Unnamed: 0
int64
0
832k
id
float64
2.49B
32.1B
type
stringclasses
1 value
created_at
stringlengths
19
19
repo
stringlengths
4
112
repo_url
stringlengths
33
141
action
stringclasses
3 values
title
stringlengths
1
957
labels
stringlengths
4
1.11k
body
stringlengths
1
261k
index
stringclasses
11 values
text_combine
stringlengths
95
261k
label
stringclasses
2 values
text
stringlengths
96
250k
binary_label
int64
0
1
53,070
6,677,096,269
IssuesEvent
2017-10-05 09:05:36
elastic/logstash
https://api.github.com/repos/elastic/logstash
opened
Introduce the concept of topics to the DLQ
design discuss DLQ enhancement
During the SupportSummit developer take-over, I handled two tickets where users wanted to get DLQ entries off disk and into ES ASAP - both users fell short with simple dlq input -> es output configs because the entries had different shapes for one mapping. **I am proposing that we generate a "topic" that categorises the entry so that dlq ingest pipelines can be built around specific topics to transform them and send onward if the original fault can't be fixed. These categories should be rich in content, e.g. "output/elasticsearch/mapper_parsing_exception/failed to parse/<field>/number_format_exception". Design wise, a tagging mechanism [@metadata][dead_letter_queue][dlq_tags] is a probably more flexible. With a topic generated by `event.get("[@metadata][dead_letter_queue][dlq_tags]").join('/')` or similar.** General pitfalls: - The entires cannot be indexed directly unless they all have the same shape. - The differently shaped entries can't be transformed into a conformal shape for insertion into the original index because information is missing. - As more plugins get given the ability to write events to the DLQ, the shape of the event will be more different still - as will the variations of the `reason` value. General problems to solve (see sample entry below): - While we do have the plugin_type and id, the original target destination for this LS event is lost. The destination should include address/port, index/topic. Some of this may be alleviated by a reference to a centralised config record. - The actual problem that this event encountered, `mapper_parsing_exception` + `failed to parse [<field>]` + `number_format_exception`, is buried deep in the response from ES. Sample DLQ metadata entry: ``` "@metadata" => { "dlq_message" => "true", "dead_letter_queue" => { "plugin_type" => "elasticsearch", "plugin_id" => "08645c9aa7d0c1e40a36b2c83adc6bbd40b1c253-11", "reason" => "Could not index event to Elasticsearch. status: 400, action: [\"index\", {:_id=>nil, :_index=>\"logstash-logs-2017.09.28\", :_type=>\"logs\", :_routing=>nil}, 2017-09-28T23:54:09.258Z %{host} %{message}], response: {\"index\"=> {\"_index\"=>\"logstash-logs-2017.09.28\", \"_type\"=>\"logs\", \"_id\"=> \"AV7K6W7-8Vei4cyktbkL\", \"status\"=>400, \"error\"=> {\"type\"=>\"mapper_parsing_exception\", \"reason\"=>\"failed to parse [mysecondfield]\", \"caused_by\"=> {\"type\"=>\"number_format_exception\", \"reason\"=>\"For input string: \\\"abc123\\\"\"}}}}", "entry_time" => #<Java::OrgLogstash::Timestamp:0x304819e9> } } ``` Other Issues: https://github.com/elastic/logstash/issues/8242
1.0
Introduce the concept of topics to the DLQ - During the SupportSummit developer take-over, I handled two tickets where users wanted to get DLQ entries off disk and into ES ASAP - both users fell short with simple dlq input -> es output configs because the entries had different shapes for one mapping. **I am proposing that we generate a "topic" that categorises the entry so that dlq ingest pipelines can be built around specific topics to transform them and send onward if the original fault can't be fixed. These categories should be rich in content, e.g. "output/elasticsearch/mapper_parsing_exception/failed to parse/<field>/number_format_exception". Design wise, a tagging mechanism [@metadata][dead_letter_queue][dlq_tags] is a probably more flexible. With a topic generated by `event.get("[@metadata][dead_letter_queue][dlq_tags]").join('/')` or similar.** General pitfalls: - The entires cannot be indexed directly unless they all have the same shape. - The differently shaped entries can't be transformed into a conformal shape for insertion into the original index because information is missing. - As more plugins get given the ability to write events to the DLQ, the shape of the event will be more different still - as will the variations of the `reason` value. General problems to solve (see sample entry below): - While we do have the plugin_type and id, the original target destination for this LS event is lost. The destination should include address/port, index/topic. Some of this may be alleviated by a reference to a centralised config record. - The actual problem that this event encountered, `mapper_parsing_exception` + `failed to parse [<field>]` + `number_format_exception`, is buried deep in the response from ES. Sample DLQ metadata entry: ``` "@metadata" => { "dlq_message" => "true", "dead_letter_queue" => { "plugin_type" => "elasticsearch", "plugin_id" => "08645c9aa7d0c1e40a36b2c83adc6bbd40b1c253-11", "reason" => "Could not index event to Elasticsearch. status: 400, action: [\"index\", {:_id=>nil, :_index=>\"logstash-logs-2017.09.28\", :_type=>\"logs\", :_routing=>nil}, 2017-09-28T23:54:09.258Z %{host} %{message}], response: {\"index\"=> {\"_index\"=>\"logstash-logs-2017.09.28\", \"_type\"=>\"logs\", \"_id\"=> \"AV7K6W7-8Vei4cyktbkL\", \"status\"=>400, \"error\"=> {\"type\"=>\"mapper_parsing_exception\", \"reason\"=>\"failed to parse [mysecondfield]\", \"caused_by\"=> {\"type\"=>\"number_format_exception\", \"reason\"=>\"For input string: \\\"abc123\\\"\"}}}}", "entry_time" => #<Java::OrgLogstash::Timestamp:0x304819e9> } } ``` Other Issues: https://github.com/elastic/logstash/issues/8242
design
introduce the concept of topics to the dlq during the supportsummit developer take over i handled two tickets where users wanted to get dlq entries off disk and into es asap both users fell short with simple dlq input es output configs because the entries had different shapes for one mapping i am proposing that we generate a topic that categorises the entry so that dlq ingest pipelines can be built around specific topics to transform them and send onward if the original fault can t be fixed these categories should be rich in content e g output elasticsearch mapper parsing exception failed to parse number format exception design wise a tagging mechanism is a probably more flexible with a topic generated by event get join or similar general pitfalls the entires cannot be indexed directly unless they all have the same shape the differently shaped entries can t be transformed into a conformal shape for insertion into the original index because information is missing as more plugins get given the ability to write events to the dlq the shape of the event will be more different still as will the variations of the reason value general problems to solve see sample entry below while we do have the plugin type and id the original target destination for this ls event is lost the destination should include address port index topic some of this may be alleviated by a reference to a centralised config record the actual problem that this event encountered mapper parsing exception failed to parse number format exception is buried deep in the response from es sample dlq metadata entry metadata dlq message true dead letter queue plugin type elasticsearch plugin id reason could not index event to elasticsearch status action index id nil index logstash logs type logs routing nil host message response index index logstash logs type logs id status error type mapper parsing exception reason failed to parse caused by type number format exception reason for input string entry time other issues
1
756,576
26,477,165,232
IssuesEvent
2023-01-17 12:04:17
helpwave/services
https://api.github.com/repos/helpwave/services
opened
libs not linted in CI
bug priority: low
### Describe the bug We only lint each service, but never the libs.
1.0
libs not linted in CI - ### Describe the bug We only lint each service, but never the libs.
non_design
libs not linted in ci describe the bug we only lint each service but never the libs
0
26,995
4,847,546,720
IssuesEvent
2016-11-10 15:14:38
quickapps/cms
https://api.github.com/repos/quickapps/cms
closed
List type fields
Defect Resolved
The instructions for List Type options states: > The label is optional: if a line contains a single string, it will be used as key and label. I found that this is not true if you only use one string null is saved in the value if you use the key|label format it works correctly
1.0
List type fields - The instructions for List Type options states: > The label is optional: if a line contains a single string, it will be used as key and label. I found that this is not true if you only use one string null is saved in the value if you use the key|label format it works correctly
non_design
list type fields the instructions for list type options states the label is optional if a line contains a single string it will be used as key and label i found that this is not true if you only use one string null is saved in the value if you use the key label format it works correctly
0
65,313
16,195,988,407
IssuesEvent
2021-05-04 14:37:57
tensorflow/tensorflow
https://api.github.com/repos/tensorflow/tensorflow
closed
Fail to build on Linux aarch64
stalled stat:awaiting response subtype: ubuntu/linux type:build/install
**System information** - OS Platform and Distribution (e.g., Linux Ubuntu 16.04):Linux Ubuntu devel 21.04 - Mobile device (e.g. iPhone 8, Pixel 2, Samsung Galaxy) if the issue happens on mobile device: N/A - TensorFlow installed from (source or binary):source - TensorFlow version:master - Python version:3.9.4 - Installed using virtualenv? pip? conda?:N/A - Bazel version (if compiling from source):3.7.2 - GCC/Compiler version (if compiling from source):GCC 10.2.1 - CUDA/cuDNN version:N/A - GPU model and memory:N/A **Describe the problem** I want to build tensorflow on Linux aarch64 platform , and it fails . Commands : `./configure ` `bazel build //tensorflow/tools/pip_package:build_pip_package` Output : [![asciicast](https://asciinema.org/a/KsEIoMqtDsDvInf0fbPTxBCBs.svg)](https://asciinema.org/a/KsEIoMqtDsDvInf0fbPTxBCBs) Error message : ERROR: /root/.cache/bazel/_bazel_root/efb88f6336d9c4a18216fb94287b8d97/external/local_config_cc/BUILD:47:19: in cc_toolchain_suite rule @local_config_cc//:toolchain: cc_toolchain_suite '@local_config_cc//:toolchain' does not contain a toolchain for cpu 'aarch64' Command : `bazel build //tensorflow/tools/pip_package:build_pip_package --toolchain_resolution_debug` Output : [![asciicast](https://asciinema.org/a/hok5YFKqreDYj7X5pLFDIsbVQ.svg)](https://asciinema.org/a/hok5YFKqreDYj7X5pLFDIsbVQ) Logs : `INFO: ToolchainResolution: Target platform @local_config_platform//:host: Selected execution platform @local_execution_config_platform//:platform, INFO: ToolchainResolution: Target platform @local_config_platform//:host: Selected execution platform @local_execution_config_platform//:platform, INFO: ToolchainResolution: Type @bazel_tools//tools/cpp:toolchain_type: target @local_config_platform//:host: Rejected toolchain @local_config_cc//:cc-compiler-armeabi-v7a; mismatching values: arm, android INFO: ToolchainResolution: Type @bazel_tools//tools/cpp:toolchain_type: target platform @local_config_platform//:host: execution @local_execution_config_platform//:platform: Selected toolchain @local_config_cc//:cc-compiler-piii INFO: ToolchainResolution: Type @bazel_tools//tools/cpp:toolchain_type: target platform @local_config_platform//:host: execution @local_config_platform//:host: Selected toolchain @local_config_cc//:cc-compiler-piii INFO: ToolchainResolution: Type @bazel_tools//tools/cpp:toolchain_type: target @local_config_platform//:host: Rejected toolchain @local_config_cc//:cc-compiler-armeabi-v7a; mismatching values: arm, android INFO: ToolchainResolution: Target platform @local_config_platform//:host: Selected execution platform @local_execution_config_platform//:platform, type @bazel_tools//tools/cpp:toolchain_type -> toolchain @local_config_cc//:cc-compiler-piii INFO: ToolchainResolution: Type @bazel_tools//tools/python:toolchain_type: target @local_config_platform//:host: Rejected toolchain @local_execution_config_python//:py_runtime_pair; mismatching values: platform_constraint INFO: ToolchainResolution: Type @bazel_tools//tools/python:toolchain_type: target platform @local_config_platform//:host: execution @local_execution_config_platform//:platform: Selected toolchain @local_config_python//:py_runtime_pair INFO: ToolchainResolution: Type @bazel_tools//tools/python:toolchain_type: target platform @local_config_platform//:host: execution @local_config_platform//:host: Selected toolchain @local_config_python//:py_runtime_pair INFO: ToolchainResolution: Type @bazel_tools//tools/cpp:toolchain_type: target @local_config_platform//:host: Rejected toolchain @local_config_cc//:cc-compiler-armeabi-v7a; mismatching values: arm, android INFO: ToolchainResolution: Type @bazel_tools//tools/cpp:toolchain_type: target platform @local_config_platform//:host: execution @local_execution_config_platform//:platform: Selected toolchain @local_config_cc//:cc-compiler-piii INFO: ToolchainResolution: Type @bazel_tools//tools/cpp:toolchain_type: target platform @local_config_platform//:host: execution @local_config_platform//:host: Selected toolchain @local_config_cc//:cc-compiler-piii INFO: ToolchainResolution: Type @bazel_tools//tools/cpp:toolchain_type: target @local_config_platform//:host: Rejected toolchain @local_config_cc//:cc-compiler-armeabi-v7a; mismatching values: arm, android INFO: ToolchainResolution: Target platform @local_config_platform//:host: Selected execution platform @local_execution_config_platform//:platform, type @bazel_tools//tools/cpp:toolchain_type -> toolchain @local_config_cc//:cc-compiler-piii, type @bazel_tools//tools/python:toolchain_type -> toolchain @local_config_python//:py_runtime_pair INFO: ToolchainResolution: Removed execution platform @local_config_platform//:host from available execution platforms, it is missing constraint @local_execution_config_platform//:platform_constraint INFO: ToolchainResolution: Target platform @local_config_platform//:host: Selected execution platform @local_execution_config_platform//:platform, INFO: ToolchainResolution: Removed execution platform @local_config_platform//:host from available execution platforms, it is missing constraint @local_execution_config_platform//:platform_constraint` P.S. Python 3.9.4 is the default and minimal version available in current Ubuntu repo , and I can't add the older repos or the system will be corrupted .
1.0
Fail to build on Linux aarch64 - **System information** - OS Platform and Distribution (e.g., Linux Ubuntu 16.04):Linux Ubuntu devel 21.04 - Mobile device (e.g. iPhone 8, Pixel 2, Samsung Galaxy) if the issue happens on mobile device: N/A - TensorFlow installed from (source or binary):source - TensorFlow version:master - Python version:3.9.4 - Installed using virtualenv? pip? conda?:N/A - Bazel version (if compiling from source):3.7.2 - GCC/Compiler version (if compiling from source):GCC 10.2.1 - CUDA/cuDNN version:N/A - GPU model and memory:N/A **Describe the problem** I want to build tensorflow on Linux aarch64 platform , and it fails . Commands : `./configure ` `bazel build //tensorflow/tools/pip_package:build_pip_package` Output : [![asciicast](https://asciinema.org/a/KsEIoMqtDsDvInf0fbPTxBCBs.svg)](https://asciinema.org/a/KsEIoMqtDsDvInf0fbPTxBCBs) Error message : ERROR: /root/.cache/bazel/_bazel_root/efb88f6336d9c4a18216fb94287b8d97/external/local_config_cc/BUILD:47:19: in cc_toolchain_suite rule @local_config_cc//:toolchain: cc_toolchain_suite '@local_config_cc//:toolchain' does not contain a toolchain for cpu 'aarch64' Command : `bazel build //tensorflow/tools/pip_package:build_pip_package --toolchain_resolution_debug` Output : [![asciicast](https://asciinema.org/a/hok5YFKqreDYj7X5pLFDIsbVQ.svg)](https://asciinema.org/a/hok5YFKqreDYj7X5pLFDIsbVQ) Logs : `INFO: ToolchainResolution: Target platform @local_config_platform//:host: Selected execution platform @local_execution_config_platform//:platform, INFO: ToolchainResolution: Target platform @local_config_platform//:host: Selected execution platform @local_execution_config_platform//:platform, INFO: ToolchainResolution: Type @bazel_tools//tools/cpp:toolchain_type: target @local_config_platform//:host: Rejected toolchain @local_config_cc//:cc-compiler-armeabi-v7a; mismatching values: arm, android INFO: ToolchainResolution: Type @bazel_tools//tools/cpp:toolchain_type: target platform @local_config_platform//:host: execution @local_execution_config_platform//:platform: Selected toolchain @local_config_cc//:cc-compiler-piii INFO: ToolchainResolution: Type @bazel_tools//tools/cpp:toolchain_type: target platform @local_config_platform//:host: execution @local_config_platform//:host: Selected toolchain @local_config_cc//:cc-compiler-piii INFO: ToolchainResolution: Type @bazel_tools//tools/cpp:toolchain_type: target @local_config_platform//:host: Rejected toolchain @local_config_cc//:cc-compiler-armeabi-v7a; mismatching values: arm, android INFO: ToolchainResolution: Target platform @local_config_platform//:host: Selected execution platform @local_execution_config_platform//:platform, type @bazel_tools//tools/cpp:toolchain_type -> toolchain @local_config_cc//:cc-compiler-piii INFO: ToolchainResolution: Type @bazel_tools//tools/python:toolchain_type: target @local_config_platform//:host: Rejected toolchain @local_execution_config_python//:py_runtime_pair; mismatching values: platform_constraint INFO: ToolchainResolution: Type @bazel_tools//tools/python:toolchain_type: target platform @local_config_platform//:host: execution @local_execution_config_platform//:platform: Selected toolchain @local_config_python//:py_runtime_pair INFO: ToolchainResolution: Type @bazel_tools//tools/python:toolchain_type: target platform @local_config_platform//:host: execution @local_config_platform//:host: Selected toolchain @local_config_python//:py_runtime_pair INFO: ToolchainResolution: Type @bazel_tools//tools/cpp:toolchain_type: target @local_config_platform//:host: Rejected toolchain @local_config_cc//:cc-compiler-armeabi-v7a; mismatching values: arm, android INFO: ToolchainResolution: Type @bazel_tools//tools/cpp:toolchain_type: target platform @local_config_platform//:host: execution @local_execution_config_platform//:platform: Selected toolchain @local_config_cc//:cc-compiler-piii INFO: ToolchainResolution: Type @bazel_tools//tools/cpp:toolchain_type: target platform @local_config_platform//:host: execution @local_config_platform//:host: Selected toolchain @local_config_cc//:cc-compiler-piii INFO: ToolchainResolution: Type @bazel_tools//tools/cpp:toolchain_type: target @local_config_platform//:host: Rejected toolchain @local_config_cc//:cc-compiler-armeabi-v7a; mismatching values: arm, android INFO: ToolchainResolution: Target platform @local_config_platform//:host: Selected execution platform @local_execution_config_platform//:platform, type @bazel_tools//tools/cpp:toolchain_type -> toolchain @local_config_cc//:cc-compiler-piii, type @bazel_tools//tools/python:toolchain_type -> toolchain @local_config_python//:py_runtime_pair INFO: ToolchainResolution: Removed execution platform @local_config_platform//:host from available execution platforms, it is missing constraint @local_execution_config_platform//:platform_constraint INFO: ToolchainResolution: Target platform @local_config_platform//:host: Selected execution platform @local_execution_config_platform//:platform, INFO: ToolchainResolution: Removed execution platform @local_config_platform//:host from available execution platforms, it is missing constraint @local_execution_config_platform//:platform_constraint` P.S. Python 3.9.4 is the default and minimal version available in current Ubuntu repo , and I can't add the older repos or the system will be corrupted .
non_design
fail to build on linux system information os platform and distribution e g linux ubuntu linux ubuntu devel mobile device e g iphone pixel samsung galaxy if the issue happens on mobile device n a tensorflow installed from source or binary source tensorflow version master python version installed using virtualenv pip conda n a bazel version if compiling from source gcc compiler version if compiling from source gcc cuda cudnn version n a gpu model and memory n a describe the problem i want to build tensorflow on linux platform and it fails commands configure bazel build tensorflow tools pip package build pip package output error message error root cache bazel bazel root external local config cc build in cc toolchain suite rule local config cc toolchain cc toolchain suite local config cc toolchain does not contain a toolchain for cpu command bazel build tensorflow tools pip package build pip package toolchain resolution debug output logs info toolchainresolution target platform local config platform host selected execution platform local execution config platform platform info toolchainresolution target platform local config platform host selected execution platform local execution config platform platform info toolchainresolution type bazel tools tools cpp toolchain type target local config platform host rejected toolchain local config cc cc compiler armeabi mismatching values arm android info toolchainresolution type bazel tools tools cpp toolchain type target platform local config platform host execution local execution config platform platform selected toolchain local config cc cc compiler piii info toolchainresolution type bazel tools tools cpp toolchain type target platform local config platform host execution local config platform host selected toolchain local config cc cc compiler piii info toolchainresolution type bazel tools tools cpp toolchain type target local config platform host rejected toolchain local config cc cc compiler armeabi mismatching values arm android info toolchainresolution target platform local config platform host selected execution platform local execution config platform platform type bazel tools tools cpp toolchain type toolchain local config cc cc compiler piii info toolchainresolution type bazel tools tools python toolchain type target local config platform host rejected toolchain local execution config python py runtime pair mismatching values platform constraint info toolchainresolution type bazel tools tools python toolchain type target platform local config platform host execution local execution config platform platform selected toolchain local config python py runtime pair info toolchainresolution type bazel tools tools python toolchain type target platform local config platform host execution local config platform host selected toolchain local config python py runtime pair info toolchainresolution type bazel tools tools cpp toolchain type target local config platform host rejected toolchain local config cc cc compiler armeabi mismatching values arm android info toolchainresolution type bazel tools tools cpp toolchain type target platform local config platform host execution local execution config platform platform selected toolchain local config cc cc compiler piii info toolchainresolution type bazel tools tools cpp toolchain type target platform local config platform host execution local config platform host selected toolchain local config cc cc compiler piii info toolchainresolution type bazel tools tools cpp toolchain type target local config platform host rejected toolchain local config cc cc compiler armeabi mismatching values arm android info toolchainresolution target platform local config platform host selected execution platform local execution config platform platform type bazel tools tools cpp toolchain type toolchain local config cc cc compiler piii type bazel tools tools python toolchain type toolchain local config python py runtime pair info toolchainresolution removed execution platform local config platform host from available execution platforms it is missing constraint local execution config platform platform constraint info toolchainresolution target platform local config platform host selected execution platform local execution config platform platform info toolchainresolution removed execution platform local config platform host from available execution platforms it is missing constraint local execution config platform platform constraint p s python is the default and minimal version available in current ubuntu repo and i can t add the older repos or the system will be corrupted
0
8,698
2,878,602,242
IssuesEvent
2015-06-10 02:42:25
18F/govt-wide-patternlibrary
https://api.github.com/repos/18F/govt-wide-patternlibrary
opened
Need more context on 'Charts/Graphs'
help wanted visual design
Looking for teams to give us a bit more insight on what components of charts and graphs people are looking for. Like styled out bar charts, line graphs, etc? Would be helpful to get guidance on whether this is about visual guidance and/or also building customizeable interfaces, which will require muchmore front end lift.
1.0
Need more context on 'Charts/Graphs' - Looking for teams to give us a bit more insight on what components of charts and graphs people are looking for. Like styled out bar charts, line graphs, etc? Would be helpful to get guidance on whether this is about visual guidance and/or also building customizeable interfaces, which will require muchmore front end lift.
design
need more context on charts graphs looking for teams to give us a bit more insight on what components of charts and graphs people are looking for like styled out bar charts line graphs etc would be helpful to get guidance on whether this is about visual guidance and or also building customizeable interfaces which will require muchmore front end lift
1
227,068
25,030,717,345
IssuesEvent
2022-11-04 12:07:59
sast-automation-dev/PartsUnlimited-46
https://api.github.com/repos/sast-automation-dev/PartsUnlimited-46
opened
jquery-2.2.0.js: 4 vulnerabilities (highest severity is: 6.1)
security vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jquery-2.2.0.js</b></p></summary> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.0/jquery.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.0/jquery.js</a></p> <p>Path to vulnerable library: /Labfiles/AZ-400T05_Implementing_Application_Infrastructure/Sample.NETCoreWebApp/WebApp1/wwwroot/lib/jquery/dist/jquery.js</p> <p> <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/PartsUnlimited-46/commit/c19d957e8f5bc2dbac5b6d1f3aaf515eb66f63c4">c19d957e8f5bc2dbac5b6d1f3aaf515eb66f63c4</a></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (jquery version) | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | ------------- | --- | | [CVE-2020-11023](https://www.mend.io/vulnerability-database/CVE-2020-11023) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | jquery-2.2.0.js | Direct | jquery - 3.5.0 | &#10060; | | [CVE-2020-11022](https://www.mend.io/vulnerability-database/CVE-2020-11022) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | jquery-2.2.0.js | Direct | jQuery - 3.5.0 | &#10060; | | [CVE-2015-9251](https://www.mend.io/vulnerability-database/CVE-2015-9251) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | jquery-2.2.0.js | Direct | jQuery - v3.0.0 | &#10060; | | [CVE-2019-11358](https://www.mend.io/vulnerability-database/CVE-2019-11358) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | jquery-2.2.0.js | Direct | 3.4.0 | &#10060; | ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2020-11023</summary> ### Vulnerable Library - <b>jquery-2.2.0.js</b></p> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.0/jquery.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.0/jquery.js</a></p> <p>Path to vulnerable library: /Labfiles/AZ-400T05_Implementing_Application_Infrastructure/Sample.NETCoreWebApp/WebApp1/wwwroot/lib/jquery/dist/jquery.js</p> <p> Dependency Hierarchy: - :x: **jquery-2.2.0.js** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/PartsUnlimited-46/commit/c19d957e8f5bc2dbac5b6d1f3aaf515eb66f63c4">c19d957e8f5bc2dbac5b6d1f3aaf515eb66f63c4</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0. <p>Publish Date: 2020-04-29 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-11023>CVE-2020-11023</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>6.1</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11023">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11023</a></p> <p>Release Date: 2020-04-29</p> <p>Fix Resolution: jquery - 3.5.0</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2020-11022</summary> ### Vulnerable Library - <b>jquery-2.2.0.js</b></p> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.0/jquery.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.0/jquery.js</a></p> <p>Path to vulnerable library: /Labfiles/AZ-400T05_Implementing_Application_Infrastructure/Sample.NETCoreWebApp/WebApp1/wwwroot/lib/jquery/dist/jquery.js</p> <p> Dependency Hierarchy: - :x: **jquery-2.2.0.js** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/PartsUnlimited-46/commit/c19d957e8f5bc2dbac5b6d1f3aaf515eb66f63c4">c19d957e8f5bc2dbac5b6d1f3aaf515eb66f63c4</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0. <p>Publish Date: 2020-04-29 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-11022>CVE-2020-11022</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>6.1</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/">https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/</a></p> <p>Release Date: 2020-04-29</p> <p>Fix Resolution: jQuery - 3.5.0</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2015-9251</summary> ### Vulnerable Library - <b>jquery-2.2.0.js</b></p> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.0/jquery.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.0/jquery.js</a></p> <p>Path to vulnerable library: /Labfiles/AZ-400T05_Implementing_Application_Infrastructure/Sample.NETCoreWebApp/WebApp1/wwwroot/lib/jquery/dist/jquery.js</p> <p> Dependency Hierarchy: - :x: **jquery-2.2.0.js** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/PartsUnlimited-46/commit/c19d957e8f5bc2dbac5b6d1f3aaf515eb66f63c4">c19d957e8f5bc2dbac5b6d1f3aaf515eb66f63c4</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed. <p>Publish Date: 2018-01-18 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2015-9251>CVE-2015-9251</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>6.1</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2015-9251">https://nvd.nist.gov/vuln/detail/CVE-2015-9251</a></p> <p>Release Date: 2018-01-18</p> <p>Fix Resolution: jQuery - v3.0.0</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2019-11358</summary> ### Vulnerable Library - <b>jquery-2.2.0.js</b></p> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.0/jquery.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.0/jquery.js</a></p> <p>Path to vulnerable library: /Labfiles/AZ-400T05_Implementing_Application_Infrastructure/Sample.NETCoreWebApp/WebApp1/wwwroot/lib/jquery/dist/jquery.js</p> <p> Dependency Hierarchy: - :x: **jquery-2.2.0.js** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/PartsUnlimited-46/commit/c19d957e8f5bc2dbac5b6d1f3aaf515eb66f63c4">c19d957e8f5bc2dbac5b6d1f3aaf515eb66f63c4</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype. <p>Publish Date: 2019-04-20 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-11358>CVE-2019-11358</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>6.1</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11358">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11358</a></p> <p>Release Date: 2019-04-20</p> <p>Fix Resolution: 3.4.0</p> </p> <p></p> </details>
True
jquery-2.2.0.js: 4 vulnerabilities (highest severity is: 6.1) - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jquery-2.2.0.js</b></p></summary> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.0/jquery.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.0/jquery.js</a></p> <p>Path to vulnerable library: /Labfiles/AZ-400T05_Implementing_Application_Infrastructure/Sample.NETCoreWebApp/WebApp1/wwwroot/lib/jquery/dist/jquery.js</p> <p> <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/PartsUnlimited-46/commit/c19d957e8f5bc2dbac5b6d1f3aaf515eb66f63c4">c19d957e8f5bc2dbac5b6d1f3aaf515eb66f63c4</a></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (jquery version) | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | ------------- | --- | | [CVE-2020-11023](https://www.mend.io/vulnerability-database/CVE-2020-11023) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | jquery-2.2.0.js | Direct | jquery - 3.5.0 | &#10060; | | [CVE-2020-11022](https://www.mend.io/vulnerability-database/CVE-2020-11022) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | jquery-2.2.0.js | Direct | jQuery - 3.5.0 | &#10060; | | [CVE-2015-9251](https://www.mend.io/vulnerability-database/CVE-2015-9251) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | jquery-2.2.0.js | Direct | jQuery - v3.0.0 | &#10060; | | [CVE-2019-11358](https://www.mend.io/vulnerability-database/CVE-2019-11358) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | jquery-2.2.0.js | Direct | 3.4.0 | &#10060; | ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2020-11023</summary> ### Vulnerable Library - <b>jquery-2.2.0.js</b></p> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.0/jquery.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.0/jquery.js</a></p> <p>Path to vulnerable library: /Labfiles/AZ-400T05_Implementing_Application_Infrastructure/Sample.NETCoreWebApp/WebApp1/wwwroot/lib/jquery/dist/jquery.js</p> <p> Dependency Hierarchy: - :x: **jquery-2.2.0.js** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/PartsUnlimited-46/commit/c19d957e8f5bc2dbac5b6d1f3aaf515eb66f63c4">c19d957e8f5bc2dbac5b6d1f3aaf515eb66f63c4</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0. <p>Publish Date: 2020-04-29 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-11023>CVE-2020-11023</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>6.1</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11023">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11023</a></p> <p>Release Date: 2020-04-29</p> <p>Fix Resolution: jquery - 3.5.0</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2020-11022</summary> ### Vulnerable Library - <b>jquery-2.2.0.js</b></p> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.0/jquery.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.0/jquery.js</a></p> <p>Path to vulnerable library: /Labfiles/AZ-400T05_Implementing_Application_Infrastructure/Sample.NETCoreWebApp/WebApp1/wwwroot/lib/jquery/dist/jquery.js</p> <p> Dependency Hierarchy: - :x: **jquery-2.2.0.js** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/PartsUnlimited-46/commit/c19d957e8f5bc2dbac5b6d1f3aaf515eb66f63c4">c19d957e8f5bc2dbac5b6d1f3aaf515eb66f63c4</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0. <p>Publish Date: 2020-04-29 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-11022>CVE-2020-11022</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>6.1</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/">https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/</a></p> <p>Release Date: 2020-04-29</p> <p>Fix Resolution: jQuery - 3.5.0</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2015-9251</summary> ### Vulnerable Library - <b>jquery-2.2.0.js</b></p> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.0/jquery.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.0/jquery.js</a></p> <p>Path to vulnerable library: /Labfiles/AZ-400T05_Implementing_Application_Infrastructure/Sample.NETCoreWebApp/WebApp1/wwwroot/lib/jquery/dist/jquery.js</p> <p> Dependency Hierarchy: - :x: **jquery-2.2.0.js** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/PartsUnlimited-46/commit/c19d957e8f5bc2dbac5b6d1f3aaf515eb66f63c4">c19d957e8f5bc2dbac5b6d1f3aaf515eb66f63c4</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed. <p>Publish Date: 2018-01-18 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2015-9251>CVE-2015-9251</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>6.1</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2015-9251">https://nvd.nist.gov/vuln/detail/CVE-2015-9251</a></p> <p>Release Date: 2018-01-18</p> <p>Fix Resolution: jQuery - v3.0.0</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2019-11358</summary> ### Vulnerable Library - <b>jquery-2.2.0.js</b></p> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.0/jquery.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.0/jquery.js</a></p> <p>Path to vulnerable library: /Labfiles/AZ-400T05_Implementing_Application_Infrastructure/Sample.NETCoreWebApp/WebApp1/wwwroot/lib/jquery/dist/jquery.js</p> <p> Dependency Hierarchy: - :x: **jquery-2.2.0.js** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/PartsUnlimited-46/commit/c19d957e8f5bc2dbac5b6d1f3aaf515eb66f63c4">c19d957e8f5bc2dbac5b6d1f3aaf515eb66f63c4</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype. <p>Publish Date: 2019-04-20 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-11358>CVE-2019-11358</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>6.1</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11358">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11358</a></p> <p>Release Date: 2019-04-20</p> <p>Fix Resolution: 3.4.0</p> </p> <p></p> </details>
non_design
jquery js vulnerabilities highest severity is vulnerable library jquery js javascript library for dom operations library home page a href path to vulnerable library labfiles az implementing application infrastructure sample netcorewebapp wwwroot lib jquery dist jquery js found in head commit a href vulnerabilities cve severity cvss dependency type fixed in jquery version remediation available medium jquery js direct jquery medium jquery js direct jquery medium jquery js direct jquery medium jquery js direct details cve vulnerable library jquery js javascript library for dom operations library home page a href path to vulnerable library labfiles az implementing application infrastructure sample netcorewebapp wwwroot lib jquery dist jquery js dependency hierarchy x jquery js vulnerable library found in head commit a href found in base branch master vulnerability details in jquery versions greater than or equal to and before passing html containing elements from untrusted sources even after sanitizing it to one of jquery s dom manipulation methods i e html append and others may execute untrusted code this problem is patched in jquery publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution jquery cve vulnerable library jquery js javascript library for dom operations library home page a href path to vulnerable library labfiles az implementing application infrastructure sample netcorewebapp wwwroot lib jquery dist jquery js dependency hierarchy x jquery js vulnerable library found in head commit a href found in base branch master vulnerability details in jquery versions greater than or equal to and before passing html from untrusted sources even after sanitizing it to one of jquery s dom manipulation methods i e html append and others may execute untrusted code this problem is patched in jquery publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution jquery cve vulnerable library jquery js javascript library for dom operations library home page a href path to vulnerable library labfiles az implementing application infrastructure sample netcorewebapp wwwroot lib jquery dist jquery js dependency hierarchy x jquery js vulnerable library found in head commit a href found in base branch master vulnerability details jquery before is vulnerable to cross site scripting xss attacks when a cross domain ajax request is performed without the datatype option causing text javascript responses to be executed publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution jquery cve vulnerable library jquery js javascript library for dom operations library home page a href path to vulnerable library labfiles az implementing application infrastructure sample netcorewebapp wwwroot lib jquery dist jquery js dependency hierarchy x jquery js vulnerable library found in head commit a href found in base branch master vulnerability details jquery before as used in drupal backdrop cms and other products mishandles jquery extend true because of object prototype pollution if an unsanitized source object contained an enumerable proto property it could extend the native object prototype publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution
0
41,886
9,090,884,416
IssuesEvent
2019-02-19 01:31:10
phetsims/wave-interference
https://api.github.com/repos/phetsims/wave-interference
opened
StepButton can enable/disable itself
dev:code-review
Noted while doing something similar in Gas Properties. In TimeControls.js: ```js const stepButton = new StepButton( { ... } ); // Only enable the step button when the model is paused. model.isRunningProperty.link( isRunning => {stepButton.enabled = !isRunning;} ); ``` The listener for `model.isRunningProperty` is unnecessary. StepButton is capable of observing `model.isRunningProperty` itself: ```js const stepButton = new StepButton( { isPlayingProperty: model.isRunningProperty ... } );
1.0
StepButton can enable/disable itself - Noted while doing something similar in Gas Properties. In TimeControls.js: ```js const stepButton = new StepButton( { ... } ); // Only enable the step button when the model is paused. model.isRunningProperty.link( isRunning => {stepButton.enabled = !isRunning;} ); ``` The listener for `model.isRunningProperty` is unnecessary. StepButton is capable of observing `model.isRunningProperty` itself: ```js const stepButton = new StepButton( { isPlayingProperty: model.isRunningProperty ... } );
non_design
stepbutton can enable disable itself noted while doing something similar in gas properties in timecontrols js js const stepbutton new stepbutton only enable the step button when the model is paused model isrunningproperty link isrunning stepbutton enabled isrunning the listener for model isrunningproperty is unnecessary stepbutton is capable of observing model isrunningproperty itself js const stepbutton new stepbutton isplayingproperty model isrunningproperty
0
491,332
14,149,322,695
IssuesEvent
2020-11-11 00:33:29
apcountryman/picolibrary-microchip-avr-megaavr
https://api.github.com/repos/apcountryman/picolibrary-microchip-avr-megaavr
closed
Simplify asynchronous serial transmitter implementation
priority-normal status-awaiting_approval type-refactoring
Simplify asynchronous serial transmitter (`::picolibrary::Microchip::AVR::megaAVR::Asynchronous_Serial::Transmitter`) implementation by leveraging `::picolibrary::Microchip::AVR::megaAVR::Asynchronous_Serial::Basic_Transmitter` and `::picolibrary::Asynchronous_Serial::Transmitter`.
1.0
Simplify asynchronous serial transmitter implementation - Simplify asynchronous serial transmitter (`::picolibrary::Microchip::AVR::megaAVR::Asynchronous_Serial::Transmitter`) implementation by leveraging `::picolibrary::Microchip::AVR::megaAVR::Asynchronous_Serial::Basic_Transmitter` and `::picolibrary::Asynchronous_Serial::Transmitter`.
non_design
simplify asynchronous serial transmitter implementation simplify asynchronous serial transmitter picolibrary microchip avr megaavr asynchronous serial transmitter implementation by leveraging picolibrary microchip avr megaavr asynchronous serial basic transmitter and picolibrary asynchronous serial transmitter
0
117,669
15,162,352,275
IssuesEvent
2021-02-12 10:28:36
flutter/flutter
https://api.github.com/repos/flutter/flutter
closed
drawerOpened may be false when opening the drawer by sliding
P4 e: device-specific f: material design f: routes found in release: 1.19 framework has reproducible steps waiting for customer response
When checking on `onWillPop`, `scaffoldKey.currentState.isDrawerOpen` may report `false` if the drawer was opened by sliding the finger from the edge of the screen.
1.0
drawerOpened may be false when opening the drawer by sliding - When checking on `onWillPop`, `scaffoldKey.currentState.isDrawerOpen` may report `false` if the drawer was opened by sliding the finger from the edge of the screen.
design
draweropened may be false when opening the drawer by sliding when checking on onwillpop scaffoldkey currentstate isdraweropen may report false if the drawer was opened by sliding the finger from the edge of the screen
1
479,889
13,807,043,077
IssuesEvent
2020-10-11 20:15:22
vitreo12/AlgaSC
https://api.github.com/repos/vitreo12/AlgaSC
opened
Clock sync for AlgaNode creation / connection
high priority
Sync to clock (optionally) the creation / connection of AlgaNodes
1.0
Clock sync for AlgaNode creation / connection - Sync to clock (optionally) the creation / connection of AlgaNodes
non_design
clock sync for alganode creation connection sync to clock optionally the creation connection of alganodes
0
167,811
20,726,411,495
IssuesEvent
2022-03-14 02:49:50
Thezone1975/send
https://api.github.com/repos/Thezone1975/send
opened
CVE-2022-24433 (High) detected in simple-git-1.113.0.tgz
security vulnerability
## CVE-2022-24433 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>simple-git-1.113.0.tgz</b></p></summary> <p>Simple GIT interface for node.js</p> <p>Library home page: <a href="https://registry.npmjs.org/simple-git/-/simple-git-1.113.0.tgz">https://registry.npmjs.org/simple-git/-/simple-git-1.113.0.tgz</a></p> <p>Path to dependency file: /send/package.json</p> <p>Path to vulnerable library: /node_modules/simple-git/package.json</p> <p> Dependency Hierarchy: - lint-staged-8.2.1.tgz (Root Library) - g-status-2.0.2.tgz - :x: **simple-git-1.113.0.tgz** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The package simple-git before 3.3.0 are vulnerable to Command Injection via argument injection. When calling the .fetch(remote, branch, handlerFn) function, both the remote and branch parameters are passed to the git fetch subcommand. By injecting some git options it was possible to get arbitrary command execution. <p>Publish Date: 2022-03-11 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-24433>CVE-2022-24433</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2022-24433 (High) detected in simple-git-1.113.0.tgz - ## CVE-2022-24433 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>simple-git-1.113.0.tgz</b></p></summary> <p>Simple GIT interface for node.js</p> <p>Library home page: <a href="https://registry.npmjs.org/simple-git/-/simple-git-1.113.0.tgz">https://registry.npmjs.org/simple-git/-/simple-git-1.113.0.tgz</a></p> <p>Path to dependency file: /send/package.json</p> <p>Path to vulnerable library: /node_modules/simple-git/package.json</p> <p> Dependency Hierarchy: - lint-staged-8.2.1.tgz (Root Library) - g-status-2.0.2.tgz - :x: **simple-git-1.113.0.tgz** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The package simple-git before 3.3.0 are vulnerable to Command Injection via argument injection. When calling the .fetch(remote, branch, handlerFn) function, both the remote and branch parameters are passed to the git fetch subcommand. By injecting some git options it was possible to get arbitrary command execution. <p>Publish Date: 2022-03-11 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-24433>CVE-2022-24433</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_design
cve high detected in simple git tgz cve high severity vulnerability vulnerable library simple git tgz simple git interface for node js library home page a href path to dependency file send package json path to vulnerable library node modules simple git package json dependency hierarchy lint staged tgz root library g status tgz x simple git tgz vulnerable library vulnerability details the package simple git before are vulnerable to command injection via argument injection when calling the fetch remote branch handlerfn function both the remote and branch parameters are passed to the git fetch subcommand by injecting some git options it was possible to get arbitrary command execution publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href step up your open source security game with whitesource
0
105,850
23,127,270,512
IssuesEvent
2022-07-28 07:10:47
swift-nav/libsbp
https://api.github.com/repos/swift-nav/libsbp
closed
Comments only sometimes line up in generated C headers
Message/Code Generation
e.g. ``` #define SBP_MSG_UART_STATE 0x0018 typedef struct __attribute__((packed)) { uart_channel_t uart_a; /**< State of UART A */ uart_channel_t uart_b; /**< State of UART B */ uart_channel_t uart_ftdi; /**< State of UART FTDI (USB logger) */ latency_t latency; /**< UART communication latency */ } msg_uart_state_t; ``` Clearly it's trying to align the comments since it uses 3 more spaces after uart_b than uart_ftdi, but it's failing to account for the different lengths of the member types.
1.0
Comments only sometimes line up in generated C headers - e.g. ``` #define SBP_MSG_UART_STATE 0x0018 typedef struct __attribute__((packed)) { uart_channel_t uart_a; /**< State of UART A */ uart_channel_t uart_b; /**< State of UART B */ uart_channel_t uart_ftdi; /**< State of UART FTDI (USB logger) */ latency_t latency; /**< UART communication latency */ } msg_uart_state_t; ``` Clearly it's trying to align the comments since it uses 3 more spaces after uart_b than uart_ftdi, but it's failing to account for the different lengths of the member types.
non_design
comments only sometimes line up in generated c headers e g define sbp msg uart state typedef struct attribute packed uart channel t uart a state of uart a uart channel t uart b state of uart b uart channel t uart ftdi state of uart ftdi usb logger latency t latency uart communication latency msg uart state t clearly it s trying to align the comments since it uses more spaces after uart b than uart ftdi but it s failing to account for the different lengths of the member types
0
183,888
31,779,959,093
IssuesEvent
2023-09-12 16:42:08
jpmorganchase/salt-ds
https://api.github.com/repos/jpmorganchase/salt-ds
opened
Create mega-menu for use with navigation item
role: dev 💻 role: design 🎨 role: content 📝
## Description The navigation item should include the option of a mega-menu drop-down. ## Tasks ```[tasklist] ### Checklist - [ ] Density (HD, MD, LD, TD) - [ ] Mode (Light, Dark) - [ ] Fill (Primary, Secondary, Tertiary) - [ ] State (Default, Hover, Selected/Active, Disabled, Read-only, Other) - [ ] Controlled API - [ ] UITK accessibility parity (screen reader + keyboard interactions) ``` ```[tasklist] ### Deliverables - [ ] Characteristics spec - [ ] Interactions spec, where necessary - [ ] In Code & Figma (Component + Guide) - [ ] Supporting site documentation ```
1.0
Create mega-menu for use with navigation item - ## Description The navigation item should include the option of a mega-menu drop-down. ## Tasks ```[tasklist] ### Checklist - [ ] Density (HD, MD, LD, TD) - [ ] Mode (Light, Dark) - [ ] Fill (Primary, Secondary, Tertiary) - [ ] State (Default, Hover, Selected/Active, Disabled, Read-only, Other) - [ ] Controlled API - [ ] UITK accessibility parity (screen reader + keyboard interactions) ``` ```[tasklist] ### Deliverables - [ ] Characteristics spec - [ ] Interactions spec, where necessary - [ ] In Code & Figma (Component + Guide) - [ ] Supporting site documentation ```
design
create mega menu for use with navigation item description the navigation item should include the option of a mega menu drop down tasks checklist density hd md ld td mode light dark fill primary secondary tertiary state default hover selected active disabled read only other controlled api uitk accessibility parity screen reader keyboard interactions deliverables characteristics spec interactions spec where necessary in code figma component guide supporting site documentation
1
130,005
17,971,513,504
IssuesEvent
2021-09-14 03:02:03
AcrossTheCloud/TBA21-client
https://api.github.com/repos/AcrossTheCloud/TBA21-client
closed
Windows alignment of text should be vertically aligned in boxes but isn't
bug ux/ui differs from design
<img width="408" alt="Screen Shot 2021-09-14 at 12 08 34 pm" src="https://user-images.githubusercontent.com/2288238/133182853-b12c9fd3-bb92-4ef8-bf3d-5cc788b0a78c.png">
1.0
Windows alignment of text should be vertically aligned in boxes but isn't - <img width="408" alt="Screen Shot 2021-09-14 at 12 08 34 pm" src="https://user-images.githubusercontent.com/2288238/133182853-b12c9fd3-bb92-4ef8-bf3d-5cc788b0a78c.png">
design
windows alignment of text should be vertically aligned in boxes but isn t img width alt screen shot at pm src
1
122,242
4,828,699,874
IssuesEvent
2016-11-07 16:54:29
meumobi/sitebuilder
https://api.github.com/repos/meumobi/sitebuilder
opened
Push not received
bug high priority push notification
I've sent push on various sites, with segmented audience and not, but never received push on my ios. Can't digg further on my investigation due to issue #431
1.0
Push not received - I've sent push on various sites, with segmented audience and not, but never received push on my ios. Can't digg further on my investigation due to issue #431
non_design
push not received i ve sent push on various sites with segmented audience and not but never received push on my ios can t digg further on my investigation due to issue
0
67,828
17,084,679,131
IssuesEvent
2021-07-08 10:13:22
ballerina-platform/ballerina-standard-library
https://api.github.com/repos/ballerina-platform/ballerina-standard-library
closed
Update Build and Release Scripts - Part I
Type/Task area/build
**Description:** We have to complete the following three tasks: 1. Remove the `push` trigger from the `pull-request.yml` file 2. Update to Gradle `7.1` version Use ```gradle wrapper --gradle-version 7.1``` to update to the `7.1` version. Make sure to commit the `gradle/wrapper/gradle-wrapper.jar` file too. When updating to the latest Gradle version, the `compile` keyword might needed to be changed to `implementation`. (`compile` was deprecated in previous versions and now removed.) 3. Update the `publish-release.yml` to use the GitHub CLI tool (`gh`) instead of shell scripts. Let's update the list once this task is completed. - [x] io - [x] url - [x] java.arrays - [x] random - [x] regex - [x] task - [x] time - [x] xmldata - [x] crypto - [x] os - [x] xslt - [x] uuid - [x] log - [x] cache - [x] file - [x] ftp - [x] mime - [x] nats - [x] stan - [x] tcp - [x] udp - [x] auth - [x] email - [x] http - [x] jwt - [x] oauth2 - [x] graphql - [x] grpc - [x] websocket - [x] websub - [x] websubhub - [x] kafka - [x] rabbitmq - [x] sql - [x] java.jdbc - [x] mysql - [x] postgresql - [x] mssql
1.0
Update Build and Release Scripts - Part I - **Description:** We have to complete the following three tasks: 1. Remove the `push` trigger from the `pull-request.yml` file 2. Update to Gradle `7.1` version Use ```gradle wrapper --gradle-version 7.1``` to update to the `7.1` version. Make sure to commit the `gradle/wrapper/gradle-wrapper.jar` file too. When updating to the latest Gradle version, the `compile` keyword might needed to be changed to `implementation`. (`compile` was deprecated in previous versions and now removed.) 3. Update the `publish-release.yml` to use the GitHub CLI tool (`gh`) instead of shell scripts. Let's update the list once this task is completed. - [x] io - [x] url - [x] java.arrays - [x] random - [x] regex - [x] task - [x] time - [x] xmldata - [x] crypto - [x] os - [x] xslt - [x] uuid - [x] log - [x] cache - [x] file - [x] ftp - [x] mime - [x] nats - [x] stan - [x] tcp - [x] udp - [x] auth - [x] email - [x] http - [x] jwt - [x] oauth2 - [x] graphql - [x] grpc - [x] websocket - [x] websub - [x] websubhub - [x] kafka - [x] rabbitmq - [x] sql - [x] java.jdbc - [x] mysql - [x] postgresql - [x] mssql
non_design
update build and release scripts part i description we have to complete the following three tasks remove the push trigger from the pull request yml file update to gradle version use gradle wrapper gradle version to update to the version make sure to commit the gradle wrapper gradle wrapper jar file too when updating to the latest gradle version the compile keyword might needed to be changed to implementation compile was deprecated in previous versions and now removed update the publish release yml to use the github cli tool gh instead of shell scripts let s update the list once this task is completed io url java arrays random regex task time xmldata crypto os xslt uuid log cache file ftp mime nats stan tcp udp auth email http jwt graphql grpc websocket websub websubhub kafka rabbitmq sql java jdbc mysql postgresql mssql
0
256,177
27,552,723,853
IssuesEvent
2023-03-07 15:55:14
BrianMcDonaldWS/genie
https://api.github.com/repos/BrianMcDonaldWS/genie
opened
CVE-2022-31159 (Medium) detected in aws-java-sdk-s3-1.11.415.jar
security vulnerability
## CVE-2022-31159 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>aws-java-sdk-s3-1.11.415.jar</b></p></summary> <p>The AWS Java SDK for Amazon S3 module holds the client classes that are used for communicating with Amazon Simple Storage Service</p> <p>Library home page: <a href="https://aws.amazon.com/sdkforjava">https://aws.amazon.com/sdkforjava</a></p> <p>Path to dependency file: /genie-agent/build.gradle</p> <p>Path to vulnerable library: /root/.gradle/caches/modules-2/files-2.1/com.amazonaws/aws-java-sdk-s3/1.11.415/f8b58cdf4e36f5e26ea4e61a89fb087ec7815d49/aws-java-sdk-s3-1.11.415.jar,/root/.gradle/caches/modules-2/files-2.1/com.amazonaws/aws-java-sdk-s3/1.11.415/f8b58cdf4e36f5e26ea4e61a89fb087ec7815d49/aws-java-sdk-s3-1.11.415.jar</p> <p> Dependency Hierarchy: - spring-cloud-starter-aws-2.2.1.RELEASE.jar (Root Library) - spring-cloud-aws-context-2.2.1.RELEASE.jar - spring-cloud-aws-core-2.2.1.RELEASE.jar - :x: **aws-java-sdk-s3-1.11.415.jar** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The AWS SDK for Java enables Java developers to work with Amazon Web Services. A partial-path traversal issue exists within the `downloadDirectory` method in the AWS S3 TransferManager component of the AWS SDK for Java v1 prior to version 1.12.261. Applications using the SDK control the `destinationDirectory` argument, but S3 object keys are determined by the application that uploaded the objects. The `downloadDirectory` method allows the caller to pass a filesystem object in the object key but contained an issue in the validation logic for the key name. A knowledgeable actor could bypass the validation logic by including a UNIX double-dot in the bucket key. Under certain conditions, this could permit them to retrieve a directory from their S3 bucket that is one level up in the filesystem from their working directory. This issue’s scope is limited to directories whose name prefix matches the destinationDirectory. E.g. for destination directory`/tmp/foo`, the actor can cause a download to `/tmp/foo-bar`, but not `/tmp/bar`. If `com.amazonaws.services.s3.transfer.TransferManager::downloadDirectory` is used to download an untrusted buckets contents, the contents of that bucket can be written outside of the intended destination directory. Version 1.12.261 contains a patch for this issue. As a workaround, when calling `com.amazonaws.services.s3.transfer.TransferManager::downloadDirectory`, pass a `KeyFilter` that forbids `S3ObjectSummary` objects that `getKey` method return a string containing the substring `..` . <p>Publish Date: 2022-07-15 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-31159>CVE-2022-31159</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/aws/aws-sdk-java/security/advisories/GHSA-c28r-hw5m-5gv3">https://github.com/aws/aws-sdk-java/security/advisories/GHSA-c28r-hw5m-5gv3</a></p> <p>Release Date: 2022-07-15</p> <p>Fix Resolution: com.amazonaws:aws-java-sdk-s3:1.12.261</p> </p> </details> <p></p>
True
CVE-2022-31159 (Medium) detected in aws-java-sdk-s3-1.11.415.jar - ## CVE-2022-31159 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>aws-java-sdk-s3-1.11.415.jar</b></p></summary> <p>The AWS Java SDK for Amazon S3 module holds the client classes that are used for communicating with Amazon Simple Storage Service</p> <p>Library home page: <a href="https://aws.amazon.com/sdkforjava">https://aws.amazon.com/sdkforjava</a></p> <p>Path to dependency file: /genie-agent/build.gradle</p> <p>Path to vulnerable library: /root/.gradle/caches/modules-2/files-2.1/com.amazonaws/aws-java-sdk-s3/1.11.415/f8b58cdf4e36f5e26ea4e61a89fb087ec7815d49/aws-java-sdk-s3-1.11.415.jar,/root/.gradle/caches/modules-2/files-2.1/com.amazonaws/aws-java-sdk-s3/1.11.415/f8b58cdf4e36f5e26ea4e61a89fb087ec7815d49/aws-java-sdk-s3-1.11.415.jar</p> <p> Dependency Hierarchy: - spring-cloud-starter-aws-2.2.1.RELEASE.jar (Root Library) - spring-cloud-aws-context-2.2.1.RELEASE.jar - spring-cloud-aws-core-2.2.1.RELEASE.jar - :x: **aws-java-sdk-s3-1.11.415.jar** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The AWS SDK for Java enables Java developers to work with Amazon Web Services. A partial-path traversal issue exists within the `downloadDirectory` method in the AWS S3 TransferManager component of the AWS SDK for Java v1 prior to version 1.12.261. Applications using the SDK control the `destinationDirectory` argument, but S3 object keys are determined by the application that uploaded the objects. The `downloadDirectory` method allows the caller to pass a filesystem object in the object key but contained an issue in the validation logic for the key name. A knowledgeable actor could bypass the validation logic by including a UNIX double-dot in the bucket key. Under certain conditions, this could permit them to retrieve a directory from their S3 bucket that is one level up in the filesystem from their working directory. This issue’s scope is limited to directories whose name prefix matches the destinationDirectory. E.g. for destination directory`/tmp/foo`, the actor can cause a download to `/tmp/foo-bar`, but not `/tmp/bar`. If `com.amazonaws.services.s3.transfer.TransferManager::downloadDirectory` is used to download an untrusted buckets contents, the contents of that bucket can be written outside of the intended destination directory. Version 1.12.261 contains a patch for this issue. As a workaround, when calling `com.amazonaws.services.s3.transfer.TransferManager::downloadDirectory`, pass a `KeyFilter` that forbids `S3ObjectSummary` objects that `getKey` method return a string containing the substring `..` . <p>Publish Date: 2022-07-15 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-31159>CVE-2022-31159</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/aws/aws-sdk-java/security/advisories/GHSA-c28r-hw5m-5gv3">https://github.com/aws/aws-sdk-java/security/advisories/GHSA-c28r-hw5m-5gv3</a></p> <p>Release Date: 2022-07-15</p> <p>Fix Resolution: com.amazonaws:aws-java-sdk-s3:1.12.261</p> </p> </details> <p></p>
non_design
cve medium detected in aws java sdk jar cve medium severity vulnerability vulnerable library aws java sdk jar the aws java sdk for amazon module holds the client classes that are used for communicating with amazon simple storage service library home page a href path to dependency file genie agent build gradle path to vulnerable library root gradle caches modules files com amazonaws aws java sdk aws java sdk jar root gradle caches modules files com amazonaws aws java sdk aws java sdk jar dependency hierarchy spring cloud starter aws release jar root library spring cloud aws context release jar spring cloud aws core release jar x aws java sdk jar vulnerable library vulnerability details the aws sdk for java enables java developers to work with amazon web services a partial path traversal issue exists within the downloaddirectory method in the aws transfermanager component of the aws sdk for java prior to version applications using the sdk control the destinationdirectory argument but object keys are determined by the application that uploaded the objects the downloaddirectory method allows the caller to pass a filesystem object in the object key but contained an issue in the validation logic for the key name a knowledgeable actor could bypass the validation logic by including a unix double dot in the bucket key under certain conditions this could permit them to retrieve a directory from their bucket that is one level up in the filesystem from their working directory this issue’s scope is limited to directories whose name prefix matches the destinationdirectory e g for destination directory tmp foo the actor can cause a download to tmp foo bar but not tmp bar if com amazonaws services transfer transfermanager downloaddirectory is used to download an untrusted buckets contents the contents of that bucket can be written outside of the intended destination directory version contains a patch for this issue as a workaround when calling com amazonaws services transfer transfermanager downloaddirectory pass a keyfilter that forbids objects that getkey method return a string containing the substring publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com amazonaws aws java sdk
0
9,011
6,725,281,776
IssuesEvent
2017-10-17 04:15:16
woocommerce/woocommerce
https://api.github.com/repos/woocommerce/woocommerce
closed
Coupon limit where clause
Focus: Performance Type: Bug
## Steps to reproduce the issue 1. Set up a coupon with a non-zero value for "Usage limit per user" 2. Add coupon to an order and check out 3. During checkout, [this query](https://github.com/woocommerce/woocommerce/blob/803b31a18cf240368c46633f98fded76ffbd949c/includes/class-wc-cart.php#L1495) will select from the users table with a `WHERE` clause of `1=1`. If the site has enough users, this can use up a lot of memory and potentially cause a fatal PHP error. I will submit a PR for this shortly.
True
Coupon limit where clause - ## Steps to reproduce the issue 1. Set up a coupon with a non-zero value for "Usage limit per user" 2. Add coupon to an order and check out 3. During checkout, [this query](https://github.com/woocommerce/woocommerce/blob/803b31a18cf240368c46633f98fded76ffbd949c/includes/class-wc-cart.php#L1495) will select from the users table with a `WHERE` clause of `1=1`. If the site has enough users, this can use up a lot of memory and potentially cause a fatal PHP error. I will submit a PR for this shortly.
non_design
coupon limit where clause steps to reproduce the issue set up a coupon with a non zero value for usage limit per user add coupon to an order and check out during checkout will select from the users table with a where clause of if the site has enough users this can use up a lot of memory and potentially cause a fatal php error i will submit a pr for this shortly
0
812,396
30,331,868,572
IssuesEvent
2023-07-11 07:01:41
matrixorigin/matrixone
https://api.github.com/repos/matrixorigin/matrixone
closed
[Feature Request]: implement lower_case_table_names
priority/p0 kind/feature source/on-demand doc close
### Is there an existing issue for the same feature request? - [X] I have checked the existing issues. ### Is your feature request related to a problem? _No response_ ### Describe the feature you'd like https://dev.mysql.com/doc/refman/8.0/en/identifier-case-sensitivity.html This should be a DB level config as https://github.com/matrixorigin/matrixone/issues/6606 ### Describe implementation you've considered _No response_ ### Documentation, Adoption, Use Case, Migration Strategy _No response_ ### Additional information _No response_
1.0
[Feature Request]: implement lower_case_table_names - ### Is there an existing issue for the same feature request? - [X] I have checked the existing issues. ### Is your feature request related to a problem? _No response_ ### Describe the feature you'd like https://dev.mysql.com/doc/refman/8.0/en/identifier-case-sensitivity.html This should be a DB level config as https://github.com/matrixorigin/matrixone/issues/6606 ### Describe implementation you've considered _No response_ ### Documentation, Adoption, Use Case, Migration Strategy _No response_ ### Additional information _No response_
non_design
implement lower case table names is there an existing issue for the same feature request i have checked the existing issues is your feature request related to a problem no response describe the feature you d like this should be a db level config as describe implementation you ve considered no response documentation adoption use case migration strategy no response additional information no response
0
241,198
20,107,507,017
IssuesEvent
2022-02-07 12:01:29
kyma-incubator/reconciler
https://api.github.com/repos/kyma-incubator/reconciler
opened
Testing reconciler changes
area/reconciler area/installation test-missing release blocker
<!-- Thank you for your contribution. Before you submit the issue: 1. Search open and closed issues for duplicates. 2. Read the contributing guidelines. --> **Description** Implement pipeline building reconciler from the sources and installing kyma. Pipeline should be triggered on reconciler changes: before merging to main and after merging to main. Pipeline should use built from sources to install kyma. There should be 2 pipelines testing latest kyma 2 release (no hardcoded version) and kyma on main. After kyma is provisioned trigger fast integration tests. Pipeline should be mandatory to merge PRs. AC: - [ ] pre main mandatory pipeline using reconciler sources to install latest kyma 2 release and running fast integration tests - [ ] pre main mandatory pipeline using reconciler sources to install main kyma and running fast integration tests - [ ] post main mandatory pipeline using reconciler sources to install latest kyma 2 release and running fast integration tests - [ ] post main mandatory pipeline using reconciler sources to install main kyma and running fast integration tests - [ ] update reconciler pipeline inventory **Reasons** It is possible to introduce changes to reconciler itself or to component reconciler containing bugs and get to know about after the merge. there is NO pipeline building reconciler from the sources and using it for installation. **Attachments** <!-- Attach any files, links, code samples, or screenshots that will convince us to your idea. -->
1.0
Testing reconciler changes - <!-- Thank you for your contribution. Before you submit the issue: 1. Search open and closed issues for duplicates. 2. Read the contributing guidelines. --> **Description** Implement pipeline building reconciler from the sources and installing kyma. Pipeline should be triggered on reconciler changes: before merging to main and after merging to main. Pipeline should use built from sources to install kyma. There should be 2 pipelines testing latest kyma 2 release (no hardcoded version) and kyma on main. After kyma is provisioned trigger fast integration tests. Pipeline should be mandatory to merge PRs. AC: - [ ] pre main mandatory pipeline using reconciler sources to install latest kyma 2 release and running fast integration tests - [ ] pre main mandatory pipeline using reconciler sources to install main kyma and running fast integration tests - [ ] post main mandatory pipeline using reconciler sources to install latest kyma 2 release and running fast integration tests - [ ] post main mandatory pipeline using reconciler sources to install main kyma and running fast integration tests - [ ] update reconciler pipeline inventory **Reasons** It is possible to introduce changes to reconciler itself or to component reconciler containing bugs and get to know about after the merge. there is NO pipeline building reconciler from the sources and using it for installation. **Attachments** <!-- Attach any files, links, code samples, or screenshots that will convince us to your idea. -->
non_design
testing reconciler changes thank you for your contribution before you submit the issue search open and closed issues for duplicates read the contributing guidelines description implement pipeline building reconciler from the sources and installing kyma pipeline should be triggered on reconciler changes before merging to main and after merging to main pipeline should use built from sources to install kyma there should be pipelines testing latest kyma release no hardcoded version and kyma on main after kyma is provisioned trigger fast integration tests pipeline should be mandatory to merge prs ac pre main mandatory pipeline using reconciler sources to install latest kyma release and running fast integration tests pre main mandatory pipeline using reconciler sources to install main kyma and running fast integration tests post main mandatory pipeline using reconciler sources to install latest kyma release and running fast integration tests post main mandatory pipeline using reconciler sources to install main kyma and running fast integration tests update reconciler pipeline inventory reasons it is possible to introduce changes to reconciler itself or to component reconciler containing bugs and get to know about after the merge there is no pipeline building reconciler from the sources and using it for installation attachments
0
172,090
27,233,053,774
IssuesEvent
2023-02-21 14:32:42
prgrms-web-devcourse/Team-5YES-WuMo-FE
https://api.github.com/repos/prgrms-web-devcourse/Team-5YES-WuMo-FE
closed
모바일 반응형 레이아웃 세팅
feature design
## 📕 작업 설명 - 모바일 반응형 레이아웃 작업 작업 브랜치: feature/mobile-layout-setting/#1 ## 📖 진행 사항 - [ ] 모바일 반응형 레이아웃 작업
1.0
모바일 반응형 레이아웃 세팅 - ## 📕 작업 설명 - 모바일 반응형 레이아웃 작업 작업 브랜치: feature/mobile-layout-setting/#1 ## 📖 진행 사항 - [ ] 모바일 반응형 레이아웃 작업
design
모바일 반응형 레이아웃 세팅 📕 작업 설명 모바일 반응형 레이아웃 작업 작업 브랜치 feature mobile layout setting 📖 진행 사항 모바일 반응형 레이아웃 작업
1
114,356
14,564,427,648
IssuesEvent
2020-12-17 05:04:45
Opentrons/opentrons
https://api.github.com/repos/Opentrons/opentrons
opened
PD: Triggers that force a user to confirm or cancel loss of changes to a step form
:spider: SPDDRS protocol designer
### User Story As a user I want loss of work to be a conscious choice Example existing modal in PD: ![image.png](https://images.zenhubusercontent.com/5e27344f9aca8806bc57bc3b/e0cd9949-40f2-41f1-a6aa-0207f06ac7bc) ### Acceptance Criteria **When users will always be asked to save or cancel changes** - [ ] When a user has made changes to a single form but shift+clicks another step in an attempt to enter batch edit mode - [ ] When a user has made changes to a batch edit form and tries to exit batch edit mode - [ ] When a user has made changes to a batch edit form and tries to _**add or remove**_ steps from their selection - [ ] When a user has made changes to a batch edit form and tries to delete or duplicate **When a user is asked to confirm their choice as a form of onboarding (aka 'don't show me again' is an option)** - [ ] When a user saves a batch edit form - [ ] When a user deletes a selection of steps
1.0
PD: Triggers that force a user to confirm or cancel loss of changes to a step form - ### User Story As a user I want loss of work to be a conscious choice Example existing modal in PD: ![image.png](https://images.zenhubusercontent.com/5e27344f9aca8806bc57bc3b/e0cd9949-40f2-41f1-a6aa-0207f06ac7bc) ### Acceptance Criteria **When users will always be asked to save or cancel changes** - [ ] When a user has made changes to a single form but shift+clicks another step in an attempt to enter batch edit mode - [ ] When a user has made changes to a batch edit form and tries to exit batch edit mode - [ ] When a user has made changes to a batch edit form and tries to _**add or remove**_ steps from their selection - [ ] When a user has made changes to a batch edit form and tries to delete or duplicate **When a user is asked to confirm their choice as a form of onboarding (aka 'don't show me again' is an option)** - [ ] When a user saves a batch edit form - [ ] When a user deletes a selection of steps
design
pd triggers that force a user to confirm or cancel loss of changes to a step form user story as a user i want loss of work to be a conscious choice example existing modal in pd acceptance criteria when users will always be asked to save or cancel changes when a user has made changes to a single form but shift clicks another step in an attempt to enter batch edit mode when a user has made changes to a batch edit form and tries to exit batch edit mode when a user has made changes to a batch edit form and tries to add or remove steps from their selection when a user has made changes to a batch edit form and tries to delete or duplicate when a user is asked to confirm their choice as a form of onboarding aka don t show me again is an option when a user saves a batch edit form when a user deletes a selection of steps
1
242,840
7,849,239,407
IssuesEvent
2018-06-20 02:20:00
kubeflow/kubeflow
https://api.github.com/repos/kubeflow/kubeflow
closed
Batch Prediction Beam Library
area/inference priority/p1 release/0.2.0 sprint/2018-05-29-to-06-08 sprint/2018-06-11-to-06-22
We'd like to have a story for batch prediction with beam. We will need a library of DoFns to do inference. Related to: Batch Prediction using GPUs #251 /assign @yixinshi
1.0
Batch Prediction Beam Library - We'd like to have a story for batch prediction with beam. We will need a library of DoFns to do inference. Related to: Batch Prediction using GPUs #251 /assign @yixinshi
non_design
batch prediction beam library we d like to have a story for batch prediction with beam we will need a library of dofns to do inference related to batch prediction using gpus assign yixinshi
0
40,133
12,750,677,866
IssuesEvent
2020-06-27 06:12:24
LucasZuk/Carrosserie
https://api.github.com/repos/LucasZuk/Carrosserie
closed
CVE-2012-6708 (Medium) detected in jquery-1.7.1.min.js
security vulnerability
## CVE-2012-6708 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jquery-1.7.1.min.js</b></p></summary> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.7.1/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/1.7.1/jquery.min.js</a></p> <p>Path to dependency file: /tmp/ws-scm/Carrosserie/wp-content/themes/twentytwenty/node_modules/vm-browserify/example/run/index.html</p> <p>Path to vulnerable library: /Carrosserie/wp-content/themes/twentytwenty/node_modules/vm-browserify/example/run/index.html</p> <p> Dependency Hierarchy: - :x: **jquery-1.7.1.min.js** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/LucasZuk/Carrosserie/commit/343ec17a4a454a6b094b442cb759631cd6ac5c4c">343ec17a4a454a6b094b442cb759631cd6ac5c4c</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> jQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS) attacks. The jQuery(strInput) function does not differentiate selectors from HTML in a reliable fashion. In vulnerable versions, jQuery determined whether the input was HTML by looking for the '<' character anywhere in the string, giving attackers more flexibility when attempting to construct a malicious payload. In fixed versions, jQuery only deems the input to be HTML if it explicitly starts with the '<' character, limiting exploitability only to attackers who can control the beginning of a string, which is far less common. <p>Publish Date: 2018-01-18 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2012-6708>CVE-2012-6708</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2012-6708">https://nvd.nist.gov/vuln/detail/CVE-2012-6708</a></p> <p>Release Date: 2018-01-18</p> <p>Fix Resolution: jQuery - v1.9.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2012-6708 (Medium) detected in jquery-1.7.1.min.js - ## CVE-2012-6708 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jquery-1.7.1.min.js</b></p></summary> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.7.1/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/1.7.1/jquery.min.js</a></p> <p>Path to dependency file: /tmp/ws-scm/Carrosserie/wp-content/themes/twentytwenty/node_modules/vm-browserify/example/run/index.html</p> <p>Path to vulnerable library: /Carrosserie/wp-content/themes/twentytwenty/node_modules/vm-browserify/example/run/index.html</p> <p> Dependency Hierarchy: - :x: **jquery-1.7.1.min.js** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/LucasZuk/Carrosserie/commit/343ec17a4a454a6b094b442cb759631cd6ac5c4c">343ec17a4a454a6b094b442cb759631cd6ac5c4c</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> jQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS) attacks. The jQuery(strInput) function does not differentiate selectors from HTML in a reliable fashion. In vulnerable versions, jQuery determined whether the input was HTML by looking for the '<' character anywhere in the string, giving attackers more flexibility when attempting to construct a malicious payload. In fixed versions, jQuery only deems the input to be HTML if it explicitly starts with the '<' character, limiting exploitability only to attackers who can control the beginning of a string, which is far less common. <p>Publish Date: 2018-01-18 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2012-6708>CVE-2012-6708</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2012-6708">https://nvd.nist.gov/vuln/detail/CVE-2012-6708</a></p> <p>Release Date: 2018-01-18</p> <p>Fix Resolution: jQuery - v1.9.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_design
cve medium detected in jquery min js cve medium severity vulnerability vulnerable library jquery min js javascript library for dom operations library home page a href path to dependency file tmp ws scm carrosserie wp content themes twentytwenty node modules vm browserify example run index html path to vulnerable library carrosserie wp content themes twentytwenty node modules vm browserify example run index html dependency hierarchy x jquery min js vulnerable library found in head commit a href vulnerability details jquery before is vulnerable to cross site scripting xss attacks the jquery strinput function does not differentiate selectors from html in a reliable fashion in vulnerable versions jquery determined whether the input was html by looking for the character anywhere in the string giving attackers more flexibility when attempting to construct a malicious payload in fixed versions jquery only deems the input to be html if it explicitly starts with the character limiting exploitability only to attackers who can control the beginning of a string which is far less common publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution jquery step up your open source security game with whitesource
0
11,917
3,028,451,223
IssuesEvent
2015-08-04 05:28:11
MarlinFirmware/MarlinDev
https://api.github.com/repos/MarlinFirmware/MarlinDev
opened
More parse-able M115
Design Concept Hosts & Protocols Needs Feedback
Currently the output of `M115` looks like this: FIRMWARE_NAME:Marlin 1.1 abc-123-de4db33f SOURCE_CODE_URL:https://github.com/MarlinFirmware/Marlin/ PROTOCOL_VERSION:1.0 MACHINE_TYPE:Mendel RepRap EXTRUDER_COUNT:1 UUID:00000000-0000-0000-0000-000000000000 This is hard to parse. It would help to add a delimiter, such as a semicolon, between parts. This results in… FIRMWARE_NAME:Marlin 1.1 abc-123-de4db33f; SOURCE_CODE_URL:https://github.com/MarlinFirmware/Marlin/; PROTOCOL_VERSION:1.0; MACHINE_TYPE:Mendel RepRap; EXTRUDER_COUNT:1; UUID:00000000-0000-0000-0000-000000000000;
1.0
More parse-able M115 - Currently the output of `M115` looks like this: FIRMWARE_NAME:Marlin 1.1 abc-123-de4db33f SOURCE_CODE_URL:https://github.com/MarlinFirmware/Marlin/ PROTOCOL_VERSION:1.0 MACHINE_TYPE:Mendel RepRap EXTRUDER_COUNT:1 UUID:00000000-0000-0000-0000-000000000000 This is hard to parse. It would help to add a delimiter, such as a semicolon, between parts. This results in… FIRMWARE_NAME:Marlin 1.1 abc-123-de4db33f; SOURCE_CODE_URL:https://github.com/MarlinFirmware/Marlin/; PROTOCOL_VERSION:1.0; MACHINE_TYPE:Mendel RepRap; EXTRUDER_COUNT:1; UUID:00000000-0000-0000-0000-000000000000;
design
more parse able currently the output of looks like this firmware name marlin abc source code url protocol version machine type mendel reprap extruder count uuid this is hard to parse it would help to add a delimiter such as a semicolon between parts this results in… firmware name marlin abc source code url protocol version machine type mendel reprap extruder count uuid
1
9,617
2,910,501,232
IssuesEvent
2015-06-21 20:26:04
hhroc/yellr-ios
https://api.github.com/repos/hhroc/yellr-ios
opened
Change voting colors
design
The up-arrow and down-arrow should be grey, unless a vote has been cast. Then, if it is an upvote, then the up arrow should turn green, and the down arrow should turn red if it was a down vote. Additionally, the color of the up/down vote counts should be green/red. Look at how the Android app does it, as well as the website at yellr.net/local.
1.0
Change voting colors - The up-arrow and down-arrow should be grey, unless a vote has been cast. Then, if it is an upvote, then the up arrow should turn green, and the down arrow should turn red if it was a down vote. Additionally, the color of the up/down vote counts should be green/red. Look at how the Android app does it, as well as the website at yellr.net/local.
design
change voting colors the up arrow and down arrow should be grey unless a vote has been cast then if it is an upvote then the up arrow should turn green and the down arrow should turn red if it was a down vote additionally the color of the up down vote counts should be green red look at how the android app does it as well as the website at yellr net local
1
80,533
10,023,139,704
IssuesEvent
2019-07-16 18:26:26
brave/brave-browser
https://api.github.com/repos/brave/brave-browser
closed
Focus ring on buttons looks odd
QA/Yes design feature/user-interface polish priority/P5 release-notes/exclude
<!-- Have you searched for similar issues? Before submitting this issue, please check the open issues and add a note before logging a new issue. PLEASE USE THE TEMPLATE BELOW TO PROVIDE INFORMATION ABOUT THE ISSUE. INSUFFICIENT INFO WILL GET THE ISSUE CLOSED. IT WILL ONLY BE REOPENED AFTER SUFFICIENT INFO IS PROVIDED--> ## Description <!--Provide a brief description of the issue--> Focus ring on buttons look odd ## Actual result: <!--Please add screenshots if needed--> ![image](https://user-images.githubusercontent.com/17010094/54028800-4029be00-4174-11e9-9ed9-81c97beca52a.png) ## Expected result: No orange rectangular border should be shown around the button ## Reproduces how often: <!--[Easily reproduced/Intermittent issue/No steps to reproduce]--> Easy ## Brave version (brave://version info) <!--For installed build, please copy Brave, Revision and OS from brave://version and paste here. If building from source please mention it along with brave://version details--> Brave | 0.63.1 Chromium: 73.0.3683.67 (Official Build) dev (64-bit) -- | -- Revision | a83fd4f3207ae83412d329a9ca1239dd1e068345-refs/branch-heads/3683@{#760} OS | Windows 10 OS Build 17134.590 ### Reproducible on current release: - Does it reproduce on brave-browser dev/beta builds? Yes only on dev ### Website problems only: - Does the issue resolve itself when disabling Brave Shields? - Is the issue reproducible on the latest version of Chrome? ### Additional Information <!--Any additional information, related issues, extra QA steps, configuration or data that might be necessary to reproduce the issue--> cc: @cezaraugusto @rossmoody
1.0
Focus ring on buttons looks odd - <!-- Have you searched for similar issues? Before submitting this issue, please check the open issues and add a note before logging a new issue. PLEASE USE THE TEMPLATE BELOW TO PROVIDE INFORMATION ABOUT THE ISSUE. INSUFFICIENT INFO WILL GET THE ISSUE CLOSED. IT WILL ONLY BE REOPENED AFTER SUFFICIENT INFO IS PROVIDED--> ## Description <!--Provide a brief description of the issue--> Focus ring on buttons look odd ## Actual result: <!--Please add screenshots if needed--> ![image](https://user-images.githubusercontent.com/17010094/54028800-4029be00-4174-11e9-9ed9-81c97beca52a.png) ## Expected result: No orange rectangular border should be shown around the button ## Reproduces how often: <!--[Easily reproduced/Intermittent issue/No steps to reproduce]--> Easy ## Brave version (brave://version info) <!--For installed build, please copy Brave, Revision and OS from brave://version and paste here. If building from source please mention it along with brave://version details--> Brave | 0.63.1 Chromium: 73.0.3683.67 (Official Build) dev (64-bit) -- | -- Revision | a83fd4f3207ae83412d329a9ca1239dd1e068345-refs/branch-heads/3683@{#760} OS | Windows 10 OS Build 17134.590 ### Reproducible on current release: - Does it reproduce on brave-browser dev/beta builds? Yes only on dev ### Website problems only: - Does the issue resolve itself when disabling Brave Shields? - Is the issue reproducible on the latest version of Chrome? ### Additional Information <!--Any additional information, related issues, extra QA steps, configuration or data that might be necessary to reproduce the issue--> cc: @cezaraugusto @rossmoody
design
focus ring on buttons looks odd have you searched for similar issues before submitting this issue please check the open issues and add a note before logging a new issue please use the template below to provide information about the issue insufficient info will get the issue closed it will only be reopened after sufficient info is provided description focus ring on buttons look odd actual result expected result no orange rectangular border should be shown around the button reproduces how often easy brave version brave version info brave chromium   official build  dev  bit revision refs branch heads os windows  os build reproducible on current release does it reproduce on brave browser dev beta builds yes only on dev website problems only does the issue resolve itself when disabling brave shields is the issue reproducible on the latest version of chrome additional information cc cezaraugusto rossmoody
1
75,372
20,779,189,134
IssuesEvent
2022-03-16 13:23:12
mozilla-mobile/reference-browser
https://api.github.com/repos/mozilla-mobile/reference-browser
closed
Update Sentry tokens for the new client
🏗️ build
Update Sentry tokens for the new clientAs part of moving to a newer instance of Sentry, we would need to update Sentry tokens in our build system's secrets. Dependant on https://github.com/mozilla-mobile/android-components/issues/11646.
1.0
Update Sentry tokens for the new client - Update Sentry tokens for the new clientAs part of moving to a newer instance of Sentry, we would need to update Sentry tokens in our build system's secrets. Dependant on https://github.com/mozilla-mobile/android-components/issues/11646.
non_design
update sentry tokens for the new client update sentry tokens for the new clientas part of moving to a newer instance of sentry we would need to update sentry tokens in our build system s secrets dependant on
0
163,255
25,779,989,346
IssuesEvent
2022-12-09 15:08:10
RE-SS3D/SS3D
https://api.github.com/repos/RE-SS3D/SS3D
closed
Add end of round mechanics
High Priority Type: Feature Bounty Needs: Documents/Design System: Rounds
<!-- Text within these arrows are notes for you and should be deleted. --> ### Summary Add end of round mechanics. ### Goal Basically, a trigger to end the round for the players. Sends all players back to lobby. I think it is tied to a timer currently, but adding a way to trigger it from in-game would be nice too, ~~like from a command console.~~ Currently decided to use a _nuke_ instead. **BOUNTY: (RAISED TO) $45**
1.0
Add end of round mechanics - <!-- Text within these arrows are notes for you and should be deleted. --> ### Summary Add end of round mechanics. ### Goal Basically, a trigger to end the round for the players. Sends all players back to lobby. I think it is tied to a timer currently, but adding a way to trigger it from in-game would be nice too, ~~like from a command console.~~ Currently decided to use a _nuke_ instead. **BOUNTY: (RAISED TO) $45**
design
add end of round mechanics summary add end of round mechanics goal basically a trigger to end the round for the players sends all players back to lobby i think it is tied to a timer currently but adding a way to trigger it from in game would be nice too like from a command console currently decided to use a nuke instead bounty raised to
1
51,196
10,595,774,186
IssuesEvent
2019-10-09 19:44:25
fdorg/flashdevelop
https://api.github.com/repos/fdorg/flashdevelop
opened
[Haxe][CodeGenerator] Add the generator `Generate constructor with initializer` for `abstract`
coderefactor enhancement haxe
```haxe abstract AType(Int) { $(EntryPoint) } ``` expected result: ```haxe abstract AType(Int) { public function new(value:Int) this = value; } ```
1.0
[Haxe][CodeGenerator] Add the generator `Generate constructor with initializer` for `abstract` - ```haxe abstract AType(Int) { $(EntryPoint) } ``` expected result: ```haxe abstract AType(Int) { public function new(value:Int) this = value; } ```
non_design
add the generator generate constructor with initializer for abstract haxe abstract atype int entrypoint expected result haxe abstract atype int public function new value int this value
0
17,009
3,588,328,781
IssuesEvent
2016-01-30 23:06:46
tgstation/-tg-station
https://api.github.com/repos/tgstation/-tg-station
closed
It's not possible to put the new bras on as a man or a woman from the dresser
Bug Needs Reproducing/Testing
Important to note that when trying as a woman I was either made into a woman via (I assume) admin intervention or surgery. Also I don't think it's possible to actually put on any of the female restricted clothing? I just didn't know what the rest of them looked like.
1.0
It's not possible to put the new bras on as a man or a woman from the dresser - Important to note that when trying as a woman I was either made into a woman via (I assume) admin intervention or surgery. Also I don't think it's possible to actually put on any of the female restricted clothing? I just didn't know what the rest of them looked like.
non_design
it s not possible to put the new bras on as a man or a woman from the dresser important to note that when trying as a woman i was either made into a woman via i assume admin intervention or surgery also i don t think it s possible to actually put on any of the female restricted clothing i just didn t know what the rest of them looked like
0
59,855
7,298,785,423
IssuesEvent
2018-02-26 18:01:08
CDLUC3/Make-Data-Count
https://api.github.com/repos/CDLUC3/Make-Data-Count
closed
Decide which repositories to target
Log Processing MVP S06: Design Log Processor in progress
Need to know which repositories will be the focus: - Dash - DataONE - DataCite
1.0
Decide which repositories to target - Need to know which repositories will be the focus: - Dash - DataONE - DataCite
design
decide which repositories to target need to know which repositories will be the focus dash dataone datacite
1
45,272
5,918,795,715
IssuesEvent
2017-05-22 16:07:41
blockstack/blockstack.org
https://api.github.com/repos/blockstack/blockstack.org
opened
design section 2 content
design
Design section 2 content - [ ] mobile - [ ] desktop Reference - [#302: home page content](https://github.com/blockstack/blockstack.org/issues/302) - [#292: design new landing view hero section and illustration](https://github.com/blockstack/blockstack.org/issues/292)
1.0
design section 2 content - Design section 2 content - [ ] mobile - [ ] desktop Reference - [#302: home page content](https://github.com/blockstack/blockstack.org/issues/302) - [#292: design new landing view hero section and illustration](https://github.com/blockstack/blockstack.org/issues/292)
design
design section content design section content mobile desktop reference
1
27,134
4,282,382,290
IssuesEvent
2016-07-15 08:55:23
e-government-ua/i
https://api.github.com/repos/e-government-ua/i
closed
Ошибка в разделе Документы, если у пользователя еще нет документов
bug test _central-js
На боевом сервере при переходе в раздел Документы от имени пользователя, у которого еще нет документов вылазит ошибка. ![2016-07-08 13-27-12](https://cloud.githubusercontent.com/assets/5942291/16684911/45deac1a-4510-11e6-877d-08622fc76046.png) В консоли на локальном фронт-енде лог примерно такой: ``` GET /app/documents/index.html 200 5ms GET /auth/isAuthenticated 200 1ms GET /auth/isAuthenticated 200 1ms GET /app/documents/user/index.html 200 3ms - 261b GET /api/user/fio 304 1ms GET /api/user/fio 304 1ms GET /%7B%7Bads.image%7D%7D 304 13ms GET /%7B%7Bads.image%7D%7D 304 13ms GET /auth/isAuthenticated 200 12ms GET /auth/isAuthenticated 200 12ms REQUEST { url: 'https://test.igov.org.ua/wf/service/document/getDocuments', auth: { username: 'activiti-master', password: 'UjhtJnEvf!' }, qs: { nID_Subject: 79367 }, callback: [Function] } REQUEST { url: 'https://test.igov.org.ua/wf/service/document/getDocumentTypes', auth: { username: 'activiti-master', password: 'UjhtJnEvf!' }, qs: { nID_Subject: 79367 }, callback: [Function] } REQUEST make request https://test.igov.org.ua/wf/service/document/getDocuments?nID_Subject=79367 REQUEST make request https://test.igov.org.ua/wf/service/document/getDocumentTypes?nID_Subject=79367 REQUEST onRequestResponse https://test.igov.org.ua/wf/service/document/getDocuments?nID_Subject=79367 200 { server: 'nginx/1.9.5', date: 'Fri, 08 Jul 2016 10:08:06 GMT', 'content-type': 'application/json;charset=UTF-8', 'content-length': '2', connection: 'close' } REQUEST reading response's body REQUEST finish init function https://test.igov.org.ua/wf/service/document/getDocuments?nID_Subject=79367 REQUEST response end https://test.igov.org.ua/wf/service/document/getDocuments?nID_Subject=79367 200 { server: 'nginx/1.9.5', date: 'Fri, 08 Jul 2016 10:08:06 GMT', 'content-type': 'application/json;charset=UTF-8', 'content-length': '2', connection: 'close' } REQUEST end event https://test.igov.org.ua/wf/service/document/getDocuments?nID_Subject=79367 REQUEST has body https://test.igov.org.ua/wf/service/document/getDocuments?nID_Subject=79367 2 REQUEST emitting complete https://test.igov.org.ua/wf/service/document/getDocuments?nID_Subject=79367 GET /api/documents 200 332ms - 2b GET /api/documents 200 332ms - 2b REQUEST onRequestResponse https://test.igov.org.ua/wf/service/document/getDocumentTypes?nID_Subject=79367 200 { server: 'nginx/1.9.5', date: 'Fri, 08 Jul 2016 10:08:06 GMT', 'content-type': 'application/json;charset=UTF-8', 'content-length': '464', connection: 'close' } REQUEST reading response's body REQUEST finish init function https://test.igov.org.ua/wf/service/document/getDocumentTypes?nID_Subject=79367 REQUEST response end https://test.igov.org.ua/wf/service/document/getDocumentTypes?nID_Subject=79367 200 { server: 'nginx/1.9.5', date: 'Fri, 08 Jul 2016 10:08:06 GMT', 'content-type': 'application/json;charset=UTF-8', 'content-length': '464', connection: 'close' } REQUEST end event https://test.igov.org.ua/wf/service/document/getDocumentTypes?nID_Subject=79367 REQUEST has body https://test.igov.org.ua/wf/service/document/getDocumentTypes?nID_Subject=79367 464 REQUEST emitting complete https://test.igov.org.ua/wf/service/document/getDocumentTypes?nID_Subject=79367 GET /api/documents/search/getDocumentTypes 200 336ms - 464b GET /api/documents/search/getDocumentTypes 200 336ms - 464b REQUEST { url: 'https://bankid.privatbank.ua/ResourceService/checked/data', headers: { 'Content-Type': 'application/json', Authorization: 'Bearer 39fb4dd0-8feb-4daa-a79b-353da8c03896, Id testIgov', Accept: 'application/json' }, json: true, body: { type: 'physical', fields: [ 'firstName', 'middleName', 'lastName', 'phone', 'inn', 'clId', 'clIdText', 'birthDay' ], scans: [ [Object], [Object] ] }, callback: [Function], method: 'POST' } REQUEST make request https://bankid.privatbank.ua/ResourceService/checked/data REQUEST onRequestResponse https://bankid.privatbank.ua/ResourceService/checked/data 200 { server: 'nginx', date: 'Fri, 08 Jul 2016 10:08:08 GMT', 'content-type': 'application/json;charset=UTF-8', 'content-length': '588', connection: 'close', 'cache-control': 'no-cache, no-store, max-age=0, must-revalidate', pragma: 'no-cache', expires: '0', 'strict-transport-security': 'max-age=31536000 ; includeSubDomains', 'x-content-type-options': 'nosniff', 'x-frame-options': 'DENY', 'x-xss-protection': '1; mode=block', 'access-control-allow-origin': '*', 'access-control-allow-headers': 'Authorization, content-type', 'access-control-allow-methods': 'GET, OPTIONS, POST', 'access-control-allow-credentials': 'true' } REQUEST reading response's body REQUEST finish init function https://bankid.privatbank.ua/ResourceService/checked/data REQUEST response end https://bankid.privatbank.ua/ResourceService/checked/data 200 { server: 'nginx', date: 'Fri, 08 Jul 2016 10:08:08 GMT', 'content-type': 'application/json;charset=UTF-8', 'content-length': '588', connection: 'close', 'cache-control': 'no-cache, no-store, max-age=0, must-revalidate', pragma: 'no-cache', expires: '0', 'strict-transport-security': 'max-age=31536000 ; includeSubDomains', 'x-content-type-options': 'nosniff', 'x-frame-options': 'DENY', 'x-xss-protection': '1; mode=block', 'access-control-allow-origin': '*', 'access-control-allow-headers': 'Authorization, content-type', 'access-control-allow-methods': 'GET, OPTIONS, POST', 'access-control-allow-credentials': 'true' } REQUEST end event https://bankid.privatbank.ua/ResourceService/checked/data REQUEST has body https://bankid.privatbank.ua/ResourceService/checked/data 588 REQUEST emitting complete https://bankid.privatbank.ua/ResourceService/checked/data /home/lem8r/bin/iGov/i/central-js/server/api/documents/documents.controller.js:185 bankIDService.scanContentRequest(documentScan.scan.type, documentScan.scan.link, accessToken, function (error, buffer) { ^ TypeError: Cannot read property 'type' of undefined at uploadScan (/home/lem8r/bin/iGov/i/central-js/server/api/documents/documents.controller.js:185:55) at async.forEach.req.session.documents.uploaded (/home/lem8r/bin/iGov/i/central-js/server/api/documents/documents.controller.js:222:9) at /home/lem8r/bin/iGov/i/central-js/node_modules/async/lib/async.js:162:20 at /home/lem8r/bin/iGov/i/central-js/node_modules/async/lib/async.js:230:13 at _arrayEach (/home/lem8r/bin/iGov/i/central-js/node_modules/async/lib/async.js:81:9) at _each (/home/lem8r/bin/iGov/i/central-js/node_modules/async/lib/async.js:72:13) at Object.async.forEachOf.async.eachOf (/home/lem8r/bin/iGov/i/central-js/node_modules/async/lib/async.js:229:9) at Object.async.forEach.async.each (/home/lem8r/bin/iGov/i/central-js/node_modules/async/lib/async.js:206:22) at doAsyncScansUpload (/home/lem8r/bin/iGov/i/central-js/server/api/documents/documents.controller.js:219:11) at scansCallback (/home/lem8r/bin/iGov/i/central-js/server/api/documents/documents.controller.js:244:11) ```
1.0
Ошибка в разделе Документы, если у пользователя еще нет документов - На боевом сервере при переходе в раздел Документы от имени пользователя, у которого еще нет документов вылазит ошибка. ![2016-07-08 13-27-12](https://cloud.githubusercontent.com/assets/5942291/16684911/45deac1a-4510-11e6-877d-08622fc76046.png) В консоли на локальном фронт-енде лог примерно такой: ``` GET /app/documents/index.html 200 5ms GET /auth/isAuthenticated 200 1ms GET /auth/isAuthenticated 200 1ms GET /app/documents/user/index.html 200 3ms - 261b GET /api/user/fio 304 1ms GET /api/user/fio 304 1ms GET /%7B%7Bads.image%7D%7D 304 13ms GET /%7B%7Bads.image%7D%7D 304 13ms GET /auth/isAuthenticated 200 12ms GET /auth/isAuthenticated 200 12ms REQUEST { url: 'https://test.igov.org.ua/wf/service/document/getDocuments', auth: { username: 'activiti-master', password: 'UjhtJnEvf!' }, qs: { nID_Subject: 79367 }, callback: [Function] } REQUEST { url: 'https://test.igov.org.ua/wf/service/document/getDocumentTypes', auth: { username: 'activiti-master', password: 'UjhtJnEvf!' }, qs: { nID_Subject: 79367 }, callback: [Function] } REQUEST make request https://test.igov.org.ua/wf/service/document/getDocuments?nID_Subject=79367 REQUEST make request https://test.igov.org.ua/wf/service/document/getDocumentTypes?nID_Subject=79367 REQUEST onRequestResponse https://test.igov.org.ua/wf/service/document/getDocuments?nID_Subject=79367 200 { server: 'nginx/1.9.5', date: 'Fri, 08 Jul 2016 10:08:06 GMT', 'content-type': 'application/json;charset=UTF-8', 'content-length': '2', connection: 'close' } REQUEST reading response's body REQUEST finish init function https://test.igov.org.ua/wf/service/document/getDocuments?nID_Subject=79367 REQUEST response end https://test.igov.org.ua/wf/service/document/getDocuments?nID_Subject=79367 200 { server: 'nginx/1.9.5', date: 'Fri, 08 Jul 2016 10:08:06 GMT', 'content-type': 'application/json;charset=UTF-8', 'content-length': '2', connection: 'close' } REQUEST end event https://test.igov.org.ua/wf/service/document/getDocuments?nID_Subject=79367 REQUEST has body https://test.igov.org.ua/wf/service/document/getDocuments?nID_Subject=79367 2 REQUEST emitting complete https://test.igov.org.ua/wf/service/document/getDocuments?nID_Subject=79367 GET /api/documents 200 332ms - 2b GET /api/documents 200 332ms - 2b REQUEST onRequestResponse https://test.igov.org.ua/wf/service/document/getDocumentTypes?nID_Subject=79367 200 { server: 'nginx/1.9.5', date: 'Fri, 08 Jul 2016 10:08:06 GMT', 'content-type': 'application/json;charset=UTF-8', 'content-length': '464', connection: 'close' } REQUEST reading response's body REQUEST finish init function https://test.igov.org.ua/wf/service/document/getDocumentTypes?nID_Subject=79367 REQUEST response end https://test.igov.org.ua/wf/service/document/getDocumentTypes?nID_Subject=79367 200 { server: 'nginx/1.9.5', date: 'Fri, 08 Jul 2016 10:08:06 GMT', 'content-type': 'application/json;charset=UTF-8', 'content-length': '464', connection: 'close' } REQUEST end event https://test.igov.org.ua/wf/service/document/getDocumentTypes?nID_Subject=79367 REQUEST has body https://test.igov.org.ua/wf/service/document/getDocumentTypes?nID_Subject=79367 464 REQUEST emitting complete https://test.igov.org.ua/wf/service/document/getDocumentTypes?nID_Subject=79367 GET /api/documents/search/getDocumentTypes 200 336ms - 464b GET /api/documents/search/getDocumentTypes 200 336ms - 464b REQUEST { url: 'https://bankid.privatbank.ua/ResourceService/checked/data', headers: { 'Content-Type': 'application/json', Authorization: 'Bearer 39fb4dd0-8feb-4daa-a79b-353da8c03896, Id testIgov', Accept: 'application/json' }, json: true, body: { type: 'physical', fields: [ 'firstName', 'middleName', 'lastName', 'phone', 'inn', 'clId', 'clIdText', 'birthDay' ], scans: [ [Object], [Object] ] }, callback: [Function], method: 'POST' } REQUEST make request https://bankid.privatbank.ua/ResourceService/checked/data REQUEST onRequestResponse https://bankid.privatbank.ua/ResourceService/checked/data 200 { server: 'nginx', date: 'Fri, 08 Jul 2016 10:08:08 GMT', 'content-type': 'application/json;charset=UTF-8', 'content-length': '588', connection: 'close', 'cache-control': 'no-cache, no-store, max-age=0, must-revalidate', pragma: 'no-cache', expires: '0', 'strict-transport-security': 'max-age=31536000 ; includeSubDomains', 'x-content-type-options': 'nosniff', 'x-frame-options': 'DENY', 'x-xss-protection': '1; mode=block', 'access-control-allow-origin': '*', 'access-control-allow-headers': 'Authorization, content-type', 'access-control-allow-methods': 'GET, OPTIONS, POST', 'access-control-allow-credentials': 'true' } REQUEST reading response's body REQUEST finish init function https://bankid.privatbank.ua/ResourceService/checked/data REQUEST response end https://bankid.privatbank.ua/ResourceService/checked/data 200 { server: 'nginx', date: 'Fri, 08 Jul 2016 10:08:08 GMT', 'content-type': 'application/json;charset=UTF-8', 'content-length': '588', connection: 'close', 'cache-control': 'no-cache, no-store, max-age=0, must-revalidate', pragma: 'no-cache', expires: '0', 'strict-transport-security': 'max-age=31536000 ; includeSubDomains', 'x-content-type-options': 'nosniff', 'x-frame-options': 'DENY', 'x-xss-protection': '1; mode=block', 'access-control-allow-origin': '*', 'access-control-allow-headers': 'Authorization, content-type', 'access-control-allow-methods': 'GET, OPTIONS, POST', 'access-control-allow-credentials': 'true' } REQUEST end event https://bankid.privatbank.ua/ResourceService/checked/data REQUEST has body https://bankid.privatbank.ua/ResourceService/checked/data 588 REQUEST emitting complete https://bankid.privatbank.ua/ResourceService/checked/data /home/lem8r/bin/iGov/i/central-js/server/api/documents/documents.controller.js:185 bankIDService.scanContentRequest(documentScan.scan.type, documentScan.scan.link, accessToken, function (error, buffer) { ^ TypeError: Cannot read property 'type' of undefined at uploadScan (/home/lem8r/bin/iGov/i/central-js/server/api/documents/documents.controller.js:185:55) at async.forEach.req.session.documents.uploaded (/home/lem8r/bin/iGov/i/central-js/server/api/documents/documents.controller.js:222:9) at /home/lem8r/bin/iGov/i/central-js/node_modules/async/lib/async.js:162:20 at /home/lem8r/bin/iGov/i/central-js/node_modules/async/lib/async.js:230:13 at _arrayEach (/home/lem8r/bin/iGov/i/central-js/node_modules/async/lib/async.js:81:9) at _each (/home/lem8r/bin/iGov/i/central-js/node_modules/async/lib/async.js:72:13) at Object.async.forEachOf.async.eachOf (/home/lem8r/bin/iGov/i/central-js/node_modules/async/lib/async.js:229:9) at Object.async.forEach.async.each (/home/lem8r/bin/iGov/i/central-js/node_modules/async/lib/async.js:206:22) at doAsyncScansUpload (/home/lem8r/bin/iGov/i/central-js/server/api/documents/documents.controller.js:219:11) at scansCallback (/home/lem8r/bin/iGov/i/central-js/server/api/documents/documents.controller.js:244:11) ```
non_design
ошибка в разделе документы если у пользователя еще нет документов на боевом сервере при переходе в раздел документы от имени пользователя у которого еще нет документов вылазит ошибка в консоли на локальном фронт енде лог примерно такой get app documents index html get auth isauthenticated get auth isauthenticated get app documents user index html get api user fio get api user fio get image get image get auth isauthenticated get auth isauthenticated request url auth username activiti master password ujhtjnevf qs nid subject callback request url auth username activiti master password ujhtjnevf qs nid subject callback request make request request make request request onrequestresponse server nginx date fri jul gmt content type application json charset utf content length connection close request reading response s body request finish init function request response end server nginx date fri jul gmt content type application json charset utf content length connection close request end event request has body request emitting complete get api documents get api documents request onrequestresponse server nginx date fri jul gmt content type application json charset utf content length connection close request reading response s body request finish init function request response end server nginx date fri jul gmt content type application json charset utf content length connection close request end event request has body request emitting complete get api documents search getdocumenttypes get api documents search getdocumenttypes request url headers content type application json authorization bearer id testigov accept application json json true body type physical fields firstname middlename lastname phone inn clid clidtext birthday scans callback method post request make request request onrequestresponse server nginx date fri jul gmt content type application json charset utf content length connection close cache control no cache no store max age must revalidate pragma no cache expires strict transport security max age includesubdomains x content type options nosniff x frame options deny x xss protection mode block access control allow origin access control allow headers authorization content type access control allow methods get options post access control allow credentials true request reading response s body request finish init function request response end server nginx date fri jul gmt content type application json charset utf content length connection close cache control no cache no store max age must revalidate pragma no cache expires strict transport security max age includesubdomains x content type options nosniff x frame options deny x xss protection mode block access control allow origin access control allow headers authorization content type access control allow methods get options post access control allow credentials true request end event request has body request emitting complete home bin igov i central js server api documents documents controller js bankidservice scancontentrequest documentscan scan type documentscan scan link accesstoken function error buffer typeerror cannot read property type of undefined at uploadscan home bin igov i central js server api documents documents controller js at async foreach req session documents uploaded home bin igov i central js server api documents documents controller js at home bin igov i central js node modules async lib async js at home bin igov i central js node modules async lib async js at arrayeach home bin igov i central js node modules async lib async js at each home bin igov i central js node modules async lib async js at object async foreachof async eachof home bin igov i central js node modules async lib async js at object async foreach async each home bin igov i central js node modules async lib async js at doasyncscansupload home bin igov i central js server api documents documents controller js at scanscallback home bin igov i central js server api documents documents controller js
0
28,796
4,119,691,112
IssuesEvent
2016-06-08 15:34:31
owncloud/core
https://api.github.com/repos/owncloud/core
closed
Tooltip in federated sharing is not showing the full url.
bug design in progress sev4-low
### Steps to reproduce Having admin in serverA and admin in serverB 1. Share a file from admin@serverA with admin@serverB. 2. In ServerB accept the share. 3. In ServerA open the sidebar of the shared file and hover the shared name ### Expected behaviour Tooltip shows full url. ### Actual behaviour Tooltip shows the same information. ![screen shot 2016-03-01 at 09 35 07](https://cloud.githubusercontent.com/assets/9048796/13465159/a901abde-e094-11e5-99c4-78b9a2adce5b.png) ### Server configuration **Operating system**: Ubuntu 14.04 **Web server:** Apache **Database:** MySQL **PHP version:** 5.5.9 **ownCloud version:** (see ownCloud admin page) {"installed":true,"maintenance":false,"version":"9.0.0.13","versionstring":"9.0.0 beta 2","edition":"Enterprise"} **Updated from an older ownCloud or fresh install:** Fresh **The content of config/config.php:** ``` ``` **Are you using external storage, if yes which one:** local/smb/sftp/... No. **Are you using encryption:** No **Logs** ``` ``` ### Client configuration **browser** Chrome
1.0
Tooltip in federated sharing is not showing the full url. - ### Steps to reproduce Having admin in serverA and admin in serverB 1. Share a file from admin@serverA with admin@serverB. 2. In ServerB accept the share. 3. In ServerA open the sidebar of the shared file and hover the shared name ### Expected behaviour Tooltip shows full url. ### Actual behaviour Tooltip shows the same information. ![screen shot 2016-03-01 at 09 35 07](https://cloud.githubusercontent.com/assets/9048796/13465159/a901abde-e094-11e5-99c4-78b9a2adce5b.png) ### Server configuration **Operating system**: Ubuntu 14.04 **Web server:** Apache **Database:** MySQL **PHP version:** 5.5.9 **ownCloud version:** (see ownCloud admin page) {"installed":true,"maintenance":false,"version":"9.0.0.13","versionstring":"9.0.0 beta 2","edition":"Enterprise"} **Updated from an older ownCloud or fresh install:** Fresh **The content of config/config.php:** ``` ``` **Are you using external storage, if yes which one:** local/smb/sftp/... No. **Are you using encryption:** No **Logs** ``` ``` ### Client configuration **browser** Chrome
design
tooltip in federated sharing is not showing the full url steps to reproduce having admin in servera and admin in serverb share a file from admin servera with admin serverb in serverb accept the share in servera open the sidebar of the shared file and hover the shared name expected behaviour tooltip shows full url actual behaviour tooltip shows the same information server configuration operating system ubuntu web server apache database mysql php version owncloud version see owncloud admin page installed true maintenance false version versionstring beta edition enterprise updated from an older owncloud or fresh install fresh the content of config config php are you using external storage if yes which one local smb sftp no are you using encryption no logs client configuration browser chrome
1
100,318
12,514,717,002
IssuesEvent
2020-06-03 06:05:11
JeschkeLab/DeerLab
https://api.github.com/repos/JeschkeLab/DeerLab
opened
Built-in models information interface
design
All parametric models in DeerLab when called without inputs return a ``info`` structure which contains the essentials (start values, boundaries, parameter names,...) needed to setup optimization with built-in models and constraints. ### Structure At the moment `info` looks like this, e.g. for the `dd_gauss` model it is defined as: ```` matlab info.model = 'Single Gaussian distribution'; info.nparam = nParam; info.parameters(1).name = 'Center r0'; info.parameters(1).range = [1 20]; info.parameters(1).default = 3.5; info.parameters(1).units = 'nm'; info.parameters(2).name = 'FWHM w'; info.parameters(2).range = [0.2 5]; info.parameters(2).default = 0.5; info.parameters(2).units = 'nm'; ```` and calling the model function returns ```` struct with fields: model: 'Single Gaussian distribution' nparam: 2 parameters: [1×2 struct] ```` While it is a simple data type, extracting the information on the parameters is cumbersome, since for each parameter there is an associated nested structure: ```` 1×2 struct array with fields: name range default units ```` First there is no clear oversight of the parameters due to the nested nature of these structures. Second, extracting the different default values, ranges, and so on for all parameters is cumbersome: ````matlab info = dd_gauss(); % Get array of start values par0 = [info.parameters(:).default]; % Get lower/upper bounds ranges = [info.parameters(:).range]; upper = ranges(2:2:end); lower = ranges(1:2:end-1); ```` Here I propose an alternative interface. ### Tables This data fundamental data type from MATLAB provides an interesting candidate for the interface of these models. A table for the `dd_gauss` can be defined similarly as above: ````matlab structInfo(1,1).Index = 1; structInfo(1,1).Parameter = 'Center r0'; structInfo(1,1).Units = 'nm'; structInfo(1,1).Start = 3.5; structInfo(1,1).Upper = 20; structInfo(1,1).Lower = 1; structInfo(2,1).Index = 2; structInfo(2,1).Parameter = 'FWHM w'; structInfo(2,1).Units = 'nm'; structInfo(2,1).Start = 0.5; structInfo(2,1).Upper = 0.2; structInfo(2,1).Lower = 5; info = struct2table(structInfo); ```` but now calling the model function returns a full (and well formatted) table with the full summary of the model parameters: ```` info = 2×6 table Index Parameter Units Start Upper Lower _____ _____________ ______ _____ _____ _____ 1 {'Center r0'} {'nm'} 3.5 20 1 2 {'FWHM w' } {'nm'} 0.5 0.2 5 ```` The retrieval of information would also be largely simplified. For example to reproduce the code above to retrieve the start, upper and lower bound values we need: ````matlab par0 = info.Start; lower = info.Lower; upper = info.Upper; ```` The main difference is that the additional fields `nparam` and `model`, containing the number of parameters and model name cannot be included in the table. The loss of `nparam` is irrelevant as it can be obtained from the number of rows, but the model name cannot be hard-coded into the table. Therefore, tables appear to be a potential candidate for this interface. Although I would need more thought before implementing this.
1.0
Built-in models information interface - All parametric models in DeerLab when called without inputs return a ``info`` structure which contains the essentials (start values, boundaries, parameter names,...) needed to setup optimization with built-in models and constraints. ### Structure At the moment `info` looks like this, e.g. for the `dd_gauss` model it is defined as: ```` matlab info.model = 'Single Gaussian distribution'; info.nparam = nParam; info.parameters(1).name = 'Center r0'; info.parameters(1).range = [1 20]; info.parameters(1).default = 3.5; info.parameters(1).units = 'nm'; info.parameters(2).name = 'FWHM w'; info.parameters(2).range = [0.2 5]; info.parameters(2).default = 0.5; info.parameters(2).units = 'nm'; ```` and calling the model function returns ```` struct with fields: model: 'Single Gaussian distribution' nparam: 2 parameters: [1×2 struct] ```` While it is a simple data type, extracting the information on the parameters is cumbersome, since for each parameter there is an associated nested structure: ```` 1×2 struct array with fields: name range default units ```` First there is no clear oversight of the parameters due to the nested nature of these structures. Second, extracting the different default values, ranges, and so on for all parameters is cumbersome: ````matlab info = dd_gauss(); % Get array of start values par0 = [info.parameters(:).default]; % Get lower/upper bounds ranges = [info.parameters(:).range]; upper = ranges(2:2:end); lower = ranges(1:2:end-1); ```` Here I propose an alternative interface. ### Tables This data fundamental data type from MATLAB provides an interesting candidate for the interface of these models. A table for the `dd_gauss` can be defined similarly as above: ````matlab structInfo(1,1).Index = 1; structInfo(1,1).Parameter = 'Center r0'; structInfo(1,1).Units = 'nm'; structInfo(1,1).Start = 3.5; structInfo(1,1).Upper = 20; structInfo(1,1).Lower = 1; structInfo(2,1).Index = 2; structInfo(2,1).Parameter = 'FWHM w'; structInfo(2,1).Units = 'nm'; structInfo(2,1).Start = 0.5; structInfo(2,1).Upper = 0.2; structInfo(2,1).Lower = 5; info = struct2table(structInfo); ```` but now calling the model function returns a full (and well formatted) table with the full summary of the model parameters: ```` info = 2×6 table Index Parameter Units Start Upper Lower _____ _____________ ______ _____ _____ _____ 1 {'Center r0'} {'nm'} 3.5 20 1 2 {'FWHM w' } {'nm'} 0.5 0.2 5 ```` The retrieval of information would also be largely simplified. For example to reproduce the code above to retrieve the start, upper and lower bound values we need: ````matlab par0 = info.Start; lower = info.Lower; upper = info.Upper; ```` The main difference is that the additional fields `nparam` and `model`, containing the number of parameters and model name cannot be included in the table. The loss of `nparam` is irrelevant as it can be obtained from the number of rows, but the model name cannot be hard-coded into the table. Therefore, tables appear to be a potential candidate for this interface. Although I would need more thought before implementing this.
design
built in models information interface all parametric models in deerlab when called without inputs return a info structure which contains the essentials start values boundaries parameter names needed to setup optimization with built in models and constraints structure at the moment info looks like this e g for the dd gauss model it is defined as matlab info model single gaussian distribution info nparam nparam info parameters name center info parameters range info parameters default info parameters units nm info parameters name fwhm w info parameters range info parameters default info parameters units nm and calling the model function returns struct with fields model single gaussian distribution nparam parameters while it is a simple data type extracting the information on the parameters is cumbersome since for each parameter there is an associated nested structure × struct array with fields name range default units first there is no clear oversight of the parameters due to the nested nature of these structures second extracting the different default values ranges and so on for all parameters is cumbersome matlab info dd gauss get array of start values get lower upper bounds ranges upper ranges end lower ranges end here i propose an alternative interface tables this data fundamental data type from matlab provides an interesting candidate for the interface of these models a table for the dd gauss can be defined similarly as above matlab structinfo index structinfo parameter center structinfo units nm structinfo start structinfo upper structinfo lower structinfo index structinfo parameter fwhm w structinfo units nm structinfo start structinfo upper structinfo lower info structinfo but now calling the model function returns a full and well formatted table with the full summary of the model parameters info × table index parameter units start upper lower center nm fwhm w nm the retrieval of information would also be largely simplified for example to reproduce the code above to retrieve the start upper and lower bound values we need matlab info start lower info lower upper info upper the main difference is that the additional fields nparam and model containing the number of parameters and model name cannot be included in the table the loss of nparam is irrelevant as it can be obtained from the number of rows but the model name cannot be hard coded into the table therefore tables appear to be a potential candidate for this interface although i would need more thought before implementing this
1
173,779
27,523,001,069
IssuesEvent
2023-03-06 16:10:07
department-of-veterans-affairs/va.gov-team
https://api.github.com/repos/department-of-veterans-affairs/va.gov-team
closed
Release to Production
frontend design product ux HCE-Checkin
## ENGINEERING TASKS - [x] Merge code to main branch (or flip the feature flag) on day of release - [x] Conduct prod or staging validation, if necessary - [ ] Needed - [ ] Not needed ## RESEARCH TASKS - [x] Push updated Product Guides to Git, if necessary ## DESIGN TASKS - [x] Merge final wireframes to Abstract main branch, if necessary - [x] Merge Sketch files to VA Sketch cloud, if necessary ## PRODUCT TASKS - [x] Create release notes [here](https://github.com/department-of-veterans-affairs/va.gov-team/blob/master/products/health-care/checkin/release-plan/check-in-release-notes.md) - [x] Remove corresponding entry from the [Planned Releases page](https://github.com/department-of-veterans-affairs/va.gov-team/blob/master/products/health-care/checkin/release-plan/check-in-planned-releases.md) - [x] Send release notification via slack in the [check-in-expreience](https://dsva.slack.com/archives/C022AC2STBM) channel - Text = "Modernized Check-in Production Release on <date>. Release notes can be found here" - Link = include link to the release notes for the date of the production release - Call-outs = include call outs to - Stephen Barrs - Patrick Bateman - Shawn Adams - Jason Woodman - [x] Send release notification via VA email - Text = "Modernized Check-in Production Release on <date>. Release notes can be found here" - Link = include link to the release notes for the date of the production release - Send email to - Stephen Barrs - Patrick Bateman - Shawn Adams - Jason Woodman - Dore Mobley (not in slack)
1.0
Release to Production - ## ENGINEERING TASKS - [x] Merge code to main branch (or flip the feature flag) on day of release - [x] Conduct prod or staging validation, if necessary - [ ] Needed - [ ] Not needed ## RESEARCH TASKS - [x] Push updated Product Guides to Git, if necessary ## DESIGN TASKS - [x] Merge final wireframes to Abstract main branch, if necessary - [x] Merge Sketch files to VA Sketch cloud, if necessary ## PRODUCT TASKS - [x] Create release notes [here](https://github.com/department-of-veterans-affairs/va.gov-team/blob/master/products/health-care/checkin/release-plan/check-in-release-notes.md) - [x] Remove corresponding entry from the [Planned Releases page](https://github.com/department-of-veterans-affairs/va.gov-team/blob/master/products/health-care/checkin/release-plan/check-in-planned-releases.md) - [x] Send release notification via slack in the [check-in-expreience](https://dsva.slack.com/archives/C022AC2STBM) channel - Text = "Modernized Check-in Production Release on <date>. Release notes can be found here" - Link = include link to the release notes for the date of the production release - Call-outs = include call outs to - Stephen Barrs - Patrick Bateman - Shawn Adams - Jason Woodman - [x] Send release notification via VA email - Text = "Modernized Check-in Production Release on <date>. Release notes can be found here" - Link = include link to the release notes for the date of the production release - Send email to - Stephen Barrs - Patrick Bateman - Shawn Adams - Jason Woodman - Dore Mobley (not in slack)
design
release to production engineering tasks merge code to main branch or flip the feature flag on day of release conduct prod or staging validation if necessary needed not needed research tasks push updated product guides to git if necessary design tasks merge final wireframes to abstract main branch if necessary merge sketch files to va sketch cloud if necessary product tasks create release notes remove corresponding entry from the send release notification via slack in the channel text modernized check in production release on release notes can be found here link include link to the release notes for the date of the production release call outs include call outs to stephen barrs patrick bateman shawn adams jason woodman send release notification via va email text modernized check in production release on release notes can be found here link include link to the release notes for the date of the production release send email to stephen barrs patrick bateman shawn adams jason woodman dore mobley not in slack
1
129,634
17,851,577,838
IssuesEvent
2021-09-04 06:44:59
SuperHouse/OXRS
https://api.github.com/repos/SuperHouse/OXRS
closed
Adding maker designator
request maker designator
Was hoping to add maker designator for Austin's Creations (AC) In relation to this page: [https://oxrs.io/glossary/makers.html](https://oxrs.io/glossary/makers.html) I do have a terribly outdated website: [austinscreations.ca](https://www.austinscreations.ca/) most of my work is posted on Instagram, and sometimes cross posted to twitter
1.0
Adding maker designator - Was hoping to add maker designator for Austin's Creations (AC) In relation to this page: [https://oxrs.io/glossary/makers.html](https://oxrs.io/glossary/makers.html) I do have a terribly outdated website: [austinscreations.ca](https://www.austinscreations.ca/) most of my work is posted on Instagram, and sometimes cross posted to twitter
design
adding maker designator was hoping to add maker designator for austin s creations ac in relation to this page i do have a terribly outdated website most of my work is posted on instagram and sometimes cross posted to twitter
1
171,284
27,091,391,166
IssuesEvent
2023-02-14 21:24:27
department-of-veterans-affairs/vets-design-system-documentation
https://api.github.com/repos/department-of-veterans-affairs/vets-design-system-documentation
opened
Experimental Design - Link - Active variation and Modal variation
vsp-design-system-team experimental_design
## What Proposing an additional Link - Active variation and a new Modal variation. ## Purpose VFS teams have a need to use primary links in modals instead of primary buttons and sometimes alongside secondary buttons. This creates some visual problems with the primary action not having visual prominence. * We don't have a solution for this issue in Modals, Cards, and potentially other components that we haven't discovered yet in the Design System. Thus teams generally look to me in CollabCycle to tell them what to do. I've been deciding case-by-case which is problematic for consistency. * Because of the above this issue comes up A LOT which distracts from catching potentially bigger problems in our design reviews Martha, Josh, Brian, and I met to discuss this and worked through iterations until we agreed on a design. ## Usage This new Link - Active variation would be used in Modals and could supersede the experimental design request Josh put forward: https://github.com/department-of-veterans-affairs/vets-design-system-documentation/issues/1459 ## Behavior * The Link - Active variation would be a more visual prominent link style that could be used in content-heavy pages or alongside a secondary button or other form component as it is the same height as those components. * The modal variation would handle the use case where the primary action needs to be a link instead of a button. ## Examples ![Solution E - Cancel close are icon buttons Copy@2x](https://user-images.githubusercontent.com/52176351/218866062-ae369425-758a-4838-b781-104297152f96.png) ![Solution E 2 - Drop cancel and make close an icon button@2x](https://user-images.githubusercontent.com/52176351/218866077-0e6ca6ba-33f4-41a3-980c-fdc6543304ed.png) ## Accessibility Brian wrote up a document: https://docs.google.com/document/d/1E-YENpg4NExqEgq8MmpJZrRhPpFFmGFT4tsJ53inmGE/edit#heading=h.mvclr4w8v9j7 ## Guidance I'll be the one writing the guidance so I'll get to that when I get to it. ## Research (optional) We'd add this as Use with Caution variations. ## Code (optional) No existing code ## Next steps I'd like to bring this to DSC on 3/3/23.
2.0
Experimental Design - Link - Active variation and Modal variation - ## What Proposing an additional Link - Active variation and a new Modal variation. ## Purpose VFS teams have a need to use primary links in modals instead of primary buttons and sometimes alongside secondary buttons. This creates some visual problems with the primary action not having visual prominence. * We don't have a solution for this issue in Modals, Cards, and potentially other components that we haven't discovered yet in the Design System. Thus teams generally look to me in CollabCycle to tell them what to do. I've been deciding case-by-case which is problematic for consistency. * Because of the above this issue comes up A LOT which distracts from catching potentially bigger problems in our design reviews Martha, Josh, Brian, and I met to discuss this and worked through iterations until we agreed on a design. ## Usage This new Link - Active variation would be used in Modals and could supersede the experimental design request Josh put forward: https://github.com/department-of-veterans-affairs/vets-design-system-documentation/issues/1459 ## Behavior * The Link - Active variation would be a more visual prominent link style that could be used in content-heavy pages or alongside a secondary button or other form component as it is the same height as those components. * The modal variation would handle the use case where the primary action needs to be a link instead of a button. ## Examples ![Solution E - Cancel close are icon buttons Copy@2x](https://user-images.githubusercontent.com/52176351/218866062-ae369425-758a-4838-b781-104297152f96.png) ![Solution E 2 - Drop cancel and make close an icon button@2x](https://user-images.githubusercontent.com/52176351/218866077-0e6ca6ba-33f4-41a3-980c-fdc6543304ed.png) ## Accessibility Brian wrote up a document: https://docs.google.com/document/d/1E-YENpg4NExqEgq8MmpJZrRhPpFFmGFT4tsJ53inmGE/edit#heading=h.mvclr4w8v9j7 ## Guidance I'll be the one writing the guidance so I'll get to that when I get to it. ## Research (optional) We'd add this as Use with Caution variations. ## Code (optional) No existing code ## Next steps I'd like to bring this to DSC on 3/3/23.
design
experimental design link active variation and modal variation what proposing an additional link active variation and a new modal variation purpose vfs teams have a need to use primary links in modals instead of primary buttons and sometimes alongside secondary buttons this creates some visual problems with the primary action not having visual prominence we don t have a solution for this issue in modals cards and potentially other components that we haven t discovered yet in the design system thus teams generally look to me in collabcycle to tell them what to do i ve been deciding case by case which is problematic for consistency because of the above this issue comes up a lot which distracts from catching potentially bigger problems in our design reviews martha josh brian and i met to discuss this and worked through iterations until we agreed on a design usage this new link active variation would be used in modals and could supersede the experimental design request josh put forward behavior the link active variation would be a more visual prominent link style that could be used in content heavy pages or alongside a secondary button or other form component as it is the same height as those components the modal variation would handle the use case where the primary action needs to be a link instead of a button examples accessibility brian wrote up a document guidance i ll be the one writing the guidance so i ll get to that when i get to it research optional we d add this as use with caution variations code optional no existing code next steps i d like to bring this to dsc on
1
403,159
27,403,052,255
IssuesEvent
2023-03-01 03:11:53
flathub/cc.arduino.IDE2
https://api.github.com/repos/flathub/cc.arduino.IDE2
closed
READ FIRST: NOTICE ABOUT ISSUES
documentation
The Flathub release is an 3rd party wrapper maintained by the community and is not an officially supported method of installing the IDE. This does **not** mean that I (the current maintainer) and the Arduino Dev's are not interested in your issues. If you experience **any** issues with the IDE please report them here first so that I can determine if this is a flatpak issue or an IDE issue and pass it onto the Arduino Devs. Alternatively you can download an officially supported version of the IDE at https://www.arduino.cc/en/software and test to see if the issue is a flatpak issue yourself or if it truly is an IDE issue. If your issue is a genuine IDE issue then please report it at: https://github.com/arduino/arduino-ide/issues/ If your issue is a flatpak specific issue please report it at: https://github.com/flathub/cc.arduino.IDE2/issues/ Why is it like this? Well to keep it simple for everyone. With the flathub release being an unofficial wrapper there is no official support. To ensure that the best support and experience is given having all IDE issues in regards to the flathub release dealt with here first means that the dev teams don't have to deal with issues that were caused by this release. Furthermore, by having all issues (related to the flathub release) here I don't have to search through the IDE's issues to find misplaced issues meaning that i can respond to your issues much quicker. Any questions regarding this should be posted here. Any issues should be created here: https://github.com/flathub/cc.arduino.IDE2/issues/ TLDR: - Check to ensure your issue hasn't been reported at: https://github.com/flathub/cc.arduino.IDE2/issues/ - Report the issue at: https://github.com/flathub/cc.arduino.IDE2/issues/new
1.0
READ FIRST: NOTICE ABOUT ISSUES - The Flathub release is an 3rd party wrapper maintained by the community and is not an officially supported method of installing the IDE. This does **not** mean that I (the current maintainer) and the Arduino Dev's are not interested in your issues. If you experience **any** issues with the IDE please report them here first so that I can determine if this is a flatpak issue or an IDE issue and pass it onto the Arduino Devs. Alternatively you can download an officially supported version of the IDE at https://www.arduino.cc/en/software and test to see if the issue is a flatpak issue yourself or if it truly is an IDE issue. If your issue is a genuine IDE issue then please report it at: https://github.com/arduino/arduino-ide/issues/ If your issue is a flatpak specific issue please report it at: https://github.com/flathub/cc.arduino.IDE2/issues/ Why is it like this? Well to keep it simple for everyone. With the flathub release being an unofficial wrapper there is no official support. To ensure that the best support and experience is given having all IDE issues in regards to the flathub release dealt with here first means that the dev teams don't have to deal with issues that were caused by this release. Furthermore, by having all issues (related to the flathub release) here I don't have to search through the IDE's issues to find misplaced issues meaning that i can respond to your issues much quicker. Any questions regarding this should be posted here. Any issues should be created here: https://github.com/flathub/cc.arduino.IDE2/issues/ TLDR: - Check to ensure your issue hasn't been reported at: https://github.com/flathub/cc.arduino.IDE2/issues/ - Report the issue at: https://github.com/flathub/cc.arduino.IDE2/issues/new
non_design
read first notice about issues the flathub release is an party wrapper maintained by the community and is not an officially supported method of installing the ide this does not mean that i the current maintainer and the arduino dev s are not interested in your issues if you experience any issues with the ide please report them here first so that i can determine if this is a flatpak issue or an ide issue and pass it onto the arduino devs alternatively you can download an officially supported version of the ide at and test to see if the issue is a flatpak issue yourself or if it truly is an ide issue if your issue is a genuine ide issue then please report it at if your issue is a flatpak specific issue please report it at why is it like this well to keep it simple for everyone with the flathub release being an unofficial wrapper there is no official support to ensure that the best support and experience is given having all ide issues in regards to the flathub release dealt with here first means that the dev teams don t have to deal with issues that were caused by this release furthermore by having all issues related to the flathub release here i don t have to search through the ide s issues to find misplaced issues meaning that i can respond to your issues much quicker any questions regarding this should be posted here any issues should be created here tldr check to ensure your issue hasn t been reported at report the issue at
0
49,255
13,186,549,484
IssuesEvent
2020-08-13 00:31:35
icecube-trac/tix3
https://api.github.com/repos/icecube-trac/tix3
opened
[simprod-scripts] GenerateAtmosphericNeutrinos bug (Trac #1050)
Incomplete Migration Migrated from Trac combo simulation defect
<details> <summary><em>Migrated from <a href="https://code.icecube.wisc.edu/ticket/1050">https://code.icecube.wisc.edu/ticket/1050</a>, reported by david.schultz and owned by olivas</em></summary> <p> ```json { "status": "closed", "changetime": "2016-03-18T21:14:03", "description": "The error:\n\n{{{\n File \"/data/user/edvorak/metaprojects/icesim/TRUNK_7_13_15/build/lib/icecube/simprod/segments/GenerateNeutrinos.py\", line 305, in GenerateAtmosphericNeutrinos\n propagators[k] = base_propagators[k]\nTypeError: Invalid index type\n}}}\n\nhttp://code.icecube.wisc.edu/projects/icecube/browser/IceCube/projects/simprod-scripts/trunk/python/segments/GenerateNeutrinos.py#L298\n\nget_propagators() returns a C++ map, which doesn't support the full dict syntax apparently?\n\n{{{\nfor k in base_propagators:\n propagators[k] = base_propagators[k]\n}}}\n\n`k` is apparently not what you think it is. I'm guessing using `.keys()` might solve this, but not sure.\n", "reporter": "david.schultz", "cc": "david.schultz, juancarlos", "resolution": "fixed", "_ts": "1458335643235016", "component": "combo simulation", "summary": "[simprod-scripts] GenerateAtmosphericNeutrinos bug", "priority": "critical", "keywords": "", "time": "2015-07-14T20:12:12", "milestone": "", "owner": "olivas", "type": "defect" } ``` </p> </details>
1.0
[simprod-scripts] GenerateAtmosphericNeutrinos bug (Trac #1050) - <details> <summary><em>Migrated from <a href="https://code.icecube.wisc.edu/ticket/1050">https://code.icecube.wisc.edu/ticket/1050</a>, reported by david.schultz and owned by olivas</em></summary> <p> ```json { "status": "closed", "changetime": "2016-03-18T21:14:03", "description": "The error:\n\n{{{\n File \"/data/user/edvorak/metaprojects/icesim/TRUNK_7_13_15/build/lib/icecube/simprod/segments/GenerateNeutrinos.py\", line 305, in GenerateAtmosphericNeutrinos\n propagators[k] = base_propagators[k]\nTypeError: Invalid index type\n}}}\n\nhttp://code.icecube.wisc.edu/projects/icecube/browser/IceCube/projects/simprod-scripts/trunk/python/segments/GenerateNeutrinos.py#L298\n\nget_propagators() returns a C++ map, which doesn't support the full dict syntax apparently?\n\n{{{\nfor k in base_propagators:\n propagators[k] = base_propagators[k]\n}}}\n\n`k` is apparently not what you think it is. I'm guessing using `.keys()` might solve this, but not sure.\n", "reporter": "david.schultz", "cc": "david.schultz, juancarlos", "resolution": "fixed", "_ts": "1458335643235016", "component": "combo simulation", "summary": "[simprod-scripts] GenerateAtmosphericNeutrinos bug", "priority": "critical", "keywords": "", "time": "2015-07-14T20:12:12", "milestone": "", "owner": "olivas", "type": "defect" } ``` </p> </details>
non_design
generateatmosphericneutrinos bug trac migrated from json status closed changetime description the error n n n file data user edvorak metaprojects icesim trunk build lib icecube simprod segments generateneutrinos py line in generateatmosphericneutrinos n propagators base propagators ntypeerror invalid index type n n n returns a c map which doesn t support the full dict syntax apparently n n nfor k in base propagators n propagators base propagators n n n k is apparently not what you think it is i m guessing using keys might solve this but not sure n reporter david schultz cc david schultz juancarlos resolution fixed ts component combo simulation summary generateatmosphericneutrinos bug priority critical keywords time milestone owner olivas type defect
0
28,147
5,200,163,050
IssuesEvent
2017-01-23 22:56:51
jccastillo0007/eFacturaT
https://api.github.com/repos/jccastillo0007/eFacturaT
opened
Optibelt - el PDF en web está incompleto, ya que no muestra datos extra a nivel pro.
bug defect
Hay que arreglarlo
1.0
Optibelt - el PDF en web está incompleto, ya que no muestra datos extra a nivel pro. - Hay que arreglarlo
non_design
optibelt el pdf en web está incompleto ya que no muestra datos extra a nivel pro hay que arreglarlo
0
74,533
9,084,289,072
IssuesEvent
2019-02-18 02:47:51
TNRIS/data.tnris.org
https://api.github.com/repos/TNRIS/data.tnris.org
closed
archer/jack Image Remake Test
Design Ideas
Could we test the two images I've adapted to 16:9 for Archer Jack Counties Lidar? They are on the vault under the data.tnris.org folder. ID for the collection is cd8246cf-99fa-4504-b178-8c6ddecc1c02
1.0
archer/jack Image Remake Test - Could we test the two images I've adapted to 16:9 for Archer Jack Counties Lidar? They are on the vault under the data.tnris.org folder. ID for the collection is cd8246cf-99fa-4504-b178-8c6ddecc1c02
design
archer jack image remake test could we test the two images i ve adapted to for archer jack counties lidar they are on the vault under the data tnris org folder id for the collection is
1
321,897
23,877,373,449
IssuesEvent
2022-09-07 20:29:19
DisciplinasProgramacao/projeto1-grupo-1-lpm
https://api.github.com/repos/DisciplinasProgramacao/projeto1-grupo-1-lpm
closed
Cadastrar compromissos periódicos
documentation enhancement
Cadastrar compromissos periódicos. Por exemplo, cadastrar uma ida ao Pilates em 16/08/2022, e repetir a cada 7 dias por 15 vezes.
1.0
Cadastrar compromissos periódicos - Cadastrar compromissos periódicos. Por exemplo, cadastrar uma ida ao Pilates em 16/08/2022, e repetir a cada 7 dias por 15 vezes.
non_design
cadastrar compromissos periódicos cadastrar compromissos periódicos por exemplo cadastrar uma ida ao pilates em e repetir a cada dias por vezes
0
14,090
8,823,348,177
IssuesEvent
2019-01-02 13:17:44
elastic/kibana
https://api.github.com/repos/elastic/kibana
closed
[ML] Changing to time-picker Job list refresh control is not intuitive
:ml :ml-config usability
Found in 6.4.0-SNAPSHOT (pre BC1) Now that the Job List page uses the Kibana time-picker to control its refresh rate, there are usability concerns around the how the end-user will know if their data is recent. This will hit existing end-users who are accustomed to more regular refreshing and new users as the list does not update as quickly in some circumstances. It is not obvious that the rate of refresh can be adjusted or that it is now timer based. Two suggestions would help the end-user know if they are seeing recent info 1. A visual indicator showing a countdown to next refresh or time since last refresh 2. Ability to manually refresh the list without having to reload the whole page. This could be per job or all jobs. @lcawl Can we please make it clear in docs that the refresh rate of the page is controlled by the Kibana time picker ping @elastic/ml-ui
True
[ML] Changing to time-picker Job list refresh control is not intuitive - Found in 6.4.0-SNAPSHOT (pre BC1) Now that the Job List page uses the Kibana time-picker to control its refresh rate, there are usability concerns around the how the end-user will know if their data is recent. This will hit existing end-users who are accustomed to more regular refreshing and new users as the list does not update as quickly in some circumstances. It is not obvious that the rate of refresh can be adjusted or that it is now timer based. Two suggestions would help the end-user know if they are seeing recent info 1. A visual indicator showing a countdown to next refresh or time since last refresh 2. Ability to manually refresh the list without having to reload the whole page. This could be per job or all jobs. @lcawl Can we please make it clear in docs that the refresh rate of the page is controlled by the Kibana time picker ping @elastic/ml-ui
non_design
changing to time picker job list refresh control is not intuitive found in snapshot pre now that the job list page uses the kibana time picker to control its refresh rate there are usability concerns around the how the end user will know if their data is recent this will hit existing end users who are accustomed to more regular refreshing and new users as the list does not update as quickly in some circumstances it is not obvious that the rate of refresh can be adjusted or that it is now timer based two suggestions would help the end user know if they are seeing recent info a visual indicator showing a countdown to next refresh or time since last refresh ability to manually refresh the list without having to reload the whole page this could be per job or all jobs lcawl can we please make it clear in docs that the refresh rate of the page is controlled by the kibana time picker ping elastic ml ui
0
13,536
3,152,305,792
IssuesEvent
2015-09-16 13:15:45
JMurk/OAM-Activity-Manager
https://api.github.com/repos/JMurk/OAM-Activity-Manager
closed
OAM - Remove Work Activity Look Up Activity
design low priority
We can now remove the "Work Activity Look Up" activity from the activity manager since it has been migrated into it's own application.
1.0
OAM - Remove Work Activity Look Up Activity - We can now remove the "Work Activity Look Up" activity from the activity manager since it has been migrated into it's own application.
design
oam remove work activity look up activity we can now remove the work activity look up activity from the activity manager since it has been migrated into it s own application
1
95,891
12,058,369,095
IssuesEvent
2020-04-15 17:20:20
cds-snc/notification-api
https://api.github.com/repos/cds-snc/notification-api
closed
Branding technical debt clean up phase 1
Design Dev:computer: SPIKE
**Story** When uploading branding for a service I want to be able to be able to use the french FIP just like the english one and easy to use, and to one day support different branding for different templates in a service. **What?** - Branding needs some fixing, can we make a plan on how to accomplish this without breaking stuff? Rough plan - [ ] Clean up the branding system to use the same code for every message - [ ] Clean up code and technical debt relating to preview - [ ] Make default dynamic - [ ] Allow banner heigh to be dynamic - [ ] Get us back down to one branding option, replaces FIP - [ ] Tim? **Why?** -Branding causes a lot of problems - We don't want to manage branding for users forever. - Cleaning up branding allows us to potentially make it more self serve or at the very least easier for SRE to manage
1.0
Branding technical debt clean up phase 1 - **Story** When uploading branding for a service I want to be able to be able to use the french FIP just like the english one and easy to use, and to one day support different branding for different templates in a service. **What?** - Branding needs some fixing, can we make a plan on how to accomplish this without breaking stuff? Rough plan - [ ] Clean up the branding system to use the same code for every message - [ ] Clean up code and technical debt relating to preview - [ ] Make default dynamic - [ ] Allow banner heigh to be dynamic - [ ] Get us back down to one branding option, replaces FIP - [ ] Tim? **Why?** -Branding causes a lot of problems - We don't want to manage branding for users forever. - Cleaning up branding allows us to potentially make it more self serve or at the very least easier for SRE to manage
design
branding technical debt clean up phase story when uploading branding for a service i want to be able to be able to use the french fip just like the english one and easy to use and to one day support different branding for different templates in a service what branding needs some fixing can we make a plan on how to accomplish this without breaking stuff rough plan clean up the branding system to use the same code for every message clean up code and technical debt relating to preview make default dynamic allow banner heigh to be dynamic get us back down to one branding option replaces fip tim why branding causes a lot of problems we don t want to manage branding for users forever cleaning up branding allows us to potentially make it more self serve or at the very least easier for sre to manage
1
17,529
12,414,464,726
IssuesEvent
2020-05-22 14:35:26
edgi-govdata-archiving/EEW_Planning
https://api.github.com/repos/edgi-govdata-archiving/EEW_Planning
closed
Give Casey Zoom account access
coordination infrastructure
Give Casey access to EDGI zoom account ┆Issue is synchronized with this [Trello card](https://trello.com/c/OW8RlEVC)
1.0
Give Casey Zoom account access - Give Casey access to EDGI zoom account ┆Issue is synchronized with this [Trello card](https://trello.com/c/OW8RlEVC)
non_design
give casey zoom account access give casey access to edgi zoom account ┆issue is synchronized with this
0
573,300
17,023,624,754
IssuesEvent
2021-07-03 02:59:19
tomhughes/trac-tickets
https://api.github.com/repos/tomhughes/trac-tickets
closed
[landcover] render hotel areas
Component: mapnik Priority: major Resolution: duplicate Type: enhancement
**[Submitted to the original trac issue database at 9.25pm, Friday, 20th August 2010]** http://www.openstreetmap.org/?lat=28.38634&lon=-81.50292&zoom=17&layers=M Here the hotels are not rendered as areas, while the landuse areas are. Perhaps a grayish pink (cross between residential and commercial) would be best.
1.0
[landcover] render hotel areas - **[Submitted to the original trac issue database at 9.25pm, Friday, 20th August 2010]** http://www.openstreetmap.org/?lat=28.38634&lon=-81.50292&zoom=17&layers=M Here the hotels are not rendered as areas, while the landuse areas are. Perhaps a grayish pink (cross between residential and commercial) would be best.
non_design
render hotel areas here the hotels are not rendered as areas while the landuse areas are perhaps a grayish pink cross between residential and commercial would be best
0
16,991
5,315,510,032
IssuesEvent
2017-02-13 17:29:33
devtools-html/perf.html
https://api.github.com/repos/devtools-html/perf.html
opened
Create types for units of time and dimensions.
code cleanup timeline timeline flame chart
The flame chart uses a variety of timing and dimensions units. Make this explicit with flow typing.
1.0
Create types for units of time and dimensions. - The flame chart uses a variety of timing and dimensions units. Make this explicit with flow typing.
non_design
create types for units of time and dimensions the flame chart uses a variety of timing and dimensions units make this explicit with flow typing
0
154,682
24,329,787,583
IssuesEvent
2022-09-30 18:14:31
Opentrons/opentrons
https://api.github.com/repos/Opentrons/opentrons
closed
PD Code Cleanup: Nullsy only when you really want to handle both null and undefined
refactor protocol designer
With @b-cooper - review where we use ` != null` or ` == null` in PD and make sure that it's not over-protecting for cases where values are never `undefined` and always `null` or non-nullsy, or visa-versa.
1.0
PD Code Cleanup: Nullsy only when you really want to handle both null and undefined - With @b-cooper - review where we use ` != null` or ` == null` in PD and make sure that it's not over-protecting for cases where values are never `undefined` and always `null` or non-nullsy, or visa-versa.
design
pd code cleanup nullsy only when you really want to handle both null and undefined with b cooper review where we use null or null in pd and make sure that it s not over protecting for cases where values are never undefined and always null or non nullsy or visa versa
1
96,384
12,126,278,054
IssuesEvent
2020-04-22 16:45:55
DataONEorg/dataone-web
https://api.github.com/repos/DataONEorg/dataone-web
closed
Change data illustration on bottom of homepage
design status: in progress
The "Universal access to data" section should have a different visual than the graph/chart illustration.
1.0
Change data illustration on bottom of homepage - The "Universal access to data" section should have a different visual than the graph/chart illustration.
design
change data illustration on bottom of homepage the universal access to data section should have a different visual than the graph chart illustration
1
81,712
10,168,719,523
IssuesEvent
2019-08-07 21:36:41
microsoft/vscode
https://api.github.com/repos/microsoft/vscode
closed
Bug to view File Explorer Button of side bar.
*as-designed
Issue Type: <b>Bug</b> he file explorer button is hidden when I go to any other option on the left side panel (for example search or extensions) and I can only show the panel again by pressing Ctrl + Shift + E (This only works if I have a file open) otherwise I have to close and reopen the visual code application VS Code version: Code 1.36.1 (2213894ea0415ee8c85c5eea0d0ff81ecc191529, 2019-07-08T22:55:08.091Z) OS version: Linux x64 4.15.0-56-generic <details> <summary>System Info</summary> |Item|Value| |---|---| |CPUs|Intel(R) Core(TM) i5-8250U CPU @ 1.60GHz (8 x 2965)| |GPU Status|2d_canvas: enabled<br>flash_3d: enabled<br>flash_stage3d: enabled<br>flash_stage3d_baseline: enabled<br>gpu_compositing: enabled<br>multiple_raster_threads: enabled_on<br>native_gpu_memory_buffers: disabled_software<br>oop_rasterization: disabled_off<br>protected_video_decode: unavailable_off<br>rasterization: disabled_software<br>skia_deferred_display_list: disabled_off<br>skia_renderer: disabled_off<br>surface_synchronization: enabled_on<br>video_decode: unavailable_off<br>viz_display_compositor: disabled_off<br>webgl: enabled<br>webgl2: enabled| |Load (avg)|1, 1, 1| |Memory (System)|11.08GB (4.47GB free)| |Process Argv|--unity-launch| |Screen Reader|no| |VM|0%| </details> <!-- generated by issue reporter -->
1.0
Bug to view File Explorer Button of side bar. - Issue Type: <b>Bug</b> he file explorer button is hidden when I go to any other option on the left side panel (for example search or extensions) and I can only show the panel again by pressing Ctrl + Shift + E (This only works if I have a file open) otherwise I have to close and reopen the visual code application VS Code version: Code 1.36.1 (2213894ea0415ee8c85c5eea0d0ff81ecc191529, 2019-07-08T22:55:08.091Z) OS version: Linux x64 4.15.0-56-generic <details> <summary>System Info</summary> |Item|Value| |---|---| |CPUs|Intel(R) Core(TM) i5-8250U CPU @ 1.60GHz (8 x 2965)| |GPU Status|2d_canvas: enabled<br>flash_3d: enabled<br>flash_stage3d: enabled<br>flash_stage3d_baseline: enabled<br>gpu_compositing: enabled<br>multiple_raster_threads: enabled_on<br>native_gpu_memory_buffers: disabled_software<br>oop_rasterization: disabled_off<br>protected_video_decode: unavailable_off<br>rasterization: disabled_software<br>skia_deferred_display_list: disabled_off<br>skia_renderer: disabled_off<br>surface_synchronization: enabled_on<br>video_decode: unavailable_off<br>viz_display_compositor: disabled_off<br>webgl: enabled<br>webgl2: enabled| |Load (avg)|1, 1, 1| |Memory (System)|11.08GB (4.47GB free)| |Process Argv|--unity-launch| |Screen Reader|no| |VM|0%| </details> <!-- generated by issue reporter -->
design
bug to view file explorer button of side bar issue type bug he file explorer button is hidden when i go to any other option on the left side panel for example search or extensions and i can only show the panel again by pressing ctrl shift e this only works if i have a file open otherwise i have to close and reopen the visual code application vs code version code os version linux generic system info item value cpus intel r core tm cpu x gpu status canvas enabled flash enabled flash enabled flash baseline enabled gpu compositing enabled multiple raster threads enabled on native gpu memory buffers disabled software oop rasterization disabled off protected video decode unavailable off rasterization disabled software skia deferred display list disabled off skia renderer disabled off surface synchronization enabled on video decode unavailable off viz display compositor disabled off webgl enabled enabled load avg memory system free process argv unity launch screen reader no vm
1
369,756
10,917,311,207
IssuesEvent
2019-11-21 14:57:01
eclipse-emfcloud/emfcloud-modelserver
https://api.github.com/repos/eclipse-emfcloud/emfcloud-modelserver
opened
Support undo/redo API
high priority
- [ ] undo and redo commands on the `edit` endpoint - [ ] on undo, compute the inverse of the command that was undone and send that to subscribers for incremental update notification - [ ] on redo, send the redone command to subscribers - [ ] ensure that the save API tells the `CommandStack` that save was done - [ ] if undo returns to the last savepoint, notify subscribers about dirty state change (command-stack listener)
1.0
Support undo/redo API - - [ ] undo and redo commands on the `edit` endpoint - [ ] on undo, compute the inverse of the command that was undone and send that to subscribers for incremental update notification - [ ] on redo, send the redone command to subscribers - [ ] ensure that the save API tells the `CommandStack` that save was done - [ ] if undo returns to the last savepoint, notify subscribers about dirty state change (command-stack listener)
non_design
support undo redo api undo and redo commands on the edit endpoint on undo compute the inverse of the command that was undone and send that to subscribers for incremental update notification on redo send the redone command to subscribers ensure that the save api tells the commandstack that save was done if undo returns to the last savepoint notify subscribers about dirty state change command stack listener
0
23,397
3,839,465,859
IssuesEvent
2016-04-03 03:39:36
ddayguerrero/soen341
https://api.github.com/repos/ddayguerrero/soen341
closed
#33 Create descriptions of entities in the class diagram (UML)
design
From the word document: "4.2 Validity and clarity and completeness of the class descriptions for each subsystem." Work closely with @ddayguerrero who's doing issue 32.
1.0
#33 Create descriptions of entities in the class diagram (UML) - From the word document: "4.2 Validity and clarity and completeness of the class descriptions for each subsystem." Work closely with @ddayguerrero who's doing issue 32.
design
create descriptions of entities in the class diagram uml from the word document validity and clarity and completeness of the class descriptions for each subsystem work closely with ddayguerrero who s doing issue
1
60,387
12,102,190,084
IssuesEvent
2020-04-20 16:18:13
dotnet/roslyn-analyzers
https://api.github.com/repos/dotnet/roslyn-analyzers
opened
CA1062 not firing if '?.' is used on the previous line
Area-Microsoft.CodeQuality.Analyzers Bug DataFlow
#### Analyzer package [Microsoft.CodeAnalysis.FxCopAnalyzers](https://www.nuget.org/packages/Microsoft.CodeAnalysis.FxCopAnalyzers) #### Package Version v3.0.0-beta3.final (latest pre-release) #### Diagnostic ID Example: [CA1062](https://docs.microsoft.com/en-us/visualstudio/code-quality/ca1062?view=vs-2019) #### Repro steps ```csharp namespace CA1062Test { public static class Thing { public static void Fn(int[] items) { var l1 = items?.Length; // This should fire a CA1062, but it does not. var l2 = items.Length; } } } ``` #### Expected behavior CA1062 on line declaring `l2` #### Actual behavior No CA1062
1.0
CA1062 not firing if '?.' is used on the previous line - #### Analyzer package [Microsoft.CodeAnalysis.FxCopAnalyzers](https://www.nuget.org/packages/Microsoft.CodeAnalysis.FxCopAnalyzers) #### Package Version v3.0.0-beta3.final (latest pre-release) #### Diagnostic ID Example: [CA1062](https://docs.microsoft.com/en-us/visualstudio/code-quality/ca1062?view=vs-2019) #### Repro steps ```csharp namespace CA1062Test { public static class Thing { public static void Fn(int[] items) { var l1 = items?.Length; // This should fire a CA1062, but it does not. var l2 = items.Length; } } } ``` #### Expected behavior CA1062 on line declaring `l2` #### Actual behavior No CA1062
non_design
not firing if is used on the previous line analyzer package package version final latest pre release diagnostic id example repro steps csharp namespace public static class thing public static void fn int items var items length this should fire a but it does not var items length expected behavior on line declaring actual behavior no
0
25,251
3,926,381,026
IssuesEvent
2016-04-22 23:20:35
angular/angular.io
https://api.github.com/repos/angular/angular.io
closed
Changing between typescript and javascript causes flash of restyle
design love
The issue described above can be viewed here: ![flash of restylized elements](https://cloud.githubusercontent.com/assets/1329167/14111805/261ec678-f59a-11e5-846d-45e0936e9d2e.gif) The restyling is most visible on the navigation toolbar, and the language switch dropdown. This issue appears on https://angular.io/docs/ts/latest/quickstart.html, and the other pages that are accessible from the sidebar.
1.0
Changing between typescript and javascript causes flash of restyle - The issue described above can be viewed here: ![flash of restylized elements](https://cloud.githubusercontent.com/assets/1329167/14111805/261ec678-f59a-11e5-846d-45e0936e9d2e.gif) The restyling is most visible on the navigation toolbar, and the language switch dropdown. This issue appears on https://angular.io/docs/ts/latest/quickstart.html, and the other pages that are accessible from the sidebar.
design
changing between typescript and javascript causes flash of restyle the issue described above can be viewed here the restyling is most visible on the navigation toolbar and the language switch dropdown this issue appears on and the other pages that are accessible from the sidebar
1
25,151
4,229,782,287
IssuesEvent
2016-07-04 09:16:28
hazelcast/hazelcast
https://api.github.com/repos/hazelcast/hazelcast
closed
no-op multiple entry operations should update `get` and `hit` count
Team: Core Type: Defect
`AbstractMultipleEntryOperation` increments put/remove counts when entries are updated/removed but if an `EntryProcessor` does only `get` then `get`/`hit` count is not updated. Stats updated when entry added/updated; https://github.com/hazelcast/hazelcast/blob/master/hazelcast/src/main/java/com/hazelcast/map/impl/operation/AbstractMultipleEntryOperation.java#L157 Stats updated when entry removed; https://github.com/hazelcast/hazelcast/blob/master/hazelcast/src/main/java/com/hazelcast/map/impl/operation/AbstractMultipleEntryOperation.java#L146
1.0
no-op multiple entry operations should update `get` and `hit` count - `AbstractMultipleEntryOperation` increments put/remove counts when entries are updated/removed but if an `EntryProcessor` does only `get` then `get`/`hit` count is not updated. Stats updated when entry added/updated; https://github.com/hazelcast/hazelcast/blob/master/hazelcast/src/main/java/com/hazelcast/map/impl/operation/AbstractMultipleEntryOperation.java#L157 Stats updated when entry removed; https://github.com/hazelcast/hazelcast/blob/master/hazelcast/src/main/java/com/hazelcast/map/impl/operation/AbstractMultipleEntryOperation.java#L146
non_design
no op multiple entry operations should update get and hit count abstractmultipleentryoperation increments put remove counts when entries are updated removed but if an entryprocessor does only get then get hit count is not updated stats updated when entry added updated stats updated when entry removed
0
99,801
11,162,974,805
IssuesEvent
2019-12-26 20:07:42
graphql-python/graphene
https://api.github.com/repos/graphql-python/graphene
closed
Example in types/objecttypes is out of date
📖 documentation
1. namedtuple is not created correctly 2. result object is not subscriptable as result['data'] 3. result data key is incorrect (my_best_friend -> myBestFriend)
1.0
Example in types/objecttypes is out of date - 1. namedtuple is not created correctly 2. result object is not subscriptable as result['data'] 3. result data key is incorrect (my_best_friend -> myBestFriend)
non_design
example in types objecttypes is out of date namedtuple is not created correctly result object is not subscriptable as result result data key is incorrect my best friend mybestfriend
0
36,261
5,040,681,546
IssuesEvent
2016-12-19 07:05:09
tbeu/Modelica
https://api.github.com/repos/tbeu/Modelica
closed
Simulation of ModelicaTest.Fluid.TestComponents.Pipes.DynamicPipeWithNominalLaminarFlow fails1
bug ModelicaTest
**Reported by otter on 16 Oct 2010 22:25 UTC** Simulation of ``` ModelicaTest.Fluid.TestComponents.Pipes.DynamicPipeWithNominalLaminarFlow ``` fails with the assert (which is present in the text layer of the model): ``` abs(pipeN10.mediums[1].p-pipeN10nParallel10.mediums[1].p) < 1 The following error was detected at time: 0 !!!Incorrect pressure for nParallel>1!!! Error: Failed to start model. ``` There are 3 dynamic pipes with 10,20,10 nodes that are just attached to boundary conditions. All are initialized in steady-state. If the "assert" is removed, initialization also fails, since the nonlinear solver does not converge. From the 3 circuits, the first (pipeN10) initializes in steady-state (if the others are removed). The second one (pipeN20) fails as well as the third one (pipeN10nParallel10) Migrated-From: https://trac.modelica.org/Modelica/ticket/437
1.0
Simulation of ModelicaTest.Fluid.TestComponents.Pipes.DynamicPipeWithNominalLaminarFlow fails1 - **Reported by otter on 16 Oct 2010 22:25 UTC** Simulation of ``` ModelicaTest.Fluid.TestComponents.Pipes.DynamicPipeWithNominalLaminarFlow ``` fails with the assert (which is present in the text layer of the model): ``` abs(pipeN10.mediums[1].p-pipeN10nParallel10.mediums[1].p) < 1 The following error was detected at time: 0 !!!Incorrect pressure for nParallel>1!!! Error: Failed to start model. ``` There are 3 dynamic pipes with 10,20,10 nodes that are just attached to boundary conditions. All are initialized in steady-state. If the "assert" is removed, initialization also fails, since the nonlinear solver does not converge. From the 3 circuits, the first (pipeN10) initializes in steady-state (if the others are removed). The second one (pipeN20) fails as well as the third one (pipeN10nParallel10) Migrated-From: https://trac.modelica.org/Modelica/ticket/437
non_design
simulation of modelicatest fluid testcomponents pipes dynamicpipewithnominallaminarflow reported by otter on oct utc simulation of modelicatest fluid testcomponents pipes dynamicpipewithnominallaminarflow fails with the assert which is present in the text layer of the model abs mediums p mediums p the following error was detected at time incorrect pressure for nparallel error failed to start model there are dynamic pipes with nodes that are just attached to boundary conditions all are initialized in steady state if the assert is removed initialization also fails since the nonlinear solver does not converge from the circuits the first initializes in steady state if the others are removed the second one fails as well as the third one migrated from
0
26,561
12,425,317,577
IssuesEvent
2020-05-24 15:47:58
openshift/odo
https://api.github.com/repos/openshift/odo
closed
parameters in services are not stored as secret
area/service kind/feature lifecycle/rotten
[kind/Enhancement] <!-- Welcome! - We kindly ask you to: 1. Fill out the issue template below 2. Use the Google group if you have a question rather than a bug or feature request. The group is at: https://groups.google.com/forum/#!forum/odo-users Thanks for understanding, and for contributing to the project! --> ## Which functionality do you think we should update/improve? when a `postgres` service is created from the webconsole then the environment variables are reference of secret ``` $ oc set env po/postgresql-1-kth7q --list # pods/postgresql-1-kth7q, container postgresql # POSTGRESQL_USER from secret postgresql, key database-user # POSTGRESQL_PASSWORD from secret postgresql, key database-password # POSTGRESQL_DATABASE from secret postgresql, key database-name ``` but when the same service is created using odo cli the environment variable are shown in plain text ``` $ oc set env po/postgresql-a33a18a0-c5ac-11e9-bcbd-0242ac110009-1-2fvtc --list # pods/postgresql-a33a18a0-c5ac-11e9-bcbd-0242ac110009-1-2fvtc, container postgresql POSTGRESQL_PASSWORD=changeme POSTGRESQL_USER=admin POSTGRESQL_DATABASE=admin ``` ## Why is this needed? Could be a security aspect we should consider
1.0
parameters in services are not stored as secret - [kind/Enhancement] <!-- Welcome! - We kindly ask you to: 1. Fill out the issue template below 2. Use the Google group if you have a question rather than a bug or feature request. The group is at: https://groups.google.com/forum/#!forum/odo-users Thanks for understanding, and for contributing to the project! --> ## Which functionality do you think we should update/improve? when a `postgres` service is created from the webconsole then the environment variables are reference of secret ``` $ oc set env po/postgresql-1-kth7q --list # pods/postgresql-1-kth7q, container postgresql # POSTGRESQL_USER from secret postgresql, key database-user # POSTGRESQL_PASSWORD from secret postgresql, key database-password # POSTGRESQL_DATABASE from secret postgresql, key database-name ``` but when the same service is created using odo cli the environment variable are shown in plain text ``` $ oc set env po/postgresql-a33a18a0-c5ac-11e9-bcbd-0242ac110009-1-2fvtc --list # pods/postgresql-a33a18a0-c5ac-11e9-bcbd-0242ac110009-1-2fvtc, container postgresql POSTGRESQL_PASSWORD=changeme POSTGRESQL_USER=admin POSTGRESQL_DATABASE=admin ``` ## Why is this needed? Could be a security aspect we should consider
non_design
parameters in services are not stored as secret welcome we kindly ask you to fill out the issue template below use the google group if you have a question rather than a bug or feature request the group is at thanks for understanding and for contributing to the project which functionality do you think we should update improve when a postgres service is created from the webconsole then the environment variables are reference of secret oc set env po postgresql list pods postgresql container postgresql postgresql user from secret postgresql key database user postgresql password from secret postgresql key database password postgresql database from secret postgresql key database name but when the same service is created using odo cli the environment variable are shown in plain text oc set env po postgresql bcbd list pods postgresql bcbd container postgresql postgresql password changeme postgresql user admin postgresql database admin why is this needed could be a security aspect we should consider
0
305,070
23,097,020,318
IssuesEvent
2022-07-26 20:40:06
build-trust/ockam
https://api.github.com/repos/build-trust/ockam
closed
Links used in PR templates are missing from the website
Type: Documentation
The contributor guides we link to in our [Pull Request template](https://github.com/build-trust/ockam/blob/develop/.github/PULL_REQUEST_TEMPLATE.md) re-direct to our homepage on the new website: * https://www.ockam.io/learn/how-to-guides/high-performance-team/conduct/ * https://www.ockam.io/learn/how-to-guides/contributing/CONTRIBUTING * https://www.ockam.io/learn/how-to-guides/contributing/cla/
1.0
Links used in PR templates are missing from the website - The contributor guides we link to in our [Pull Request template](https://github.com/build-trust/ockam/blob/develop/.github/PULL_REQUEST_TEMPLATE.md) re-direct to our homepage on the new website: * https://www.ockam.io/learn/how-to-guides/high-performance-team/conduct/ * https://www.ockam.io/learn/how-to-guides/contributing/CONTRIBUTING * https://www.ockam.io/learn/how-to-guides/contributing/cla/
non_design
links used in pr templates are missing from the website the contributor guides we link to in our re direct to our homepage on the new website
0
15,679
2,868,983,276
IssuesEvent
2015-06-05 22:22:10
dart-lang/sdk
https://api.github.com/repos/dart-lang/sdk
closed
Validate the SDK constraint when checking if the lockfile is up-to-date
Area-Pub Priority-Unassigned Triaged Type-Defect
Currently, if &quot;pub get&quot; is run with one version of the SDK and then later the SDK upgrades to a version that's no longer valid, future &quot;pub get&quot;s won't necessarily validate the SDK constraint. One possible solution would be to save the intersection of all SDK constraints to the lockfile and check the current version against that.
1.0
Validate the SDK constraint when checking if the lockfile is up-to-date - Currently, if &quot;pub get&quot; is run with one version of the SDK and then later the SDK upgrades to a version that's no longer valid, future &quot;pub get&quot;s won't necessarily validate the SDK constraint. One possible solution would be to save the intersection of all SDK constraints to the lockfile and check the current version against that.
non_design
validate the sdk constraint when checking if the lockfile is up to date currently if quot pub get quot is run with one version of the sdk and then later the sdk upgrades to a version that s no longer valid future quot pub get quot s won t necessarily validate the sdk constraint one possible solution would be to save the intersection of all sdk constraints to the lockfile and check the current version against that
0
134,643
19,296,152,443
IssuesEvent
2021-12-12 16:17:36
glennl-msft/WAF_PnP_Demo3
https://api.github.com/repos/glennl-msft/WAF_PnP_Demo3
opened
Secure your configuration information: Remove platform specific information from HTTP headers, do not expose security details in error messages,etc
Security Application Design Design
<a href="https://docs.microsoft.com/azure/architecture/framework/security/design-app-dependencies#configuration-security">Secure your configuration information: Remove platform specific information from HTTP headers, do not expose security details in error messages,etc</a>
2.0
Secure your configuration information: Remove platform specific information from HTTP headers, do not expose security details in error messages,etc - <a href="https://docs.microsoft.com/azure/architecture/framework/security/design-app-dependencies#configuration-security">Secure your configuration information: Remove platform specific information from HTTP headers, do not expose security details in error messages,etc</a>
design
secure your configuration information remove platform specific information from http headers do not expose security details in error messages etc
1
268,179
20,261,045,982
IssuesEvent
2022-02-15 07:27:48
marmelab/react-admin
https://api.github.com/repos/marmelab/react-admin
closed
DateInput parse and format does not display the value in the input
bug documentation
<!-- Please do not submit support requests or "How to" questions here. For that, - go to Stack Overflow: https://stackoverflow.com/questions/tagged/react-admin) for community support, or - use the Professional Support (https://marmelab.com/ra-enterprise/#support) if you're an Enterprise Edition subscriber. --> # What you were expecting: <!-- Describe what the behavior would be without the bug. --> **When entered manually:** - `DateInput` should work normally, shown in the docs's gif: https://marmelab.com/react-admin/Inputs.html#dateinput. **When entered via the browser's datepicker:** - `DateInput` should also reflect the selected date. # What happened instead: <!-- Describe how the bug manifests. --> **When entered manually:** - `DateInput` does not let me enter the full year (in `YYYY` format). https://user-images.githubusercontent.com/31163334/120006297-59e0a580-c00b-11eb-9823-152e52bea6c5.mov > Here, I tried to enter `02 03 2021` directly from the input field. **When entered via the browser's datepicker:** - `DateInput` shows a blank date (`mm/dd/yy`, literally) https://user-images.githubusercontent.com/31163334/120007694-c3ad7f00-c00c-11eb-9ee5-421feddd4b26.mov # Steps to reproduce: <!-- Please explain the steps required to duplicate the issue, especially if you are able to provide a sample application. --> 1. Use the example from the docs in the [Transforming Input value to and from record section](https://marmelab.com/react-admin/Inputs.html#transforming-input-value-tofrom-record) :). 2. Enter any date manually, for example, type `02 03 2021`. See that the input does not reflect what you type. 3. Or, select the date picker, select any date, and then click anything to remove the focus. See that the input becomes `mm/dd/yy` literally. # Related code: ```tsx <DateInput label="Start from" source="startFrom" defaultValue={new Date()} format={dateFormatter} parse={dateParser} /> ``` where `dateParser` and `dateFormatter` is the following (straight copy-paste from the [docs](https://marmelab.com/react-admin/Inputs.html#transforming-input-value-tofrom-record)): ```ts const dateFormatter = (v) => { // v is a `Date` object if (!(v instanceof Date) || Number.isNaN(v)) return; const pad = "00"; const yy = v.getFullYear().toString(); const mm = (v.getMonth() + 1).toString(); const dd = v.getDate().toString(); return `${yy}-${(pad + mm).slice(-2)}-${(pad + dd).slice(-2)}`; }; const dateParser = (v) => { // v is a string of "YYYY-MM-DD" format const match = /(\d{4})-(\d{2})-(\d{2})/.exec(v); if (match === null) return; const d = new Date( match[1], parseInt(match[2], 10) - 1, match[3] ); if (Number.isNaN(d)) return; return d; }; ``` # Other information: Looks like a regression in the version `3.15.2`. Visual bug because the form validation (`required()`) works just fine. # Environment * React-admin version: 3.15.2 * Last version that did not exhibit the issue (if applicable): 3.14.2 works * React version: 16.13.1 * Browser: Microsoft Edge * Stack trace (in case of a JS error):
1.0
DateInput parse and format does not display the value in the input - <!-- Please do not submit support requests or "How to" questions here. For that, - go to Stack Overflow: https://stackoverflow.com/questions/tagged/react-admin) for community support, or - use the Professional Support (https://marmelab.com/ra-enterprise/#support) if you're an Enterprise Edition subscriber. --> # What you were expecting: <!-- Describe what the behavior would be without the bug. --> **When entered manually:** - `DateInput` should work normally, shown in the docs's gif: https://marmelab.com/react-admin/Inputs.html#dateinput. **When entered via the browser's datepicker:** - `DateInput` should also reflect the selected date. # What happened instead: <!-- Describe how the bug manifests. --> **When entered manually:** - `DateInput` does not let me enter the full year (in `YYYY` format). https://user-images.githubusercontent.com/31163334/120006297-59e0a580-c00b-11eb-9823-152e52bea6c5.mov > Here, I tried to enter `02 03 2021` directly from the input field. **When entered via the browser's datepicker:** - `DateInput` shows a blank date (`mm/dd/yy`, literally) https://user-images.githubusercontent.com/31163334/120007694-c3ad7f00-c00c-11eb-9ee5-421feddd4b26.mov # Steps to reproduce: <!-- Please explain the steps required to duplicate the issue, especially if you are able to provide a sample application. --> 1. Use the example from the docs in the [Transforming Input value to and from record section](https://marmelab.com/react-admin/Inputs.html#transforming-input-value-tofrom-record) :). 2. Enter any date manually, for example, type `02 03 2021`. See that the input does not reflect what you type. 3. Or, select the date picker, select any date, and then click anything to remove the focus. See that the input becomes `mm/dd/yy` literally. # Related code: ```tsx <DateInput label="Start from" source="startFrom" defaultValue={new Date()} format={dateFormatter} parse={dateParser} /> ``` where `dateParser` and `dateFormatter` is the following (straight copy-paste from the [docs](https://marmelab.com/react-admin/Inputs.html#transforming-input-value-tofrom-record)): ```ts const dateFormatter = (v) => { // v is a `Date` object if (!(v instanceof Date) || Number.isNaN(v)) return; const pad = "00"; const yy = v.getFullYear().toString(); const mm = (v.getMonth() + 1).toString(); const dd = v.getDate().toString(); return `${yy}-${(pad + mm).slice(-2)}-${(pad + dd).slice(-2)}`; }; const dateParser = (v) => { // v is a string of "YYYY-MM-DD" format const match = /(\d{4})-(\d{2})-(\d{2})/.exec(v); if (match === null) return; const d = new Date( match[1], parseInt(match[2], 10) - 1, match[3] ); if (Number.isNaN(d)) return; return d; }; ``` # Other information: Looks like a regression in the version `3.15.2`. Visual bug because the form validation (`required()`) works just fine. # Environment * React-admin version: 3.15.2 * Last version that did not exhibit the issue (if applicable): 3.14.2 works * React version: 16.13.1 * Browser: Microsoft Edge * Stack trace (in case of a JS error):
non_design
dateinput parse and format does not display the value in the input please do not submit support requests or how to questions here for that go to stack overflow for community support or use the professional support if you re an enterprise edition subscriber what you were expecting when entered manually dateinput should work normally shown in the docs s gif when entered via the browser s datepicker dateinput should also reflect the selected date what happened instead when entered manually dateinput does not let me enter the full year in yyyy format here i tried to enter directly from the input field when entered via the browser s datepicker dateinput shows a blank date mm dd yy literally steps to reproduce use the example from the docs in the enter any date manually for example type see that the input does not reflect what you type or select the date picker select any date and then click anything to remove the focus see that the input becomes mm dd yy literally related code tsx dateinput label start from source startfrom defaultvalue new date format dateformatter parse dateparser where dateparser and dateformatter is the following straight copy paste from the ts const dateformatter v v is a date object if v instanceof date number isnan v return const pad const yy v getfullyear tostring const mm v getmonth tostring const dd v getdate tostring return yy pad mm slice pad dd slice const dateparser v v is a string of yyyy mm dd format const match d d d exec v if match null return const d new date match parseint match match if number isnan d return return d other information looks like a regression in the version visual bug because the form validation required works just fine environment react admin version last version that did not exhibit the issue if applicable works react version browser microsoft edge stack trace in case of a js error
0
127,196
5,025,830,002
IssuesEvent
2016-12-15 10:29:17
9705395/Examen
https://api.github.com/repos/9705395/Examen
closed
Toevoegen cursussen
high-priority
### Huidige situatie Alleen de cursussen van dit jaar zijn vermeld. ### Nieuwe situatie Ook de cursussen voor nieuwere jaren moeten toegevoegd worden. ### Reden wijziging Nieuw cursusjaar [Nieuw Cursusjaar.csv.zip](https://github.com/9705395/Examen/files/654267/Nieuw.Cursusjaar.csv.zip)
1.0
Toevoegen cursussen - ### Huidige situatie Alleen de cursussen van dit jaar zijn vermeld. ### Nieuwe situatie Ook de cursussen voor nieuwere jaren moeten toegevoegd worden. ### Reden wijziging Nieuw cursusjaar [Nieuw Cursusjaar.csv.zip](https://github.com/9705395/Examen/files/654267/Nieuw.Cursusjaar.csv.zip)
non_design
toevoegen cursussen huidige situatie alleen de cursussen van dit jaar zijn vermeld nieuwe situatie ook de cursussen voor nieuwere jaren moeten toegevoegd worden reden wijziging nieuw cursusjaar
0
451,137
32,009,574,506
IssuesEvent
2023-09-21 17:01:28
rooch-network/rooch
https://api.github.com/repos/rooch-network/rooch
closed
Considering adding brew formula for downloading Rooch binary directly?
documentation devops
Should we consider adding a brew formula for downloading the Rooch binary directly?
1.0
Considering adding brew formula for downloading Rooch binary directly? - Should we consider adding a brew formula for downloading the Rooch binary directly?
non_design
considering adding brew formula for downloading rooch binary directly should we consider adding a brew formula for downloading the rooch binary directly
0
407,780
11,937,310,750
IssuesEvent
2020-04-02 11:57:28
metabase/metabase
https://api.github.com/repos/metabase/metabase
closed
Zooming-in yields fks->join-information does not match schema
.Need More Info Priority:P3 Querying/GUI Type:Bug
Getting a Output of fks->join-information does not match schema:  [nil nil {:pk-field-id (not (integer? nil))}]  When zooming-in on the value of an aggregated cell using a query built by Metabase. What additional information can I contribute to help reproduce this issue?
1.0
Zooming-in yields fks->join-information does not match schema - Getting a Output of fks->join-information does not match schema:  [nil nil {:pk-field-id (not (integer? nil))}]  When zooming-in on the value of an aggregated cell using a query built by Metabase. What additional information can I contribute to help reproduce this issue?
non_design
zooming in yields fks join information does not match schema getting a output of fks join information does not match schema   when zooming in on the value of an aggregated cell using a query built by metabase what additional information can i contribute to help reproduce this issue
0
12,649
5,222,561,135
IssuesEvent
2017-01-27 08:53:15
JimBobSquarePants/ImageSharp
https://api.github.com/repos/JimBobSquarePants/ImageSharp
closed
Could not load signature of ImageSharp.Image`1[TColor]:To due to: Could not load file or assembly or one of its dependencies.
area:build help needed
Hello! Awesome project you have here! Can't wait to have a first release :) I'm on OSX, and I'm using MonoDevelop on a project compiled against Mono / .NET 4.5. I downloaded every DLL (in the net45 folder) from the pre-releases here https://www.myget.org/gallery/imagesharp except the ImageSharp.Drawing which I won't use. Everything compiles but when I try to call a method I got this error message: "Could not load signature of ImageSharp.Image`1[TColor]:To due to: Could not load file or assembly or one of its dependencies." Any idea of what could be causing this? Thanks!
1.0
Could not load signature of ImageSharp.Image`1[TColor]:To due to: Could not load file or assembly or one of its dependencies. - Hello! Awesome project you have here! Can't wait to have a first release :) I'm on OSX, and I'm using MonoDevelop on a project compiled against Mono / .NET 4.5. I downloaded every DLL (in the net45 folder) from the pre-releases here https://www.myget.org/gallery/imagesharp except the ImageSharp.Drawing which I won't use. Everything compiles but when I try to call a method I got this error message: "Could not load signature of ImageSharp.Image`1[TColor]:To due to: Could not load file or assembly or one of its dependencies." Any idea of what could be causing this? Thanks!
non_design
could not load signature of imagesharp image to due to could not load file or assembly or one of its dependencies hello awesome project you have here can t wait to have a first release i m on osx and i m using monodevelop on a project compiled against mono net i downloaded every dll in the folder from the pre releases here except the imagesharp drawing which i won t use everything compiles but when i try to call a method i got this error message could not load signature of imagesharp image to due to could not load file or assembly or one of its dependencies any idea of what could be causing this thanks
0
99,343
12,418,948,052
IssuesEvent
2020-05-23 02:58:43
retaildevcrews/webvalidate
https://api.github.com/repos/retaildevcrews/webvalidate
opened
Move WebV to Microsoft github
Design Review Documentation Enhancement WebV
## Description: - To increase visibility and sharing of WebV, move the repo to github/Microsoft ## Tasks - Remove most of the helium specific tests from webv so that it is more general purpose - Add tests against a public API - Come up with a strategy for using WebV in Helium - Could move the test files to each language repo and use the -v option - Could fork the repo and sync when code changes are made - this works well when you add files to the fork, but is a nightmare if you change any shared files - Other?
1.0
Move WebV to Microsoft github - ## Description: - To increase visibility and sharing of WebV, move the repo to github/Microsoft ## Tasks - Remove most of the helium specific tests from webv so that it is more general purpose - Add tests against a public API - Come up with a strategy for using WebV in Helium - Could move the test files to each language repo and use the -v option - Could fork the repo and sync when code changes are made - this works well when you add files to the fork, but is a nightmare if you change any shared files - Other?
design
move webv to microsoft github description to increase visibility and sharing of webv move the repo to github microsoft tasks remove most of the helium specific tests from webv so that it is more general purpose add tests against a public api come up with a strategy for using webv in helium could move the test files to each language repo and use the v option could fork the repo and sync when code changes are made this works well when you add files to the fork but is a nightmare if you change any shared files other
1
35,162
4,631,296,287
IssuesEvent
2016-09-28 15:06:40
xiaohanyu/org-site
https://api.github.com/repos/xiaohanyu/org-site
closed
Theme and design refinement
design enhancement
Design ---------- Current theme still has lots flaws and bugs, which may need some refinement and redesign. For example, the TOC anchor doesn't locate to the right section due to css margin. Implementation ---------- Pluskid's blog is really a good design using bootstrap, see http://freemind.pluskid.org/, I'll import some elements from it.
1.0
Theme and design refinement - Design ---------- Current theme still has lots flaws and bugs, which may need some refinement and redesign. For example, the TOC anchor doesn't locate to the right section due to css margin. Implementation ---------- Pluskid's blog is really a good design using bootstrap, see http://freemind.pluskid.org/, I'll import some elements from it.
design
theme and design refinement design current theme still has lots flaws and bugs which may need some refinement and redesign for example the toc anchor doesn t locate to the right section due to css margin implementation pluskid s blog is really a good design using bootstrap see i ll import some elements from it
1
770,791
27,056,843,859
IssuesEvent
2023-02-13 16:43:41
matrixorigin/matrixone
https://api.github.com/repos/matrixorigin/matrixone
closed
[Feature Request]: Examination points for distributed cluster of MO
priority/p0 kind/feature source/on-demand component/distributed tae
### Is there an existing issue for the same feature request? - [X] I have checked the existing issues. ### Is your feature request related to a problem? _No response_ ### Describe the feature you'd like In 0.6.0, MO will provide these features as following in distributed level: - [ ] #3685 - [ ] #3728 - [ ] #3729 - [ ] #3727 - [ ] #3730 - [x] #3115 - [x] #3116 - [x] #3940 This issue will be broken down into several more sub-feature issues: #3685 #3727 #3728 #3729 #3730 #3115 #3116 #3527 #2716 #2759 #2757 #2758 #3516 #3505 #3528 #3790 ### Describe implementation you've considered _No response_ ### Documentation, Adoption, Use Case, Migration Strategy _No response_ ### Additional information _No response_
1.0
[Feature Request]: Examination points for distributed cluster of MO - ### Is there an existing issue for the same feature request? - [X] I have checked the existing issues. ### Is your feature request related to a problem? _No response_ ### Describe the feature you'd like In 0.6.0, MO will provide these features as following in distributed level: - [ ] #3685 - [ ] #3728 - [ ] #3729 - [ ] #3727 - [ ] #3730 - [x] #3115 - [x] #3116 - [x] #3940 This issue will be broken down into several more sub-feature issues: #3685 #3727 #3728 #3729 #3730 #3115 #3116 #3527 #2716 #2759 #2757 #2758 #3516 #3505 #3528 #3790 ### Describe implementation you've considered _No response_ ### Documentation, Adoption, Use Case, Migration Strategy _No response_ ### Additional information _No response_
non_design
examination points for distributed cluster of mo is there an existing issue for the same feature request i have checked the existing issues is your feature request related to a problem no response describe the feature you d like in mo will provide these features as following in distributed level this issue will be broken down into several more sub feature issues describe implementation you ve considered no response documentation adoption use case migration strategy no response additional information no response
0
91,548
15,856,524,207
IssuesEvent
2021-04-08 02:32:44
rammatzkvosky/cwa-website
https://api.github.com/repos/rammatzkvosky/cwa-website
opened
CVE-2020-7733 (High) detected in ua-parser-js-0.7.17.tgz
security vulnerability
## CVE-2020-7733 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>ua-parser-js-0.7.17.tgz</b></p></summary> <p>Lightweight JavaScript-based user-agent string parser</p> <p>Library home page: <a href="https://registry.npmjs.org/ua-parser-js/-/ua-parser-js-0.7.17.tgz">https://registry.npmjs.org/ua-parser-js/-/ua-parser-js-0.7.17.tgz</a></p> <p>Path to dependency file: cwa-website/package.json</p> <p>Path to vulnerable library: cwa-website/node_modules/ua-parser-js/package.json</p> <p> Dependency Hierarchy: - browser-sync-2.26.7.tgz (Root Library) - :x: **ua-parser-js-0.7.17.tgz** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The package ua-parser-js before 0.7.22 are vulnerable to Regular Expression Denial of Service (ReDoS) via the regex for Redmi Phones and Mi Pad Tablets UA. <p>Publish Date: 2020-09-16 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7733>CVE-2020-7733</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7733">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7733</a></p> <p>Release Date: 2020-07-21</p> <p>Fix Resolution: 0.7.22</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"ua-parser-js","packageVersion":"0.7.17","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"browser-sync:2.26.7;ua-parser-js:0.7.17","isMinimumFixVersionAvailable":true,"minimumFixVersion":"0.7.22"}],"baseBranches":[],"vulnerabilityIdentifier":"CVE-2020-7733","vulnerabilityDetails":"The package ua-parser-js before 0.7.22 are vulnerable to Regular Expression Denial of Service (ReDoS) via the regex for Redmi Phones and Mi Pad Tablets UA.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7733","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> -->
True
CVE-2020-7733 (High) detected in ua-parser-js-0.7.17.tgz - ## CVE-2020-7733 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>ua-parser-js-0.7.17.tgz</b></p></summary> <p>Lightweight JavaScript-based user-agent string parser</p> <p>Library home page: <a href="https://registry.npmjs.org/ua-parser-js/-/ua-parser-js-0.7.17.tgz">https://registry.npmjs.org/ua-parser-js/-/ua-parser-js-0.7.17.tgz</a></p> <p>Path to dependency file: cwa-website/package.json</p> <p>Path to vulnerable library: cwa-website/node_modules/ua-parser-js/package.json</p> <p> Dependency Hierarchy: - browser-sync-2.26.7.tgz (Root Library) - :x: **ua-parser-js-0.7.17.tgz** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The package ua-parser-js before 0.7.22 are vulnerable to Regular Expression Denial of Service (ReDoS) via the regex for Redmi Phones and Mi Pad Tablets UA. <p>Publish Date: 2020-09-16 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7733>CVE-2020-7733</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7733">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7733</a></p> <p>Release Date: 2020-07-21</p> <p>Fix Resolution: 0.7.22</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"ua-parser-js","packageVersion":"0.7.17","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"browser-sync:2.26.7;ua-parser-js:0.7.17","isMinimumFixVersionAvailable":true,"minimumFixVersion":"0.7.22"}],"baseBranches":[],"vulnerabilityIdentifier":"CVE-2020-7733","vulnerabilityDetails":"The package ua-parser-js before 0.7.22 are vulnerable to Regular Expression Denial of Service (ReDoS) via the regex for Redmi Phones and Mi Pad Tablets UA.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7733","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> -->
non_design
cve high detected in ua parser js tgz cve high severity vulnerability vulnerable library ua parser js tgz lightweight javascript based user agent string parser library home page a href path to dependency file cwa website package json path to vulnerable library cwa website node modules ua parser js package json dependency hierarchy browser sync tgz root library x ua parser js tgz vulnerable library vulnerability details the package ua parser js before are vulnerable to regular expression denial of service redos via the regex for redmi phones and mi pad tablets ua publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree browser sync ua parser js isminimumfixversionavailable true minimumfixversion basebranches vulnerabilityidentifier cve vulnerabilitydetails the package ua parser js before are vulnerable to regular expression denial of service redos via the regex for redmi phones and mi pad tablets ua vulnerabilityurl
0
94,077
11,846,930,878
IssuesEvent
2020-03-24 11:04:16
LiskHQ/lisk-desktop
https://api.github.com/repos/LiskHQ/lisk-desktop
closed
Inform user to initialize account, before registering as delegate
type: bug type: design
### Expected behavior The user should be informed, that the delegate registration fails, if the account is not initialises. ### Actual behavior It was reported that it is not possible to register as a delegate with an uninitialised account, without further information why it fails. After initialising the account, a delegate could be registered successfully. ### Steps to reproduce Create new testnet account. Send at least 25 LSK to this account. Login to Lisk Desktop with the new account and try to register a delegate. ### Which version(s) does this affect? (Environment, OS, etc...)
1.0
Inform user to initialize account, before registering as delegate - ### Expected behavior The user should be informed, that the delegate registration fails, if the account is not initialises. ### Actual behavior It was reported that it is not possible to register as a delegate with an uninitialised account, without further information why it fails. After initialising the account, a delegate could be registered successfully. ### Steps to reproduce Create new testnet account. Send at least 25 LSK to this account. Login to Lisk Desktop with the new account and try to register a delegate. ### Which version(s) does this affect? (Environment, OS, etc...)
design
inform user to initialize account before registering as delegate expected behavior the user should be informed that the delegate registration fails if the account is not initialises actual behavior it was reported that it is not possible to register as a delegate with an uninitialised account without further information why it fails after initialising the account a delegate could be registered successfully steps to reproduce create new testnet account send at least lsk to this account login to lisk desktop with the new account and try to register a delegate which version s does this affect environment os etc
1
193,981
22,261,769,311
IssuesEvent
2022-06-10 01:37:31
nanopathi/linux-4.19.72_CVE-2020-14381
https://api.github.com/repos/nanopathi/linux-4.19.72_CVE-2020-14381
reopened
CVE-2019-17666 (High) detected in linuxlinux-4.19.237
security vulnerability
## CVE-2019-17666 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linuxlinux-4.19.237</b></p></summary> <p> <p>The Linux Kernel</p> <p>Library home page: <a href=https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux>https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux</a></p> <p>Found in HEAD commit: <a href="https://github.com/nanopathi/linux-4.19.72_CVE-2020-14381/commit/10c7b674d65d46240997df9855fe104bdf05229c">10c7b674d65d46240997df9855fe104bdf05229c</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary> <p></p> <p> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow. <p>Publish Date: 2019-10-17 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-17666>CVE-2019-17666</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Adjacent - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2019-17666">https://nvd.nist.gov/vuln/detail/CVE-2019-17666</a></p> <p>Release Date: 2019-10-24</p> <p>Fix Resolution: linux - 5.3.9.1-1;linux-lts - 4.19.82-1;linux-zen - 5.3.9.1-1;linux-hardened - 5.3.7.b-1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2019-17666 (High) detected in linuxlinux-4.19.237 - ## CVE-2019-17666 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linuxlinux-4.19.237</b></p></summary> <p> <p>The Linux Kernel</p> <p>Library home page: <a href=https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux>https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux</a></p> <p>Found in HEAD commit: <a href="https://github.com/nanopathi/linux-4.19.72_CVE-2020-14381/commit/10c7b674d65d46240997df9855fe104bdf05229c">10c7b674d65d46240997df9855fe104bdf05229c</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary> <p></p> <p> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow. <p>Publish Date: 2019-10-17 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-17666>CVE-2019-17666</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Adjacent - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2019-17666">https://nvd.nist.gov/vuln/detail/CVE-2019-17666</a></p> <p>Release Date: 2019-10-24</p> <p>Fix Resolution: linux - 5.3.9.1-1;linux-lts - 4.19.82-1;linux-zen - 5.3.9.1-1;linux-hardened - 5.3.7.b-1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_design
cve high detected in linuxlinux cve high severity vulnerability vulnerable library linuxlinux the linux kernel library home page a href found in head commit a href found in base branch master vulnerable source files vulnerability details rtl noa ie in drivers net wireless realtek rtlwifi ps c in the linux kernel through lacks a certain upper bound check leading to a buffer overflow publish date url a href cvss score details base score metrics exploitability metrics attack vector adjacent attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution linux linux lts linux zen linux hardened b step up your open source security game with whitesource
0
83,542
7,874,507,848
IssuesEvent
2018-06-25 17:17:11
brave/browser-laptop
https://api.github.com/repos/brave/browser-laptop
closed
Manual test run on OS X for 0.23.x (Beta Channel)
OS/macOS release-notes/exclude tests
## Per release specialty tests - [x] Context-menu search items doesn't use DDG if the private tab search engine is DDG. ([#14530](https://github.com/brave/browser-laptop/issues/14530)) - [x] Pinned tabs shift when closing tabs (before animating). ([#14528](https://github.com/brave/browser-laptop/issues/14528)) - [x] Private tab doesn't allow torrent download. ([#14524](https://github.com/brave/browser-laptop/issues/14524)) - [ ] Allow $SITE to run flash notifications should not appear on tor tabs. ([#14480](https://github.com/brave/browser-laptop/issues/14480)) - [x] Closing the last tab on full tabstrip and moving mouse away does not restore tab width. ([#14477](https://github.com/brave/browser-laptop/issues/14477)) - [ ] Include EasyPrivacy by default. ([#14476](https://github.com/brave/browser-laptop/issues/14476)) - [x] Clicking inside url bar but not directly on url string does not focus. ([#14473](https://github.com/brave/browser-laptop/issues/14473)) - [x] Tab doesn't stop loading indicator when opening a torrent in tor private tab. ([#14472](https://github.com/brave/browser-laptop/issues/14472)) - [ ] Preferences menu icons looks smaller compared to the current icons set. ([#14458](https://github.com/brave/browser-laptop/issues/14458)) - [ ] Contribution notification displays 'undefined' instead of 'BAT'. ([#14417](https://github.com/brave/browser-laptop/issues/14417)) - [x] Save file/Export file renames to Downloads instead of actual file name. ([#14407](https://github.com/brave/browser-laptop/issues/14407)) - [x] Learn more link on Private or Tor tab opens a regular tab. ([#14400](https://github.com/brave/browser-laptop/issues/14400)) - [x] Tor connection crashed after upgrade. ([#14399](https://github.com/brave/browser-laptop/issues/14399)) - [x] Private tab icon is overlapping on the favicon when there are too many tabs opened. ([#14373](https://github.com/brave/browser-laptop/issues/14373)) - [x] Brave Stopped playing Facebook videos. ([#14358](https://github.com/brave/browser-laptop/issues/14358)) - [x] Visiting Netflix in a private tab shows Widevine notification on normal tabs. ([#14227](https://github.com/brave/browser-laptop/issues/14227)) - [x] No immediate visual feedback from URL bar before page starts to load. ([#14207](https://github.com/brave/browser-laptop/issues/14207)) - [ ] WebRTC block sometimes not working on private tabs running tor. ([#14174](https://github.com/brave/browser-laptop/issues/14174)) - [ ] WebRTC not fully disabled with Tor. ([#14091](https://github.com/brave/browser-laptop/issues/14091)) - [ ] Block referer based on eTLD+1 instead of full origin. ([#13779](https://github.com/brave/browser-laptop/issues/13779)) - [x] Closing fixed-width tabs and then moving mouse away animates tabs past bounds of tab-bar. ([#12566](https://github.com/brave/browser-laptop/issues/12566)) - [ ] Download bar cannot be closed with an active download. ([#11923](https://github.com/brave/browser-laptop/issues/11923)) - [ ] Replace moment with date-fns for date helpers. ([#11061](https://github.com/brave/browser-laptop/issues/11061)) - [ ] Replace all CSS and l10n selectors with data-test-id for webdriver tests. ([#8735](https://github.com/brave/browser-laptop/issues/8735)) - [x] Tab size change should have transition animation. ([#7001](https://github.com/brave/browser-laptop/issues/7001)) ## Installer - [ ] Check that installer is close to the size of last release. - [ ] Check signature: If OS Run `spctl --assess --verbose /Applications/Brave.app/` and make sure it returns `accepted`. If Windows right click on the installer exe and go to Properties, go to the Digital Signatures tab and double click on the signature. Make sure it says "The digital signature is OK" in the popup window. - [ ] Check Brave, muon, and libchromiumcontent version in `about:brave` and make sure it is EXACTLY as expected. ## Last changeset test - [ ] Test what is covered by the last changeset (you can find this by clicking on the SHA in about:brave) ## Data - [ ] Make sure that data from the last version appears in the new version OK - [ ] With data from the last version, test that - [ ] cookies are preserved - [ ] pinned tabs can be opened - [ ] pinned tabs can be unpinned - [ ] unpinned tabs can be re-pinned - [ ] opened tabs can be reloaded - [ ] bookmarks on the bookmark toolbar can be opened - [ ] bookmarks in the bookmark folder toolbar can be opened ## About pages - [ ] Test that about:adblock loads - [ ] Test that about:autofill loads - [ ] Test that about:bookmarks loads bookmarks - [ ] Test that about:downloads loads downloads - [ ] Test that about:extensions loads - [ ] Test that about:history loads history - [ ] Test that about:passwords loads - [ ] Test that about:styles loads - [ ] Test that about:welcome loads - [ ] Test that about:preferences changing a preference takes effect right away - [ ] Test that about:preferences language change takes effect on re-start ## Bookmarks - [ ] Test that creating a bookmark on the bookmarks toolbar with the star button works - [ ] Test that creating a bookmark on the bookmarks toolbar by dragging the un/lock icon works - [ ] Test that creating a bookmark folder on the bookmarks toolbar works - [ ] Test that moving a bookmark into a folder by drag and drop on the bookmarks folder works - [ ] Test that clicking a bookmark in the toolbar loads the bookmark. - [ ] Test that clicking a bookmark in a bookmark toolbar folder loads the bookmark. - [ ] Test that a bookmark on the bookmark toolbar can be removed via context menu - [ ] Test that a bookmark in a bookmark folder on the bookmark toolbar can be removed via context menu - [ ] Test that a bookmark subfolder can be removed via context menu - [ ] Test that a bookmark folder on the bookmark toolbar can be removed via context menu ## Context menus - [ ] Make sure context menu items in the URL bar work - [ ] Make sure context menu items on content work with no selected text - [ ] Make sure context menu items on content work with selected text - [ ] Make sure context menu items on content work inside an editable control on `about:styles` (input, textarea, or contenteditable) ## Find on page - [ ] Ensure search box is shown with shortcut - [ ] Test successful find - [ ] Test forward and backward find navigation - [ ] Test failed find shows 0 results - [ ] Test match case find ## Keyboard Shortcuts - [ ] Open a new window: `Command` + `N` (macOS) || `Ctrl` + `N` (Win/Linux) - [ ] Open a new tab: `Command` + `T` (macOS) || `Ctrl` + `T` (Win/Linux) - [ ] Open a new private tab: `Command` + `Shift` + `P` (macOS) || `Ctrl` + `Shift` + `P` (Win/Linux) - [ ] Reopen the latest closed tab: `Command` + `Shift` + `t` (macOS) || `Ctrl` + `Shift` + `t` (Win/Linux) - [ ] Reopen the latest closed window: `Command` + `Shift` + `Option` + `T` (macOS) || `Ctrl` + `Shift` + `Alt` + `T` (Win/Linux) - [ ] Jump to the next tab: `Command` + `Option` + `->` (macOS) || `Ctrl` + `PgDn` (Win/Linux) - [ ] Jump to the previous tab: `Command` + `Option` + `<-` (macOS) || `Ctrl` + `PgUp` (Win/Linux) - [ ] Jump to the next tab: `Ctrl` + `Tab` (macOS/Win/Linux) - [ ] Jump to the previous tab: `Ctrl` + `Shift` + `Tab` (macOS/Win/Linux) - [ ] Open Brave preferences: `Command` + `,` (macOS) || `Ctrl` + `,` (Win/Linux) - [ ] Jump into the URL bar: `Command` + `L` (macOS) || `Ctrl` + `L` (Win/Linux) - [ ] Reload page: `Command` + `R` (macOS) || `Ctrl` + `R` (Win/Linux) - [ ] Select All: `Command` + `A` (macOS) || `Ctrl` + `A` (Win/Linux) - [ ] Copying text: `Command` + `C` (macOS) || `Ctrl` + `C` (Win/Linux) - [ ] Pasting text: `Command` + `V` (macOS) || `Ctrl` + `V` (Win/Linux) - [ ] Minimize Brave: `Command` + `M` (macOS) || `Ctrl` + `M` (Win/Linux) - [ ] Quit Brave: `Command` + `Q` (macOS) || `Ctrl` + `Q` (Win/Linux) ## Tabs, Pinning and Tear off tabs - [ ] Test that tabs are pinnable - [ ] Test that tabs are unpinnable - [ ] Test that tabs are draggable to same tabset - [ ] Test that tabs are draggable to alternate tabset - [ ] Test that tabs can be teared off into a new window - [ ] Test that you are able to reattach a tab that is teared off into a new window - [ ] Test that tab pages can be closed - [ ] Test that tab pages can be muted - [ ] Test that tabs can be cloned ## Downloads - [ ] Test downloading a file works and that all actions on the download item works ## Fullscreen - [ ] Test that entering full screen window works View -> Toggle Full Screen. And exit back (Not Esc) - [ ] Test that entering HTML5 full screen works. And Esc to go back. (youtube.com) ## Zoom - [ ] Test zoom in / out shortcut works - [ ] Test hamburger menu zooms - [ ] Test zoom saved when you close the browser and restore on a single site - [ ] Test zoom saved when you navigate within a single origin site - [ ] Test that navigating to a different origin resets the zoom ## Printing - [ ] Test that you can print a PDF ## Extensions/Plugins tests - [ ] Enable each extension one by one under `about:preferences#extensions` and ensure that the browser doesn't become unresponsive ### Widevine - [ ] Test that you can log into Netflix and start a show ### Flash tests - [ ] Test that flash placeholder appears on http://www.homestarrunner.com - [ ] Test with flash enabled in preferences, auto play option is shown when visiting http://www.homestarrunner.com ## Autofill tests - [ ] Test that autofill works on http://www.roboform.com/filling-test-all-fields - [ ] Verify clicking `Next` button on https://www.paypal.com/signin doesn't crash the browser ## Geolocation - [ ] Check that https://developer.mozilla.org/en-US/docs/Web/API/Geolocation/Using_geolocation is blocked due to cross-origin iframes - [ ] Check that https://browserleaks.com/geo works and shows correct location - [ ] Check that https://html5demos.com/geo/ works but doesn't require an accurate location ## Crash Reporting - [ ] Check that loading `chrome://crash` causes the new tab to crash - [ ] Check that `chrome://crashes` lists all the crashes and includes both Crash Report ID & Local Crash ID - [ ] Verify the crash ID matches the report on brave stats ## Performance test _Each start should take less than 7 seconds_ - [ ] Enable only sync (new sync group). - [ ] Enable only sync with a large sync group (many entries). - [ ] Enable only payments. - [ ] Only import a large set of bookmarks. - [ ] Combine sync, payments, and a large set of bookmarks. ## Bravery settings - [ ] Check that HTTPS Everywhere works by loading http://https-everywhere.badssl.com/ - [ ] Turning HTTPS Everywhere off and shields off both disable the redirect to https://https-everywhere.badssl.com/ - [ ] Check that ad replacement works on http://slashdot.org - [ ] Check that toggling to blocking and allow ads works as expected - [ ] Test that clicking through a cert error in https://badssl.com/ works - [ ] Test that Safe Browsing works (https://www.raisegame.com/) - [ ] Turning Safe Browsing off and shields off both disable safe browsing for https://www.raisegame.com/ - [ ] Visit https://brianbondy.com/ and then turn on script blocking, nothing should load. Allow it from the script blocking UI in the URL bar and it should work - [ ] Test that about:preferences default Bravery settings take effect on pages with no site settings - [ ] Test that 3rd party storage results are blank at https://jsfiddle.net/7ke9r14a/9/ when 3rd party cookies are blocked and not blank when 3rd party cookies are unblocked ### Fingerprint Tests - [ ] Visit https://jsfiddle.net/bkf50r8v/13/, ensure 3 blocked items are listed in shields. Result window should show `got canvas fingerprint 0` and `got webgl fingerprint 00` - [ ] Test that audio fingerprint is blocked at https://audiofingerprint.openwpm.com/ only when `Block all fingerprinting protection` is on - [ ] Test that Brave browser isn't detected on https://extensions.inrialpes.fr/brave/ - [ ] Test that https://diafygi.github.io/webrtc-ips/ doesn't leak IP address when `Block all fingerprinting protection` is on ## Content tests - [ ] Go to https://brianbondy.com/ and click on the twitter icon on the top right. Test that context menus work in the new twitter tab - [ ] Load twitter and click on a tweet so the popup div shows. Click to dismiss and repeat with another div. Make sure it shows - [ ] Go to https://www.bennish.net/web-notifications.html and test that clicking on 'Show' pops up a notification asking for permission. Make sure that clicking 'Deny' leads to no notifications being shown - [ ] Go to https://trac.torproject.org/projects/tor/login and make sure that the password can be saved. Make sure the saved password shows up in `about:passwords`. Then reload https://trac.torproject.org/projects/tor/login and make sure the saved credentials aren't autofilled instead shows saved id as a dropdown under the login field - [ ] Open `about:styles` and type some misspellings on a textbox, make sure they are underlined. - [ ] Make sure that right clicking on a word with suggestions gives a suggestion and that clicking on the suggestion replaces the text - [ ] Make sure that Command + Click (Control + Click on Windows, Control + Click on Ubuntu) on a link opens a new tab but does NOT switch to it. Click on it and make sure it is already loaded - [ ] Open an email on http://mail.google.com/ or inbox.google.com and click on a link. Make sure it works - [ ] Test that PDF is loaded over https at https://basicattentiontoken.org/BasicAttentionTokenWhitePaper-4.pdf - [ ] Test that PDF is loaded over http at http://www.pdf995.com/samples/pdf.pdf - [ ] Test that https://mixed-script.badssl.com/ shows up as grey not red (no mixed content scripts are run). - [ ] Test that hovering the cursor over a link changes the cursor into a pointer (hand) - [ ] Visit https://dlptest.com/ftp-test/ and ensure that basic authentication is working by clicking on ftp://ftp.dlptest.com/ and ensuring you're prompted for credentials - [ ] Test that WebSockets are working by ensuring http://slither.io/ runs once "Play" has been clicked. ## Ledger - [ ] Verify wallet is auto created after enabling payments - [ ] Verify monthly budget and account balance shows correct BAT and USD value - [ ] Click on `add funds` and click on each currency and verify it shows wallet address and QR Code - [ ] Verify that Brave BAT wallet address can be copied - [ ] Verify adding funds via any of the currencies flows into BAT Wallet after specified amount of time - [ ] Verify adding funds to an existing wallet with amount, adjusts the BAT value appropriately - [ ] Change min visit and min time in advance setting and verify if the publisher list gets updated based on new setting - [ ] Visit nytimes.com for a few seconds and make sure it shows up in the Payments table - [ ] Check that disabling payments and enabling them again does not lose state - [ ] Generate 500 ledger table entries using `npm run add-simulated-synopsis-visits 500` - [ ] ensure that disabling/enabling Brave Payments several times doesn't cause any issues - [ ] visit `about:preferences` and switch through all the available preference pages including Payments and ensure they're loading without issues - [ ] ensure that loading/viewing `about:preferences#payments` doesn't cause the CPU to reach 100% of usage and cause performance issues - [ ] ensure that both `Minimum page time` & `Minimum visits` work correctly with the large list of ledger entries - [ ] ensure that you can sort the ledger table using `Site`, `Include`, `Views`, `Time Spent` and `%` - [ ] Upgrade from older version - [ ] Verify the wallet isn't corrupted upon upgrade (balance is retained and wallet backup code isn't corrupted) - [ ] Verify publishers list is not lost after upgrade ### Ledger Media (To be verified on YouTube and Twitch) - [ ] Visit any YouTube/Twitch video in a normal/session tab and ensure the video publisher name is listed in ledger table - [ ] Visit any YouTube/Twitch video in a private tab and ensure the video publisher name is not listed in ledger table - [ ] Visit any live YouTube/Twitch video and ensure the time spent is shown under ledger table - [ ] Visit any embeded YouTube/Twitch video and ensure the video publisher name is listed in ledger table - [ ] Ensure total time spent is correctly calculated for each publisher video - [ ] Ensure total time spent is correctly calculated when switching to YouTube/Twitch video from an embeded video - [ ] Ensure YouTube/Twitch publishers are not listed when `Allow contributions to video` is disabled in adavanced settings - [ ] Ensure existing YouTube/Twitch publishers are not lost when `Allow contributions to video` is disabled in adavanced settings - [ ] Ensure YouTube/Twitch publishers is listed but not included when `auto-include` is disabled - [ ] Update Advanced settings to different time/visit value and ensure YouTube/Twitch videos are added to ledger table once criteria is met - [ ] Perform a contribution while YouTube/Twitch channels are included on the ledger. Ensure the channels are listed on the contribution statement - [ ] Verify that you are able to delete YouTube/Twitch publishers from ledger table - [ ] Verify that you are able to re-add YouTube/Twitch publishers to ledger table - [ ] Verify if you minimize a Twitch video (Stream/VOD) and navigate around the site, the video is counted in ledger ## Sync - [ ] Verify you are able to sync two devices using the secret code - [ ] Visit a site on device 1 and change shield setting, ensure that the saved site preference is synced to device 2 - [ ] Enable Browsing history sync on device 1, ensure the history is shown on device 2 - [ ] Clear browsing history on device 1, ensure the history is sync back on device 1 from device 2 - [ ] Import/Add bookmarks on device 1, ensure it is synced on device 2 - [ ] Ensure imported bookmark folder structure is maintained on device 2 - [ ] Ensure bookmark favicons are shown after sync ## Session storage Do not forget to make a backup of your entire `~/Library/Application\ Support/Brave` folder. - [ ] Temporarily move away your `~/Library/Application\ Support/Brave/session-store-1` and test that clean session storage works. (`%appdata%\Brave` in Windows, `./config/brave` in Ubuntu) - [ ] Test that windows and tabs restore when closed, including active tab. - [ ] Move away your entire `~/Library/Application\ Support/Brave` folder (`%appdata%\Brave` in Windows, `./config/brave` in Ubuntu) ## Cookie and Cache - [ ] Make a backup of your profile, turn on all clearing in preferences and shut down. Make sure when you bring the browser back up everything is gone that is specified. - [ ] Go to http://samy.pl/evercookie/ and set an evercookie. Check that going to prefs, clearing site data and cache, and going back to the Evercookie site does not remember the old evercookie value. ## Update tests - [ ] Test that updating using `BRAVE_UPDATE_VERSION=0.8.3` env variable works correctly. - [ ] Test that using `BRAVE_ENABLE_PREVIEW_UPDATES=TRUE` env variable works and prompts for preview build updates.
1.0
Manual test run on OS X for 0.23.x (Beta Channel) - ## Per release specialty tests - [x] Context-menu search items doesn't use DDG if the private tab search engine is DDG. ([#14530](https://github.com/brave/browser-laptop/issues/14530)) - [x] Pinned tabs shift when closing tabs (before animating). ([#14528](https://github.com/brave/browser-laptop/issues/14528)) - [x] Private tab doesn't allow torrent download. ([#14524](https://github.com/brave/browser-laptop/issues/14524)) - [ ] Allow $SITE to run flash notifications should not appear on tor tabs. ([#14480](https://github.com/brave/browser-laptop/issues/14480)) - [x] Closing the last tab on full tabstrip and moving mouse away does not restore tab width. ([#14477](https://github.com/brave/browser-laptop/issues/14477)) - [ ] Include EasyPrivacy by default. ([#14476](https://github.com/brave/browser-laptop/issues/14476)) - [x] Clicking inside url bar but not directly on url string does not focus. ([#14473](https://github.com/brave/browser-laptop/issues/14473)) - [x] Tab doesn't stop loading indicator when opening a torrent in tor private tab. ([#14472](https://github.com/brave/browser-laptop/issues/14472)) - [ ] Preferences menu icons looks smaller compared to the current icons set. ([#14458](https://github.com/brave/browser-laptop/issues/14458)) - [ ] Contribution notification displays 'undefined' instead of 'BAT'. ([#14417](https://github.com/brave/browser-laptop/issues/14417)) - [x] Save file/Export file renames to Downloads instead of actual file name. ([#14407](https://github.com/brave/browser-laptop/issues/14407)) - [x] Learn more link on Private or Tor tab opens a regular tab. ([#14400](https://github.com/brave/browser-laptop/issues/14400)) - [x] Tor connection crashed after upgrade. ([#14399](https://github.com/brave/browser-laptop/issues/14399)) - [x] Private tab icon is overlapping on the favicon when there are too many tabs opened. ([#14373](https://github.com/brave/browser-laptop/issues/14373)) - [x] Brave Stopped playing Facebook videos. ([#14358](https://github.com/brave/browser-laptop/issues/14358)) - [x] Visiting Netflix in a private tab shows Widevine notification on normal tabs. ([#14227](https://github.com/brave/browser-laptop/issues/14227)) - [x] No immediate visual feedback from URL bar before page starts to load. ([#14207](https://github.com/brave/browser-laptop/issues/14207)) - [ ] WebRTC block sometimes not working on private tabs running tor. ([#14174](https://github.com/brave/browser-laptop/issues/14174)) - [ ] WebRTC not fully disabled with Tor. ([#14091](https://github.com/brave/browser-laptop/issues/14091)) - [ ] Block referer based on eTLD+1 instead of full origin. ([#13779](https://github.com/brave/browser-laptop/issues/13779)) - [x] Closing fixed-width tabs and then moving mouse away animates tabs past bounds of tab-bar. ([#12566](https://github.com/brave/browser-laptop/issues/12566)) - [ ] Download bar cannot be closed with an active download. ([#11923](https://github.com/brave/browser-laptop/issues/11923)) - [ ] Replace moment with date-fns for date helpers. ([#11061](https://github.com/brave/browser-laptop/issues/11061)) - [ ] Replace all CSS and l10n selectors with data-test-id for webdriver tests. ([#8735](https://github.com/brave/browser-laptop/issues/8735)) - [x] Tab size change should have transition animation. ([#7001](https://github.com/brave/browser-laptop/issues/7001)) ## Installer - [ ] Check that installer is close to the size of last release. - [ ] Check signature: If OS Run `spctl --assess --verbose /Applications/Brave.app/` and make sure it returns `accepted`. If Windows right click on the installer exe and go to Properties, go to the Digital Signatures tab and double click on the signature. Make sure it says "The digital signature is OK" in the popup window. - [ ] Check Brave, muon, and libchromiumcontent version in `about:brave` and make sure it is EXACTLY as expected. ## Last changeset test - [ ] Test what is covered by the last changeset (you can find this by clicking on the SHA in about:brave) ## Data - [ ] Make sure that data from the last version appears in the new version OK - [ ] With data from the last version, test that - [ ] cookies are preserved - [ ] pinned tabs can be opened - [ ] pinned tabs can be unpinned - [ ] unpinned tabs can be re-pinned - [ ] opened tabs can be reloaded - [ ] bookmarks on the bookmark toolbar can be opened - [ ] bookmarks in the bookmark folder toolbar can be opened ## About pages - [ ] Test that about:adblock loads - [ ] Test that about:autofill loads - [ ] Test that about:bookmarks loads bookmarks - [ ] Test that about:downloads loads downloads - [ ] Test that about:extensions loads - [ ] Test that about:history loads history - [ ] Test that about:passwords loads - [ ] Test that about:styles loads - [ ] Test that about:welcome loads - [ ] Test that about:preferences changing a preference takes effect right away - [ ] Test that about:preferences language change takes effect on re-start ## Bookmarks - [ ] Test that creating a bookmark on the bookmarks toolbar with the star button works - [ ] Test that creating a bookmark on the bookmarks toolbar by dragging the un/lock icon works - [ ] Test that creating a bookmark folder on the bookmarks toolbar works - [ ] Test that moving a bookmark into a folder by drag and drop on the bookmarks folder works - [ ] Test that clicking a bookmark in the toolbar loads the bookmark. - [ ] Test that clicking a bookmark in a bookmark toolbar folder loads the bookmark. - [ ] Test that a bookmark on the bookmark toolbar can be removed via context menu - [ ] Test that a bookmark in a bookmark folder on the bookmark toolbar can be removed via context menu - [ ] Test that a bookmark subfolder can be removed via context menu - [ ] Test that a bookmark folder on the bookmark toolbar can be removed via context menu ## Context menus - [ ] Make sure context menu items in the URL bar work - [ ] Make sure context menu items on content work with no selected text - [ ] Make sure context menu items on content work with selected text - [ ] Make sure context menu items on content work inside an editable control on `about:styles` (input, textarea, or contenteditable) ## Find on page - [ ] Ensure search box is shown with shortcut - [ ] Test successful find - [ ] Test forward and backward find navigation - [ ] Test failed find shows 0 results - [ ] Test match case find ## Keyboard Shortcuts - [ ] Open a new window: `Command` + `N` (macOS) || `Ctrl` + `N` (Win/Linux) - [ ] Open a new tab: `Command` + `T` (macOS) || `Ctrl` + `T` (Win/Linux) - [ ] Open a new private tab: `Command` + `Shift` + `P` (macOS) || `Ctrl` + `Shift` + `P` (Win/Linux) - [ ] Reopen the latest closed tab: `Command` + `Shift` + `t` (macOS) || `Ctrl` + `Shift` + `t` (Win/Linux) - [ ] Reopen the latest closed window: `Command` + `Shift` + `Option` + `T` (macOS) || `Ctrl` + `Shift` + `Alt` + `T` (Win/Linux) - [ ] Jump to the next tab: `Command` + `Option` + `->` (macOS) || `Ctrl` + `PgDn` (Win/Linux) - [ ] Jump to the previous tab: `Command` + `Option` + `<-` (macOS) || `Ctrl` + `PgUp` (Win/Linux) - [ ] Jump to the next tab: `Ctrl` + `Tab` (macOS/Win/Linux) - [ ] Jump to the previous tab: `Ctrl` + `Shift` + `Tab` (macOS/Win/Linux) - [ ] Open Brave preferences: `Command` + `,` (macOS) || `Ctrl` + `,` (Win/Linux) - [ ] Jump into the URL bar: `Command` + `L` (macOS) || `Ctrl` + `L` (Win/Linux) - [ ] Reload page: `Command` + `R` (macOS) || `Ctrl` + `R` (Win/Linux) - [ ] Select All: `Command` + `A` (macOS) || `Ctrl` + `A` (Win/Linux) - [ ] Copying text: `Command` + `C` (macOS) || `Ctrl` + `C` (Win/Linux) - [ ] Pasting text: `Command` + `V` (macOS) || `Ctrl` + `V` (Win/Linux) - [ ] Minimize Brave: `Command` + `M` (macOS) || `Ctrl` + `M` (Win/Linux) - [ ] Quit Brave: `Command` + `Q` (macOS) || `Ctrl` + `Q` (Win/Linux) ## Tabs, Pinning and Tear off tabs - [ ] Test that tabs are pinnable - [ ] Test that tabs are unpinnable - [ ] Test that tabs are draggable to same tabset - [ ] Test that tabs are draggable to alternate tabset - [ ] Test that tabs can be teared off into a new window - [ ] Test that you are able to reattach a tab that is teared off into a new window - [ ] Test that tab pages can be closed - [ ] Test that tab pages can be muted - [ ] Test that tabs can be cloned ## Downloads - [ ] Test downloading a file works and that all actions on the download item works ## Fullscreen - [ ] Test that entering full screen window works View -> Toggle Full Screen. And exit back (Not Esc) - [ ] Test that entering HTML5 full screen works. And Esc to go back. (youtube.com) ## Zoom - [ ] Test zoom in / out shortcut works - [ ] Test hamburger menu zooms - [ ] Test zoom saved when you close the browser and restore on a single site - [ ] Test zoom saved when you navigate within a single origin site - [ ] Test that navigating to a different origin resets the zoom ## Printing - [ ] Test that you can print a PDF ## Extensions/Plugins tests - [ ] Enable each extension one by one under `about:preferences#extensions` and ensure that the browser doesn't become unresponsive ### Widevine - [ ] Test that you can log into Netflix and start a show ### Flash tests - [ ] Test that flash placeholder appears on http://www.homestarrunner.com - [ ] Test with flash enabled in preferences, auto play option is shown when visiting http://www.homestarrunner.com ## Autofill tests - [ ] Test that autofill works on http://www.roboform.com/filling-test-all-fields - [ ] Verify clicking `Next` button on https://www.paypal.com/signin doesn't crash the browser ## Geolocation - [ ] Check that https://developer.mozilla.org/en-US/docs/Web/API/Geolocation/Using_geolocation is blocked due to cross-origin iframes - [ ] Check that https://browserleaks.com/geo works and shows correct location - [ ] Check that https://html5demos.com/geo/ works but doesn't require an accurate location ## Crash Reporting - [ ] Check that loading `chrome://crash` causes the new tab to crash - [ ] Check that `chrome://crashes` lists all the crashes and includes both Crash Report ID & Local Crash ID - [ ] Verify the crash ID matches the report on brave stats ## Performance test _Each start should take less than 7 seconds_ - [ ] Enable only sync (new sync group). - [ ] Enable only sync with a large sync group (many entries). - [ ] Enable only payments. - [ ] Only import a large set of bookmarks. - [ ] Combine sync, payments, and a large set of bookmarks. ## Bravery settings - [ ] Check that HTTPS Everywhere works by loading http://https-everywhere.badssl.com/ - [ ] Turning HTTPS Everywhere off and shields off both disable the redirect to https://https-everywhere.badssl.com/ - [ ] Check that ad replacement works on http://slashdot.org - [ ] Check that toggling to blocking and allow ads works as expected - [ ] Test that clicking through a cert error in https://badssl.com/ works - [ ] Test that Safe Browsing works (https://www.raisegame.com/) - [ ] Turning Safe Browsing off and shields off both disable safe browsing for https://www.raisegame.com/ - [ ] Visit https://brianbondy.com/ and then turn on script blocking, nothing should load. Allow it from the script blocking UI in the URL bar and it should work - [ ] Test that about:preferences default Bravery settings take effect on pages with no site settings - [ ] Test that 3rd party storage results are blank at https://jsfiddle.net/7ke9r14a/9/ when 3rd party cookies are blocked and not blank when 3rd party cookies are unblocked ### Fingerprint Tests - [ ] Visit https://jsfiddle.net/bkf50r8v/13/, ensure 3 blocked items are listed in shields. Result window should show `got canvas fingerprint 0` and `got webgl fingerprint 00` - [ ] Test that audio fingerprint is blocked at https://audiofingerprint.openwpm.com/ only when `Block all fingerprinting protection` is on - [ ] Test that Brave browser isn't detected on https://extensions.inrialpes.fr/brave/ - [ ] Test that https://diafygi.github.io/webrtc-ips/ doesn't leak IP address when `Block all fingerprinting protection` is on ## Content tests - [ ] Go to https://brianbondy.com/ and click on the twitter icon on the top right. Test that context menus work in the new twitter tab - [ ] Load twitter and click on a tweet so the popup div shows. Click to dismiss and repeat with another div. Make sure it shows - [ ] Go to https://www.bennish.net/web-notifications.html and test that clicking on 'Show' pops up a notification asking for permission. Make sure that clicking 'Deny' leads to no notifications being shown - [ ] Go to https://trac.torproject.org/projects/tor/login and make sure that the password can be saved. Make sure the saved password shows up in `about:passwords`. Then reload https://trac.torproject.org/projects/tor/login and make sure the saved credentials aren't autofilled instead shows saved id as a dropdown under the login field - [ ] Open `about:styles` and type some misspellings on a textbox, make sure they are underlined. - [ ] Make sure that right clicking on a word with suggestions gives a suggestion and that clicking on the suggestion replaces the text - [ ] Make sure that Command + Click (Control + Click on Windows, Control + Click on Ubuntu) on a link opens a new tab but does NOT switch to it. Click on it and make sure it is already loaded - [ ] Open an email on http://mail.google.com/ or inbox.google.com and click on a link. Make sure it works - [ ] Test that PDF is loaded over https at https://basicattentiontoken.org/BasicAttentionTokenWhitePaper-4.pdf - [ ] Test that PDF is loaded over http at http://www.pdf995.com/samples/pdf.pdf - [ ] Test that https://mixed-script.badssl.com/ shows up as grey not red (no mixed content scripts are run). - [ ] Test that hovering the cursor over a link changes the cursor into a pointer (hand) - [ ] Visit https://dlptest.com/ftp-test/ and ensure that basic authentication is working by clicking on ftp://ftp.dlptest.com/ and ensuring you're prompted for credentials - [ ] Test that WebSockets are working by ensuring http://slither.io/ runs once "Play" has been clicked. ## Ledger - [ ] Verify wallet is auto created after enabling payments - [ ] Verify monthly budget and account balance shows correct BAT and USD value - [ ] Click on `add funds` and click on each currency and verify it shows wallet address and QR Code - [ ] Verify that Brave BAT wallet address can be copied - [ ] Verify adding funds via any of the currencies flows into BAT Wallet after specified amount of time - [ ] Verify adding funds to an existing wallet with amount, adjusts the BAT value appropriately - [ ] Change min visit and min time in advance setting and verify if the publisher list gets updated based on new setting - [ ] Visit nytimes.com for a few seconds and make sure it shows up in the Payments table - [ ] Check that disabling payments and enabling them again does not lose state - [ ] Generate 500 ledger table entries using `npm run add-simulated-synopsis-visits 500` - [ ] ensure that disabling/enabling Brave Payments several times doesn't cause any issues - [ ] visit `about:preferences` and switch through all the available preference pages including Payments and ensure they're loading without issues - [ ] ensure that loading/viewing `about:preferences#payments` doesn't cause the CPU to reach 100% of usage and cause performance issues - [ ] ensure that both `Minimum page time` & `Minimum visits` work correctly with the large list of ledger entries - [ ] ensure that you can sort the ledger table using `Site`, `Include`, `Views`, `Time Spent` and `%` - [ ] Upgrade from older version - [ ] Verify the wallet isn't corrupted upon upgrade (balance is retained and wallet backup code isn't corrupted) - [ ] Verify publishers list is not lost after upgrade ### Ledger Media (To be verified on YouTube and Twitch) - [ ] Visit any YouTube/Twitch video in a normal/session tab and ensure the video publisher name is listed in ledger table - [ ] Visit any YouTube/Twitch video in a private tab and ensure the video publisher name is not listed in ledger table - [ ] Visit any live YouTube/Twitch video and ensure the time spent is shown under ledger table - [ ] Visit any embeded YouTube/Twitch video and ensure the video publisher name is listed in ledger table - [ ] Ensure total time spent is correctly calculated for each publisher video - [ ] Ensure total time spent is correctly calculated when switching to YouTube/Twitch video from an embeded video - [ ] Ensure YouTube/Twitch publishers are not listed when `Allow contributions to video` is disabled in adavanced settings - [ ] Ensure existing YouTube/Twitch publishers are not lost when `Allow contributions to video` is disabled in adavanced settings - [ ] Ensure YouTube/Twitch publishers is listed but not included when `auto-include` is disabled - [ ] Update Advanced settings to different time/visit value and ensure YouTube/Twitch videos are added to ledger table once criteria is met - [ ] Perform a contribution while YouTube/Twitch channels are included on the ledger. Ensure the channels are listed on the contribution statement - [ ] Verify that you are able to delete YouTube/Twitch publishers from ledger table - [ ] Verify that you are able to re-add YouTube/Twitch publishers to ledger table - [ ] Verify if you minimize a Twitch video (Stream/VOD) and navigate around the site, the video is counted in ledger ## Sync - [ ] Verify you are able to sync two devices using the secret code - [ ] Visit a site on device 1 and change shield setting, ensure that the saved site preference is synced to device 2 - [ ] Enable Browsing history sync on device 1, ensure the history is shown on device 2 - [ ] Clear browsing history on device 1, ensure the history is sync back on device 1 from device 2 - [ ] Import/Add bookmarks on device 1, ensure it is synced on device 2 - [ ] Ensure imported bookmark folder structure is maintained on device 2 - [ ] Ensure bookmark favicons are shown after sync ## Session storage Do not forget to make a backup of your entire `~/Library/Application\ Support/Brave` folder. - [ ] Temporarily move away your `~/Library/Application\ Support/Brave/session-store-1` and test that clean session storage works. (`%appdata%\Brave` in Windows, `./config/brave` in Ubuntu) - [ ] Test that windows and tabs restore when closed, including active tab. - [ ] Move away your entire `~/Library/Application\ Support/Brave` folder (`%appdata%\Brave` in Windows, `./config/brave` in Ubuntu) ## Cookie and Cache - [ ] Make a backup of your profile, turn on all clearing in preferences and shut down. Make sure when you bring the browser back up everything is gone that is specified. - [ ] Go to http://samy.pl/evercookie/ and set an evercookie. Check that going to prefs, clearing site data and cache, and going back to the Evercookie site does not remember the old evercookie value. ## Update tests - [ ] Test that updating using `BRAVE_UPDATE_VERSION=0.8.3` env variable works correctly. - [ ] Test that using `BRAVE_ENABLE_PREVIEW_UPDATES=TRUE` env variable works and prompts for preview build updates.
non_design
manual test run on os x for x beta channel per release specialty tests context menu search items doesn t use ddg if the private tab search engine is ddg pinned tabs shift when closing tabs before animating private tab doesn t allow torrent download allow site to run flash notifications should not appear on tor tabs closing the last tab on full tabstrip and moving mouse away does not restore tab width include easyprivacy by default clicking inside url bar but not directly on url string does not focus tab doesn t stop loading indicator when opening a torrent in tor private tab preferences menu icons looks smaller compared to the current icons set contribution notification displays undefined instead of bat save file export file renames to downloads instead of actual file name learn more link on private or tor tab opens a regular tab tor connection crashed after upgrade private tab icon is overlapping on the favicon when there are too many tabs opened brave stopped playing facebook videos visiting netflix in a private tab shows widevine notification on normal tabs no immediate visual feedback from url bar before page starts to load webrtc block sometimes not working on private tabs running tor webrtc not fully disabled with tor block referer based on etld instead of full origin closing fixed width tabs and then moving mouse away animates tabs past bounds of tab bar download bar cannot be closed with an active download replace moment with date fns for date helpers replace all css and selectors with data test id for webdriver tests tab size change should have transition animation installer check that installer is close to the size of last release check signature if os run spctl assess verbose applications brave app and make sure it returns accepted if windows right click on the installer exe and go to properties go to the digital signatures tab and double click on the signature make sure it says the digital signature is ok in the popup window check brave muon and libchromiumcontent version in about brave and make sure it is exactly as expected last changeset test test what is covered by the last changeset you can find this by clicking on the sha in about brave data make sure that data from the last version appears in the new version ok with data from the last version test that cookies are preserved pinned tabs can be opened pinned tabs can be unpinned unpinned tabs can be re pinned opened tabs can be reloaded bookmarks on the bookmark toolbar can be opened bookmarks in the bookmark folder toolbar can be opened about pages test that about adblock loads test that about autofill loads test that about bookmarks loads bookmarks test that about downloads loads downloads test that about extensions loads test that about history loads history test that about passwords loads test that about styles loads test that about welcome loads test that about preferences changing a preference takes effect right away test that about preferences language change takes effect on re start bookmarks test that creating a bookmark on the bookmarks toolbar with the star button works test that creating a bookmark on the bookmarks toolbar by dragging the un lock icon works test that creating a bookmark folder on the bookmarks toolbar works test that moving a bookmark into a folder by drag and drop on the bookmarks folder works test that clicking a bookmark in the toolbar loads the bookmark test that clicking a bookmark in a bookmark toolbar folder loads the bookmark test that a bookmark on the bookmark toolbar can be removed via context menu test that a bookmark in a bookmark folder on the bookmark toolbar can be removed via context menu test that a bookmark subfolder can be removed via context menu test that a bookmark folder on the bookmark toolbar can be removed via context menu context menus make sure context menu items in the url bar work make sure context menu items on content work with no selected text make sure context menu items on content work with selected text make sure context menu items on content work inside an editable control on about styles input textarea or contenteditable find on page ensure search box is shown with shortcut test successful find test forward and backward find navigation test failed find shows results test match case find keyboard shortcuts open a new window command n macos ctrl n win linux open a new tab command t macos ctrl t win linux open a new private tab command shift p macos ctrl shift p win linux reopen the latest closed tab command shift t macos ctrl shift t win linux reopen the latest closed window command shift option t macos ctrl shift alt t win linux jump to the next tab command option macos ctrl pgdn win linux jump to the previous tab command option macos ctrl pgup win linux jump to the next tab ctrl tab macos win linux jump to the previous tab ctrl shift tab macos win linux open brave preferences command macos ctrl win linux jump into the url bar command l macos ctrl l win linux reload page command r macos ctrl r win linux select all command a macos ctrl a win linux copying text command c macos ctrl c win linux pasting text command v macos ctrl v win linux minimize brave command m macos ctrl m win linux quit brave command q macos ctrl q win linux tabs pinning and tear off tabs test that tabs are pinnable test that tabs are unpinnable test that tabs are draggable to same tabset test that tabs are draggable to alternate tabset test that tabs can be teared off into a new window test that you are able to reattach a tab that is teared off into a new window test that tab pages can be closed test that tab pages can be muted test that tabs can be cloned downloads test downloading a file works and that all actions on the download item works fullscreen test that entering full screen window works view toggle full screen and exit back not esc test that entering full screen works and esc to go back youtube com zoom test zoom in out shortcut works test hamburger menu zooms test zoom saved when you close the browser and restore on a single site test zoom saved when you navigate within a single origin site test that navigating to a different origin resets the zoom printing test that you can print a pdf extensions plugins tests enable each extension one by one under about preferences extensions and ensure that the browser doesn t become unresponsive widevine test that you can log into netflix and start a show flash tests test that flash placeholder appears on test with flash enabled in preferences auto play option is shown when visiting autofill tests test that autofill works on verify clicking next button on doesn t crash the browser geolocation check that is blocked due to cross origin iframes check that works and shows correct location check that works but doesn t require an accurate location crash reporting check that loading chrome crash causes the new tab to crash check that chrome crashes lists all the crashes and includes both crash report id local crash id verify the crash id matches the report on brave stats performance test each start should take less than seconds enable only sync new sync group enable only sync with a large sync group many entries enable only payments only import a large set of bookmarks combine sync payments and a large set of bookmarks bravery settings check that https everywhere works by loading turning https everywhere off and shields off both disable the redirect to check that ad replacement works on check that toggling to blocking and allow ads works as expected test that clicking through a cert error in works test that safe browsing works turning safe browsing off and shields off both disable safe browsing for visit and then turn on script blocking nothing should load allow it from the script blocking ui in the url bar and it should work test that about preferences default bravery settings take effect on pages with no site settings test that party storage results are blank at when party cookies are blocked and not blank when party cookies are unblocked fingerprint tests visit ensure blocked items are listed in shields result window should show got canvas fingerprint and got webgl fingerprint test that audio fingerprint is blocked at only when block all fingerprinting protection is on test that brave browser isn t detected on test that doesn t leak ip address when block all fingerprinting protection is on content tests go to and click on the twitter icon on the top right test that context menus work in the new twitter tab load twitter and click on a tweet so the popup div shows click to dismiss and repeat with another div make sure it shows go to and test that clicking on show pops up a notification asking for permission make sure that clicking deny leads to no notifications being shown go to and make sure that the password can be saved make sure the saved password shows up in about passwords then reload and make sure the saved credentials aren t autofilled instead shows saved id as a dropdown under the login field open about styles and type some misspellings on a textbox make sure they are underlined make sure that right clicking on a word with suggestions gives a suggestion and that clicking on the suggestion replaces the text make sure that command click control click on windows control click on ubuntu on a link opens a new tab but does not switch to it click on it and make sure it is already loaded open an email on or inbox google com and click on a link make sure it works test that pdf is loaded over https at test that pdf is loaded over http at test that shows up as grey not red no mixed content scripts are run test that hovering the cursor over a link changes the cursor into a pointer hand visit and ensure that basic authentication is working by clicking on ftp ftp dlptest com and ensuring you re prompted for credentials test that websockets are working by ensuring runs once play has been clicked ledger verify wallet is auto created after enabling payments verify monthly budget and account balance shows correct bat and usd value click on add funds and click on each currency and verify it shows wallet address and qr code verify that brave bat wallet address can be copied verify adding funds via any of the currencies flows into bat wallet after specified amount of time verify adding funds to an existing wallet with amount adjusts the bat value appropriately change min visit and min time in advance setting and verify if the publisher list gets updated based on new setting visit nytimes com for a few seconds and make sure it shows up in the payments table check that disabling payments and enabling them again does not lose state generate ledger table entries using npm run add simulated synopsis visits ensure that disabling enabling brave payments several times doesn t cause any issues visit about preferences and switch through all the available preference pages including payments and ensure they re loading without issues ensure that loading viewing about preferences payments doesn t cause the cpu to reach of usage and cause performance issues ensure that both minimum page time minimum visits work correctly with the large list of ledger entries ensure that you can sort the ledger table using site include views time spent and upgrade from older version verify the wallet isn t corrupted upon upgrade balance is retained and wallet backup code isn t corrupted verify publishers list is not lost after upgrade ledger media to be verified on youtube and twitch visit any youtube twitch video in a normal session tab and ensure the video publisher name is listed in ledger table visit any youtube twitch video in a private tab and ensure the video publisher name is not listed in ledger table visit any live youtube twitch video and ensure the time spent is shown under ledger table visit any embeded youtube twitch video and ensure the video publisher name is listed in ledger table ensure total time spent is correctly calculated for each publisher video ensure total time spent is correctly calculated when switching to youtube twitch video from an embeded video ensure youtube twitch publishers are not listed when allow contributions to video is disabled in adavanced settings ensure existing youtube twitch publishers are not lost when allow contributions to video is disabled in adavanced settings ensure youtube twitch publishers is listed but not included when auto include is disabled update advanced settings to different time visit value and ensure youtube twitch videos are added to ledger table once criteria is met perform a contribution while youtube twitch channels are included on the ledger ensure the channels are listed on the contribution statement verify that you are able to delete youtube twitch publishers from ledger table verify that you are able to re add youtube twitch publishers to ledger table verify if you minimize a twitch video stream vod and navigate around the site the video is counted in ledger sync verify you are able to sync two devices using the secret code visit a site on device and change shield setting ensure that the saved site preference is synced to device enable browsing history sync on device ensure the history is shown on device clear browsing history on device ensure the history is sync back on device from device import add bookmarks on device ensure it is synced on device ensure imported bookmark folder structure is maintained on device ensure bookmark favicons are shown after sync session storage do not forget to make a backup of your entire library application support brave folder temporarily move away your library application support brave session store and test that clean session storage works appdata brave in windows config brave in ubuntu test that windows and tabs restore when closed including active tab move away your entire library application support brave folder appdata brave in windows config brave in ubuntu cookie and cache make a backup of your profile turn on all clearing in preferences and shut down make sure when you bring the browser back up everything is gone that is specified go to and set an evercookie check that going to prefs clearing site data and cache and going back to the evercookie site does not remember the old evercookie value update tests test that updating using brave update version env variable works correctly test that using brave enable preview updates true env variable works and prompts for preview build updates
0
146,215
23,031,877,848
IssuesEvent
2022-07-22 14:38:40
coder/coder
https://api.github.com/repos/coder/coder
closed
Add icons to the workspace resources
design
Initial proposal: <img width="1347" alt="Screen Shot 2022-07-20 at 13 57 51" src="https://user-images.githubusercontent.com/3165839/180040046-a63b8797-8a6b-43e8-829b-38e9c34784b4.png"> Discord discussion: https://discord.com/channels/747933592273027093/991429648200245358/999314552560824441 Notes: - Drop the color changes - Try to make it more simple - Increase the contrast and make it more visible - The plan is to still keep using the text
1.0
Add icons to the workspace resources - Initial proposal: <img width="1347" alt="Screen Shot 2022-07-20 at 13 57 51" src="https://user-images.githubusercontent.com/3165839/180040046-a63b8797-8a6b-43e8-829b-38e9c34784b4.png"> Discord discussion: https://discord.com/channels/747933592273027093/991429648200245358/999314552560824441 Notes: - Drop the color changes - Try to make it more simple - Increase the contrast and make it more visible - The plan is to still keep using the text
design
add icons to the workspace resources initial proposal img width alt screen shot at src discord discussion notes drop the color changes try to make it more simple increase the contrast and make it more visible the plan is to still keep using the text
1
178,188
29,512,923,470
IssuesEvent
2023-06-04 06:11:43
SeSACTHON-Winner/SeSACTHON-Front
https://api.github.com/repos/SeSACTHON-Winner/SeSACTHON-Front
opened
[Feat] - Navigation기능 삭제 & MapAnnotation 뷰 만들기
Design
## To Do - [ ] Navigation기능 삭제 - [ ] MapAnnotation 뷰 만들기
1.0
[Feat] - Navigation기능 삭제 & MapAnnotation 뷰 만들기 - ## To Do - [ ] Navigation기능 삭제 - [ ] MapAnnotation 뷰 만들기
design
navigation기능 삭제 mapannotation 뷰 만들기 to do navigation기능 삭제 mapannotation 뷰 만들기
1
125,177
4,953,650,519
IssuesEvent
2016-12-01 15:36:32
department-of-veterans-affairs/vets-website
https://api.github.com/repos/department-of-veterans-affairs/vets-website
opened
FL Header consistencies
enhancement FL low-priority
Couple of header size inconsistencies. Please check the following - [ ] Page headers should be `h1` instead of `h3` - [ ] Service and Facility Locator on search page - [ ] Name of facility on detail page - [ ] In detail page, sidebar headings should use `h4 highlight` class - [ ] View on Map - [ ] Hours of Operation - [ ] Access to Care - [ ] In detail page, Services header should be `h2` We probably need to make a `h2 highlight` - [ ] All border-bottom color should be primary blue cc @melwoodard
1.0
FL Header consistencies - Couple of header size inconsistencies. Please check the following - [ ] Page headers should be `h1` instead of `h3` - [ ] Service and Facility Locator on search page - [ ] Name of facility on detail page - [ ] In detail page, sidebar headings should use `h4 highlight` class - [ ] View on Map - [ ] Hours of Operation - [ ] Access to Care - [ ] In detail page, Services header should be `h2` We probably need to make a `h2 highlight` - [ ] All border-bottom color should be primary blue cc @melwoodard
non_design
fl header consistencies couple of header size inconsistencies please check the following page headers should be instead of service and facility locator on search page name of facility on detail page in detail page sidebar headings should use highlight class view on map hours of operation access to care in detail page services header should be we probably need to make a highlight all border bottom color should be primary blue cc melwoodard
0
150,316
19,603,608,856
IssuesEvent
2022-01-06 06:06:57
snykiotcubedev/react-17.0.2
https://api.github.com/repos/snykiotcubedev/react-17.0.2
opened
CVE-2021-3803 (High) detected in nth-check-1.0.1.tgz, nth-check-1.0.2.tgz
security vulnerability
## CVE-2021-3803 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>nth-check-1.0.1.tgz</b>, <b>nth-check-1.0.2.tgz</b></p></summary> <p> <details><summary><b>nth-check-1.0.1.tgz</b></p></summary> <p>performant nth-check parser & compiler</p> <p>Library home page: <a href="https://registry.npmjs.org/nth-check/-/nth-check-1.0.1.tgz">https://registry.npmjs.org/nth-check/-/nth-check-1.0.1.tgz</a></p> <p> Dependency Hierarchy: - react-scripts-1.1.4.tgz (Root Library) - html-webpack-plugin-2.29.0.tgz - pretty-error-2.1.1.tgz - renderkid-2.0.1.tgz - css-select-1.2.0.tgz - :x: **nth-check-1.0.1.tgz** (Vulnerable Library) </details> <details><summary><b>nth-check-1.0.2.tgz</b></p></summary> <p>performant nth-check parser & compiler</p> <p>Library home page: <a href="https://registry.npmjs.org/nth-check/-/nth-check-1.0.2.tgz">https://registry.npmjs.org/nth-check/-/nth-check-1.0.2.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/nth-check/package.json</p> <p> Dependency Hierarchy: - react-scripts-3.4.1.tgz (Root Library) - html-webpack-plugin-4.0.0-beta.11.tgz - pretty-error-2.1.1.tgz - renderkid-2.0.3.tgz - css-select-1.2.0.tgz - :x: **nth-check-1.0.2.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/snykiotcubedev/react-17.0.2/commit/c546697344431dcd6c04b4fea877c488ef3a6ad5">c546697344431dcd6c04b4fea877c488ef3a6ad5</a></p> <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> nth-check is vulnerable to Inefficient Regular Expression Complexity <p>Publish Date: 2021-09-17 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-3803>CVE-2021-3803</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/fb55/nth-check/compare/v2.0.0...v2.0.1">https://github.com/fb55/nth-check/compare/v2.0.0...v2.0.1</a></p> <p>Release Date: 2021-09-17</p> <p>Fix Resolution: nth-check - v2.0.1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2021-3803 (High) detected in nth-check-1.0.1.tgz, nth-check-1.0.2.tgz - ## CVE-2021-3803 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>nth-check-1.0.1.tgz</b>, <b>nth-check-1.0.2.tgz</b></p></summary> <p> <details><summary><b>nth-check-1.0.1.tgz</b></p></summary> <p>performant nth-check parser & compiler</p> <p>Library home page: <a href="https://registry.npmjs.org/nth-check/-/nth-check-1.0.1.tgz">https://registry.npmjs.org/nth-check/-/nth-check-1.0.1.tgz</a></p> <p> Dependency Hierarchy: - react-scripts-1.1.4.tgz (Root Library) - html-webpack-plugin-2.29.0.tgz - pretty-error-2.1.1.tgz - renderkid-2.0.1.tgz - css-select-1.2.0.tgz - :x: **nth-check-1.0.1.tgz** (Vulnerable Library) </details> <details><summary><b>nth-check-1.0.2.tgz</b></p></summary> <p>performant nth-check parser & compiler</p> <p>Library home page: <a href="https://registry.npmjs.org/nth-check/-/nth-check-1.0.2.tgz">https://registry.npmjs.org/nth-check/-/nth-check-1.0.2.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/nth-check/package.json</p> <p> Dependency Hierarchy: - react-scripts-3.4.1.tgz (Root Library) - html-webpack-plugin-4.0.0-beta.11.tgz - pretty-error-2.1.1.tgz - renderkid-2.0.3.tgz - css-select-1.2.0.tgz - :x: **nth-check-1.0.2.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/snykiotcubedev/react-17.0.2/commit/c546697344431dcd6c04b4fea877c488ef3a6ad5">c546697344431dcd6c04b4fea877c488ef3a6ad5</a></p> <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> nth-check is vulnerable to Inefficient Regular Expression Complexity <p>Publish Date: 2021-09-17 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-3803>CVE-2021-3803</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/fb55/nth-check/compare/v2.0.0...v2.0.1">https://github.com/fb55/nth-check/compare/v2.0.0...v2.0.1</a></p> <p>Release Date: 2021-09-17</p> <p>Fix Resolution: nth-check - v2.0.1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_design
cve high detected in nth check tgz nth check tgz cve high severity vulnerability vulnerable libraries nth check tgz nth check tgz nth check tgz performant nth check parser compiler library home page a href dependency hierarchy react scripts tgz root library html webpack plugin tgz pretty error tgz renderkid tgz css select tgz x nth check tgz vulnerable library nth check tgz performant nth check parser compiler library home page a href path to dependency file package json path to vulnerable library node modules nth check package json dependency hierarchy react scripts tgz root library html webpack plugin beta tgz pretty error tgz renderkid tgz css select tgz x nth check tgz vulnerable library found in head commit a href found in base branch main vulnerability details nth check is vulnerable to inefficient regular expression complexity publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution nth check step up your open source security game with whitesource
0
96,918
28,050,602,753
IssuesEvent
2023-03-29 05:15:38
PaddlePaddle/Paddle
https://api.github.com/repos/PaddlePaddle/Paddle
closed
在MacOS下编译Paddle无法重复make
status/following-up type/build PFCC
### 问题描述 Issue Description ```bash make -j$(nproc) ``` ``` [ 0%] copy_if_different /Users/wangxin/repos/Paddle/build/paddle/phi/kernels/declarations.h [ 0%] copy_if_different /Users/wangxin/repos/Paddle/build/paddle/fluid/inference/api/paddle_inference_pass.h [ 0%] Built target extern_zlib [ 0%] copy_if_different /Users/wangxin/repos/Paddle/build/paddle/fluid/operators/jit/kernels.h [ 0%] Built target extern_eigen3 [ 1%] Built target extern_gflags [ 2%] Built target extern_threadpool [ 2%] copy_if_different /Users/wangxin/repos/Paddle/build/paddle/fluid/pybind/pybind.h [ 2%] copy_if_different /Users/wangxin/repos/Paddle/build/paddle/phi/ops/compat/signatures.h [ 2%] Built target extern_dlpack [ 2%] Built target copy_paddle_inference_pass_command [ 2%] Built target copy_declarations_command [ 2%] Built target copy_kernels_command [ 2%] Built target copy_signatures_command [ 2%] Built target copy_pybind_command [ 2%] Built target extern_lapack [ 2%] Built target extern_warpctc [ 3%] Built target extern_warprnnt [ 3%] Built target extern_utf8proc [ 4%] Built target extern_openblas [ 4%] Built target extern_cryptopp [ 4%] Built target extern_pybind [ 4%] Built target extern_pocketfft [ 4%] Built target extern_protobuf ... adding 'paddle/vision/transforms/__init__.py' adding 'paddle/vision/transforms/functional.py' adding 'paddle/vision/transforms/functional_cv2.py' adding 'paddle/vision/transforms/functional_pil.py' adding 'paddle/vision/transforms/functional_tensor.py' adding 'paddle/vision/transforms/transforms.py' adding 'paddlepaddle-0.0.0.data/scripts/paddle' adding 'paddlepaddle-0.0.0.dist-info/LICENSE' adding 'paddlepaddle-0.0.0.dist-info/METADATA' adding 'paddlepaddle-0.0.0.dist-info/WHEEL' adding 'paddlepaddle-0.0.0.dist-info/entry_points.txt' adding 'paddlepaddle-0.0.0.dist-info/top_level.txt' adding 'paddlepaddle-0.0.0.dist-info/RECORD' removing build/bdist.macosx-11.1-arm64/wheel [100%] Built target paddle_python ``` ```bash make -j$(nproc) ``` ``` [ 0%] copy_if_different /Users/wangxin/repos/Paddle/build/paddle/fluid/pybind/pybind.h [ 0%] Built target extern_zlib [ 0%] copy_if_different /Users/wangxin/repos/Paddle/build/paddle/phi/ops/compat/signatures.h [ 0%] copy_if_different /Users/wangxin/repos/Paddle/build/paddle/fluid/operators/jit/kernels.h [ 1%] Built target extern_gflags [ 1%] copy_if_different /Users/wangxin/repos/Paddle/build/paddle/phi/kernels/declarations.h [ 1%] Built target extern_eigen3 [ 1%] Built target extern_dlpack [ 2%] Built target extern_threadpool [ 2%] copy_if_different /Users/wangxin/repos/Paddle/build/paddle/fluid/inference/api/paddle_inference_pass.h [ 2%] Built target copy_signatures_command [ 2%] Built target copy_pybind_command [ 2%] Built target copy_kernels_command [ 2%] Built target copy_declarations_command [ 2%] Built target extern_warpctc [ 2%] Built target copy_paddle_inference_pass_command [ 3%] Built target extern_openblas [ 4%] Built target extern_warprnnt [ 4%] Built target extern_utf8proc [ 4%] Built target extern_lapack [ 4%] Built target extern_pybind [ 4%] Built target extern_cryptopp ... [100%] Built target inference_lib_dist error: /Applications/Xcode.app/Contents/Developer/Toolchains/XcodeDefault.xctoolchain/usr/bin/install_name_tool: for: /Users/wangxin/repos/Paddle/build/python/paddle/fluid/libpaddle.so (for architecture arm64) option "-add_rpath @loader_path/../libs/" would duplicate path, file already has LC_RPATH for: @loader_path/../libs/ Traceback (most recent call last): File "/Users/wangxin/repos/Paddle/build/python/setup.py", line 668, in <module> raise Exception("patch libpaddle.%s failed, command: %s" % (ext_name, command)) Exception: patch libpaddle..dylib failed, command: install_name_tool -add_rpath '@loader_path/../libs/' /Users/wangxin/repos/Paddle/build/python/paddle/fluid/libpaddle.so copying /Users/wangxin/repos/Paddle/paddle/fluid/inference/*.h -> /Users/wangxin/repos/Paddle/build/paddle_install_dir/paddle/fluid/inference make[2]: *** [python/build/.timestamp] Error 1 make[1]: *** [python/CMakeFiles/paddle_python.dir/all] Error 2 make[1]: *** Waiting for unfinished jobs.... ``` ### 版本&环境信息 Version & Environment Information Paddle version: N/A Paddle With CUDA: N/A OS: macOS 13.2.1 GCC version: N/A Clang version: 14.0.0 (clang-1400.0.29.202) CMake version: version 3.25.2 Libc version: N/A Python version: 3.10.9 CUDA version: N/A cuDNN version: N/A Nvidia driver version: N/A Nvidia driver List: N/A
1.0
在MacOS下编译Paddle无法重复make - ### 问题描述 Issue Description ```bash make -j$(nproc) ``` ``` [ 0%] copy_if_different /Users/wangxin/repos/Paddle/build/paddle/phi/kernels/declarations.h [ 0%] copy_if_different /Users/wangxin/repos/Paddle/build/paddle/fluid/inference/api/paddle_inference_pass.h [ 0%] Built target extern_zlib [ 0%] copy_if_different /Users/wangxin/repos/Paddle/build/paddle/fluid/operators/jit/kernels.h [ 0%] Built target extern_eigen3 [ 1%] Built target extern_gflags [ 2%] Built target extern_threadpool [ 2%] copy_if_different /Users/wangxin/repos/Paddle/build/paddle/fluid/pybind/pybind.h [ 2%] copy_if_different /Users/wangxin/repos/Paddle/build/paddle/phi/ops/compat/signatures.h [ 2%] Built target extern_dlpack [ 2%] Built target copy_paddle_inference_pass_command [ 2%] Built target copy_declarations_command [ 2%] Built target copy_kernels_command [ 2%] Built target copy_signatures_command [ 2%] Built target copy_pybind_command [ 2%] Built target extern_lapack [ 2%] Built target extern_warpctc [ 3%] Built target extern_warprnnt [ 3%] Built target extern_utf8proc [ 4%] Built target extern_openblas [ 4%] Built target extern_cryptopp [ 4%] Built target extern_pybind [ 4%] Built target extern_pocketfft [ 4%] Built target extern_protobuf ... adding 'paddle/vision/transforms/__init__.py' adding 'paddle/vision/transforms/functional.py' adding 'paddle/vision/transforms/functional_cv2.py' adding 'paddle/vision/transforms/functional_pil.py' adding 'paddle/vision/transforms/functional_tensor.py' adding 'paddle/vision/transforms/transforms.py' adding 'paddlepaddle-0.0.0.data/scripts/paddle' adding 'paddlepaddle-0.0.0.dist-info/LICENSE' adding 'paddlepaddle-0.0.0.dist-info/METADATA' adding 'paddlepaddle-0.0.0.dist-info/WHEEL' adding 'paddlepaddle-0.0.0.dist-info/entry_points.txt' adding 'paddlepaddle-0.0.0.dist-info/top_level.txt' adding 'paddlepaddle-0.0.0.dist-info/RECORD' removing build/bdist.macosx-11.1-arm64/wheel [100%] Built target paddle_python ``` ```bash make -j$(nproc) ``` ``` [ 0%] copy_if_different /Users/wangxin/repos/Paddle/build/paddle/fluid/pybind/pybind.h [ 0%] Built target extern_zlib [ 0%] copy_if_different /Users/wangxin/repos/Paddle/build/paddle/phi/ops/compat/signatures.h [ 0%] copy_if_different /Users/wangxin/repos/Paddle/build/paddle/fluid/operators/jit/kernels.h [ 1%] Built target extern_gflags [ 1%] copy_if_different /Users/wangxin/repos/Paddle/build/paddle/phi/kernels/declarations.h [ 1%] Built target extern_eigen3 [ 1%] Built target extern_dlpack [ 2%] Built target extern_threadpool [ 2%] copy_if_different /Users/wangxin/repos/Paddle/build/paddle/fluid/inference/api/paddle_inference_pass.h [ 2%] Built target copy_signatures_command [ 2%] Built target copy_pybind_command [ 2%] Built target copy_kernels_command [ 2%] Built target copy_declarations_command [ 2%] Built target extern_warpctc [ 2%] Built target copy_paddle_inference_pass_command [ 3%] Built target extern_openblas [ 4%] Built target extern_warprnnt [ 4%] Built target extern_utf8proc [ 4%] Built target extern_lapack [ 4%] Built target extern_pybind [ 4%] Built target extern_cryptopp ... [100%] Built target inference_lib_dist error: /Applications/Xcode.app/Contents/Developer/Toolchains/XcodeDefault.xctoolchain/usr/bin/install_name_tool: for: /Users/wangxin/repos/Paddle/build/python/paddle/fluid/libpaddle.so (for architecture arm64) option "-add_rpath @loader_path/../libs/" would duplicate path, file already has LC_RPATH for: @loader_path/../libs/ Traceback (most recent call last): File "/Users/wangxin/repos/Paddle/build/python/setup.py", line 668, in <module> raise Exception("patch libpaddle.%s failed, command: %s" % (ext_name, command)) Exception: patch libpaddle..dylib failed, command: install_name_tool -add_rpath '@loader_path/../libs/' /Users/wangxin/repos/Paddle/build/python/paddle/fluid/libpaddle.so copying /Users/wangxin/repos/Paddle/paddle/fluid/inference/*.h -> /Users/wangxin/repos/Paddle/build/paddle_install_dir/paddle/fluid/inference make[2]: *** [python/build/.timestamp] Error 1 make[1]: *** [python/CMakeFiles/paddle_python.dir/all] Error 2 make[1]: *** Waiting for unfinished jobs.... ``` ### 版本&环境信息 Version & Environment Information Paddle version: N/A Paddle With CUDA: N/A OS: macOS 13.2.1 GCC version: N/A Clang version: 14.0.0 (clang-1400.0.29.202) CMake version: version 3.25.2 Libc version: N/A Python version: 3.10.9 CUDA version: N/A cuDNN version: N/A Nvidia driver version: N/A Nvidia driver List: N/A
non_design
在macos下编译paddle无法重复make 问题描述 issue description bash make j nproc copy if different users wangxin repos paddle build paddle phi kernels declarations h copy if different users wangxin repos paddle build paddle fluid inference api paddle inference pass h built target extern zlib copy if different users wangxin repos paddle build paddle fluid operators jit kernels h built target extern built target extern gflags built target extern threadpool copy if different users wangxin repos paddle build paddle fluid pybind pybind h copy if different users wangxin repos paddle build paddle phi ops compat signatures h built target extern dlpack built target copy paddle inference pass command built target copy declarations command built target copy kernels command built target copy signatures command built target copy pybind command built target extern lapack built target extern warpctc built target extern warprnnt built target extern built target extern openblas built target extern cryptopp built target extern pybind built target extern pocketfft built target extern protobuf adding paddle vision transforms init py adding paddle vision transforms functional py adding paddle vision transforms functional py adding paddle vision transforms functional pil py adding paddle vision transforms functional tensor py adding paddle vision transforms transforms py adding paddlepaddle data scripts paddle adding paddlepaddle dist info license adding paddlepaddle dist info metadata adding paddlepaddle dist info wheel adding paddlepaddle dist info entry points txt adding paddlepaddle dist info top level txt adding paddlepaddle dist info record removing build bdist macosx wheel built target paddle python bash make j nproc copy if different users wangxin repos paddle build paddle fluid pybind pybind h built target extern zlib copy if different users wangxin repos paddle build paddle phi ops compat signatures h copy if different users wangxin repos paddle build paddle fluid operators jit kernels h built target extern gflags copy if different users wangxin repos paddle build paddle phi kernels declarations h built target extern built target extern dlpack built target extern threadpool copy if different users wangxin repos paddle build paddle fluid inference api paddle inference pass h built target copy signatures command built target copy pybind command built target copy kernels command built target copy declarations command built target extern warpctc built target copy paddle inference pass command built target extern openblas built target extern warprnnt built target extern built target extern lapack built target extern pybind built target extern cryptopp built target inference lib dist error applications xcode app contents developer toolchains xcodedefault xctoolchain usr bin install name tool for users wangxin repos paddle build python paddle fluid libpaddle so for architecture option add rpath loader path libs would duplicate path file already has lc rpath for loader path libs traceback most recent call last file users wangxin repos paddle build python setup py line in raise exception patch libpaddle s failed command s ext name command exception patch libpaddle dylib failed command install name tool add rpath loader path libs users wangxin repos paddle build python paddle fluid libpaddle so copying users wangxin repos paddle paddle fluid inference h users wangxin repos paddle build paddle install dir paddle fluid inference make error make error make waiting for unfinished jobs 版本 环境信息 version environment information paddle version n a paddle with cuda n a os macos gcc version n a clang version clang cmake version version libc version n a python version cuda version n a cudnn version n a nvidia driver version n a nvidia driver list n a
0
380,047
26,399,381,939
IssuesEvent
2023-01-12 22:58:26
chatwoot/chatwoot
https://api.github.com/repos/chatwoot/chatwoot
closed
yaml key duplication results in not all calls appearing in API docs
documentation
I've noticed that some duplicate keys appear in the swagger paths yaml files. This results in only one of the duplicated calls appearing in the final swagger.json. Some examples of this: https://github.com/chatwoot/chatwoot/blob/2880f4942a03a4a4ee40b023d00ae24da99e8ab7/swagger/paths/index.yml#L4-L8 https://github.com/chatwoot/chatwoot/blob/2880f4942a03a4a4ee40b023d00ae24da99e8ab7/swagger/paths/conversation/index_or_create.yml#L1-L81 Possible solution for the first instance of the issue: ```` # Inboxes /accounts/{account_id}/inboxes: get: $ref: ./inboxes/index.yml post: $ref: ./inboxes/create.yml ```` The second one is more difficult since I don't think swagger can differentiate between two GET calls with different query parameters and request bodies. This could possibly require a change in the API path.
1.0
yaml key duplication results in not all calls appearing in API docs - I've noticed that some duplicate keys appear in the swagger paths yaml files. This results in only one of the duplicated calls appearing in the final swagger.json. Some examples of this: https://github.com/chatwoot/chatwoot/blob/2880f4942a03a4a4ee40b023d00ae24da99e8ab7/swagger/paths/index.yml#L4-L8 https://github.com/chatwoot/chatwoot/blob/2880f4942a03a4a4ee40b023d00ae24da99e8ab7/swagger/paths/conversation/index_or_create.yml#L1-L81 Possible solution for the first instance of the issue: ```` # Inboxes /accounts/{account_id}/inboxes: get: $ref: ./inboxes/index.yml post: $ref: ./inboxes/create.yml ```` The second one is more difficult since I don't think swagger can differentiate between two GET calls with different query parameters and request bodies. This could possibly require a change in the API path.
non_design
yaml key duplication results in not all calls appearing in api docs i ve noticed that some duplicate keys appear in the swagger paths yaml files this results in only one of the duplicated calls appearing in the final swagger json some examples of this possible solution for the first instance of the issue inboxes accounts account id inboxes get ref inboxes index yml post ref inboxes create yml the second one is more difficult since i don t think swagger can differentiate between two get calls with different query parameters and request bodies this could possibly require a change in the api path
0
213,859
24,022,466,862
IssuesEvent
2022-09-15 08:47:57
sast-automation-dev/vulnado-25
https://api.github.com/repos/sast-automation-dev/vulnado-25
opened
spring-boot-starter-web-2.1.2.RELEASE.jar: 68 vulnerabilities (highest severity is: 9.8)
security vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>spring-boot-starter-web-2.1.2.RELEASE.jar</b></p></summary> <p></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-web/5.1.4.RELEASE/spring-web-5.1.4.RELEASE.jar</p> <p> <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/vulnado-25/commit/8124ec9320e9726976350f7385af80f7e6c3021d">8124ec9320e9726976350f7385af80f7e6c3021d</a></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | --- | --- | | [CVE-2019-14540](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-14540) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | &#9989; | | [CVE-2019-17531](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-17531) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | &#9989; | | [CVE-2016-1000027](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-1000027) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | spring-web-5.1.4.RELEASE.jar | Transitive | 2.1.15.RELEASE | &#9989; | | [CVE-2019-16335](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-16335) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.8.jar | Transitive | 2.1.10.RELEASE | &#9989; | | [CVE-2019-17267](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-17267) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.8.jar | Transitive | 2.1.10.RELEASE | &#9989; | | [CVE-2020-8840](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-8840) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | &#9989; | | [CVE-2019-16942](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-16942) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | &#9989; | | [CVE-2019-16943](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-16943) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | &#9989; | | [CVE-2019-14893](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-14893) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.8.jar | Transitive | 2.1.10.RELEASE | &#9989; | | [CVE-2019-14892](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-14892) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.8.jar | Transitive | 2.1.10.RELEASE | &#9989; | | [CVE-2020-9546](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-9546) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | &#9989; | | [CVE-2020-9547](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-9547) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | &#9989; | | [CVE-2019-14379](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-14379) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.8.jar | Transitive | 2.1.10.RELEASE | &#9989; | | [CVE-2020-9548](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-9548) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | &#9989; | | [CVE-2019-20330](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-20330) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | &#9989; | | [CVE-2020-10968](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-10968) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | jackson-databind-2.9.8.jar | Transitive | 2.1.6.RELEASE | &#9989; | | [CVE-2020-10969](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-10969) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | &#9989; | | [CVE-2020-11111](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11111) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | &#9989; | | [CVE-2020-11113](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11113) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | &#9989; | | [CVE-2020-11112](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11112) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | &#9989; | | [CVE-2020-10672](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-10672) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | &#9989; | | [CVE-2020-10673](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-10673) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | &#9989; | | [CVE-2019-0232](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-0232) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | tomcat-embed-core-9.0.14.jar | Transitive | 2.1.5.RELEASE | &#9989; | | [CVE-2020-11619](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11619) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | &#9989; | | [CVE-2020-35728](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-35728) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | &#9989; | | [CVE-2020-36189](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36189) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | &#9989; | | [CVE-2020-36188](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36188) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | &#9989; | | [CVE-2020-11620](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11620) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | &#9989; | | [CVE-2020-36181](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36181) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | &#9989; | | [CVE-2020-36180](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36180) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | &#9989; | | [CVE-2020-35490](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-35490) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | &#9989; | | [CVE-2020-36183](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36183) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | &#9989; | | [CVE-2020-36182](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36182) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | &#9989; | | [CVE-2020-36185](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36185) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | &#9989; | | [CVE-2020-35491](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-35491) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | &#9989; | | [CVE-2020-36184](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36184) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | &#9989; | | [CVE-2020-36187](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36187) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | &#9989; | | [CVE-2020-36186](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36186) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | &#9989; | | [CVE-2021-20190](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-20190) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | &#9989; | | [CVE-2020-36179](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36179) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | &#9989; | | [CVE-2020-24616](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-24616) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | &#9989; | | [CVE-2020-14060](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-14060) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | &#9989; | | [CVE-2020-14061](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-14061) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | &#9989; | | [CVE-2020-14062](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-14062) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | &#9989; | | [CVE-2020-24750](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-24750) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | &#9989; | | [CVE-2020-14195](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-14195) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | &#9989; | | [CVE-2019-12086](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-12086) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | jackson-databind-2.9.8.jar | Transitive | 2.1.6.RELEASE | &#9989; | | [CVE-2020-25649](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-25649) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | &#9989; | | [CVE-2020-5398](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-5398) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | spring-web-5.1.4.RELEASE.jar | Transitive | 2.1.12.RELEASE | &#9989; | | [CVE-2019-10072](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-10072) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | tomcat-embed-core-9.0.14.jar | Transitive | 2.1.6.RELEASE | &#9989; | | [CVE-2019-14439](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-14439) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | jackson-databind-2.9.8.jar | Transitive | 2.1.10.RELEASE | &#9989; | | [CVE-2021-25122](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-25122) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | tomcat-embed-core-9.0.14.jar | Transitive | 2.1.7.RELEASE | &#9989; | | [CVE-2019-17563](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-17563) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | tomcat-embed-core-9.0.14.jar | Transitive | 2.1.7.RELEASE | &#9989; | | [CVE-2020-11996](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11996) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | tomcat-embed-core-9.0.14.jar | Transitive | 2.1.7.RELEASE | &#9989; | | [CVE-2020-13934](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-13934) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | tomcat-embed-core-9.0.14.jar | Transitive | 2.1.7.RELEASE | &#9989; | | [CVE-2020-13935](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-13935) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | tomcat-embed-websocket-9.0.14.jar | Transitive | 2.1.13.RELEASE | &#9989; | | [CVE-2020-9484](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-9484) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.0 | tomcat-embed-core-9.0.14.jar | Transitive | 2.1.7.RELEASE | &#9989; | | [CVE-2021-25329](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-25329) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.0 | tomcat-embed-core-9.0.14.jar | Transitive | 2.1.7.RELEASE | &#9989; | | [CVE-2020-5421](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-5421) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.5 | spring-web-5.1.4.RELEASE.jar | Transitive | 2.1.17.RELEASE | &#9989; | | [CVE-2019-0221](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-0221) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | tomcat-embed-core-9.0.14.jar | Transitive | 2.1.5.RELEASE | &#9989; | | [CVE-2019-10219](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-10219) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | hibernate-validator-6.0.14.Final.jar | Transitive | 2.1.10.RELEASE | &#9989; | | [CVE-2019-12814](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-12814) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.9 | jackson-databind-2.9.8.jar | Transitive | 2.1.10.RELEASE | &#9989; | | [CVE-2019-12384](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-12384) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.9 | jackson-databind-2.9.8.jar | Transitive | 2.1.10.RELEASE | &#9989; | | [CVE-2021-24122](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-24122) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.9 | tomcat-embed-core-9.0.14.jar | Transitive | 2.1.7.RELEASE | &#9989; | | [CVE-2020-10693](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-10693) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.3 | hibernate-validator-6.0.14.Final.jar | Transitive | 2.1.15.RELEASE | &#9989; | | [CVE-2019-10202](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-10202) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 4.9 | jackson-databind-2.9.8.jar | Transitive | N/A | &#10060; | | [CVE-2020-1935](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-1935) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 4.8 | tomcat-embed-core-9.0.14.jar | Transitive | 2.1.7.RELEASE | &#9989; | | [CVE-2020-13943](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-13943) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 4.3 | tomcat-embed-core-9.0.14.jar | Transitive | 2.1.7.RELEASE | &#9989; | ## Details > Partial details (18 vulnerabilities) are displayed below due to a content size limitation in GitHub. To view information on the remaining vulnerabilities, navigate to the Mend Application.<br> <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-14540</summary> ### Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-web-2.1.2.RELEASE.jar (Root Library) - spring-boot-starter-json-2.1.2.RELEASE.jar - :x: **jackson-databind-2.9.8.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/vulnado-25/commit/8124ec9320e9726976350f7385af80f7e6c3021d">8124ec9320e9726976350f7385af80f7e6c3021d</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to com.zaxxer.hikari.HikariConfig. <p>Publish Date: 2019-09-15 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-14540>CVE-2019-14540</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14540">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14540</a></p> <p>Release Date: 2019-09-15</p> <p>Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.redhat-00005</p> <p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.2.0.RELEASE</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-17531</summary> ### Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-web-2.1.2.RELEASE.jar (Root Library) - spring-boot-starter-json-2.1.2.RELEASE.jar - :x: **jackson-databind-2.9.8.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/vulnado-25/commit/8124ec9320e9726976350f7385af80f7e6c3021d">8124ec9320e9726976350f7385af80f7e6c3021d</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the apache-log4j-extra (version 1.2.x) jar in the classpath, and an attacker can provide a JNDI service to access, it is possible to make the service execute a malicious payload. <p>Publish Date: 2019-10-12 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-17531>CVE-2019-17531</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17531">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17531</a></p> <p>Release Date: 2019-10-12</p> <p>Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.redhat-00002</p> <p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.2.0.RELEASE</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2016-1000027</summary> ### Vulnerable Library - <b>spring-web-5.1.4.RELEASE.jar</b></p> <p>Spring Web</p> <p>Library home page: <a href="https://github.com/spring-projects/spring-framework">https://github.com/spring-projects/spring-framework</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-web/5.1.4.RELEASE/spring-web-5.1.4.RELEASE.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-web-2.1.2.RELEASE.jar (Root Library) - :x: **spring-web-5.1.4.RELEASE.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/vulnado-25/commit/8124ec9320e9726976350f7385af80f7e6c3021d">8124ec9320e9726976350f7385af80f7e6c3021d</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> Pivotal Spring Framework 4.1.4 suffers from a potential remote code execution (RCE) issue if used for Java deserialization of untrusted data. Depending on how the library is implemented within a product, this issue may or not occur, and authentication may be required. <p>Publish Date: 2020-01-02 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-1000027>CVE-2016-1000027</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2020-01-02</p> <p>Fix Resolution (org.springframework:spring-web): 5.1.16.RELEASE</p> <p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.1.15.RELEASE</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-16335</summary> ### Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-web-2.1.2.RELEASE.jar (Root Library) - spring-boot-starter-json-2.1.2.RELEASE.jar - :x: **jackson-databind-2.9.8.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/vulnado-25/commit/8124ec9320e9726976350f7385af80f7e6c3021d">8124ec9320e9726976350f7385af80f7e6c3021d</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to com.zaxxer.hikari.HikariDataSource. This is a different vulnerability than CVE-2019-14540. <p>Publish Date: 2019-09-15 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-16335>CVE-2019-16335</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2019-09-15</p> <p>Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.9.3-redhat-00001</p> <p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.1.10.RELEASE</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-17267</summary> ### Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-web-2.1.2.RELEASE.jar (Root Library) - spring-boot-starter-json-2.1.2.RELEASE.jar - :x: **jackson-databind-2.9.8.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/vulnado-25/commit/8124ec9320e9726976350f7385af80f7e6c3021d">8124ec9320e9726976350f7385af80f7e6c3021d</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to net.sf.ehcache.hibernate.EhcacheJtaTransactionManagerLookup. <p>Publish Date: 2019-10-07 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-17267>CVE-2019-17267</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2019-10-07</p> <p>Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.9.3-redhat-00001</p> <p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.1.10.RELEASE</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-8840</summary> ### Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-web-2.1.2.RELEASE.jar (Root Library) - spring-boot-starter-json-2.1.2.RELEASE.jar - :x: **jackson-databind-2.9.8.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/vulnado-25/commit/8124ec9320e9726976350f7385af80f7e6c3021d">8124ec9320e9726976350f7385af80f7e6c3021d</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> FasterXML jackson-databind 2.0.0 through 2.9.10.2 lacks certain xbean-reflect/JNDI blocking, as demonstrated by org.apache.xbean.propertyeditor.JndiConverter. <p>Publish Date: 2020-02-10 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-8840>CVE-2020-8840</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2020-02-10</p> <p>Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.redhat-00005</p> <p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.2.0.RELEASE</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-16942</summary> ### Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-web-2.1.2.RELEASE.jar (Root Library) - spring-boot-starter-json-2.1.2.RELEASE.jar - :x: **jackson-databind-2.9.8.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/vulnado-25/commit/8124ec9320e9726976350f7385af80f7e6c3021d">8124ec9320e9726976350f7385af80f7e6c3021d</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the commons-dbcp (1.4) jar in the classpath, and an attacker can find an RMI service endpoint to access, it is possible to make the service execute a malicious payload. This issue exists because of org.apache.commons.dbcp.datasources.SharedPoolDataSource and org.apache.commons.dbcp.datasources.PerUserPoolDataSource mishandling. <p>Publish Date: 2019-10-01 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-16942>CVE-2019-16942</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16942">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16942</a></p> <p>Release Date: 2019-10-01</p> <p>Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.redhat-00002</p> <p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.2.0.RELEASE</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-16943</summary> ### Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-web-2.1.2.RELEASE.jar (Root Library) - spring-boot-starter-json-2.1.2.RELEASE.jar - :x: **jackson-databind-2.9.8.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/vulnado-25/commit/8124ec9320e9726976350f7385af80f7e6c3021d">8124ec9320e9726976350f7385af80f7e6c3021d</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the p6spy (3.8.6) jar in the classpath, and an attacker can find an RMI service endpoint to access, it is possible to make the service execute a malicious payload. This issue exists because of com.p6spy.engine.spy.P6DataSource mishandling. <p>Publish Date: 2019-10-01 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-16943>CVE-2019-16943</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16943">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16943</a></p> <p>Release Date: 2019-10-01</p> <p>Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.redhat-00002</p> <p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.2.0.RELEASE</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-14893</summary> ### Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-web-2.1.2.RELEASE.jar (Root Library) - spring-boot-starter-json-2.1.2.RELEASE.jar - :x: **jackson-databind-2.9.8.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/vulnado-25/commit/8124ec9320e9726976350f7385af80f7e6c3021d">8124ec9320e9726976350f7385af80f7e6c3021d</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> A flaw was discovered in FasterXML jackson-databind in all versions before 2.9.10 and 2.10.0, where it would permit polymorphic deserialization of malicious objects using the xalan JNDI gadget when used in conjunction with polymorphic type handling methods such as `enableDefaultTyping()` or when @JsonTypeInfo is using `Id.CLASS` or `Id.MINIMAL_CLASS` or in any other way which ObjectMapper.readValue might instantiate objects from unsafe sources. An attacker could use this flaw to execute arbitrary code. <p>Publish Date: 2020-03-02 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-14893>CVE-2019-14893</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14893">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14893</a></p> <p>Release Date: 2020-03-02</p> <p>Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10</p> <p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.1.10.RELEASE</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-14892</summary> ### Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-web-2.1.2.RELEASE.jar (Root Library) - spring-boot-starter-json-2.1.2.RELEASE.jar - :x: **jackson-databind-2.9.8.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/vulnado-25/commit/8124ec9320e9726976350f7385af80f7e6c3021d">8124ec9320e9726976350f7385af80f7e6c3021d</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> A flaw was discovered in jackson-databind in versions before 2.9.10, 2.8.11.5 and 2.6.7.3, where it would permit polymorphic deserialization of a malicious object using commons-configuration 1 and 2 JNDI classes. An attacker could use this flaw to execute arbitrary code. <p>Publish Date: 2020-03-02 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-14892>CVE-2019-14892</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2020-09-04</p> <p>Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.9.3-redhat-00001</p> <p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.1.10.RELEASE</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-9546</summary> ### Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-web-2.1.2.RELEASE.jar (Root Library) - spring-boot-starter-json-2.1.2.RELEASE.jar - :x: **jackson-databind-2.9.8.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/vulnado-25/commit/8124ec9320e9726976350f7385af80f7e6c3021d">8124ec9320e9726976350f7385af80f7e6c3021d</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.hadoop.shaded.com.zaxxer.hikari.HikariConfig (aka shaded hikari-config). <p>Publish Date: 2020-03-02 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-9546>CVE-2020-9546</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9546">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9546</a></p> <p>Release Date: 2020-03-02</p> <p>Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.redhat-00005</p> <p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.2.0.RELEASE</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-9547</summary> ### Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-web-2.1.2.RELEASE.jar (Root Library) - spring-boot-starter-json-2.1.2.RELEASE.jar - :x: **jackson-databind-2.9.8.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/vulnado-25/commit/8124ec9320e9726976350f7385af80f7e6c3021d">8124ec9320e9726976350f7385af80f7e6c3021d</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to com.ibatis.sqlmap.engine.transaction.jta.JtaTransactionConfig (aka ibatis-sqlmap). <p>Publish Date: 2020-03-02 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-9547>CVE-2020-9547</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9547">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9547</a></p> <p>Release Date: 2020-03-02</p> <p>Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.redhat-00005</p> <p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.2.0.RELEASE</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-14379</summary> ### Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-web-2.1.2.RELEASE.jar (Root Library) - spring-boot-starter-json-2.1.2.RELEASE.jar - :x: **jackson-databind-2.9.8.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/vulnado-25/commit/8124ec9320e9726976350f7385af80f7e6c3021d">8124ec9320e9726976350f7385af80f7e6c3021d</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> SubTypeValidator.java in FasterXML jackson-databind before 2.9.9.2 mishandles default typing when ehcache is used (because of net.sf.ehcache.transaction.manager.DefaultTransactionManagerLookup), leading to remote code execution. <p>Publish Date: 2019-07-29 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-14379>CVE-2019-14379</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14379">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14379</a></p> <p>Release Date: 2019-07-29</p> <p>Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.9.2</p> <p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.1.10.RELEASE</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-9548</summary> ### Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-web-2.1.2.RELEASE.jar (Root Library) - spring-boot-starter-json-2.1.2.RELEASE.jar - :x: **jackson-databind-2.9.8.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/vulnado-25/commit/8124ec9320e9726976350f7385af80f7e6c3021d">8124ec9320e9726976350f7385af80f7e6c3021d</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPConfig (aka anteros-core). <p>Publish Date: 2020-03-02 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-9548>CVE-2020-9548</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9548">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9548</a></p> <p>Release Date: 2020-03-02</p> <p>Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.redhat-00005</p> <p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.2.0.RELEASE</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-20330</summary> ### Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-web-2.1.2.RELEASE.jar (Root Library) - spring-boot-starter-json-2.1.2.RELEASE.jar - :x: **jackson-databind-2.9.8.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/vulnado-25/commit/8124ec9320e9726976350f7385af80f7e6c3021d">8124ec9320e9726976350f7385af80f7e6c3021d</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> FasterXML jackson-databind 2.x before 2.9.10.2 lacks certain net.sf.ehcache blocking. <p>Publish Date: 2020-01-03 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-20330>CVE-2019-20330</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2020-01-03</p> <p>Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.redhat-00005</p> <p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.2.0.RELEASE</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-10968</summary> ### Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-web-2.1.2.RELEASE.jar (Root Library) - spring-boot-starter-json-2.1.2.RELEASE.jar - :x: **jackson-databind-2.9.8.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/vulnado-25/commit/8124ec9320e9726976350f7385af80f7e6c3021d">8124ec9320e9726976350f7385af80f7e6c3021d</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.aoju.bus.proxy.provider.remoting.RmiProvider (aka bus-proxy). <p>Publish Date: 2020-03-26 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-10968>CVE-2020-10968</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-10968">https://nvd.nist.gov/vuln/detail/CVE-2020-10968</a></p> <p>Release Date: 2020-03-26</p> <p>Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.8.redhat-00002</p> <p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.1.6.RELEASE</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-10969</summary> ### Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-web-2.1.2.RELEASE.jar (Root Library) - spring-boot-starter-json-2.1.2.RELEASE.jar - :x: **jackson-databind-2.9.8.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/vulnado-25/commit/8124ec9320e9726976350f7385af80f7e6c3021d">8124ec9320e9726976350f7385af80f7e6c3021d</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to javax.swing.JEditorPane. <p>Publish Date: 2020-03-26 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-10969>CVE-2020-10969</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10969">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10969</a></p> <p>Release Date: 2020-03-26</p> <p>Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.redhat-00005</p> <p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.2.0.RELEASE</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-11111</summary> ### Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-web-2.1.2.RELEASE.jar (Root Library) - spring-boot-starter-json-2.1.2.RELEASE.jar - :x: **jackson-databind-2.9.8.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/vulnado-25/commit/8124ec9320e9726976350f7385af80f7e6c3021d">8124ec9320e9726976350f7385af80f7e6c3021d</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.activemq.* (aka activemq-jms, activemq-core, activemq-pool, and activemq-pool-jms). <p>Publish Date: 2020-03-31 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11111>CVE-2020-11111</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11113">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11113</a></p> <p>Release Date: 2020-03-31</p> <p>Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.redhat-00005</p> <p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.2.0.RELEASE</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details> *** <p>:rescue_worker_helmet: Automatic Remediation is available for this issue.</p>
True
spring-boot-starter-web-2.1.2.RELEASE.jar: 68 vulnerabilities (highest severity is: 9.8) - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>spring-boot-starter-web-2.1.2.RELEASE.jar</b></p></summary> <p></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-web/5.1.4.RELEASE/spring-web-5.1.4.RELEASE.jar</p> <p> <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/vulnado-25/commit/8124ec9320e9726976350f7385af80f7e6c3021d">8124ec9320e9726976350f7385af80f7e6c3021d</a></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | --- | --- | | [CVE-2019-14540](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-14540) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | &#9989; | | [CVE-2019-17531](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-17531) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | &#9989; | | [CVE-2016-1000027](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-1000027) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | spring-web-5.1.4.RELEASE.jar | Transitive | 2.1.15.RELEASE | &#9989; | | [CVE-2019-16335](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-16335) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.8.jar | Transitive | 2.1.10.RELEASE | &#9989; | | [CVE-2019-17267](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-17267) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.8.jar | Transitive | 2.1.10.RELEASE | &#9989; | | [CVE-2020-8840](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-8840) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | &#9989; | | [CVE-2019-16942](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-16942) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | &#9989; | | [CVE-2019-16943](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-16943) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | &#9989; | | [CVE-2019-14893](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-14893) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.8.jar | Transitive | 2.1.10.RELEASE | &#9989; | | [CVE-2019-14892](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-14892) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.8.jar | Transitive | 2.1.10.RELEASE | &#9989; | | [CVE-2020-9546](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-9546) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | &#9989; | | [CVE-2020-9547](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-9547) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | &#9989; | | [CVE-2019-14379](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-14379) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.8.jar | Transitive | 2.1.10.RELEASE | &#9989; | | [CVE-2020-9548](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-9548) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | &#9989; | | [CVE-2019-20330](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-20330) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | &#9989; | | [CVE-2020-10968](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-10968) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | jackson-databind-2.9.8.jar | Transitive | 2.1.6.RELEASE | &#9989; | | [CVE-2020-10969](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-10969) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | &#9989; | | [CVE-2020-11111](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11111) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | &#9989; | | [CVE-2020-11113](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11113) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | &#9989; | | [CVE-2020-11112](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11112) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | &#9989; | | [CVE-2020-10672](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-10672) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | &#9989; | | [CVE-2020-10673](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-10673) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | &#9989; | | [CVE-2019-0232](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-0232) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | tomcat-embed-core-9.0.14.jar | Transitive | 2.1.5.RELEASE | &#9989; | | [CVE-2020-11619](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11619) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | &#9989; | | [CVE-2020-35728](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-35728) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | &#9989; | | [CVE-2020-36189](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36189) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | &#9989; | | [CVE-2020-36188](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36188) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | &#9989; | | [CVE-2020-11620](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11620) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | &#9989; | | [CVE-2020-36181](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36181) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | &#9989; | | [CVE-2020-36180](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36180) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | &#9989; | | [CVE-2020-35490](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-35490) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | &#9989; | | [CVE-2020-36183](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36183) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | &#9989; | | [CVE-2020-36182](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36182) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | &#9989; | | [CVE-2020-36185](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36185) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | &#9989; | | [CVE-2020-35491](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-35491) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | &#9989; | | [CVE-2020-36184](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36184) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | &#9989; | | [CVE-2020-36187](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36187) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | &#9989; | | [CVE-2020-36186](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36186) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | &#9989; | | [CVE-2021-20190](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-20190) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | &#9989; | | [CVE-2020-36179](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36179) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | &#9989; | | [CVE-2020-24616](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-24616) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | &#9989; | | [CVE-2020-14060](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-14060) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | &#9989; | | [CVE-2020-14061](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-14061) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | &#9989; | | [CVE-2020-14062](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-14062) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | &#9989; | | [CVE-2020-24750](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-24750) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | &#9989; | | [CVE-2020-14195](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-14195) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | &#9989; | | [CVE-2019-12086](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-12086) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | jackson-databind-2.9.8.jar | Transitive | 2.1.6.RELEASE | &#9989; | | [CVE-2020-25649](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-25649) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | jackson-databind-2.9.8.jar | Transitive | 2.2.0.RELEASE | &#9989; | | [CVE-2020-5398](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-5398) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | spring-web-5.1.4.RELEASE.jar | Transitive | 2.1.12.RELEASE | &#9989; | | [CVE-2019-10072](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-10072) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | tomcat-embed-core-9.0.14.jar | Transitive | 2.1.6.RELEASE | &#9989; | | [CVE-2019-14439](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-14439) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | jackson-databind-2.9.8.jar | Transitive | 2.1.10.RELEASE | &#9989; | | [CVE-2021-25122](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-25122) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | tomcat-embed-core-9.0.14.jar | Transitive | 2.1.7.RELEASE | &#9989; | | [CVE-2019-17563](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-17563) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | tomcat-embed-core-9.0.14.jar | Transitive | 2.1.7.RELEASE | &#9989; | | [CVE-2020-11996](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11996) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | tomcat-embed-core-9.0.14.jar | Transitive | 2.1.7.RELEASE | &#9989; | | [CVE-2020-13934](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-13934) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | tomcat-embed-core-9.0.14.jar | Transitive | 2.1.7.RELEASE | &#9989; | | [CVE-2020-13935](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-13935) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | tomcat-embed-websocket-9.0.14.jar | Transitive | 2.1.13.RELEASE | &#9989; | | [CVE-2020-9484](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-9484) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.0 | tomcat-embed-core-9.0.14.jar | Transitive | 2.1.7.RELEASE | &#9989; | | [CVE-2021-25329](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-25329) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.0 | tomcat-embed-core-9.0.14.jar | Transitive | 2.1.7.RELEASE | &#9989; | | [CVE-2020-5421](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-5421) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.5 | spring-web-5.1.4.RELEASE.jar | Transitive | 2.1.17.RELEASE | &#9989; | | [CVE-2019-0221](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-0221) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | tomcat-embed-core-9.0.14.jar | Transitive | 2.1.5.RELEASE | &#9989; | | [CVE-2019-10219](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-10219) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | hibernate-validator-6.0.14.Final.jar | Transitive | 2.1.10.RELEASE | &#9989; | | [CVE-2019-12814](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-12814) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.9 | jackson-databind-2.9.8.jar | Transitive | 2.1.10.RELEASE | &#9989; | | [CVE-2019-12384](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-12384) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.9 | jackson-databind-2.9.8.jar | Transitive | 2.1.10.RELEASE | &#9989; | | [CVE-2021-24122](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-24122) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.9 | tomcat-embed-core-9.0.14.jar | Transitive | 2.1.7.RELEASE | &#9989; | | [CVE-2020-10693](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-10693) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.3 | hibernate-validator-6.0.14.Final.jar | Transitive | 2.1.15.RELEASE | &#9989; | | [CVE-2019-10202](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-10202) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 4.9 | jackson-databind-2.9.8.jar | Transitive | N/A | &#10060; | | [CVE-2020-1935](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-1935) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 4.8 | tomcat-embed-core-9.0.14.jar | Transitive | 2.1.7.RELEASE | &#9989; | | [CVE-2020-13943](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-13943) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 4.3 | tomcat-embed-core-9.0.14.jar | Transitive | 2.1.7.RELEASE | &#9989; | ## Details > Partial details (18 vulnerabilities) are displayed below due to a content size limitation in GitHub. To view information on the remaining vulnerabilities, navigate to the Mend Application.<br> <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-14540</summary> ### Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-web-2.1.2.RELEASE.jar (Root Library) - spring-boot-starter-json-2.1.2.RELEASE.jar - :x: **jackson-databind-2.9.8.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/vulnado-25/commit/8124ec9320e9726976350f7385af80f7e6c3021d">8124ec9320e9726976350f7385af80f7e6c3021d</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to com.zaxxer.hikari.HikariConfig. <p>Publish Date: 2019-09-15 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-14540>CVE-2019-14540</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14540">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14540</a></p> <p>Release Date: 2019-09-15</p> <p>Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.redhat-00005</p> <p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.2.0.RELEASE</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-17531</summary> ### Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-web-2.1.2.RELEASE.jar (Root Library) - spring-boot-starter-json-2.1.2.RELEASE.jar - :x: **jackson-databind-2.9.8.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/vulnado-25/commit/8124ec9320e9726976350f7385af80f7e6c3021d">8124ec9320e9726976350f7385af80f7e6c3021d</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the apache-log4j-extra (version 1.2.x) jar in the classpath, and an attacker can provide a JNDI service to access, it is possible to make the service execute a malicious payload. <p>Publish Date: 2019-10-12 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-17531>CVE-2019-17531</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17531">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17531</a></p> <p>Release Date: 2019-10-12</p> <p>Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.redhat-00002</p> <p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.2.0.RELEASE</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2016-1000027</summary> ### Vulnerable Library - <b>spring-web-5.1.4.RELEASE.jar</b></p> <p>Spring Web</p> <p>Library home page: <a href="https://github.com/spring-projects/spring-framework">https://github.com/spring-projects/spring-framework</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-web/5.1.4.RELEASE/spring-web-5.1.4.RELEASE.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-web-2.1.2.RELEASE.jar (Root Library) - :x: **spring-web-5.1.4.RELEASE.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/vulnado-25/commit/8124ec9320e9726976350f7385af80f7e6c3021d">8124ec9320e9726976350f7385af80f7e6c3021d</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> Pivotal Spring Framework 4.1.4 suffers from a potential remote code execution (RCE) issue if used for Java deserialization of untrusted data. Depending on how the library is implemented within a product, this issue may or not occur, and authentication may be required. <p>Publish Date: 2020-01-02 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-1000027>CVE-2016-1000027</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2020-01-02</p> <p>Fix Resolution (org.springframework:spring-web): 5.1.16.RELEASE</p> <p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.1.15.RELEASE</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-16335</summary> ### Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-web-2.1.2.RELEASE.jar (Root Library) - spring-boot-starter-json-2.1.2.RELEASE.jar - :x: **jackson-databind-2.9.8.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/vulnado-25/commit/8124ec9320e9726976350f7385af80f7e6c3021d">8124ec9320e9726976350f7385af80f7e6c3021d</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to com.zaxxer.hikari.HikariDataSource. This is a different vulnerability than CVE-2019-14540. <p>Publish Date: 2019-09-15 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-16335>CVE-2019-16335</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2019-09-15</p> <p>Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.9.3-redhat-00001</p> <p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.1.10.RELEASE</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-17267</summary> ### Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-web-2.1.2.RELEASE.jar (Root Library) - spring-boot-starter-json-2.1.2.RELEASE.jar - :x: **jackson-databind-2.9.8.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/vulnado-25/commit/8124ec9320e9726976350f7385af80f7e6c3021d">8124ec9320e9726976350f7385af80f7e6c3021d</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to net.sf.ehcache.hibernate.EhcacheJtaTransactionManagerLookup. <p>Publish Date: 2019-10-07 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-17267>CVE-2019-17267</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2019-10-07</p> <p>Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.9.3-redhat-00001</p> <p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.1.10.RELEASE</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-8840</summary> ### Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-web-2.1.2.RELEASE.jar (Root Library) - spring-boot-starter-json-2.1.2.RELEASE.jar - :x: **jackson-databind-2.9.8.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/vulnado-25/commit/8124ec9320e9726976350f7385af80f7e6c3021d">8124ec9320e9726976350f7385af80f7e6c3021d</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> FasterXML jackson-databind 2.0.0 through 2.9.10.2 lacks certain xbean-reflect/JNDI blocking, as demonstrated by org.apache.xbean.propertyeditor.JndiConverter. <p>Publish Date: 2020-02-10 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-8840>CVE-2020-8840</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2020-02-10</p> <p>Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.redhat-00005</p> <p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.2.0.RELEASE</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-16942</summary> ### Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-web-2.1.2.RELEASE.jar (Root Library) - spring-boot-starter-json-2.1.2.RELEASE.jar - :x: **jackson-databind-2.9.8.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/vulnado-25/commit/8124ec9320e9726976350f7385af80f7e6c3021d">8124ec9320e9726976350f7385af80f7e6c3021d</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the commons-dbcp (1.4) jar in the classpath, and an attacker can find an RMI service endpoint to access, it is possible to make the service execute a malicious payload. This issue exists because of org.apache.commons.dbcp.datasources.SharedPoolDataSource and org.apache.commons.dbcp.datasources.PerUserPoolDataSource mishandling. <p>Publish Date: 2019-10-01 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-16942>CVE-2019-16942</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16942">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16942</a></p> <p>Release Date: 2019-10-01</p> <p>Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.redhat-00002</p> <p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.2.0.RELEASE</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-16943</summary> ### Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-web-2.1.2.RELEASE.jar (Root Library) - spring-boot-starter-json-2.1.2.RELEASE.jar - :x: **jackson-databind-2.9.8.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/vulnado-25/commit/8124ec9320e9726976350f7385af80f7e6c3021d">8124ec9320e9726976350f7385af80f7e6c3021d</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the p6spy (3.8.6) jar in the classpath, and an attacker can find an RMI service endpoint to access, it is possible to make the service execute a malicious payload. This issue exists because of com.p6spy.engine.spy.P6DataSource mishandling. <p>Publish Date: 2019-10-01 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-16943>CVE-2019-16943</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16943">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16943</a></p> <p>Release Date: 2019-10-01</p> <p>Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.redhat-00002</p> <p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.2.0.RELEASE</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-14893</summary> ### Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-web-2.1.2.RELEASE.jar (Root Library) - spring-boot-starter-json-2.1.2.RELEASE.jar - :x: **jackson-databind-2.9.8.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/vulnado-25/commit/8124ec9320e9726976350f7385af80f7e6c3021d">8124ec9320e9726976350f7385af80f7e6c3021d</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> A flaw was discovered in FasterXML jackson-databind in all versions before 2.9.10 and 2.10.0, where it would permit polymorphic deserialization of malicious objects using the xalan JNDI gadget when used in conjunction with polymorphic type handling methods such as `enableDefaultTyping()` or when @JsonTypeInfo is using `Id.CLASS` or `Id.MINIMAL_CLASS` or in any other way which ObjectMapper.readValue might instantiate objects from unsafe sources. An attacker could use this flaw to execute arbitrary code. <p>Publish Date: 2020-03-02 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-14893>CVE-2019-14893</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14893">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14893</a></p> <p>Release Date: 2020-03-02</p> <p>Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10</p> <p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.1.10.RELEASE</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-14892</summary> ### Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-web-2.1.2.RELEASE.jar (Root Library) - spring-boot-starter-json-2.1.2.RELEASE.jar - :x: **jackson-databind-2.9.8.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/vulnado-25/commit/8124ec9320e9726976350f7385af80f7e6c3021d">8124ec9320e9726976350f7385af80f7e6c3021d</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> A flaw was discovered in jackson-databind in versions before 2.9.10, 2.8.11.5 and 2.6.7.3, where it would permit polymorphic deserialization of a malicious object using commons-configuration 1 and 2 JNDI classes. An attacker could use this flaw to execute arbitrary code. <p>Publish Date: 2020-03-02 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-14892>CVE-2019-14892</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2020-09-04</p> <p>Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.9.3-redhat-00001</p> <p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.1.10.RELEASE</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-9546</summary> ### Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-web-2.1.2.RELEASE.jar (Root Library) - spring-boot-starter-json-2.1.2.RELEASE.jar - :x: **jackson-databind-2.9.8.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/vulnado-25/commit/8124ec9320e9726976350f7385af80f7e6c3021d">8124ec9320e9726976350f7385af80f7e6c3021d</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.hadoop.shaded.com.zaxxer.hikari.HikariConfig (aka shaded hikari-config). <p>Publish Date: 2020-03-02 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-9546>CVE-2020-9546</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9546">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9546</a></p> <p>Release Date: 2020-03-02</p> <p>Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.redhat-00005</p> <p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.2.0.RELEASE</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-9547</summary> ### Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-web-2.1.2.RELEASE.jar (Root Library) - spring-boot-starter-json-2.1.2.RELEASE.jar - :x: **jackson-databind-2.9.8.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/vulnado-25/commit/8124ec9320e9726976350f7385af80f7e6c3021d">8124ec9320e9726976350f7385af80f7e6c3021d</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to com.ibatis.sqlmap.engine.transaction.jta.JtaTransactionConfig (aka ibatis-sqlmap). <p>Publish Date: 2020-03-02 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-9547>CVE-2020-9547</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9547">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9547</a></p> <p>Release Date: 2020-03-02</p> <p>Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.redhat-00005</p> <p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.2.0.RELEASE</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-14379</summary> ### Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-web-2.1.2.RELEASE.jar (Root Library) - spring-boot-starter-json-2.1.2.RELEASE.jar - :x: **jackson-databind-2.9.8.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/vulnado-25/commit/8124ec9320e9726976350f7385af80f7e6c3021d">8124ec9320e9726976350f7385af80f7e6c3021d</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> SubTypeValidator.java in FasterXML jackson-databind before 2.9.9.2 mishandles default typing when ehcache is used (because of net.sf.ehcache.transaction.manager.DefaultTransactionManagerLookup), leading to remote code execution. <p>Publish Date: 2019-07-29 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-14379>CVE-2019-14379</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14379">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14379</a></p> <p>Release Date: 2019-07-29</p> <p>Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.9.2</p> <p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.1.10.RELEASE</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-9548</summary> ### Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-web-2.1.2.RELEASE.jar (Root Library) - spring-boot-starter-json-2.1.2.RELEASE.jar - :x: **jackson-databind-2.9.8.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/vulnado-25/commit/8124ec9320e9726976350f7385af80f7e6c3021d">8124ec9320e9726976350f7385af80f7e6c3021d</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPConfig (aka anteros-core). <p>Publish Date: 2020-03-02 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-9548>CVE-2020-9548</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9548">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9548</a></p> <p>Release Date: 2020-03-02</p> <p>Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.redhat-00005</p> <p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.2.0.RELEASE</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-20330</summary> ### Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-web-2.1.2.RELEASE.jar (Root Library) - spring-boot-starter-json-2.1.2.RELEASE.jar - :x: **jackson-databind-2.9.8.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/vulnado-25/commit/8124ec9320e9726976350f7385af80f7e6c3021d">8124ec9320e9726976350f7385af80f7e6c3021d</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> FasterXML jackson-databind 2.x before 2.9.10.2 lacks certain net.sf.ehcache blocking. <p>Publish Date: 2020-01-03 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-20330>CVE-2019-20330</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2020-01-03</p> <p>Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.redhat-00005</p> <p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.2.0.RELEASE</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-10968</summary> ### Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-web-2.1.2.RELEASE.jar (Root Library) - spring-boot-starter-json-2.1.2.RELEASE.jar - :x: **jackson-databind-2.9.8.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/vulnado-25/commit/8124ec9320e9726976350f7385af80f7e6c3021d">8124ec9320e9726976350f7385af80f7e6c3021d</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.aoju.bus.proxy.provider.remoting.RmiProvider (aka bus-proxy). <p>Publish Date: 2020-03-26 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-10968>CVE-2020-10968</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-10968">https://nvd.nist.gov/vuln/detail/CVE-2020-10968</a></p> <p>Release Date: 2020-03-26</p> <p>Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.8.redhat-00002</p> <p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.1.6.RELEASE</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-10969</summary> ### Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-web-2.1.2.RELEASE.jar (Root Library) - spring-boot-starter-json-2.1.2.RELEASE.jar - :x: **jackson-databind-2.9.8.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/vulnado-25/commit/8124ec9320e9726976350f7385af80f7e6c3021d">8124ec9320e9726976350f7385af80f7e6c3021d</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to javax.swing.JEditorPane. <p>Publish Date: 2020-03-26 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-10969>CVE-2020-10969</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10969">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10969</a></p> <p>Release Date: 2020-03-26</p> <p>Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.redhat-00005</p> <p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.2.0.RELEASE</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-11111</summary> ### Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-web-2.1.2.RELEASE.jar (Root Library) - spring-boot-starter-json-2.1.2.RELEASE.jar - :x: **jackson-databind-2.9.8.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/vulnado-25/commit/8124ec9320e9726976350f7385af80f7e6c3021d">8124ec9320e9726976350f7385af80f7e6c3021d</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.activemq.* (aka activemq-jms, activemq-core, activemq-pool, and activemq-pool-jms). <p>Publish Date: 2020-03-31 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11111>CVE-2020-11111</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11113">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11113</a></p> <p>Release Date: 2020-03-31</p> <p>Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.redhat-00005</p> <p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.2.0.RELEASE</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details> *** <p>:rescue_worker_helmet: Automatic Remediation is available for this issue.</p>
non_design
spring boot starter web release jar vulnerabilities highest severity is vulnerable library spring boot starter web release jar path to dependency file pom xml path to vulnerable library home wss scanner repository org springframework spring web release spring web release jar found in head commit a href vulnerabilities cve severity cvss dependency type fixed in remediation available high jackson databind jar transitive release high jackson databind jar transitive release high spring web release jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high tomcat embed core jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high jackson databind jar transitive release high spring web release jar transitive release high tomcat embed core jar transitive release high jackson databind jar transitive release high tomcat embed core jar transitive release high tomcat embed core jar transitive release high tomcat embed core jar transitive release high tomcat embed core jar transitive release high tomcat embed websocket jar transitive release high tomcat embed core jar transitive release high tomcat embed core jar transitive release medium spring web release jar transitive release medium tomcat embed core jar transitive release medium hibernate validator final jar transitive release medium jackson databind jar transitive release medium jackson databind jar transitive release medium tomcat embed core jar transitive release medium hibernate validator final jar transitive release medium jackson databind jar transitive n a medium tomcat embed core jar transitive release medium tomcat embed core jar transitive release details partial details vulnerabilities are displayed below due to a content size limitation in github to view information on the remaining vulnerabilities navigate to the mend application cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy spring boot starter web release jar root library spring boot starter json release jar x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details a polymorphic typing issue was discovered in fasterxml jackson databind before it is related to com zaxxer hikari hikariconfig publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson core jackson databind redhat direct dependency fix resolution org springframework boot spring boot starter web release rescue worker helmet automatic remediation is available for this issue cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy spring boot starter web release jar root library spring boot starter json release jar x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details a polymorphic typing issue was discovered in fasterxml jackson databind through when default typing is enabled either globally or for a specific property for an externally exposed json endpoint and the service has the apache extra version x jar in the classpath and an attacker can provide a jndi service to access it is possible to make the service execute a malicious payload publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson core jackson databind redhat direct dependency fix resolution org springframework boot spring boot starter web release rescue worker helmet automatic remediation is available for this issue cve vulnerable library spring web release jar spring web library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository org springframework spring web release spring web release jar dependency hierarchy spring boot starter web release jar root library x spring web release jar vulnerable library found in head commit a href found in base branch master vulnerability details pivotal spring framework suffers from a potential remote code execution rce issue if used for java deserialization of untrusted data depending on how the library is implemented within a product this issue may or not occur and authentication may be required publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version release date fix resolution org springframework spring web release direct dependency fix resolution org springframework boot spring boot starter web release rescue worker helmet automatic remediation is available for this issue cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy spring boot starter web release jar root library spring boot starter json release jar x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details a polymorphic typing issue was discovered in fasterxml jackson databind before it is related to com zaxxer hikari hikaridatasource this is a different vulnerability than cve publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version release date fix resolution com fasterxml jackson core jackson databind redhat direct dependency fix resolution org springframework boot spring boot starter web release rescue worker helmet automatic remediation is available for this issue cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy spring boot starter web release jar root library spring boot starter json release jar x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details a polymorphic typing issue was discovered in fasterxml jackson databind before it is related to net sf ehcache hibernate ehcachejtatransactionmanagerlookup publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version release date fix resolution com fasterxml jackson core jackson databind redhat direct dependency fix resolution org springframework boot spring boot starter web release rescue worker helmet automatic remediation is available for this issue cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy spring boot starter web release jar root library spring boot starter json release jar x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details fasterxml jackson databind through lacks certain xbean reflect jndi blocking as demonstrated by org apache xbean propertyeditor jndiconverter publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version release date fix resolution com fasterxml jackson core jackson databind redhat direct dependency fix resolution org springframework boot spring boot starter web release rescue worker helmet automatic remediation is available for this issue cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy spring boot starter web release jar root library spring boot starter json release jar x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details a polymorphic typing issue was discovered in fasterxml jackson databind through when default typing is enabled either globally or for a specific property for an externally exposed json endpoint and the service has the commons dbcp jar in the classpath and an attacker can find an rmi service endpoint to access it is possible to make the service execute a malicious payload this issue exists because of org apache commons dbcp datasources sharedpooldatasource and org apache commons dbcp datasources peruserpooldatasource mishandling publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson core jackson databind redhat direct dependency fix resolution org springframework boot spring boot starter web release rescue worker helmet automatic remediation is available for this issue cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy spring boot starter web release jar root library spring boot starter json release jar x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details a polymorphic typing issue was discovered in fasterxml jackson databind through when default typing is enabled either globally or for a specific property for an externally exposed json endpoint and the service has the jar in the classpath and an attacker can find an rmi service endpoint to access it is possible to make the service execute a malicious payload this issue exists because of com engine spy mishandling publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson core jackson databind redhat direct dependency fix resolution org springframework boot spring boot starter web release rescue worker helmet automatic remediation is available for this issue cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy spring boot starter web release jar root library spring boot starter json release jar x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details a flaw was discovered in fasterxml jackson databind in all versions before and where it would permit polymorphic deserialization of malicious objects using the xalan jndi gadget when used in conjunction with polymorphic type handling methods such as enabledefaulttyping or when jsontypeinfo is using id class or id minimal class or in any other way which objectmapper readvalue might instantiate objects from unsafe sources an attacker could use this flaw to execute arbitrary code publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson core jackson databind direct dependency fix resolution org springframework boot spring boot starter web release rescue worker helmet automatic remediation is available for this issue cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy spring boot starter web release jar root library spring boot starter json release jar x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details a flaw was discovered in jackson databind in versions before and where it would permit polymorphic deserialization of a malicious object using commons configuration and jndi classes an attacker could use this flaw to execute arbitrary code publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version release date fix resolution com fasterxml jackson core jackson databind redhat direct dependency fix resolution org springframework boot spring boot starter web release rescue worker helmet automatic remediation is available for this issue cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy spring boot starter web release jar root library spring boot starter json release jar x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details fasterxml jackson databind x before mishandles the interaction between serialization gadgets and typing related to org apache hadoop shaded com zaxxer hikari hikariconfig aka shaded hikari config publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson core jackson databind redhat direct dependency fix resolution org springframework boot spring boot starter web release rescue worker helmet automatic remediation is available for this issue cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy spring boot starter web release jar root library spring boot starter json release jar x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details fasterxml jackson databind x before mishandles the interaction between serialization gadgets and typing related to com ibatis sqlmap engine transaction jta jtatransactionconfig aka ibatis sqlmap publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson core jackson databind redhat direct dependency fix resolution org springframework boot spring boot starter web release rescue worker helmet automatic remediation is available for this issue cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy spring boot starter web release jar root library spring boot starter json release jar x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details subtypevalidator java in fasterxml jackson databind before mishandles default typing when ehcache is used because of net sf ehcache transaction manager defaulttransactionmanagerlookup leading to remote code execution publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson core jackson databind direct dependency fix resolution org springframework boot spring boot starter web release rescue worker helmet automatic remediation is available for this issue cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy spring boot starter web release jar root library spring boot starter json release jar x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details fasterxml jackson databind x before mishandles the interaction between serialization gadgets and typing related to br com anteros dbcp anterosdbcpconfig aka anteros core publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson core jackson databind redhat direct dependency fix resolution org springframework boot spring boot starter web release rescue worker helmet automatic remediation is available for this issue cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy spring boot starter web release jar root library spring boot starter json release jar x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details fasterxml jackson databind x before lacks certain net sf ehcache blocking publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version release date fix resolution com fasterxml jackson core jackson databind redhat direct dependency fix resolution org springframework boot spring boot starter web release rescue worker helmet automatic remediation is available for this issue cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy spring boot starter web release jar root library spring boot starter json release jar x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details fasterxml jackson databind x before mishandles the interaction between serialization gadgets and typing related to org aoju bus proxy provider remoting rmiprovider aka bus proxy publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson core jackson databind redhat direct dependency fix resolution org springframework boot spring boot starter web release rescue worker helmet automatic remediation is available for this issue cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy spring boot starter web release jar root library spring boot starter json release jar x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details fasterxml jackson databind x before mishandles the interaction between serialization gadgets and typing related to javax swing jeditorpane publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson core jackson databind redhat direct dependency fix resolution org springframework boot spring boot starter web release rescue worker helmet automatic remediation is available for this issue cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy spring boot starter web release jar root library spring boot starter json release jar x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details fasterxml jackson databind x before mishandles the interaction between serialization gadgets and typing related to org apache activemq aka activemq jms activemq core activemq pool and activemq pool jms publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson core jackson databind redhat direct dependency fix resolution org springframework boot spring boot starter web release rescue worker helmet automatic remediation is available for this issue rescue worker helmet automatic remediation is available for this issue
0
410,789
27,802,254,879
IssuesEvent
2023-03-17 16:43:09
Sarahsparxx/mywebclass-simulation
https://api.github.com/repos/Sarahsparxx/mywebclass-simulation
opened
Select appropriate testing methods and tools
documentation
Select appropriate testing methods and tools based on the project requirements
1.0
Select appropriate testing methods and tools - Select appropriate testing methods and tools based on the project requirements
non_design
select appropriate testing methods and tools select appropriate testing methods and tools based on the project requirements
0
35,229
4,641,468,645
IssuesEvent
2016-09-30 05:02:48
tor4kichi/Hohoema
https://api.github.com/repos/tor4kichi/Hohoema
closed
お気に入りの追加可能数の表示
ui_design
お気に入りに追加できるアイテム数が把握できないので、管理が難しいです。 (ローカルへのお気に入り保存はここでは扱いません) FavManagerに上限数はまとめてあります。 ``` public const uint FAV_USER_MAX_COUNT = 50; public const uint PREMIUM_FAV_USER_MAX_COUNT = 400; public const uint FAV_MYLIST_MAX_COUNT = 20; public const uint PREMIUM_FAV_MYLIST_MAX_COUNT = 50; public const uint FAV_TAG_MAX_COUNT = 10; public const uint PREMIUM_FAV_TAG_MAX_COUNT = 10; ``` お気に入り管理画面で「登録数 / 上限数」を表示する?
1.0
お気に入りの追加可能数の表示 - お気に入りに追加できるアイテム数が把握できないので、管理が難しいです。 (ローカルへのお気に入り保存はここでは扱いません) FavManagerに上限数はまとめてあります。 ``` public const uint FAV_USER_MAX_COUNT = 50; public const uint PREMIUM_FAV_USER_MAX_COUNT = 400; public const uint FAV_MYLIST_MAX_COUNT = 20; public const uint PREMIUM_FAV_MYLIST_MAX_COUNT = 50; public const uint FAV_TAG_MAX_COUNT = 10; public const uint PREMIUM_FAV_TAG_MAX_COUNT = 10; ``` お気に入り管理画面で「登録数 / 上限数」を表示する?
design
お気に入りの追加可能数の表示 お気に入りに追加できるアイテム数が把握できないので、管理が難しいです。 (ローカルへのお気に入り保存はここでは扱いません) favmanagerに上限数はまとめてあります。 public const uint fav user max count public const uint premium fav user max count public const uint fav mylist max count public const uint premium fav mylist max count public const uint fav tag max count public const uint premium fav tag max count お気に入り管理画面で「登録数 上限数」を表示する?
1
42,546
5,474,754,974
IssuesEvent
2017-03-11 03:08:20
RobotLocomotion/drake
https://api.github.com/repos/RobotLocomotion/drake
closed
Doxygen Style Guide
priority: backlog team: software core type: design
# Problem Definition [Doxygen](http://www.stack.nl/~dimitri/doxygen/) supports numerous documentation styles. As an example, [this page](http://www.stack.nl/~dimitri/doxygen/manual/docblocks.html) lists four different ways to create a documentation block. For the same reasons we adopted a [C++ style guide](http://drake002.csail.mit.edu/drake/sphinx/code_style_guide.html#c-style), we need to adopt a Doxygen style guide. I'll start conversation started by pointing to: 1. [Mozilla Developer Network's Doxygen style guide](https://developer.mozilla.org/en-US/docs/Mozilla/Developer_guide/Interface_development_guide/Commenting_IDL_for_better_documentation) — a possible model to follow. 2. https://github.com/RobotLocomotion/drake/pull/2023#issuecomment-207096198 — a possible exception to the model 3. https://github.com/sherm1/drake/blob/add-common-nicetypename/drake/common/nice_type_name.h — actual example of compact style. # Descriptions for Non-Public-API Code Drake contains code that's not part of the public API and thus should not be commented using Doxygen, but should still be commented for developers to read. One example is method `GetActuatorEffortLimit()` in `RigidBodyTreeURDF.cpp`. We need to define a best practice on to document this code. One option is to apply the same comment style for things like parameters, exceptions, and return values, but simply prefix each line with `//`. # Wish List - [ ] Update `cpplint` and `clang-format` to enforce a Doxygen style guide.
1.0
Doxygen Style Guide - # Problem Definition [Doxygen](http://www.stack.nl/~dimitri/doxygen/) supports numerous documentation styles. As an example, [this page](http://www.stack.nl/~dimitri/doxygen/manual/docblocks.html) lists four different ways to create a documentation block. For the same reasons we adopted a [C++ style guide](http://drake002.csail.mit.edu/drake/sphinx/code_style_guide.html#c-style), we need to adopt a Doxygen style guide. I'll start conversation started by pointing to: 1. [Mozilla Developer Network's Doxygen style guide](https://developer.mozilla.org/en-US/docs/Mozilla/Developer_guide/Interface_development_guide/Commenting_IDL_for_better_documentation) — a possible model to follow. 2. https://github.com/RobotLocomotion/drake/pull/2023#issuecomment-207096198 — a possible exception to the model 3. https://github.com/sherm1/drake/blob/add-common-nicetypename/drake/common/nice_type_name.h — actual example of compact style. # Descriptions for Non-Public-API Code Drake contains code that's not part of the public API and thus should not be commented using Doxygen, but should still be commented for developers to read. One example is method `GetActuatorEffortLimit()` in `RigidBodyTreeURDF.cpp`. We need to define a best practice on to document this code. One option is to apply the same comment style for things like parameters, exceptions, and return values, but simply prefix each line with `//`. # Wish List - [ ] Update `cpplint` and `clang-format` to enforce a Doxygen style guide.
design
doxygen style guide problem definition supports numerous documentation styles as an example lists four different ways to create a documentation block for the same reasons we adopted a we need to adopt a doxygen style guide i ll start conversation started by pointing to — a possible model to follow — a possible exception to the model — actual example of compact style descriptions for non public api code drake contains code that s not part of the public api and thus should not be commented using doxygen but should still be commented for developers to read one example is method getactuatoreffortlimit in rigidbodytreeurdf cpp we need to define a best practice on to document this code one option is to apply the same comment style for things like parameters exceptions and return values but simply prefix each line with wish list update cpplint and clang format to enforce a doxygen style guide
1
130,881
5,134,861,457
IssuesEvent
2017-01-11 10:23:50
DRDD2016/sparkn2
https://api.github.com/repos/DRDD2016/sparkn2
closed
Loading app state
priority 2
Want to be able to hydrate app state at various points, primarily on initial login. State items include: * Fetching phone contacts
1.0
Loading app state - Want to be able to hydrate app state at various points, primarily on initial login. State items include: * Fetching phone contacts
non_design
loading app state want to be able to hydrate app state at various points primarily on initial login state items include fetching phone contacts
0
152,216
23,932,692,028
IssuesEvent
2022-09-10 19:43:38
rohmishra/personal_website
https://api.github.com/repos/rohmishra/personal_website
reopened
Impovement: Who am I needs more visual highlights
Design Needed
**Is your feature request related to a problem? Please describe.** Current "Who am I" is way too simple. It has only 2 lines **Describe the solution you'd like** MORE INTERACTIVITY **Describe alternatives you've considered** _*DESIGN NEEDED*_ **Additional context** _Examples go here_
1.0
Impovement: Who am I needs more visual highlights - **Is your feature request related to a problem? Please describe.** Current "Who am I" is way too simple. It has only 2 lines **Describe the solution you'd like** MORE INTERACTIVITY **Describe alternatives you've considered** _*DESIGN NEEDED*_ **Additional context** _Examples go here_
design
impovement who am i needs more visual highlights is your feature request related to a problem please describe current who am i is way too simple it has only lines describe the solution you d like more interactivity describe alternatives you ve considered design needed additional context examples go here
1
97,788
12,261,836,382
IssuesEvent
2020-05-06 20:50:58
Princeton-CDH/mep-django
https://api.github.com/repos/Princeton-CDH/mep-django
closed
Make the text inside the breadcrumb horizontally centered to make it look visually correct
awaiting design testing site≠design
All the text inside the breadcrumb containers are still off-centered – any way to fix that so they are horizontally centered? - Level of importance: It's just killing me visually, may not be noticed by the user, the user may not be affected in any way.
2.0
Make the text inside the breadcrumb horizontally centered to make it look visually correct - All the text inside the breadcrumb containers are still off-centered – any way to fix that so they are horizontally centered? - Level of importance: It's just killing me visually, may not be noticed by the user, the user may not be affected in any way.
design
make the text inside the breadcrumb horizontally centered to make it look visually correct all the text inside the breadcrumb containers are still off centered – any way to fix that so they are horizontally centered level of importance it s just killing me visually may not be noticed by the user the user may not be affected in any way
1
139,748
18,853,783,638
IssuesEvent
2021-11-12 01:43:31
peterwkc85/selenium-loadable-component
https://api.github.com/repos/peterwkc85/selenium-loadable-component
opened
WS-2017-3734 (Medium) detected in httpclient-4.5.1.jar
security vulnerability
## WS-2017-3734 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>httpclient-4.5.1.jar</b></p></summary> <p>Apache HttpComponents Client</p> <p>Path to dependency file: /selenium-loadable-component/pom.xml</p> <p>Path to vulnerable library: /root/.m2/repository/org/apache/httpcomponents/httpclient/4.5.1/httpclient-4.5.1.jar</p> <p> Dependency Hierarchy: - selenide-3.5.1.jar (Root Library) - selenium-java-2.53.0.jar - selenium-chrome-driver-2.53.0.jar - selenium-remote-driver-2.53.0.jar - :x: **httpclient-4.5.1.jar** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Apache httpclient before 4.5.3 are vulnerable to Directory Traversal. The user-provided path was able to override the specified host, resulting in giving network access to a sensitive environment. <p>Publish Date: 2017-01-21 <p>URL: <a href=https://github.com/apache/httpcomponents-client/commit/0554271750599756d4946c0d7ba43d04b1a7b220>WS-2017-3734</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://issues.apache.org/jira/browse/HTTPCLIENT-1803">https://issues.apache.org/jira/browse/HTTPCLIENT-1803</a></p> <p>Release Date: 2017-01-21</p> <p>Fix Resolution: org.apache.httpcomponents:httpclient:4.5.3</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
WS-2017-3734 (Medium) detected in httpclient-4.5.1.jar - ## WS-2017-3734 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>httpclient-4.5.1.jar</b></p></summary> <p>Apache HttpComponents Client</p> <p>Path to dependency file: /selenium-loadable-component/pom.xml</p> <p>Path to vulnerable library: /root/.m2/repository/org/apache/httpcomponents/httpclient/4.5.1/httpclient-4.5.1.jar</p> <p> Dependency Hierarchy: - selenide-3.5.1.jar (Root Library) - selenium-java-2.53.0.jar - selenium-chrome-driver-2.53.0.jar - selenium-remote-driver-2.53.0.jar - :x: **httpclient-4.5.1.jar** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Apache httpclient before 4.5.3 are vulnerable to Directory Traversal. The user-provided path was able to override the specified host, resulting in giving network access to a sensitive environment. <p>Publish Date: 2017-01-21 <p>URL: <a href=https://github.com/apache/httpcomponents-client/commit/0554271750599756d4946c0d7ba43d04b1a7b220>WS-2017-3734</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://issues.apache.org/jira/browse/HTTPCLIENT-1803">https://issues.apache.org/jira/browse/HTTPCLIENT-1803</a></p> <p>Release Date: 2017-01-21</p> <p>Fix Resolution: org.apache.httpcomponents:httpclient:4.5.3</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_design
ws medium detected in httpclient jar ws medium severity vulnerability vulnerable library httpclient jar apache httpcomponents client path to dependency file selenium loadable component pom xml path to vulnerable library root repository org apache httpcomponents httpclient httpclient jar dependency hierarchy selenide jar root library selenium java jar selenium chrome driver jar selenium remote driver jar x httpclient jar vulnerable library vulnerability details apache httpclient before are vulnerable to directory traversal the user provided path was able to override the specified host resulting in giving network access to a sensitive environment publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org apache httpcomponents httpclient step up your open source security game with whitesource
0
532,799
15,571,683,158
IssuesEvent
2021-03-17 05:32:16
wso2/integration-studio
https://api.github.com/repos/wso2/integration-studio
closed
Target is not getting saved in call mediator
8.0.0 Priority/High Type/Bug
**Description:** 1. Add a call mediator. 2. Add source and target configuration in the source view 3. Switch to design view Target is getting removed from the config. When we add to config to source view, it is not getting saved in the capp. **Affected Product Version:** 8.0.0 Alpha **OS, DB, other environment details and versions:** MacOS Ubuntu 20.04
1.0
Target is not getting saved in call mediator - **Description:** 1. Add a call mediator. 2. Add source and target configuration in the source view 3. Switch to design view Target is getting removed from the config. When we add to config to source view, it is not getting saved in the capp. **Affected Product Version:** 8.0.0 Alpha **OS, DB, other environment details and versions:** MacOS Ubuntu 20.04
non_design
target is not getting saved in call mediator description add a call mediator add source and target configuration in the source view switch to design view target is getting removed from the config when we add to config to source view it is not getting saved in the capp affected product version alpha os db other environment details and versions macos ubuntu
0
95,019
11,948,767,356
IssuesEvent
2020-04-03 12:30:18
mozilla-mobile/fenix
https://api.github.com/repos/mozilla-mobile/fenix
closed
[Fenix] Use Metropolis font for headers, buttons, and snackbars
P2 eng:qa:needed eng:ready ux:visual-design
Since we are unable to use Sharp Sans, we will be using Metropolis instead for headers, buttons, and snackbars. Please see reference below @colintheshots Font location: https://github.com/chrismsimpson/Metropolis ![Screen Shot 2019-06-26 at 3 55 21 PM](https://user-images.githubusercontent.com/5992746/60210496-02d46380-982b-11e9-9630-3f70e070970d.png) ![Screen Shot 2019-06-26 at 3 54 26 PM](https://user-images.githubusercontent.com/5992746/60210505-0536bd80-982b-11e9-9430-2575c539e142.png) ![Screen Shot 2019-06-26 at 3 53 12 PM](https://user-images.githubusercontent.com/5992746/60210514-0a940800-982b-11e9-9538-9ee9269966fe.png) ![Screen Shot 2019-06-26 at 3 52 13 PM](https://user-images.githubusercontent.com/5992746/60210520-0c5dcb80-982b-11e9-8b46-79354a231d23.png) ![Screen Shot 2019-06-26 at 3 52 00 PM](https://user-images.githubusercontent.com/5992746/60210524-0ec02580-982b-11e9-843a-ad76fa18d121.png)
1.0
[Fenix] Use Metropolis font for headers, buttons, and snackbars - Since we are unable to use Sharp Sans, we will be using Metropolis instead for headers, buttons, and snackbars. Please see reference below @colintheshots Font location: https://github.com/chrismsimpson/Metropolis ![Screen Shot 2019-06-26 at 3 55 21 PM](https://user-images.githubusercontent.com/5992746/60210496-02d46380-982b-11e9-9630-3f70e070970d.png) ![Screen Shot 2019-06-26 at 3 54 26 PM](https://user-images.githubusercontent.com/5992746/60210505-0536bd80-982b-11e9-9430-2575c539e142.png) ![Screen Shot 2019-06-26 at 3 53 12 PM](https://user-images.githubusercontent.com/5992746/60210514-0a940800-982b-11e9-9538-9ee9269966fe.png) ![Screen Shot 2019-06-26 at 3 52 13 PM](https://user-images.githubusercontent.com/5992746/60210520-0c5dcb80-982b-11e9-8b46-79354a231d23.png) ![Screen Shot 2019-06-26 at 3 52 00 PM](https://user-images.githubusercontent.com/5992746/60210524-0ec02580-982b-11e9-843a-ad76fa18d121.png)
design
use metropolis font for headers buttons and snackbars since we are unable to use sharp sans we will be using metropolis instead for headers buttons and snackbars please see reference below colintheshots font location
1
169,685
20,841,861,438
IssuesEvent
2022-03-21 01:42:25
prafullkotecha/fabmedical
https://api.github.com/repos/prafullkotecha/fabmedical
opened
CVE-2021-44906 (High) detected in multiple libraries
security vulnerability
## CVE-2021-44906 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>minimist-0.0.8.tgz</b>, <b>minimist-0.0.10.tgz</b>, <b>minimist-1.2.0.tgz</b></p></summary> <p> <details><summary><b>minimist-0.0.8.tgz</b></p></summary> <p>parse argument options</p> <p>Library home page: <a href="https://registry.npmjs.org/minimist/-/minimist-0.0.8.tgz">https://registry.npmjs.org/minimist/-/minimist-0.0.8.tgz</a></p> <p> Dependency Hierarchy: - karma-4.1.0.tgz (Root Library) - chokidar-2.1.8.tgz - fsevents-1.2.9.tgz - node-pre-gyp-0.12.0.tgz - mkdirp-0.5.1.tgz - :x: **minimist-0.0.8.tgz** (Vulnerable Library) </details> <details><summary><b>minimist-0.0.10.tgz</b></p></summary> <p>parse argument options</p> <p>Library home page: <a href="https://registry.npmjs.org/minimist/-/minimist-0.0.10.tgz">https://registry.npmjs.org/minimist/-/minimist-0.0.10.tgz</a></p> <p>Path to dependency file: /content-web/package.json</p> <p>Path to vulnerable library: /content-web/node_modules/optimist/node_modules/minimist/package.json</p> <p> Dependency Hierarchy: - karma-4.1.0.tgz (Root Library) - optimist-0.6.1.tgz - :x: **minimist-0.0.10.tgz** (Vulnerable Library) </details> <details><summary><b>minimist-1.2.0.tgz</b></p></summary> <p>parse argument options</p> <p>Library home page: <a href="https://registry.npmjs.org/minimist/-/minimist-1.2.0.tgz">https://registry.npmjs.org/minimist/-/minimist-1.2.0.tgz</a></p> <p> Dependency Hierarchy: - karma-4.1.0.tgz (Root Library) - chokidar-2.1.8.tgz - fsevents-1.2.9.tgz - node-pre-gyp-0.12.0.tgz - rc-1.2.8.tgz - :x: **minimist-1.2.0.tgz** (Vulnerable Library) </details> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Minimist <=1.2.5 is vulnerable to Prototype Pollution via file index.js, function setKey() (lines 69-95). <p>Publish Date: 2022-03-17 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-44906>CVE-2021-44906</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44906">https://nvd.nist.gov/vuln/detail/CVE-2021-44906</a></p> <p>Release Date: 2022-03-17</p> <p>Fix Resolution: BumperLane.Public.Service.Contracts - 0.23.35.214-prerelease;cloudscribe.templates - 5.2.0;Virteom.Tenant.Mobile.Bluetooth - 0.21.29.159-prerelease;ShowingVault.DotNet.Sdk - 0.13.41.190-prerelease;Envisia.DotNet.Templates - 3.0.1;Yarnpkg.Yarn - 0.26.1;Virteom.Tenant.Mobile.Framework.UWP - 0.20.41.103-prerelease;Virteom.Tenant.Mobile.Framework.iOS - 0.20.41.103-prerelease;BumperLane.Public.Api.V2.ClientModule - 0.23.35.214-prerelease;VueJS.NetCore - 1.1.1;Dianoga - 4.0.0,3.0.0-RC02;Virteom.Tenant.Mobile.Bluetooth.iOS - 0.20.41.103-prerelease;Virteom.Public.Utilities - 0.23.37.212-prerelease;Indianadavy.VueJsWebAPITemplate.CSharp - 1.0.1;NorDroN.AngularTemplate - 0.1.6;Virteom.Tenant.Mobile.Framework - 0.21.29.159-prerelease;Virteom.Tenant.Mobile.Bluetooth.Android - 0.20.41.103-prerelease;z4a-dotnet-scaffold - 1.0.0.2;Raml.Parser - 1.0.7;CoreVueWebTest - 3.0.101;dotnetng.template - 1.0.0.4;SitecoreMaster.TrueDynamicPlaceholders - 1.0.3;Virteom.Tenant.Mobile.Framework.Android - 0.20.41.103-prerelease;Fable.Template.Elmish.React - 0.1.6;BlazorPolyfill.Build - 6.0.100.2;Fable.Snowpack.Template - 2.1.0;BumperLane.Public.Api.Client - 0.23.35.214-prerelease;Yarn.MSBuild - 0.22.0,0.24.6;Blazor.TailwindCSS.BUnit - 1.0.2;Bridge.AWS - 0.3.30.36;tslint - 5.6.0;SAFE.Template - 3.0.1;GR.PageRender.Razor - 1.8.0;MIDIator.WebClient - 1.0.105</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2021-44906 (High) detected in multiple libraries - ## CVE-2021-44906 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>minimist-0.0.8.tgz</b>, <b>minimist-0.0.10.tgz</b>, <b>minimist-1.2.0.tgz</b></p></summary> <p> <details><summary><b>minimist-0.0.8.tgz</b></p></summary> <p>parse argument options</p> <p>Library home page: <a href="https://registry.npmjs.org/minimist/-/minimist-0.0.8.tgz">https://registry.npmjs.org/minimist/-/minimist-0.0.8.tgz</a></p> <p> Dependency Hierarchy: - karma-4.1.0.tgz (Root Library) - chokidar-2.1.8.tgz - fsevents-1.2.9.tgz - node-pre-gyp-0.12.0.tgz - mkdirp-0.5.1.tgz - :x: **minimist-0.0.8.tgz** (Vulnerable Library) </details> <details><summary><b>minimist-0.0.10.tgz</b></p></summary> <p>parse argument options</p> <p>Library home page: <a href="https://registry.npmjs.org/minimist/-/minimist-0.0.10.tgz">https://registry.npmjs.org/minimist/-/minimist-0.0.10.tgz</a></p> <p>Path to dependency file: /content-web/package.json</p> <p>Path to vulnerable library: /content-web/node_modules/optimist/node_modules/minimist/package.json</p> <p> Dependency Hierarchy: - karma-4.1.0.tgz (Root Library) - optimist-0.6.1.tgz - :x: **minimist-0.0.10.tgz** (Vulnerable Library) </details> <details><summary><b>minimist-1.2.0.tgz</b></p></summary> <p>parse argument options</p> <p>Library home page: <a href="https://registry.npmjs.org/minimist/-/minimist-1.2.0.tgz">https://registry.npmjs.org/minimist/-/minimist-1.2.0.tgz</a></p> <p> Dependency Hierarchy: - karma-4.1.0.tgz (Root Library) - chokidar-2.1.8.tgz - fsevents-1.2.9.tgz - node-pre-gyp-0.12.0.tgz - rc-1.2.8.tgz - :x: **minimist-1.2.0.tgz** (Vulnerable Library) </details> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Minimist <=1.2.5 is vulnerable to Prototype Pollution via file index.js, function setKey() (lines 69-95). <p>Publish Date: 2022-03-17 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-44906>CVE-2021-44906</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44906">https://nvd.nist.gov/vuln/detail/CVE-2021-44906</a></p> <p>Release Date: 2022-03-17</p> <p>Fix Resolution: BumperLane.Public.Service.Contracts - 0.23.35.214-prerelease;cloudscribe.templates - 5.2.0;Virteom.Tenant.Mobile.Bluetooth - 0.21.29.159-prerelease;ShowingVault.DotNet.Sdk - 0.13.41.190-prerelease;Envisia.DotNet.Templates - 3.0.1;Yarnpkg.Yarn - 0.26.1;Virteom.Tenant.Mobile.Framework.UWP - 0.20.41.103-prerelease;Virteom.Tenant.Mobile.Framework.iOS - 0.20.41.103-prerelease;BumperLane.Public.Api.V2.ClientModule - 0.23.35.214-prerelease;VueJS.NetCore - 1.1.1;Dianoga - 4.0.0,3.0.0-RC02;Virteom.Tenant.Mobile.Bluetooth.iOS - 0.20.41.103-prerelease;Virteom.Public.Utilities - 0.23.37.212-prerelease;Indianadavy.VueJsWebAPITemplate.CSharp - 1.0.1;NorDroN.AngularTemplate - 0.1.6;Virteom.Tenant.Mobile.Framework - 0.21.29.159-prerelease;Virteom.Tenant.Mobile.Bluetooth.Android - 0.20.41.103-prerelease;z4a-dotnet-scaffold - 1.0.0.2;Raml.Parser - 1.0.7;CoreVueWebTest - 3.0.101;dotnetng.template - 1.0.0.4;SitecoreMaster.TrueDynamicPlaceholders - 1.0.3;Virteom.Tenant.Mobile.Framework.Android - 0.20.41.103-prerelease;Fable.Template.Elmish.React - 0.1.6;BlazorPolyfill.Build - 6.0.100.2;Fable.Snowpack.Template - 2.1.0;BumperLane.Public.Api.Client - 0.23.35.214-prerelease;Yarn.MSBuild - 0.22.0,0.24.6;Blazor.TailwindCSS.BUnit - 1.0.2;Bridge.AWS - 0.3.30.36;tslint - 5.6.0;SAFE.Template - 3.0.1;GR.PageRender.Razor - 1.8.0;MIDIator.WebClient - 1.0.105</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_design
cve high detected in multiple libraries cve high severity vulnerability vulnerable libraries minimist tgz minimist tgz minimist tgz minimist tgz parse argument options library home page a href dependency hierarchy karma tgz root library chokidar tgz fsevents tgz node pre gyp tgz mkdirp tgz x minimist tgz vulnerable library minimist tgz parse argument options library home page a href path to dependency file content web package json path to vulnerable library content web node modules optimist node modules minimist package json dependency hierarchy karma tgz root library optimist tgz x minimist tgz vulnerable library minimist tgz parse argument options library home page a href dependency hierarchy karma tgz root library chokidar tgz fsevents tgz node pre gyp tgz rc tgz x minimist tgz vulnerable library found in base branch master vulnerability details minimist is vulnerable to prototype pollution via file index js function setkey lines publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution bumperlane public service contracts prerelease cloudscribe templates virteom tenant mobile bluetooth prerelease showingvault dotnet sdk prerelease envisia dotnet templates yarnpkg yarn virteom tenant mobile framework uwp prerelease virteom tenant mobile framework ios prerelease bumperlane public api clientmodule prerelease vuejs netcore dianoga virteom tenant mobile bluetooth ios prerelease virteom public utilities prerelease indianadavy vuejswebapitemplate csharp nordron angulartemplate virteom tenant mobile framework prerelease virteom tenant mobile bluetooth android prerelease dotnet scaffold raml parser corevuewebtest dotnetng template sitecoremaster truedynamicplaceholders virteom tenant mobile framework android prerelease fable template elmish react blazorpolyfill build fable snowpack template bumperlane public api client prerelease yarn msbuild blazor tailwindcss bunit bridge aws tslint safe template gr pagerender razor midiator webclient step up your open source security game with whitesource
0
50,477
6,393,560,848
IssuesEvent
2017-08-04 07:51:12
alphagov/govuk-frontend
https://api.github.com/repos/alphagov/govuk-frontend
closed
Make all form elements the same height
design
If our form elements were the same height it would make it much easier to maintain a vertical rhythm and to create horizontal form layouts where necessary. For example, we sometimes need to align buttons to the right of form fields (eg. search boxes). They'd look a lot nicer if they were the same height. I'm thinking of the following elements in particular: radios, checkboxes, text fields, select boxes, type-aheads, buttons.
1.0
Make all form elements the same height - If our form elements were the same height it would make it much easier to maintain a vertical rhythm and to create horizontal form layouts where necessary. For example, we sometimes need to align buttons to the right of form fields (eg. search boxes). They'd look a lot nicer if they were the same height. I'm thinking of the following elements in particular: radios, checkboxes, text fields, select boxes, type-aheads, buttons.
design
make all form elements the same height if our form elements were the same height it would make it much easier to maintain a vertical rhythm and to create horizontal form layouts where necessary for example we sometimes need to align buttons to the right of form fields eg search boxes they d look a lot nicer if they were the same height i m thinking of the following elements in particular radios checkboxes text fields select boxes type aheads buttons
1
52,646
6,648,531,325
IssuesEvent
2017-09-28 09:39:58
wellcometrust/wellcomecollection.org
https://api.github.com/repos/wellcometrust/wellcomecollection.org
closed
Design: Revisit page grid on key templates
needs:design
## Type - enhancement ## Description Review and update the page grid on Article and Work templates to improve visual hierarchy and standardise the layout.
1.0
Design: Revisit page grid on key templates - ## Type - enhancement ## Description Review and update the page grid on Article and Work templates to improve visual hierarchy and standardise the layout.
design
design revisit page grid on key templates type enhancement description review and update the page grid on article and work templates to improve visual hierarchy and standardise the layout
1
765,225
26,838,407,651
IssuesEvent
2023-02-02 21:37:36
inaturalist/inaturalist
https://api.github.com/repos/inaturalist/inaturalist
closed
Better indicators that slow PDF Generation of large guides is not hungup
abandoned priority
The generation of PDFs of large guides for the first time takes several minutes and then gives the following 'taking forever' alert ![image 3](https://cloud.githubusercontent.com/assets/598026/4480115/68305292-4994-11e4-8f13-cd68cf40ce18.png)Indicator Ultimately these guides do generate, but users are perceiving this as a bug in PDF generation. We should reword to something like - 'Please be patient, generating large PDFs for the first time can take an hour or two' and change the 'This seems to be taking forever, Please try again later' alert to something like 'This guide is still generating, please check back later'. A better solution would be to include email-when-done functionality as in CSV generation elsewhere on the site
1.0
Better indicators that slow PDF Generation of large guides is not hungup - The generation of PDFs of large guides for the first time takes several minutes and then gives the following 'taking forever' alert ![image 3](https://cloud.githubusercontent.com/assets/598026/4480115/68305292-4994-11e4-8f13-cd68cf40ce18.png)Indicator Ultimately these guides do generate, but users are perceiving this as a bug in PDF generation. We should reword to something like - 'Please be patient, generating large PDFs for the first time can take an hour or two' and change the 'This seems to be taking forever, Please try again later' alert to something like 'This guide is still generating, please check back later'. A better solution would be to include email-when-done functionality as in CSV generation elsewhere on the site
non_design
better indicators that slow pdf generation of large guides is not hungup the generation of pdfs of large guides for the first time takes several minutes and then gives the following taking forever alert ultimately these guides do generate but users are perceiving this as a bug in pdf generation we should reword to something like please be patient generating large pdfs for the first time can take an hour or two and change the this seems to be taking forever please try again later alert to something like this guide is still generating please check back later a better solution would be to include email when done functionality as in csv generation elsewhere on the site
0
158,112
20,007,591,363
IssuesEvent
2022-02-01 00:03:14
timf-app-sandbox/t1
https://api.github.com/repos/timf-app-sandbox/t1
opened
CVE-2018-3728 (High) detected in hoek-0.9.1.tgz, hoek-2.16.3.tgz
security vulnerability
## CVE-2018-3728 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>hoek-0.9.1.tgz</b>, <b>hoek-2.16.3.tgz</b></p></summary> <p> <details><summary><b>hoek-0.9.1.tgz</b></p></summary> <p>General purpose node utilities</p> <p>Library home page: <a href="https://registry.npmjs.org/hoek/-/hoek-0.9.1.tgz">https://registry.npmjs.org/hoek/-/hoek-0.9.1.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/zaproxy/node_modules/hoek/package.json</p> <p> Dependency Hierarchy: - zaproxy-0.2.0.tgz (Root Library) - request-2.36.0.tgz - hawk-1.0.0.tgz - :x: **hoek-0.9.1.tgz** (Vulnerable Library) </details> <details><summary><b>hoek-2.16.3.tgz</b></p></summary> <p>General purpose node utilities</p> <p>Library home page: <a href="https://registry.npmjs.org/hoek/-/hoek-2.16.3.tgz">https://registry.npmjs.org/hoek/-/hoek-2.16.3.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/npm/node_modules/request/node_modules/hawk/node_modules/hoek/package.json,/node_modules/hoek/package.json</p> <p> Dependency Hierarchy: - grunt-retire-0.3.12.tgz (Root Library) - request-2.67.0.tgz - hawk-3.1.3.tgz - :x: **hoek-2.16.3.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/timf-app-sandbox/t1/commit/ade63e4d4d7f78775fe064056f81c5da1b53aecf">ade63e4d4d7f78775fe064056f81c5da1b53aecf</a></p> <p>Found in base branch: <b>dev</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> hoek node module before 4.2.0 and 5.0.x before 5.0.3 suffers from a Modification of Assumed-Immutable Data (MAID) vulnerability via 'merge' and 'applyToDefaults' functions, which allows a malicious user to modify the prototype of "Object" via __proto__, causing the addition or modification of an existing property that will exist on all objects. <p>Publish Date: 2018-03-30 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-3728>CVE-2018-3728</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16082">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16082</a></p> <p>Release Date: 2018-03-30</p> <p>Fix Resolution (hoek): 4.2.0</p> <p>Direct dependency fix Resolution (zaproxy): 1.0.0-rc.1</p><p>Fix Resolution (hoek): 4.2.0</p> <p>Direct dependency fix Resolution (grunt-retire): 1.0.7</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"zaproxy","packageVersion":"0.2.0","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"zaproxy:0.2.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.0.0-rc.1","isBinary":false},{"packageType":"javascript/Node.js","packageName":"grunt-retire","packageVersion":"0.3.12","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"grunt-retire:0.3.12","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.0.7","isBinary":false}],"baseBranches":["dev"],"vulnerabilityIdentifier":"CVE-2018-3728","vulnerabilityDetails":"hoek node module before 4.2.0 and 5.0.x before 5.0.3 suffers from a Modification of Assumed-Immutable Data (MAID) vulnerability via \u0027merge\u0027 and \u0027applyToDefaults\u0027 functions, which allows a malicious user to modify the prototype of \"Object\" via __proto__, causing the addition or modification of an existing property that will exist on all objects.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-3728","cvss3Severity":"high","cvss3Score":"8.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"Low","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> -->
True
CVE-2018-3728 (High) detected in hoek-0.9.1.tgz, hoek-2.16.3.tgz - ## CVE-2018-3728 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>hoek-0.9.1.tgz</b>, <b>hoek-2.16.3.tgz</b></p></summary> <p> <details><summary><b>hoek-0.9.1.tgz</b></p></summary> <p>General purpose node utilities</p> <p>Library home page: <a href="https://registry.npmjs.org/hoek/-/hoek-0.9.1.tgz">https://registry.npmjs.org/hoek/-/hoek-0.9.1.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/zaproxy/node_modules/hoek/package.json</p> <p> Dependency Hierarchy: - zaproxy-0.2.0.tgz (Root Library) - request-2.36.0.tgz - hawk-1.0.0.tgz - :x: **hoek-0.9.1.tgz** (Vulnerable Library) </details> <details><summary><b>hoek-2.16.3.tgz</b></p></summary> <p>General purpose node utilities</p> <p>Library home page: <a href="https://registry.npmjs.org/hoek/-/hoek-2.16.3.tgz">https://registry.npmjs.org/hoek/-/hoek-2.16.3.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/npm/node_modules/request/node_modules/hawk/node_modules/hoek/package.json,/node_modules/hoek/package.json</p> <p> Dependency Hierarchy: - grunt-retire-0.3.12.tgz (Root Library) - request-2.67.0.tgz - hawk-3.1.3.tgz - :x: **hoek-2.16.3.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/timf-app-sandbox/t1/commit/ade63e4d4d7f78775fe064056f81c5da1b53aecf">ade63e4d4d7f78775fe064056f81c5da1b53aecf</a></p> <p>Found in base branch: <b>dev</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> hoek node module before 4.2.0 and 5.0.x before 5.0.3 suffers from a Modification of Assumed-Immutable Data (MAID) vulnerability via 'merge' and 'applyToDefaults' functions, which allows a malicious user to modify the prototype of "Object" via __proto__, causing the addition or modification of an existing property that will exist on all objects. <p>Publish Date: 2018-03-30 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-3728>CVE-2018-3728</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16082">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16082</a></p> <p>Release Date: 2018-03-30</p> <p>Fix Resolution (hoek): 4.2.0</p> <p>Direct dependency fix Resolution (zaproxy): 1.0.0-rc.1</p><p>Fix Resolution (hoek): 4.2.0</p> <p>Direct dependency fix Resolution (grunt-retire): 1.0.7</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"zaproxy","packageVersion":"0.2.0","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"zaproxy:0.2.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.0.0-rc.1","isBinary":false},{"packageType":"javascript/Node.js","packageName":"grunt-retire","packageVersion":"0.3.12","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"grunt-retire:0.3.12","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.0.7","isBinary":false}],"baseBranches":["dev"],"vulnerabilityIdentifier":"CVE-2018-3728","vulnerabilityDetails":"hoek node module before 4.2.0 and 5.0.x before 5.0.3 suffers from a Modification of Assumed-Immutable Data (MAID) vulnerability via \u0027merge\u0027 and \u0027applyToDefaults\u0027 functions, which allows a malicious user to modify the prototype of \"Object\" via __proto__, causing the addition or modification of an existing property that will exist on all objects.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-3728","cvss3Severity":"high","cvss3Score":"8.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"Low","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> -->
non_design
cve high detected in hoek tgz hoek tgz cve high severity vulnerability vulnerable libraries hoek tgz hoek tgz hoek tgz general purpose node utilities library home page a href path to dependency file package json path to vulnerable library node modules zaproxy node modules hoek package json dependency hierarchy zaproxy tgz root library request tgz hawk tgz x hoek tgz vulnerable library hoek tgz general purpose node utilities library home page a href path to dependency file package json path to vulnerable library node modules npm node modules request node modules hawk node modules hoek package json node modules hoek package json dependency hierarchy grunt retire tgz root library request tgz hawk tgz x hoek tgz vulnerable library found in head commit a href found in base branch dev vulnerability details hoek node module before and x before suffers from a modification of assumed immutable data maid vulnerability via merge and applytodefaults functions which allows a malicious user to modify the prototype of object via proto causing the addition or modification of an existing property that will exist on all objects publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution hoek direct dependency fix resolution zaproxy rc fix resolution hoek direct dependency fix resolution grunt retire isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency false dependencytree zaproxy isminimumfixversionavailable true minimumfixversion rc isbinary false packagetype javascript node js packagename grunt retire packageversion packagefilepaths istransitivedependency false dependencytree grunt retire isminimumfixversionavailable true minimumfixversion isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails hoek node module before and x before suffers from a modification of assumed immutable data maid vulnerability via and functions which allows a malicious user to modify the prototype of object via proto causing the addition or modification of an existing property that will exist on all objects vulnerabilityurl
0
51,064
6,491,348,652
IssuesEvent
2017-08-21 09:48:15
CatalystCode/ibex-dashboard
https://api.github.com/repos/CatalystCode/ibex-dashboard
closed
Add info balloons when hovering on the icons in create dashboard page
design feature
![image](https://user-images.githubusercontent.com/13463870/29119054-3f1b18d8-7d0d-11e7-97bf-db2fb438383b.png) screenshot with suggestion attached
1.0
Add info balloons when hovering on the icons in create dashboard page - ![image](https://user-images.githubusercontent.com/13463870/29119054-3f1b18d8-7d0d-11e7-97bf-db2fb438383b.png) screenshot with suggestion attached
design
add info balloons when hovering on the icons in create dashboard page screenshot with suggestion attached
1
175,255
27,815,947,959
IssuesEvent
2023-03-18 17:32:49
chromium/subspace
https://api.github.com/repos/chromium/subspace
opened
Make all Iterator types in the library Clone
enhancement design
- If they are over references, like iter(), or slice iterators. - Cloning mutable references is fraught. Do we... support that? - If they are over values, like into_iter() if the values are `Clone`.
1.0
Make all Iterator types in the library Clone - - If they are over references, like iter(), or slice iterators. - Cloning mutable references is fraught. Do we... support that? - If they are over values, like into_iter() if the values are `Clone`.
design
make all iterator types in the library clone if they are over references like iter or slice iterators cloning mutable references is fraught do we support that if they are over values like into iter if the values are clone
1
112,326
9,560,636,359
IssuesEvent
2019-05-03 20:13:38
dart-lang/sdk
https://api.github.com/repos/dart-lang/sdk
closed
Tests of non-utf8 filenames break infrastructure if they don't clean up their temp files
area-test library-io
The tests standalone_2/io/non_utf8_directory_test standalone_2/io/non_utf8_file_test standalone_2/io/non_utf8_link_test standalone_2/io/non_utf8_output_test (possibly) will leave behind a temporary file system object with a non-utf8 name (starting with 0xb6, decimal 182) if they time out or crash. The swarming infrastructure used for builders then crashes when trying to delete these files, as part of cleaning up after a build. This is happening on the hot_reload and hot_reload_rollback builders right now. Skipping these tests on the reload and reload rollback builders for now, filing an issue with Chrome infrastructure to make the swarming bots stop crashing on this case. These are tests related to issue "Cannot walk a list of files and pass them to a subprocess (if any are non-UTF8) #33368"
1.0
Tests of non-utf8 filenames break infrastructure if they don't clean up their temp files - The tests standalone_2/io/non_utf8_directory_test standalone_2/io/non_utf8_file_test standalone_2/io/non_utf8_link_test standalone_2/io/non_utf8_output_test (possibly) will leave behind a temporary file system object with a non-utf8 name (starting with 0xb6, decimal 182) if they time out or crash. The swarming infrastructure used for builders then crashes when trying to delete these files, as part of cleaning up after a build. This is happening on the hot_reload and hot_reload_rollback builders right now. Skipping these tests on the reload and reload rollback builders for now, filing an issue with Chrome infrastructure to make the swarming bots stop crashing on this case. These are tests related to issue "Cannot walk a list of files and pass them to a subprocess (if any are non-UTF8) #33368"
non_design
tests of non filenames break infrastructure if they don t clean up their temp files the tests standalone io non directory test standalone io non file test standalone io non link test standalone io non output test possibly will leave behind a temporary file system object with a non name starting with decimal if they time out or crash the swarming infrastructure used for builders then crashes when trying to delete these files as part of cleaning up after a build this is happening on the hot reload and hot reload rollback builders right now skipping these tests on the reload and reload rollback builders for now filing an issue with chrome infrastructure to make the swarming bots stop crashing on this case these are tests related to issue cannot walk a list of files and pass them to a subprocess if any are non
0