form fields (eg. search boxes). They'd look a lot nicer if they were the same height.
I'm thinking of the following elements in particular: radios, checkboxes, text fields, select boxes, type-aheads, buttons.
|
design
|
make all form elements the same height if our form elements were the same height it would make it much easier to maintain a vertical rhythm and to create horizontal form layouts where necessary for example we sometimes need to align buttons to the right of form fields eg search boxes they d look a lot nicer if they were the same height i m thinking of the following elements in particular radios checkboxes text fields select boxes type aheads buttons
| 1
|
52,646
| 6,648,531,325
|
IssuesEvent
|
2017-09-28 09:39:58
|
wellcometrust/wellcomecollection.org
|
https://api.github.com/repos/wellcometrust/wellcomecollection.org
|
closed
|
Design: Revisit page grid on key templates
|
needs:design
|
## Type
- enhancement
## Description
Review and update the page grid on Article and Work templates to improve visual hierarchy and standardise the layout.
|
1.0
|
Design: Revisit page grid on key templates - ## Type
- enhancement
## Description
Review and update the page grid on Article and Work templates to improve visual hierarchy and standardise the layout.
|
design
|
design revisit page grid on key templates type enhancement description review and update the page grid on article and work templates to improve visual hierarchy and standardise the layout
| 1
|
765,225
| 26,838,407,651
|
IssuesEvent
|
2023-02-02 21:37:36
|
inaturalist/inaturalist
|
https://api.github.com/repos/inaturalist/inaturalist
|
closed
|
Better indicators that slow PDF Generation of large guides is not hungup
|
abandoned priority
|
The generation of PDFs of large guides for the first time takes several minutes and then gives the following 'taking forever' alert
Indicator
Ultimately these guides do generate, but users are perceiving this as a bug in PDF generation. We should reword to something like - 'Please be patient, generating large PDFs for the first time can take an hour or two' and change the 'This seems to be taking forever, Please try again later' alert to something like 'This guide is still generating, please check back later'.
A better solution would be to include email-when-done functionality as in CSV generation elsewhere on the site
|
1.0
|
Better indicators that slow PDF Generation of large guides is not hungup - The generation of PDFs of large guides for the first time takes several minutes and then gives the following 'taking forever' alert
Indicator
Ultimately these guides do generate, but users are perceiving this as a bug in PDF generation. We should reword to something like - 'Please be patient, generating large PDFs for the first time can take an hour or two' and change the 'This seems to be taking forever, Please try again later' alert to something like 'This guide is still generating, please check back later'.
A better solution would be to include email-when-done functionality as in CSV generation elsewhere on the site
|
non_design
|
better indicators that slow pdf generation of large guides is not hungup the generation of pdfs of large guides for the first time takes several minutes and then gives the following taking forever alert ultimately these guides do generate but users are perceiving this as a bug in pdf generation we should reword to something like please be patient generating large pdfs for the first time can take an hour or two and change the this seems to be taking forever please try again later alert to something like this guide is still generating please check back later a better solution would be to include email when done functionality as in csv generation elsewhere on the site
| 0
|
158,112
| 20,007,591,363
|
IssuesEvent
|
2022-02-01 00:03:14
|
timf-app-sandbox/t1
|
https://api.github.com/repos/timf-app-sandbox/t1
|
opened
|
CVE-2018-3728 (High) detected in hoek-0.9.1.tgz, hoek-2.16.3.tgz
|
security vulnerability
|
## CVE-2018-3728 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>hoek-0.9.1.tgz</b>, <b>hoek-2.16.3.tgz</b></p></summary>
<p>
<details><summary><b>hoek-0.9.1.tgz</b></p></summary>
<p>General purpose node utilities</p>
<p>Library home page: <a href="https://registry.npmjs.org/hoek/-/hoek-0.9.1.tgz">https://registry.npmjs.org/hoek/-/hoek-0.9.1.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/zaproxy/node_modules/hoek/package.json</p>
<p>
Dependency Hierarchy:
- zaproxy-0.2.0.tgz (Root Library)
- request-2.36.0.tgz
- hawk-1.0.0.tgz
- :x: **hoek-0.9.1.tgz** (Vulnerable Library)
</details>
<details><summary><b>hoek-2.16.3.tgz</b></p></summary>
<p>General purpose node utilities</p>
<p>Library home page: <a href="https://registry.npmjs.org/hoek/-/hoek-2.16.3.tgz">https://registry.npmjs.org/hoek/-/hoek-2.16.3.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/npm/node_modules/request/node_modules/hawk/node_modules/hoek/package.json,/node_modules/hoek/package.json</p>
<p>
Dependency Hierarchy:
- grunt-retire-0.3.12.tgz (Root Library)
- request-2.67.0.tgz
- hawk-3.1.3.tgz
- :x: **hoek-2.16.3.tgz** (Vulnerable Library)
</details>
<p>Found in HEAD commit: <a href="https://github.com/timf-app-sandbox/t1/commit/ade63e4d4d7f78775fe064056f81c5da1b53aecf">ade63e4d4d7f78775fe064056f81c5da1b53aecf</a></p>
<p>Found in base branch: <b>dev</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
hoek node module before 4.2.0 and 5.0.x before 5.0.3 suffers from a Modification of Assumed-Immutable Data (MAID) vulnerability via 'merge' and 'applyToDefaults' functions, which allows a malicious user to modify the prototype of "Object" via __proto__, causing the addition or modification of an existing property that will exist on all objects.
<p>Publish Date: 2018-03-30
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-3728>CVE-2018-3728</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16082">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16082</a></p>
<p>Release Date: 2018-03-30</p>
<p>Fix Resolution (hoek): 4.2.0</p>
<p>Direct dependency fix Resolution (zaproxy): 1.0.0-rc.1</p><p>Fix Resolution (hoek): 4.2.0</p>
<p>Direct dependency fix Resolution (grunt-retire): 1.0.7</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"zaproxy","packageVersion":"0.2.0","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"zaproxy:0.2.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.0.0-rc.1","isBinary":false},{"packageType":"javascript/Node.js","packageName":"grunt-retire","packageVersion":"0.3.12","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"grunt-retire:0.3.12","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.0.7","isBinary":false}],"baseBranches":["dev"],"vulnerabilityIdentifier":"CVE-2018-3728","vulnerabilityDetails":"hoek node module before 4.2.0 and 5.0.x before 5.0.3 suffers from a Modification of Assumed-Immutable Data (MAID) vulnerability via \u0027merge\u0027 and \u0027applyToDefaults\u0027 functions, which allows a malicious user to modify the prototype of \"Object\" via __proto__, causing the addition or modification of an existing property that will exist on all objects.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-3728","cvss3Severity":"high","cvss3Score":"8.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"Low","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> -->
|
True
|
CVE-2018-3728 (High) detected in hoek-0.9.1.tgz, hoek-2.16.3.tgz - ## CVE-2018-3728 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>hoek-0.9.1.tgz</b>, <b>hoek-2.16.3.tgz</b></p></summary>
<p>
<details><summary><b>hoek-0.9.1.tgz</b></p></summary>
<p>General purpose node utilities</p>
<p>Library home page: <a href="https://registry.npmjs.org/hoek/-/hoek-0.9.1.tgz">https://registry.npmjs.org/hoek/-/hoek-0.9.1.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/zaproxy/node_modules/hoek/package.json</p>
<p>
Dependency Hierarchy:
- zaproxy-0.2.0.tgz (Root Library)
- request-2.36.0.tgz
- hawk-1.0.0.tgz
- :x: **hoek-0.9.1.tgz** (Vulnerable Library)
</details>
<details><summary><b>hoek-2.16.3.tgz</b></p></summary>
<p>General purpose node utilities</p>
<p>Library home page: <a href="https://registry.npmjs.org/hoek/-/hoek-2.16.3.tgz">https://registry.npmjs.org/hoek/-/hoek-2.16.3.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/npm/node_modules/request/node_modules/hawk/node_modules/hoek/package.json,/node_modules/hoek/package.json</p>
<p>
Dependency Hierarchy:
- grunt-retire-0.3.12.tgz (Root Library)
- request-2.67.0.tgz
- hawk-3.1.3.tgz
- :x: **hoek-2.16.3.tgz** (Vulnerable Library)
</details>
<p>Found in HEAD commit: <a href="https://github.com/timf-app-sandbox/t1/commit/ade63e4d4d7f78775fe064056f81c5da1b53aecf">ade63e4d4d7f78775fe064056f81c5da1b53aecf</a></p>
<p>Found in base branch: <b>dev</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
hoek node module before 4.2.0 and 5.0.x before 5.0.3 suffers from a Modification of Assumed-Immutable Data (MAID) vulnerability via 'merge' and 'applyToDefaults' functions, which allows a malicious user to modify the prototype of "Object" via __proto__, causing the addition or modification of an existing property that will exist on all objects.
<p>Publish Date: 2018-03-30
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-3728>CVE-2018-3728</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16082">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16082</a></p>
<p>Release Date: 2018-03-30</p>
<p>Fix Resolution (hoek): 4.2.0</p>
<p>Direct dependency fix Resolution (zaproxy): 1.0.0-rc.1</p><p>Fix Resolution (hoek): 4.2.0</p>
<p>Direct dependency fix Resolution (grunt-retire): 1.0.7</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"zaproxy","packageVersion":"0.2.0","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"zaproxy:0.2.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.0.0-rc.1","isBinary":false},{"packageType":"javascript/Node.js","packageName":"grunt-retire","packageVersion":"0.3.12","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"grunt-retire:0.3.12","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.0.7","isBinary":false}],"baseBranches":["dev"],"vulnerabilityIdentifier":"CVE-2018-3728","vulnerabilityDetails":"hoek node module before 4.2.0 and 5.0.x before 5.0.3 suffers from a Modification of Assumed-Immutable Data (MAID) vulnerability via \u0027merge\u0027 and \u0027applyToDefaults\u0027 functions, which allows a malicious user to modify the prototype of \"Object\" via __proto__, causing the addition or modification of an existing property that will exist on all objects.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-3728","cvss3Severity":"high","cvss3Score":"8.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"Low","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> -->
|
non_design
|
cve high detected in hoek tgz hoek tgz cve high severity vulnerability vulnerable libraries hoek tgz hoek tgz hoek tgz general purpose node utilities library home page a href path to dependency file package json path to vulnerable library node modules zaproxy node modules hoek package json dependency hierarchy zaproxy tgz root library request tgz hawk tgz x hoek tgz vulnerable library hoek tgz general purpose node utilities library home page a href path to dependency file package json path to vulnerable library node modules npm node modules request node modules hawk node modules hoek package json node modules hoek package json dependency hierarchy grunt retire tgz root library request tgz hawk tgz x hoek tgz vulnerable library found in head commit a href found in base branch dev vulnerability details hoek node module before and x before suffers from a modification of assumed immutable data maid vulnerability via merge and applytodefaults functions which allows a malicious user to modify the prototype of object via proto causing the addition or modification of an existing property that will exist on all objects publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution hoek direct dependency fix resolution zaproxy rc fix resolution hoek direct dependency fix resolution grunt retire isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency false dependencytree zaproxy isminimumfixversionavailable true minimumfixversion rc isbinary false packagetype javascript node js packagename grunt retire packageversion packagefilepaths istransitivedependency false dependencytree grunt retire isminimumfixversionavailable true minimumfixversion isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails hoek node module before and x before suffers from a modification of assumed immutable data maid vulnerability via and functions which allows a malicious user to modify the prototype of object via proto causing the addition or modification of an existing property that will exist on all objects vulnerabilityurl
| 0
|
51,064
| 6,491,348,652
|
IssuesEvent
|
2017-08-21 09:48:15
|
CatalystCode/ibex-dashboard
|
https://api.github.com/repos/CatalystCode/ibex-dashboard
|
closed
|
Add info balloons when hovering on the icons in create dashboard page
|
design feature
|

screenshot with suggestion attached
|
1.0
|
Add info balloons when hovering on the icons in create dashboard page - 
screenshot with suggestion attached
|
design
|
add info balloons when hovering on the icons in create dashboard page screenshot with suggestion attached
| 1
|
175,255
| 27,815,947,959
|
IssuesEvent
|
2023-03-18 17:32:49
|
chromium/subspace
|
https://api.github.com/repos/chromium/subspace
|
opened
|
Make all Iterator types in the library Clone
|
enhancement design
|
- If they are over references, like iter(), or slice iterators.
- Cloning mutable references is fraught. Do we... support that?
- If they are over values, like into_iter() if the values are `Clone`.
|
1.0
|
Make all Iterator types in the library Clone - - If they are over references, like iter(), or slice iterators.
- Cloning mutable references is fraught. Do we... support that?
- If they are over values, like into_iter() if the values are `Clone`.
|
design
|
make all iterator types in the library clone if they are over references like iter or slice iterators cloning mutable references is fraught do we support that if they are over values like into iter if the values are clone
| 1
|
112,326
| 9,560,636,359
|
IssuesEvent
|
2019-05-03 20:13:38
|
dart-lang/sdk
|
https://api.github.com/repos/dart-lang/sdk
|
closed
|
Tests of non-utf8 filenames break infrastructure if they don't clean up their temp files
|
area-test library-io
|
The tests
standalone_2/io/non_utf8_directory_test
standalone_2/io/non_utf8_file_test
standalone_2/io/non_utf8_link_test
standalone_2/io/non_utf8_output_test (possibly)
will leave behind a temporary file system object with a non-utf8 name (starting with 0xb6, decimal 182)
if they time out or crash.
The swarming infrastructure used for builders then crashes when trying to delete these files, as part of cleaning up after a build.
This is happening on the hot_reload and hot_reload_rollback builders right now.
Skipping these tests on the reload and reload rollback builders for now, filing an issue with Chrome infrastructure to make the swarming bots stop crashing on this case.
These are tests related to issue "Cannot walk a list of files and pass them to a subprocess (if any are non-UTF8) #33368"
|
1.0
|
Tests of non-utf8 filenames break infrastructure if they don't clean up their temp files - The tests
standalone_2/io/non_utf8_directory_test
standalone_2/io/non_utf8_file_test
standalone_2/io/non_utf8_link_test
standalone_2/io/non_utf8_output_test (possibly)
will leave behind a temporary file system object with a non-utf8 name (starting with 0xb6, decimal 182)
if they time out or crash.
The swarming infrastructure used for builders then crashes when trying to delete these files, as part of cleaning up after a build.
This is happening on the hot_reload and hot_reload_rollback builders right now.
Skipping these tests on the reload and reload rollback builders for now, filing an issue with Chrome infrastructure to make the swarming bots stop crashing on this case.
These are tests related to issue "Cannot walk a list of files and pass them to a subprocess (if any are non-UTF8) #33368"
|
non_design
|
tests of non filenames break infrastructure if they don t clean up their temp files the tests standalone io non directory test standalone io non file test standalone io non link test standalone io non output test possibly will leave behind a temporary file system object with a non name starting with decimal if they time out or crash the swarming infrastructure used for builders then crashes when trying to delete these files as part of cleaning up after a build this is happening on the hot reload and hot reload rollback builders right now skipping these tests on the reload and reload rollback builders for now filing an issue with chrome infrastructure to make the swarming bots stop crashing on this case these are tests related to issue cannot walk a list of files and pass them to a subprocess if any are non
| 0
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.