Unnamed: 0
int64
0
832k
id
float64
2.49B
32.1B
type
stringclasses
1 value
created_at
stringlengths
19
19
repo
stringlengths
5
112
repo_url
stringlengths
34
141
action
stringclasses
3 values
title
stringlengths
1
855
labels
stringlengths
4
721
body
stringlengths
1
261k
index
stringclasses
13 values
text_combine
stringlengths
96
261k
label
stringclasses
2 values
text
stringlengths
96
240k
binary_label
int64
0
1
245,081
26,509,481,640
IssuesEvent
2023-01-18 16:04:06
MatBenfield/news
https://api.github.com/repos/MatBenfield/news
closed
[SecurityWeek] PyPI Users Targeted With 'Wacatac' Trojan in New Supply Chain Attack
SecurityWeek Stale
**Fortinet warns of three new malicious PyPI packages containing code designed to fetch the Wacatac trojan and information stealer as a next stage payload.** [read more](https://www.securityweek.com/pypi-users-targeted-wacatac-trojan-new-supply-chain-attack) <https://www.securityweek.com/pypi-users-targeted-wacatac-trojan-new-supply-chain-attack>
True
[SecurityWeek] PyPI Users Targeted With 'Wacatac' Trojan in New Supply Chain Attack - **Fortinet warns of three new malicious PyPI packages containing code designed to fetch the Wacatac trojan and information stealer as a next stage payload.** [read more](https://www.securityweek.com/pypi-users-targeted-wacatac-trojan-new-supply-chain-attack) <https://www.securityweek.com/pypi-users-targeted-wacatac-trojan-new-supply-chain-attack>
non_priority
pypi users targeted with wacatac trojan in new supply chain attack fortinet warns of three new malicious pypi packages containing code designed to fetch the wacatac trojan and information stealer as a next stage payload
0
67,978
21,390,280,903
IssuesEvent
2022-04-21 06:14:21
jlaffaye/ftp
https://api.github.com/repos/jlaffaye/ftp
opened
Some func do not support ftp on windows
defect
**Describe the bug** Some func do not support ftp on windows, Like NameList(string) **To Reproduce** 502 Command not implemented. **Expected behavior** return filename list **FTP server** Slyar FTPserver on windows
1.0
Some func do not support ftp on windows - **Describe the bug** Some func do not support ftp on windows, Like NameList(string) **To Reproduce** 502 Command not implemented. **Expected behavior** return filename list **FTP server** Slyar FTPserver on windows
non_priority
some func do not support ftp on windows describe the bug some func do not support ftp on windows like namelist string to reproduce command not implemented expected behavior return filename list ftp server slyar ftpserver on windows
0
208,815
16,163,768,140
IssuesEvent
2021-05-01 05:25:46
kaist-cp/rv6
https://api.github.com/repos/kaist-cp/rv6
closed
About #![allow(deadcode)] in lib.rs
D-easy documentation
- closes #113 lib.rs 내부의 `#![allow(deadcode)]`를 삭제하려면 xv6에는 구현되어 있는 요소들 중 사용되지 않는 것들을 제거하게 됩니다. xv6의 의도를 살리기 위해 `#![allow(deadcode)]`는 그대로 남겨서 사용하도록 하겠습니다. documentation으로 남기고, comment 추가하도록 하겠습니다.
1.0
About #![allow(deadcode)] in lib.rs - - closes #113 lib.rs 내부의 `#![allow(deadcode)]`를 삭제하려면 xv6에는 구현되어 있는 요소들 중 사용되지 않는 것들을 제거하게 됩니다. xv6의 의도를 살리기 위해 `#![allow(deadcode)]`는 그대로 남겨서 사용하도록 하겠습니다. documentation으로 남기고, comment 추가하도록 하겠습니다.
non_priority
about in lib rs closes lib rs 내부의 를 삭제하려면 구현되어 있는 요소들 중 사용되지 않는 것들을 제거하게 됩니다 의도를 살리기 위해 는 그대로 남겨서 사용하도록 하겠습니다 documentation으로 남기고 comment 추가하도록 하겠습니다
0
446,347
31,469,968,684
IssuesEvent
2023-08-30 06:46:11
WeblateOrg/weblate
https://api.github.com/repos/WeblateOrg/weblate
closed
Info icon redirects to 404 page
bug documentation
### Describe the issue The info icon redirects to the corresponding page in the Docs. However, if the page does not exist in the set interface language, the user lands on a 404 page. I would expect that it would then redirect to the English page instead. So, unfortunately, most translators have no way to get the relevant info. ### I already tried - [X] I've read and searched [the documentation](https://docs.weblate.org/). - [X] I've searched for similar issues in this repository. ### Steps to reproduce the behavior 1. Set the user interface language to German 2. Go to a project 3. Select a Component 4. Select a language 5. Scroll to string status 6. Click the info icon on the right 7. Redirects to [https://docs.weblate.org/de/weblate-4.13.1/user/translating.html#strings-to-check](https://docs.weblate.org/de/weblate-4.13.1/user/translating.html#strings-to-check) ### Expected behavior Opens the corresponding page in the Docs in German or if not available in the default language. ### Screenshots ![image](https://github.com/WeblateOrg/weblate/assets/77051325/14991e6a-7857-4848-abca-b736e586cfea) ![image](https://github.com/WeblateOrg/weblate/assets/77051325/8af9cdf8-93ef-4896-99b2-80b6b44c2d2a) ### Exception traceback _No response_ ### How do you run Weblate? PyPI module ### Weblate versions 4.13.1 ### Weblate deploy checks _No response_ ### Additional context _No response_
1.0
Info icon redirects to 404 page - ### Describe the issue The info icon redirects to the corresponding page in the Docs. However, if the page does not exist in the set interface language, the user lands on a 404 page. I would expect that it would then redirect to the English page instead. So, unfortunately, most translators have no way to get the relevant info. ### I already tried - [X] I've read and searched [the documentation](https://docs.weblate.org/). - [X] I've searched for similar issues in this repository. ### Steps to reproduce the behavior 1. Set the user interface language to German 2. Go to a project 3. Select a Component 4. Select a language 5. Scroll to string status 6. Click the info icon on the right 7. Redirects to [https://docs.weblate.org/de/weblate-4.13.1/user/translating.html#strings-to-check](https://docs.weblate.org/de/weblate-4.13.1/user/translating.html#strings-to-check) ### Expected behavior Opens the corresponding page in the Docs in German or if not available in the default language. ### Screenshots ![image](https://github.com/WeblateOrg/weblate/assets/77051325/14991e6a-7857-4848-abca-b736e586cfea) ![image](https://github.com/WeblateOrg/weblate/assets/77051325/8af9cdf8-93ef-4896-99b2-80b6b44c2d2a) ### Exception traceback _No response_ ### How do you run Weblate? PyPI module ### Weblate versions 4.13.1 ### Weblate deploy checks _No response_ ### Additional context _No response_
non_priority
info icon redirects to page describe the issue the info icon redirects to the corresponding page in the docs however if the page does not exist in the set interface language the user lands on a page i would expect that it would then redirect to the english page instead so unfortunately most translators have no way to get the relevant info i already tried i ve read and searched i ve searched for similar issues in this repository steps to reproduce the behavior set the user interface language to german go to a project select a component select a language scroll to string status click the info icon on the right redirects to expected behavior opens the corresponding page in the docs in german or if not available in the default language screenshots exception traceback no response how do you run weblate pypi module weblate versions weblate deploy checks no response additional context no response
0
405,810
27,534,706,104
IssuesEvent
2023-03-07 02:01:33
OpenCyphal/nunavut
https://api.github.com/repos/OpenCyphal/nunavut
closed
The local testing insturctions are obsolete
trivial documentation
Aren't we supposed to be using ghcr instead of dockerhub? <img width="388" alt="image" src="https://user-images.githubusercontent.com/3298404/222776629-38d80434-c121-43bd-bec5-2defc50c96a1.png"> If it was possible to make these instructions less prone to obsolescence, that would be helpful.
1.0
The local testing insturctions are obsolete - Aren't we supposed to be using ghcr instead of dockerhub? <img width="388" alt="image" src="https://user-images.githubusercontent.com/3298404/222776629-38d80434-c121-43bd-bec5-2defc50c96a1.png"> If it was possible to make these instructions less prone to obsolescence, that would be helpful.
non_priority
the local testing insturctions are obsolete aren t we supposed to be using ghcr instead of dockerhub img width alt image src if it was possible to make these instructions less prone to obsolescence that would be helpful
0
55,402
30,732,226,686
IssuesEvent
2023-07-28 03:21:04
hasura/graphql-engine
https://api.github.com/repos/hasura/graphql-engine
closed
[Feature Request]: Add latency report to GraphiQL
k/enhancement c/console p/medium e/intermediate a/performance
This one is really a minor but important detail: Please add query latency to the GraphiQL query console, as shown in the image below. The background is very simple when merging multiple remote-schemata together and exposing them through Hasura, it is not always clear were additional latency is coming from. For example, a microservice may query a database and exposes these queries a GraphQL endpoint to Hasura which then passes it on to the client. When the client measures, say 300 ms latency, but the naked DB query only takes 25 ms, the big question is where the rest is coming from. If, on the other hand, the same query in GraphiQL console also takes, say 225 ms latency, I know immediately that I have to dissect my microservice before tracing network hops. Conversely, if the GraphiQL query is about as fast, I have to dissect my CDN, but either way, I know exactly where to look from the get-go. ![image](https://user-images.githubusercontent.com/24190940/75304212-c79e9000-5810-11ea-93f9-122589214a2e.png)
True
[Feature Request]: Add latency report to GraphiQL - This one is really a minor but important detail: Please add query latency to the GraphiQL query console, as shown in the image below. The background is very simple when merging multiple remote-schemata together and exposing them through Hasura, it is not always clear were additional latency is coming from. For example, a microservice may query a database and exposes these queries a GraphQL endpoint to Hasura which then passes it on to the client. When the client measures, say 300 ms latency, but the naked DB query only takes 25 ms, the big question is where the rest is coming from. If, on the other hand, the same query in GraphiQL console also takes, say 225 ms latency, I know immediately that I have to dissect my microservice before tracing network hops. Conversely, if the GraphiQL query is about as fast, I have to dissect my CDN, but either way, I know exactly where to look from the get-go. ![image](https://user-images.githubusercontent.com/24190940/75304212-c79e9000-5810-11ea-93f9-122589214a2e.png)
non_priority
add latency report to graphiql this one is really a minor but important detail please add query latency to the graphiql query console as shown in the image below the background is very simple when merging multiple remote schemata together and exposing them through hasura it is not always clear were additional latency is coming from for example a microservice may query a database and exposes these queries a graphql endpoint to hasura which then passes it on to the client when the client measures say ms latency but the naked db query only takes ms the big question is where the rest is coming from if on the other hand the same query in graphiql console also takes say ms latency i know immediately that i have to dissect my microservice before tracing network hops conversely if the graphiql query is about as fast i have to dissect my cdn but either way i know exactly where to look from the get go
0
188,611
15,165,759,967
IssuesEvent
2021-02-12 15:28:33
TEIC/Stylesheets
https://api.github.com/repos/TEIC/Stylesheets
closed
Add permalink for examples
resp: StylesheetsGroup target: documentation type: enhancement
See TEIC/TEI#1931. We want to add a link on each example making it easy to obtain a URL directly to that example. Examples already have IDs, making that straightforward. The links should point at a particular version of the GLs rather than "current". Also see #470, so that if someone bookmarks one of these links and visits it, they see a message alerting them that they have visited an older version.
1.0
Add permalink for examples - See TEIC/TEI#1931. We want to add a link on each example making it easy to obtain a URL directly to that example. Examples already have IDs, making that straightforward. The links should point at a particular version of the GLs rather than "current". Also see #470, so that if someone bookmarks one of these links and visits it, they see a message alerting them that they have visited an older version.
non_priority
add permalink for examples see teic tei we want to add a link on each example making it easy to obtain a url directly to that example examples already have ids making that straightforward the links should point at a particular version of the gls rather than current also see so that if someone bookmarks one of these links and visits it they see a message alerting them that they have visited an older version
0
32,623
4,386,576,163
IssuesEvent
2016-08-08 13:18:59
prdxn-org/tagster
https://api.github.com/repos/prdxn-org/tagster
opened
As a designer I want to create a new design template for Geotagged images
Design Phase I Sprint 2 User Story
As a designer I want to create a new design template for Geotagged images so that I can see the images which are Geotagged. **Acceptance Criteria:** 1. Logo should be visible at Top left. 2. Light box should be shown. 3. Light box should show Google maps. 4. In the right side of header there should be a Mailto icon and an info icon 5. Search icon should be shown in the bottom right position next to the lightbox.
1.0
As a designer I want to create a new design template for Geotagged images - As a designer I want to create a new design template for Geotagged images so that I can see the images which are Geotagged. **Acceptance Criteria:** 1. Logo should be visible at Top left. 2. Light box should be shown. 3. Light box should show Google maps. 4. In the right side of header there should be a Mailto icon and an info icon 5. Search icon should be shown in the bottom right position next to the lightbox.
non_priority
as a designer i want to create a new design template for geotagged images as a designer i want to create a new design template for geotagged images so that i can see the images which are geotagged acceptance criteria logo should be visible at top left light box should be shown light box should show google maps in the right side of header there should be a mailto icon and an info icon search icon should be shown in the bottom right position next to the lightbox
0
21,445
7,024,831,326
IssuesEvent
2017-12-23 00:16:58
dart-lang/build
https://api.github.com/repos/dart-lang/build
closed
Allow mixed-mode building
package:build_runner
We need to allow running Builders that output to source, as well as to the generated cache directory. - [ ] #626 - How will outputting to source impact ordering? The Builders that output to source should probably all be run before those writing to the cache. They also likely shouldn't be allowed to use `required_inputs` - [x] Store `isHidden` on `GeneratedAssetNode`. Use this to determine where to read from - [x] Add `hiddenOutput` to `BuildAction`. We may want to hide this until `BuildAction` is removed from the public interface. - [x] Support setting `hiddenOutput` through `BuilderApplication`. - [x] Support some configuration for `hide_outputs` in `build.yaml` - [x] Deprecate then drop `writeToCache` argument, use the per-action setting instead
1.0
Allow mixed-mode building - We need to allow running Builders that output to source, as well as to the generated cache directory. - [ ] #626 - How will outputting to source impact ordering? The Builders that output to source should probably all be run before those writing to the cache. They also likely shouldn't be allowed to use `required_inputs` - [x] Store `isHidden` on `GeneratedAssetNode`. Use this to determine where to read from - [x] Add `hiddenOutput` to `BuildAction`. We may want to hide this until `BuildAction` is removed from the public interface. - [x] Support setting `hiddenOutput` through `BuilderApplication`. - [x] Support some configuration for `hide_outputs` in `build.yaml` - [x] Deprecate then drop `writeToCache` argument, use the per-action setting instead
non_priority
allow mixed mode building we need to allow running builders that output to source as well as to the generated cache directory how will outputting to source impact ordering the builders that output to source should probably all be run before those writing to the cache they also likely shouldn t be allowed to use required inputs store ishidden on generatedassetnode use this to determine where to read from add hiddenoutput to buildaction we may want to hide this until buildaction is removed from the public interface support setting hiddenoutput through builderapplication support some configuration for hide outputs in build yaml deprecate then drop writetocache argument use the per action setting instead
0
97,608
8,663,673,884
IssuesEvent
2018-11-28 17:58:08
elastic/beats
https://api.github.com/repos/elastic/beats
opened
Add more E2E tests for JSON configuration variations and `log.*` fields
:Testing Filebeat enhancement
Goal: test if metadata provided by Filebeat can be overwritten correctly using the JSON configuration options. Validate the following scenarios: https://github.com/elastic/beats/pull/9172#discussion_r236865737
1.0
Add more E2E tests for JSON configuration variations and `log.*` fields - Goal: test if metadata provided by Filebeat can be overwritten correctly using the JSON configuration options. Validate the following scenarios: https://github.com/elastic/beats/pull/9172#discussion_r236865737
non_priority
add more tests for json configuration variations and log fields goal test if metadata provided by filebeat can be overwritten correctly using the json configuration options validate the following scenarios
0
37,018
18,070,223,478
IssuesEvent
2021-09-21 01:25:55
matomo-org/matomo
https://api.github.com/repos/matomo-org/matomo
opened
SQL query to calculate life time metric can be slow
Major c: Performance
I'm meaning this query https://github.com/matomo-org/matomo/blob/4.5.0-b2/plugins/Ecommerce/VisitorDetails.php#L154-L169 which looks like this ```sql SELECT COALESCE(SUM(ROUND(revenue,2)), 0) as lifeTimeRevenue, COUNT(*) as lifeTimeConversions,COALESCE(SUM(ROUND(items,2)), 0) as lifeTimeEcommerceItems FROM log_visit AS log_visit LEFT JOIN log_conversion AS log_conversion ON log_visit.idvisit = log_conversion.idvisit WHERE log_visit.idsite = '2' AND log_visit.idvisitor = 'Vè…tO' AND log_conversion.idgoal = 0 ``` At first glance the query looks good as it uses indexes etc. This is usually also the case ![image](https://user-images.githubusercontent.com/273120/134098053-fa5ca4a5-9e07-499f-ac24-ab84dde32b49.png) However, things change when one visitor has hundreds or thousands of visits. Then it looks like this: ![image](https://user-images.githubusercontent.com/273120/134098012-31aa735b-cf77-476f-b8aa-a9fd9c47ba8e.png) Here is more explain format=json information: ```json { "query_block": { "select_id": 1, "cost_info": { "query_cost": "365.16" }, "nested_loop": [ { "table": { "table_name": "log_conversion", "access_type": "ALL", "possible_keys": [ "PRIMARY" ], "rows_examined_per_scan": 738, "rows_produced_per_join": 73, "filtered": "10.00", "cost_info": { "read_cost": "261.84", "eval_cost": "14.76", "prefix_cost": "276.60", "data_read_per_join": "2M" }, "used_columns": [ "idvisit", "idgoal", "items", "revenue" ], "attached_condition": "((`test`.`log_conversion`.`idgoal` = 0) and (`test`.`log_conversion`.`idvisit` is not null))" } }, { "table": { "table_name": "log_visit", "access_type": "eq_ref", "possible_keys": [ "PRIMARY", "index_idsite_config_datetime", "index_idsite_datetime", "index_idsite_idvisitor" ], "key": "PRIMARY", "used_key_parts": [ "idvisit" ], "key_length": "8", "ref": [ "test.log_conversion.idvisit" ], "rows_examined_per_scan": 1, "rows_produced_per_join": 3, "filtered": "5.00", "cost_info": { "read_cost": "73.80", "eval_cost": "0.74", "prefix_cost": "365.16", "data_read_per_join": "113K" }, "used_columns": [ "idvisit", "idsite", "idvisitor" ], "attached_condition": "((`test`.`log_visit`.`idvisitor` = (@`id`)) and (`test`.`log_visit`.`idsite` = '2'))" } } ] } } ``` FYI Overall, in that specific case, there is actually no entry that matches `idsite = 2 and idgoal = 0` in `log_conversion`. refs https://github.com/matomo-org/matomo/issues/16904
True
SQL query to calculate life time metric can be slow - I'm meaning this query https://github.com/matomo-org/matomo/blob/4.5.0-b2/plugins/Ecommerce/VisitorDetails.php#L154-L169 which looks like this ```sql SELECT COALESCE(SUM(ROUND(revenue,2)), 0) as lifeTimeRevenue, COUNT(*) as lifeTimeConversions,COALESCE(SUM(ROUND(items,2)), 0) as lifeTimeEcommerceItems FROM log_visit AS log_visit LEFT JOIN log_conversion AS log_conversion ON log_visit.idvisit = log_conversion.idvisit WHERE log_visit.idsite = '2' AND log_visit.idvisitor = 'Vè…tO' AND log_conversion.idgoal = 0 ``` At first glance the query looks good as it uses indexes etc. This is usually also the case ![image](https://user-images.githubusercontent.com/273120/134098053-fa5ca4a5-9e07-499f-ac24-ab84dde32b49.png) However, things change when one visitor has hundreds or thousands of visits. Then it looks like this: ![image](https://user-images.githubusercontent.com/273120/134098012-31aa735b-cf77-476f-b8aa-a9fd9c47ba8e.png) Here is more explain format=json information: ```json { "query_block": { "select_id": 1, "cost_info": { "query_cost": "365.16" }, "nested_loop": [ { "table": { "table_name": "log_conversion", "access_type": "ALL", "possible_keys": [ "PRIMARY" ], "rows_examined_per_scan": 738, "rows_produced_per_join": 73, "filtered": "10.00", "cost_info": { "read_cost": "261.84", "eval_cost": "14.76", "prefix_cost": "276.60", "data_read_per_join": "2M" }, "used_columns": [ "idvisit", "idgoal", "items", "revenue" ], "attached_condition": "((`test`.`log_conversion`.`idgoal` = 0) and (`test`.`log_conversion`.`idvisit` is not null))" } }, { "table": { "table_name": "log_visit", "access_type": "eq_ref", "possible_keys": [ "PRIMARY", "index_idsite_config_datetime", "index_idsite_datetime", "index_idsite_idvisitor" ], "key": "PRIMARY", "used_key_parts": [ "idvisit" ], "key_length": "8", "ref": [ "test.log_conversion.idvisit" ], "rows_examined_per_scan": 1, "rows_produced_per_join": 3, "filtered": "5.00", "cost_info": { "read_cost": "73.80", "eval_cost": "0.74", "prefix_cost": "365.16", "data_read_per_join": "113K" }, "used_columns": [ "idvisit", "idsite", "idvisitor" ], "attached_condition": "((`test`.`log_visit`.`idvisitor` = (@`id`)) and (`test`.`log_visit`.`idsite` = '2'))" } } ] } } ``` FYI Overall, in that specific case, there is actually no entry that matches `idsite = 2 and idgoal = 0` in `log_conversion`. refs https://github.com/matomo-org/matomo/issues/16904
non_priority
sql query to calculate life time metric can be slow i m meaning this query which looks like this sql select coalesce sum round revenue as lifetimerevenue count as lifetimeconversions coalesce sum round items as lifetimeecommerceitems from log visit as log visit left join log conversion as log conversion on log visit idvisit log conversion idvisit where log visit idsite and log visit idvisitor vè…to and log conversion idgoal at first glance the query looks good as it uses indexes etc this is usually also the case however things change when one visitor has hundreds or thousands of visits then it looks like this here is more explain format json information json query block select id cost info query cost nested loop table table name log conversion access type all possible keys primary rows examined per scan rows produced per join filtered cost info read cost eval cost prefix cost data read per join used columns idvisit idgoal items revenue attached condition test log conversion idgoal and test log conversion idvisit is not null table table name log visit access type eq ref possible keys primary index idsite config datetime index idsite datetime index idsite idvisitor key primary used key parts idvisit key length ref test log conversion idvisit rows examined per scan rows produced per join filtered cost info read cost eval cost prefix cost data read per join used columns idvisit idsite idvisitor attached condition test log visit idvisitor id and test log visit idsite fyi overall in that specific case there is actually no entry that matches idsite and idgoal in log conversion refs
0
151,196
13,393,406,004
IssuesEvent
2020-09-03 04:08:08
seanpm2001/SNU_2D_CloudDrive
https://api.github.com/repos/seanpm2001/SNU_2D_CloudDrive
opened
Can't upload WAV Pcloud audio sample
documentation enhancement good first issue help wanted
*** ### Can't upload WAV Pcloud audio sample I can't upload the pCloud audio sample that is in WAV format, as it exceeds the GitHub 25 megabyte file limit. I have tried multiple methods of compression, but I have been unable to get it below 26.1 megabytes, which is still over 1.1 megabytes over the limit. If anyone knows how to compress it without losing its original data, feel free to upload a copy. ***
1.0
Can't upload WAV Pcloud audio sample - *** ### Can't upload WAV Pcloud audio sample I can't upload the pCloud audio sample that is in WAV format, as it exceeds the GitHub 25 megabyte file limit. I have tried multiple methods of compression, but I have been unable to get it below 26.1 megabytes, which is still over 1.1 megabytes over the limit. If anyone knows how to compress it without losing its original data, feel free to upload a copy. ***
non_priority
can t upload wav pcloud audio sample can t upload wav pcloud audio sample i can t upload the pcloud audio sample that is in wav format as it exceeds the github megabyte file limit i have tried multiple methods of compression but i have been unable to get it below megabytes which is still over megabytes over the limit if anyone knows how to compress it without losing its original data feel free to upload a copy
0
12,498
7,893,200,863
IssuesEvent
2018-06-28 17:15:37
Azure/azure-functions-durable-extension
https://api.github.com/repos/Azure/azure-functions-durable-extension
opened
Heavy load performance and reliability improvements
dtfx performance
This is a general work item tracking performance improvements in heavy load scenarios for Azure Functions v2 GA timeframe (ideally any improvements would work for Durable on both v1 and v2). I'm currently tracking the current scenario(s), which have shown some inconsistent behavior: - [ ] 1M sequential orchestrations executing concurrently across multiple Azure VMs. I will also link other issues to this one which might impact our results.
True
Heavy load performance and reliability improvements - This is a general work item tracking performance improvements in heavy load scenarios for Azure Functions v2 GA timeframe (ideally any improvements would work for Durable on both v1 and v2). I'm currently tracking the current scenario(s), which have shown some inconsistent behavior: - [ ] 1M sequential orchestrations executing concurrently across multiple Azure VMs. I will also link other issues to this one which might impact our results.
non_priority
heavy load performance and reliability improvements this is a general work item tracking performance improvements in heavy load scenarios for azure functions ga timeframe ideally any improvements would work for durable on both and i m currently tracking the current scenario s which have shown some inconsistent behavior sequential orchestrations executing concurrently across multiple azure vms i will also link other issues to this one which might impact our results
0
24,633
12,344,588,378
IssuesEvent
2020-05-15 07:19:37
flutter/flutter
https://api.github.com/repos/flutter/flutter
opened
ios release not working properly
created via performance template
<!-- Thank you for using Flutter! If you are looking for support, please check out our documentation or consider asking a question on Stack Overflow: * https://flutter.dev/ * https://api.flutter.dev/ * https://stackoverflow.com/questions/tagged/flutter?sort=frequent If you have found a performance problem, then fill our the template below. Please read our guide to filing a bug first: https://flutter.dev/docs/resources/bug-reports --> ## Details <!-- 1. Please tell us exactly how to reproduce the problem you are running into. 2. Please attach a small application (ideally just one main.dart file) that reproduces the problem. You could use https://gist.github.com/ for this. 3. Switch flutter to master channel and run this app on a physical device using profile mode with Skia tracing enabled, as follows: flutter channel master flutter run --profile --trace-skia Then press ‘P’ to enable the performance overlay. The bleeding edge master channel is encouraged here because Flutter is constantly fixing bugs and improving its performance. Your problem in an older Flutter version may have already been solved in the master channel. 4. Record a video of the performance issue using another phone so we can have an intuitive understanding of what happened. Don’t use "adb screenrecord", as that affects the performance of the profile run. 5. Open Observatory and save a timeline trace of the performance issue so we know which functions might be causing it. See "How to Collect and Read Timeline Traces" on this blog post: https://medium.com/flutter-io/profiling-flutter-applications-using-the-timeline-a1a434964af03#a499 --> I don't know which part is wrong. When I use flutter to develop an application, everything works fine. After the application is uploaded to the app store, I can use it myself without problems. But the user feedback to me is very bad. <!-- Please tell us which target platform(s) the problem occurs (Android / iOS / Web / macOS / Linux / Windows) Which target OS version, for Web, browser, is the test system running? Does the problem occur on emulator/simulator as well as on physical devices? --> **Target Platform: ios **Target OS version/browser: all **Devices: all ## Logs <!-- Run `flutter analyze` and attach any output of that command below. If there are any analysis errors, try resolving them before filing this issue. --> ``` info • The value of the field '_options' isn't used • lib/common/Git.dart:47:18 • unused_field info • The declaration '_getAuth' isn't referenced • lib/common/Git.dart:229:25 • unused_element info • The value of the field '_languageCode' isn't used • lib/main.dart:968:16 • unused_field info • Unused import: 'package:camera/camera.dart' • lib/routers/book/WriteBookInfo.dart:15:8 • unused_import info • Unused import: 'dart:io' • lib/routers/book/WriteExperience.dart:1:8 • unused_import info • Unused import: 'dart:convert' • lib/routers/index/ImagePick.dart:2:8 • unused_import warning • Missing case clause for 'linux' • lib/routers/index/login/PrivateBottomSheet.dart:280:5 • missing_enum_constant_in_switch warning • Missing case clause for 'macOS' • lib/routers/index/login/PrivateBottomSheet.dart:280:5 • missing_enum_constant_in_switch warning • Missing case clause for 'windows' • lib/routers/index/login/PrivateBottomSheet.dart:280:5 • missing_enum_constant_in_switch info • Unused import: 'dart:io' • lib/routers/settings/Setting.dart:1:8 • unused_import info • Unused import: 'package:book_data/widgets/searchBar/SearchBar.dart' • lib/routers/user/UserChat.dart:12:8 • unused_import info • Unused import: 'dart:async' • lib/routers/user/homePage/UserHomePage.dart:1:8 • unused_import warning • Missing case clause for 'linux' • lib/widgets/MyAppBar.dart:256:5 • missing_enum_constant_in_switch warning • Missing case clause for 'macOS' • lib/widgets/MyAppBar.dart:256:5 • missing_enum_constant_in_switch warning • Missing case clause for 'windows' • lib/widgets/MyAppBar.dart:256:5 • missing_enum_constant_in_switch info • 'title' is deprecated and shouldn't be used. This is the term used in the 2014 version of material design. The modern term is headline6. This feature was deprecated after v1.13.8. • lib/widgets/MyAppBar.dart:301:47 • deprecated_member_use info • 'title' is deprecated and shouldn't be used. This is the term used in the 2014 version of material design. The modern term is headline6. This feature was deprecated after v1.13.8. • lib/widgets/MyAppBar.dart:302:35 • deprecated_member_use info • 'title' is deprecated and shouldn't be used. This is the term used in the 2014 version of material design. The modern term is headline6. This feature was deprecated after v1.13.8. • lib/widgets/MyAppBar.dart:303:35 • deprecated_member_use info • 'body1' is deprecated and shouldn't be used. This is the term used in the 2014 version of material design. The modern term is bodyText2. This feature was deprecated after v1.13.8. • lib/widgets/MyAppBar.dart:304:45 • deprecated_member_use info • 'body1' is deprecated and shouldn't be used. This is the term used in the 2014 version of material design. The modern term is bodyText2. This feature was deprecated after v1.13.8. • lib/widgets/MyAppBar.dart:305:35 • deprecated_member_use info • 'body1' is deprecated and shouldn't be used. This is the term used in the 2014 version of material design. The modern term is bodyText2. This feature was deprecated after v1.13.8. • lib/widgets/MyAppBar.dart:306:35 • deprecated_member_use warning • Missing case clause for 'linux' • lib/widgets/MyAppBar.dart:345:7 • missing_enum_constant_in_switch warning • Missing case clause for 'macOS' • lib/widgets/MyAppBar.dart:345:7 • missing_enum_constant_in_switch warning • Missing case clause for 'windows' • lib/widgets/MyAppBar.dart:345:7 • missing_enum_constant_in_switch warning • Missing case clause for 'linux' • lib/widgets/PrivateBottomSheet.dart:280:5 • missing_enum_constant_in_switch warning • Missing case clause for 'macOS' • lib/widgets/PrivateBottomSheet.dart:280:5 • missing_enum_constant_in_switch warning • Missing case clause for 'windows' • lib/widgets/PrivateBottomSheet.dart:280:5 • missing_enum_constant_in_switch info • Unused import: 'dart:typed_data' • lib/widgets/UpdateImage.dart:1:8 • unused_import info • Unused import: 'package:book_data/common/Global.dart' • lib/widgets/UpdateImage.dart:4:8 • unused_import info • 'body1' is deprecated and shouldn't be used. This is the term used in the 2014 version of material design. The modern term is bodyText2. This feature was deprecated after v1.13.8. • lib/widgets/numberpicker.dart:263:50 • deprecated_member_use info • 'headline' is deprecated and shouldn't be used. This is the term used in the 2014 version of material design. The modern term is headline5. This feature was deprecated after v1.13.8. • lib/widgets/numberpicker.dart:265:29 • deprecated_member_use info • The member 'activity' can only be used within 'package:flutter/src/widgets/scroll_position.dart' or a test • lib/widgets/numberpicker.dart:272:42 • invalid_use_of_visible_for_testing_member info • The member 'activity' can only be used within instance members of subclasses of 'package:flutter/src/widgets/scroll_position.dart' • lib/widgets/numberpicker.dart:272:42 • invalid_use_of_protected_member info • 'body1' is deprecated and shouldn't be used. This is the term used in the 2014 version of material design. The modern term is bodyText2. This feature was deprecated after v1.13.8. • lib/widgets/numberpicker.dart:325:50 • deprecated_member_use info • 'headline' is deprecated and shouldn't be used. This is the term used in the 2014 version of material design. The modern term is headline5. This feature was deprecated after v1.13.8. • lib/widgets/numberpicker.dart:327:29 • deprecated_member_use info • The member 'activity' can only be used within 'package:flutter/src/widgets/scroll_position.dart' or a test • lib/widgets/numberpicker.dart:335:46 • invalid_use_of_visible_for_testing_member info • The member 'activity' can only be used within instance members of subclasses of 'package:flutter/src/widgets/scroll_position.dart' • lib/widgets/numberpicker.dart:335:46 • invalid_use_of_protected_member info • 'body1' is deprecated and shouldn't be used. This is the term used in the 2014 version of material design. The modern term is bodyText2. This feature was deprecated after v1.13.8. • lib/widgets/numberpicker.dart:385:50 • deprecated_member_use info • 'headline' is deprecated and shouldn't be used. This is the term used in the 2014 version of material design. The modern term is headline5. This feature was deprecated after v1.13.8. • lib/widgets/numberpicker.dart:387:29 • deprecated_member_use info • The member 'activity' can only be used within 'package:flutter/src/widgets/scroll_position.dart' or a test • lib/widgets/numberpicker.dart:392:42 • invalid_use_of_visible_for_testing_member info • The member 'activity' can only be used within instance members of subclasses of 'package:flutter/src/widgets/scroll_position.dart' • lib/widgets/numberpicker.dart:392:42 • invalid_use_of_protected_member info • The member 'activity' can only be used within 'package:flutter/src/widgets/scroll_position.dart' or a test • lib/widgets/numberpicker.dart:553:35 • invalid_use_of_visible_for_testing_member info • The member 'activity' can only be used within instance members of subclasses of 'package:flutter/src/widgets/scroll_position.dart' • lib/widgets/numberpicker.dart:553:35 • invalid_use_of_protected_member warning • The parameter 'lastStr' is required • lib/widgets/numberpicker.dart:697:18 • missing_required_param warning • The parameter 'preStr' is required • lib/widgets/numberpicker.dart:697:18 • missing_required_param warning • The parameter 'lastStr' is required • lib/widgets/numberpicker.dart:706:18 • missing_required_param warning • The parameter 'preStr' is required • lib/widgets/numberpicker.dart:706:18 • missing_required_param info • Unused import: 'package:book_data/common/ThemeModel.dart' • lib/widgets/searchBar/SearchBar.dart:5:8 • unused_import info • Unused import: 'package:provider/provider.dart' • lib/widgets/searchBar/SearchBar.dart:12:8 • unused_import warning • The include file ../../analysis_options.yaml in /Users/elevendimensions/Desktop/book_data/plugins/camera-0.5.7+4/analysis_options.yaml cannot be found • plugins/camera-0.5.7+4/analysis_options.yaml:1:11 • include_file_not_found warning • The include file ../../analysis_options.yaml in /Users/elevendimensions/Desktop/book_data/plugins/camera-0.5.7+4/analysis_options.yaml cannot be found • plugins/camera-0.5.7+4/analysis_options.yaml:1:11 • include_file_not_found 51 issues found. (ran in 15.2s) ``` <!-- Finally, paste the output of running `flutter doctor -v` here, with your device plugged in. --> ``` [✓] Flutter (Channel stable, v1.17.0, on Mac OS X 10.15.4 19E287, locale zh-Hans-CN) • Flutter version 1.17.0 at /Users/elevendimensions/Documents/flutter • Framework revision e6b34c2b5c (13 days ago), 2020-05-02 11:39:18 -0700 • Engine revision 540786dd51 • Dart version 2.8.1 [✓] Android toolchain - develop for Android devices (Android SDK version 29.0.3) • Android SDK at /Users/elevendimensions/Library/Android/sdk • Platform android-29, build-tools 29.0.3 • Java binary at: /Applications/Android Studio.app/Contents/jre/jdk/Contents/Home/bin/java • Java version OpenJDK Runtime Environment (build 1.8.0_212-release-1586-b4-5784211) • All Android licenses accepted. [✓] Xcode - develop for iOS and macOS (Xcode 11.4.1) • Xcode at /Applications/Xcode.app/Contents/Developer • Xcode 11.4.1, Build version 11E503a • CocoaPods version 1.9.1 [✓] Android Studio (version 3.6) • Android Studio at /Applications/Android Studio.app/Contents • Flutter plugin version 45.1.1 • Dart plugin version 192.7761 • Java version OpenJDK Runtime Environment (build 1.8.0_212-release-1586-b4-5784211) [!] Connected device ! No devices available ! Doctor found issues in 1 category. ```
True
ios release not working properly - <!-- Thank you for using Flutter! If you are looking for support, please check out our documentation or consider asking a question on Stack Overflow: * https://flutter.dev/ * https://api.flutter.dev/ * https://stackoverflow.com/questions/tagged/flutter?sort=frequent If you have found a performance problem, then fill our the template below. Please read our guide to filing a bug first: https://flutter.dev/docs/resources/bug-reports --> ## Details <!-- 1. Please tell us exactly how to reproduce the problem you are running into. 2. Please attach a small application (ideally just one main.dart file) that reproduces the problem. You could use https://gist.github.com/ for this. 3. Switch flutter to master channel and run this app on a physical device using profile mode with Skia tracing enabled, as follows: flutter channel master flutter run --profile --trace-skia Then press ‘P’ to enable the performance overlay. The bleeding edge master channel is encouraged here because Flutter is constantly fixing bugs and improving its performance. Your problem in an older Flutter version may have already been solved in the master channel. 4. Record a video of the performance issue using another phone so we can have an intuitive understanding of what happened. Don’t use "adb screenrecord", as that affects the performance of the profile run. 5. Open Observatory and save a timeline trace of the performance issue so we know which functions might be causing it. See "How to Collect and Read Timeline Traces" on this blog post: https://medium.com/flutter-io/profiling-flutter-applications-using-the-timeline-a1a434964af03#a499 --> I don't know which part is wrong. When I use flutter to develop an application, everything works fine. After the application is uploaded to the app store, I can use it myself without problems. But the user feedback to me is very bad. <!-- Please tell us which target platform(s) the problem occurs (Android / iOS / Web / macOS / Linux / Windows) Which target OS version, for Web, browser, is the test system running? Does the problem occur on emulator/simulator as well as on physical devices? --> **Target Platform: ios **Target OS version/browser: all **Devices: all ## Logs <!-- Run `flutter analyze` and attach any output of that command below. If there are any analysis errors, try resolving them before filing this issue. --> ``` info • The value of the field '_options' isn't used • lib/common/Git.dart:47:18 • unused_field info • The declaration '_getAuth' isn't referenced • lib/common/Git.dart:229:25 • unused_element info • The value of the field '_languageCode' isn't used • lib/main.dart:968:16 • unused_field info • Unused import: 'package:camera/camera.dart' • lib/routers/book/WriteBookInfo.dart:15:8 • unused_import info • Unused import: 'dart:io' • lib/routers/book/WriteExperience.dart:1:8 • unused_import info • Unused import: 'dart:convert' • lib/routers/index/ImagePick.dart:2:8 • unused_import warning • Missing case clause for 'linux' • lib/routers/index/login/PrivateBottomSheet.dart:280:5 • missing_enum_constant_in_switch warning • Missing case clause for 'macOS' • lib/routers/index/login/PrivateBottomSheet.dart:280:5 • missing_enum_constant_in_switch warning • Missing case clause for 'windows' • lib/routers/index/login/PrivateBottomSheet.dart:280:5 • missing_enum_constant_in_switch info • Unused import: 'dart:io' • lib/routers/settings/Setting.dart:1:8 • unused_import info • Unused import: 'package:book_data/widgets/searchBar/SearchBar.dart' • lib/routers/user/UserChat.dart:12:8 • unused_import info • Unused import: 'dart:async' • lib/routers/user/homePage/UserHomePage.dart:1:8 • unused_import warning • Missing case clause for 'linux' • lib/widgets/MyAppBar.dart:256:5 • missing_enum_constant_in_switch warning • Missing case clause for 'macOS' • lib/widgets/MyAppBar.dart:256:5 • missing_enum_constant_in_switch warning • Missing case clause for 'windows' • lib/widgets/MyAppBar.dart:256:5 • missing_enum_constant_in_switch info • 'title' is deprecated and shouldn't be used. This is the term used in the 2014 version of material design. The modern term is headline6. This feature was deprecated after v1.13.8. • lib/widgets/MyAppBar.dart:301:47 • deprecated_member_use info • 'title' is deprecated and shouldn't be used. This is the term used in the 2014 version of material design. The modern term is headline6. This feature was deprecated after v1.13.8. • lib/widgets/MyAppBar.dart:302:35 • deprecated_member_use info • 'title' is deprecated and shouldn't be used. This is the term used in the 2014 version of material design. The modern term is headline6. This feature was deprecated after v1.13.8. • lib/widgets/MyAppBar.dart:303:35 • deprecated_member_use info • 'body1' is deprecated and shouldn't be used. This is the term used in the 2014 version of material design. The modern term is bodyText2. This feature was deprecated after v1.13.8. • lib/widgets/MyAppBar.dart:304:45 • deprecated_member_use info • 'body1' is deprecated and shouldn't be used. This is the term used in the 2014 version of material design. The modern term is bodyText2. This feature was deprecated after v1.13.8. • lib/widgets/MyAppBar.dart:305:35 • deprecated_member_use info • 'body1' is deprecated and shouldn't be used. This is the term used in the 2014 version of material design. The modern term is bodyText2. This feature was deprecated after v1.13.8. • lib/widgets/MyAppBar.dart:306:35 • deprecated_member_use warning • Missing case clause for 'linux' • lib/widgets/MyAppBar.dart:345:7 • missing_enum_constant_in_switch warning • Missing case clause for 'macOS' • lib/widgets/MyAppBar.dart:345:7 • missing_enum_constant_in_switch warning • Missing case clause for 'windows' • lib/widgets/MyAppBar.dart:345:7 • missing_enum_constant_in_switch warning • Missing case clause for 'linux' • lib/widgets/PrivateBottomSheet.dart:280:5 • missing_enum_constant_in_switch warning • Missing case clause for 'macOS' • lib/widgets/PrivateBottomSheet.dart:280:5 • missing_enum_constant_in_switch warning • Missing case clause for 'windows' • lib/widgets/PrivateBottomSheet.dart:280:5 • missing_enum_constant_in_switch info • Unused import: 'dart:typed_data' • lib/widgets/UpdateImage.dart:1:8 • unused_import info • Unused import: 'package:book_data/common/Global.dart' • lib/widgets/UpdateImage.dart:4:8 • unused_import info • 'body1' is deprecated and shouldn't be used. This is the term used in the 2014 version of material design. The modern term is bodyText2. This feature was deprecated after v1.13.8. • lib/widgets/numberpicker.dart:263:50 • deprecated_member_use info • 'headline' is deprecated and shouldn't be used. This is the term used in the 2014 version of material design. The modern term is headline5. This feature was deprecated after v1.13.8. • lib/widgets/numberpicker.dart:265:29 • deprecated_member_use info • The member 'activity' can only be used within 'package:flutter/src/widgets/scroll_position.dart' or a test • lib/widgets/numberpicker.dart:272:42 • invalid_use_of_visible_for_testing_member info • The member 'activity' can only be used within instance members of subclasses of 'package:flutter/src/widgets/scroll_position.dart' • lib/widgets/numberpicker.dart:272:42 • invalid_use_of_protected_member info • 'body1' is deprecated and shouldn't be used. This is the term used in the 2014 version of material design. The modern term is bodyText2. This feature was deprecated after v1.13.8. • lib/widgets/numberpicker.dart:325:50 • deprecated_member_use info • 'headline' is deprecated and shouldn't be used. This is the term used in the 2014 version of material design. The modern term is headline5. This feature was deprecated after v1.13.8. • lib/widgets/numberpicker.dart:327:29 • deprecated_member_use info • The member 'activity' can only be used within 'package:flutter/src/widgets/scroll_position.dart' or a test • lib/widgets/numberpicker.dart:335:46 • invalid_use_of_visible_for_testing_member info • The member 'activity' can only be used within instance members of subclasses of 'package:flutter/src/widgets/scroll_position.dart' • lib/widgets/numberpicker.dart:335:46 • invalid_use_of_protected_member info • 'body1' is deprecated and shouldn't be used. This is the term used in the 2014 version of material design. The modern term is bodyText2. This feature was deprecated after v1.13.8. • lib/widgets/numberpicker.dart:385:50 • deprecated_member_use info • 'headline' is deprecated and shouldn't be used. This is the term used in the 2014 version of material design. The modern term is headline5. This feature was deprecated after v1.13.8. • lib/widgets/numberpicker.dart:387:29 • deprecated_member_use info • The member 'activity' can only be used within 'package:flutter/src/widgets/scroll_position.dart' or a test • lib/widgets/numberpicker.dart:392:42 • invalid_use_of_visible_for_testing_member info • The member 'activity' can only be used within instance members of subclasses of 'package:flutter/src/widgets/scroll_position.dart' • lib/widgets/numberpicker.dart:392:42 • invalid_use_of_protected_member info • The member 'activity' can only be used within 'package:flutter/src/widgets/scroll_position.dart' or a test • lib/widgets/numberpicker.dart:553:35 • invalid_use_of_visible_for_testing_member info • The member 'activity' can only be used within instance members of subclasses of 'package:flutter/src/widgets/scroll_position.dart' • lib/widgets/numberpicker.dart:553:35 • invalid_use_of_protected_member warning • The parameter 'lastStr' is required • lib/widgets/numberpicker.dart:697:18 • missing_required_param warning • The parameter 'preStr' is required • lib/widgets/numberpicker.dart:697:18 • missing_required_param warning • The parameter 'lastStr' is required • lib/widgets/numberpicker.dart:706:18 • missing_required_param warning • The parameter 'preStr' is required • lib/widgets/numberpicker.dart:706:18 • missing_required_param info • Unused import: 'package:book_data/common/ThemeModel.dart' • lib/widgets/searchBar/SearchBar.dart:5:8 • unused_import info • Unused import: 'package:provider/provider.dart' • lib/widgets/searchBar/SearchBar.dart:12:8 • unused_import warning • The include file ../../analysis_options.yaml in /Users/elevendimensions/Desktop/book_data/plugins/camera-0.5.7+4/analysis_options.yaml cannot be found • plugins/camera-0.5.7+4/analysis_options.yaml:1:11 • include_file_not_found warning • The include file ../../analysis_options.yaml in /Users/elevendimensions/Desktop/book_data/plugins/camera-0.5.7+4/analysis_options.yaml cannot be found • plugins/camera-0.5.7+4/analysis_options.yaml:1:11 • include_file_not_found 51 issues found. (ran in 15.2s) ``` <!-- Finally, paste the output of running `flutter doctor -v` here, with your device plugged in. --> ``` [✓] Flutter (Channel stable, v1.17.0, on Mac OS X 10.15.4 19E287, locale zh-Hans-CN) • Flutter version 1.17.0 at /Users/elevendimensions/Documents/flutter • Framework revision e6b34c2b5c (13 days ago), 2020-05-02 11:39:18 -0700 • Engine revision 540786dd51 • Dart version 2.8.1 [✓] Android toolchain - develop for Android devices (Android SDK version 29.0.3) • Android SDK at /Users/elevendimensions/Library/Android/sdk • Platform android-29, build-tools 29.0.3 • Java binary at: /Applications/Android Studio.app/Contents/jre/jdk/Contents/Home/bin/java • Java version OpenJDK Runtime Environment (build 1.8.0_212-release-1586-b4-5784211) • All Android licenses accepted. [✓] Xcode - develop for iOS and macOS (Xcode 11.4.1) • Xcode at /Applications/Xcode.app/Contents/Developer • Xcode 11.4.1, Build version 11E503a • CocoaPods version 1.9.1 [✓] Android Studio (version 3.6) • Android Studio at /Applications/Android Studio.app/Contents • Flutter plugin version 45.1.1 • Dart plugin version 192.7761 • Java version OpenJDK Runtime Environment (build 1.8.0_212-release-1586-b4-5784211) [!] Connected device ! No devices available ! Doctor found issues in 1 category. ```
non_priority
ios release not working properly thank you for using flutter if you are looking for support please check out our documentation or consider asking a question on stack overflow if you have found a performance problem then fill our the template below please read our guide to filing a bug first details please tell us exactly how to reproduce the problem you are running into please attach a small application ideally just one main dart file that reproduces the problem you could use for this switch flutter to master channel and run this app on a physical device using profile mode with skia tracing enabled as follows flutter channel master flutter run profile trace skia then press ‘p’ to enable the performance overlay the bleeding edge master channel is encouraged here because flutter is constantly fixing bugs and improving its performance your problem in an older flutter version may have already been solved in the master channel record a video of the performance issue using another phone so we can have an intuitive understanding of what happened don’t use adb screenrecord as that affects the performance of the profile run open observatory and save a timeline trace of the performance issue so we know which functions might be causing it see how to collect and read timeline traces on this blog post i don t know which part is wrong when i use flutter to develop an application everything works fine after the application is uploaded to the app store i can use it myself without problems but the user feedback to me is very bad please tell us which target platform s the problem occurs android ios web macos linux windows which target os version for web browser is the test system running does the problem occur on emulator simulator as well as on physical devices target platform ios target os version browser all devices all logs run flutter analyze and attach any output of that command below if there are any analysis errors try resolving them before filing this issue info • the value of the field options isn t used • lib common git dart • unused field info • the declaration getauth isn t referenced • lib common git dart • unused element info • the value of the field languagecode isn t used • lib main dart • unused field info • unused import package camera camera dart • lib routers book writebookinfo dart • unused import info • unused import dart io • lib routers book writeexperience dart • unused import info • unused import dart convert • lib routers index imagepick dart • unused import warning • missing case clause for linux • lib routers index login privatebottomsheet dart • missing enum constant in switch warning • missing case clause for macos • lib routers index login privatebottomsheet dart • missing enum constant in switch warning • missing case clause for windows • lib routers index login privatebottomsheet dart • missing enum constant in switch info • unused import dart io • lib routers settings setting dart • unused import info • unused import package book data widgets searchbar searchbar dart • lib routers user userchat dart • unused import info • unused import dart async • lib routers user homepage userhomepage dart • unused import warning • missing case clause for linux • lib widgets myappbar dart • missing enum constant in switch warning • missing case clause for macos • lib widgets myappbar dart • missing enum constant in switch warning • missing case clause for windows • lib widgets myappbar dart • missing enum constant in switch info • title is deprecated and shouldn t be used this is the term used in the version of material design the modern term is this feature was deprecated after • lib widgets myappbar dart • deprecated member use info • title is deprecated and shouldn t be used this is the term used in the version of material design the modern term is this feature was deprecated after • lib widgets myappbar dart • deprecated member use info • title is deprecated and shouldn t be used this is the term used in the version of material design the modern term is this feature was deprecated after • lib widgets myappbar dart • deprecated member use info • is deprecated and shouldn t be used this is the term used in the version of material design the modern term is this feature was deprecated after • lib widgets myappbar dart • deprecated member use info • is deprecated and shouldn t be used this is the term used in the version of material design the modern term is this feature was deprecated after • lib widgets myappbar dart • deprecated member use info • is deprecated and shouldn t be used this is the term used in the version of material design the modern term is this feature was deprecated after • lib widgets myappbar dart • deprecated member use warning • missing case clause for linux • lib widgets myappbar dart • missing enum constant in switch warning • missing case clause for macos • lib widgets myappbar dart • missing enum constant in switch warning • missing case clause for windows • lib widgets myappbar dart • missing enum constant in switch warning • missing case clause for linux • lib widgets privatebottomsheet dart • missing enum constant in switch warning • missing case clause for macos • lib widgets privatebottomsheet dart • missing enum constant in switch warning • missing case clause for windows • lib widgets privatebottomsheet dart • missing enum constant in switch info • unused import dart typed data • lib widgets updateimage dart • unused import info • unused import package book data common global dart • lib widgets updateimage dart • unused import info • is deprecated and shouldn t be used this is the term used in the version of material design the modern term is this feature was deprecated after • lib widgets numberpicker dart • deprecated member use info • headline is deprecated and shouldn t be used this is the term used in the version of material design the modern term is this feature was deprecated after • lib widgets numberpicker dart • deprecated member use info • the member activity can only be used within package flutter src widgets scroll position dart or a test • lib widgets numberpicker dart • invalid use of visible for testing member info • the member activity can only be used within instance members of subclasses of package flutter src widgets scroll position dart • lib widgets numberpicker dart • invalid use of protected member info • is deprecated and shouldn t be used this is the term used in the version of material design the modern term is this feature was deprecated after • lib widgets numberpicker dart • deprecated member use info • headline is deprecated and shouldn t be used this is the term used in the version of material design the modern term is this feature was deprecated after • lib widgets numberpicker dart • deprecated member use info • the member activity can only be used within package flutter src widgets scroll position dart or a test • lib widgets numberpicker dart • invalid use of visible for testing member info • the member activity can only be used within instance members of subclasses of package flutter src widgets scroll position dart • lib widgets numberpicker dart • invalid use of protected member info • is deprecated and shouldn t be used this is the term used in the version of material design the modern term is this feature was deprecated after • lib widgets numberpicker dart • deprecated member use info • headline is deprecated and shouldn t be used this is the term used in the version of material design the modern term is this feature was deprecated after • lib widgets numberpicker dart • deprecated member use info • the member activity can only be used within package flutter src widgets scroll position dart or a test • lib widgets numberpicker dart • invalid use of visible for testing member info • the member activity can only be used within instance members of subclasses of package flutter src widgets scroll position dart • lib widgets numberpicker dart • invalid use of protected member info • the member activity can only be used within package flutter src widgets scroll position dart or a test • lib widgets numberpicker dart • invalid use of visible for testing member info • the member activity can only be used within instance members of subclasses of package flutter src widgets scroll position dart • lib widgets numberpicker dart • invalid use of protected member warning • the parameter laststr is required • lib widgets numberpicker dart • missing required param warning • the parameter prestr is required • lib widgets numberpicker dart • missing required param warning • the parameter laststr is required • lib widgets numberpicker dart • missing required param warning • the parameter prestr is required • lib widgets numberpicker dart • missing required param info • unused import package book data common thememodel dart • lib widgets searchbar searchbar dart • unused import info • unused import package provider provider dart • lib widgets searchbar searchbar dart • unused import warning • the include file analysis options yaml in users elevendimensions desktop book data plugins camera analysis options yaml cannot be found • plugins camera analysis options yaml • include file not found warning • the include file analysis options yaml in users elevendimensions desktop book data plugins camera analysis options yaml cannot be found • plugins camera analysis options yaml • include file not found issues found ran in flutter channel stable on mac os x locale zh hans cn • flutter version at users elevendimensions documents flutter • framework revision days ago • engine revision • dart version android toolchain develop for android devices android sdk version • android sdk at users elevendimensions library android sdk • platform android build tools • java binary at applications android studio app contents jre jdk contents home bin java • java version openjdk runtime environment build release • all android licenses accepted xcode develop for ios and macos xcode • xcode at applications xcode app contents developer • xcode build version • cocoapods version android studio version • android studio at applications android studio app contents • flutter plugin version • dart plugin version • java version openjdk runtime environment build release connected device no devices available doctor found issues in category
0
233,338
25,762,717,208
IssuesEvent
2022-12-08 22:03:52
MatBenfield/news
https://api.github.com/repos/MatBenfield/news
closed
[SecurityWeek] Big Tech Vendors Object to US Gov SBOM Mandate
SecurityWeek Stale
**The U.S. government’s mandates around the creation and delivery of SBOMs (software bill of materials) to help mitigate supply chain attacks has run into strong objections from big-name technology vendors.** [read more](https://www.securityweek.com/big-tech-vendors-object-us-gov-sbom-mandate) <https://www.securityweek.com/big-tech-vendors-object-us-gov-sbom-mandate>
True
[SecurityWeek] Big Tech Vendors Object to US Gov SBOM Mandate - **The U.S. government’s mandates around the creation and delivery of SBOMs (software bill of materials) to help mitigate supply chain attacks has run into strong objections from big-name technology vendors.** [read more](https://www.securityweek.com/big-tech-vendors-object-us-gov-sbom-mandate) <https://www.securityweek.com/big-tech-vendors-object-us-gov-sbom-mandate>
non_priority
big tech vendors object to us gov sbom mandate the u s government’s mandates around the creation and delivery of sboms software bill of materials to help mitigate supply chain attacks has run into strong objections from big name technology vendors
0
274,608
20,843,465,365
IssuesEvent
2022-03-21 05:13:10
kubernetes-sigs/secrets-store-csi-driver
https://api.github.com/repos/kubernetes-sigs/secrets-store-csi-driver
closed
Secrets not rotated when using subPath
kind/documentation
**Describe the solution you'd like** When using a volume with `subPath` ``` volumeMounts: - mountPath: /app/spapi/settings.ini name: app-config subPath: settings.ini ... volumes: - csi: driver: secrets-store.csi.k8s.io readOnly: true volumeAttributes: secretProviderClass: app-config name: app-config ``` The application may not be able to observe when the secret is rotated. **Anything else you would like to add:** This may be limited to just the use of the `AtomicWriter` since directly writing the files would not involve symlinks. We should verify and document this limitation. **Environment:** - Secrets Store CSI Driver version: (use the image tag): - Kubernetes version: (use `kubectl version`):
1.0
Secrets not rotated when using subPath - **Describe the solution you'd like** When using a volume with `subPath` ``` volumeMounts: - mountPath: /app/spapi/settings.ini name: app-config subPath: settings.ini ... volumes: - csi: driver: secrets-store.csi.k8s.io readOnly: true volumeAttributes: secretProviderClass: app-config name: app-config ``` The application may not be able to observe when the secret is rotated. **Anything else you would like to add:** This may be limited to just the use of the `AtomicWriter` since directly writing the files would not involve symlinks. We should verify and document this limitation. **Environment:** - Secrets Store CSI Driver version: (use the image tag): - Kubernetes version: (use `kubectl version`):
non_priority
secrets not rotated when using subpath describe the solution you d like when using a volume with subpath volumemounts mountpath app spapi settings ini name app config subpath settings ini volumes csi driver secrets store csi io readonly true volumeattributes secretproviderclass app config name app config the application may not be able to observe when the secret is rotated anything else you would like to add this may be limited to just the use of the atomicwriter since directly writing the files would not involve symlinks we should verify and document this limitation environment secrets store csi driver version use the image tag kubernetes version use kubectl version
0
333,562
29,765,505,077
IssuesEvent
2023-06-15 00:15:56
keycloak/keycloak
https://api.github.com/repos/keycloak/keycloak
opened
Flaky test: org.keycloak.testsuite.ui.account2.UpdateEmailTest#aiaCancellationSucceeds
kind/bug area/ci flaky-test
## org.keycloak.testsuite.ui.account2.UpdateEmailTest#aiaCancellationSucceeds [Keycloak CI - Account Console IT (firefox)](https://github.com/keycloak/keycloak/actions/runs/5272920970/jobs/9535950872) ``` java.lang.AssertionError at org.junit.Assert.fail(Assert.java:87) at org.junit.Assert.assertTrue(Assert.java:42) at org.junit.Assert.assertTrue(Assert.java:53) at org.keycloak.testsuite.ui.account2.UpdateEmailTest.aiaCancellationSucceeds(UpdateEmailTest.java:122) ... ```
1.0
Flaky test: org.keycloak.testsuite.ui.account2.UpdateEmailTest#aiaCancellationSucceeds - ## org.keycloak.testsuite.ui.account2.UpdateEmailTest#aiaCancellationSucceeds [Keycloak CI - Account Console IT (firefox)](https://github.com/keycloak/keycloak/actions/runs/5272920970/jobs/9535950872) ``` java.lang.AssertionError at org.junit.Assert.fail(Assert.java:87) at org.junit.Assert.assertTrue(Assert.java:42) at org.junit.Assert.assertTrue(Assert.java:53) at org.keycloak.testsuite.ui.account2.UpdateEmailTest.aiaCancellationSucceeds(UpdateEmailTest.java:122) ... ```
non_priority
flaky test org keycloak testsuite ui updateemailtest aiacancellationsucceeds org keycloak testsuite ui updateemailtest aiacancellationsucceeds java lang assertionerror at org junit assert fail assert java at org junit assert asserttrue assert java at org junit assert asserttrue assert java at org keycloak testsuite ui updateemailtest aiacancellationsucceeds updateemailtest java
0
51,404
13,635,118,728
IssuesEvent
2020-09-25 01:57:05
nasifimtiazohi/openmrs-module-reporting-1.20.0
https://api.github.com/repos/nasifimtiazohi/openmrs-module-reporting-1.20.0
opened
CVE-2020-14061 (High) detected in jackson-databind-2.9.0.jar
security vulnerability
## CVE-2020-14061 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.9.0.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: openmrs-module-reporting-1.20.0/api-2.2/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.0/jackson-databind-2.9.0.jar</p> <p> Dependency Hierarchy: - openmrs-api-2.2.0.jar (Root Library) - :x: **jackson-databind-2.9.0.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/nasifimtiazohi/openmrs-module-reporting-1.20.0/commit/43757d56a9ab9f7202e297fea95f1861af41888c">43757d56a9ab9f7202e297fea95f1861af41888c</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to oracle.jms.AQjmsQueueConnectionFactory, oracle.jms.AQjmsXATopicConnectionFactory, oracle.jms.AQjmsTopicConnectionFactory, oracle.jms.AQjmsXAQueueConnectionFactory, and oracle.jms.AQjmsXAConnectionFactory (aka weblogic/oracle-aqjms). <p>Publish Date: 2020-06-14 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-14061>CVE-2020-14061</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14061">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14061</a></p> <p>Release Date: 2020-06-14</p> <p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.10.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2020-14061 (High) detected in jackson-databind-2.9.0.jar - ## CVE-2020-14061 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.9.0.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: openmrs-module-reporting-1.20.0/api-2.2/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.0/jackson-databind-2.9.0.jar</p> <p> Dependency Hierarchy: - openmrs-api-2.2.0.jar (Root Library) - :x: **jackson-databind-2.9.0.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/nasifimtiazohi/openmrs-module-reporting-1.20.0/commit/43757d56a9ab9f7202e297fea95f1861af41888c">43757d56a9ab9f7202e297fea95f1861af41888c</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to oracle.jms.AQjmsQueueConnectionFactory, oracle.jms.AQjmsXATopicConnectionFactory, oracle.jms.AQjmsTopicConnectionFactory, oracle.jms.AQjmsXAQueueConnectionFactory, and oracle.jms.AQjmsXAConnectionFactory (aka weblogic/oracle-aqjms). <p>Publish Date: 2020-06-14 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-14061>CVE-2020-14061</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14061">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14061</a></p> <p>Release Date: 2020-06-14</p> <p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.10.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in jackson databind jar cve high severity vulnerability vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file openmrs module reporting api pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy openmrs api jar root library x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details fasterxml jackson databind x before mishandles the interaction between serialization gadgets and typing related to oracle jms aqjmsqueueconnectionfactory oracle jms aqjmsxatopicconnectionfactory oracle jms aqjmstopicconnectionfactory oracle jms aqjmsxaqueueconnectionfactory and oracle jms aqjmsxaconnectionfactory aka weblogic oracle aqjms publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson core jackson databind step up your open source security game with whitesource
0
126,767
10,434,911,046
IssuesEvent
2019-09-17 16:07:26
istio/istio
https://api.github.com/repos/istio/istio
opened
Use explicit helm placeholder version
area/test and release
Right now we have the version set to `1.1.0` in the helm charts, and then we replace this with the correct version at release time. So it is essentially a placeholder version, but it is very implicit. We should make this more explicit and set it to a version like 0.0.0-dev
1.0
Use explicit helm placeholder version - Right now we have the version set to `1.1.0` in the helm charts, and then we replace this with the correct version at release time. So it is essentially a placeholder version, but it is very implicit. We should make this more explicit and set it to a version like 0.0.0-dev
non_priority
use explicit helm placeholder version right now we have the version set to in the helm charts and then we replace this with the correct version at release time so it is essentially a placeholder version but it is very implicit we should make this more explicit and set it to a version like dev
0
200,445
22,773,756,300
IssuesEvent
2022-07-08 12:37:28
ignatandrei/AspNetCoreImageTagHelper
https://api.github.com/repos/ignatandrei/AspNetCoreImageTagHelper
opened
WS-2018-0608 (High) detected in microsoft.aspnetcore.server.kestrel.transport.libuv.2.0.3.nupkg
security vulnerability
## WS-2018-0608 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>microsoft.aspnetcore.server.kestrel.transport.libuv.2.0.3.nupkg</b></p></summary> <p>Libuv transport for the ASP.NET Core Kestrel cross-platform web server.</p> <p>Library home page: <a href="https://api.nuget.org/packages/microsoft.aspnetcore.server.kestrel.transport.libuv.2.0.3.nupkg">https://api.nuget.org/packages/microsoft.aspnetcore.server.kestrel.transport.libuv.2.0.3.nupkg</a></p> <p>Path to dependency file: /src/TestWebSite/TestWebSite.csproj</p> <p>Path to vulnerable library: /tmp/ws-ua_20220708123351_QIKSIB/dotnet_WCHIOT/20220708123352/microsoft.aspnetcore.server.kestrel.transport.libuv/2.0.3/microsoft.aspnetcore.server.kestrel.transport.libuv.2.0.3.nupkg</p> <p> Dependency Hierarchy: - microsoft.aspnetcore.2.0.3.nupkg (Root Library) - microsoft.aspnetcore.server.kestrel.2.0.3.nupkg - :x: **microsoft.aspnetcore.server.kestrel.transport.libuv.2.0.3.nupkg** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/ignatandrei/AspNetCoreImageTagHelper/commit/1acdde0e5e2173fc9be87dbb3080ebd3037e487b">1acdde0e5e2173fc9be87dbb3080ebd3037e487b</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A vulnerability was discovered in versions 2.x of ASP.NET Core where a specially crafted request can cause excess resource consumption in Kestrel. <p>Publish Date: 2018-05-08 <p>URL: <a href=https://github.com/aspnet/Announcements/issues/300>WS-2018-0608</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Release Date: 2018-05-08</p> <p>Fix Resolution: Microsoft.AspNetCore.Server.Kestrel.Core - 2.0.3,2.1.0;Microsoft.AspNetCore.Server.Kestrel.Transport.Abstractions - 2.0.3,2.1.0;Microsoft.AspNetCore.Server.Kestrel.Transport.Libuv - 2.0.3,2.1.0;Microsoft.AspNetCore.All - 2.0.8,2.1.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
WS-2018-0608 (High) detected in microsoft.aspnetcore.server.kestrel.transport.libuv.2.0.3.nupkg - ## WS-2018-0608 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>microsoft.aspnetcore.server.kestrel.transport.libuv.2.0.3.nupkg</b></p></summary> <p>Libuv transport for the ASP.NET Core Kestrel cross-platform web server.</p> <p>Library home page: <a href="https://api.nuget.org/packages/microsoft.aspnetcore.server.kestrel.transport.libuv.2.0.3.nupkg">https://api.nuget.org/packages/microsoft.aspnetcore.server.kestrel.transport.libuv.2.0.3.nupkg</a></p> <p>Path to dependency file: /src/TestWebSite/TestWebSite.csproj</p> <p>Path to vulnerable library: /tmp/ws-ua_20220708123351_QIKSIB/dotnet_WCHIOT/20220708123352/microsoft.aspnetcore.server.kestrel.transport.libuv/2.0.3/microsoft.aspnetcore.server.kestrel.transport.libuv.2.0.3.nupkg</p> <p> Dependency Hierarchy: - microsoft.aspnetcore.2.0.3.nupkg (Root Library) - microsoft.aspnetcore.server.kestrel.2.0.3.nupkg - :x: **microsoft.aspnetcore.server.kestrel.transport.libuv.2.0.3.nupkg** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/ignatandrei/AspNetCoreImageTagHelper/commit/1acdde0e5e2173fc9be87dbb3080ebd3037e487b">1acdde0e5e2173fc9be87dbb3080ebd3037e487b</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A vulnerability was discovered in versions 2.x of ASP.NET Core where a specially crafted request can cause excess resource consumption in Kestrel. <p>Publish Date: 2018-05-08 <p>URL: <a href=https://github.com/aspnet/Announcements/issues/300>WS-2018-0608</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Release Date: 2018-05-08</p> <p>Fix Resolution: Microsoft.AspNetCore.Server.Kestrel.Core - 2.0.3,2.1.0;Microsoft.AspNetCore.Server.Kestrel.Transport.Abstractions - 2.0.3,2.1.0;Microsoft.AspNetCore.Server.Kestrel.Transport.Libuv - 2.0.3,2.1.0;Microsoft.AspNetCore.All - 2.0.8,2.1.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
ws high detected in microsoft aspnetcore server kestrel transport libuv nupkg ws high severity vulnerability vulnerable library microsoft aspnetcore server kestrel transport libuv nupkg libuv transport for the asp net core kestrel cross platform web server library home page a href path to dependency file src testwebsite testwebsite csproj path to vulnerable library tmp ws ua qiksib dotnet wchiot microsoft aspnetcore server kestrel transport libuv microsoft aspnetcore server kestrel transport libuv nupkg dependency hierarchy microsoft aspnetcore nupkg root library microsoft aspnetcore server kestrel nupkg x microsoft aspnetcore server kestrel transport libuv nupkg vulnerable library found in head commit a href found in base branch master vulnerability details a vulnerability was discovered in versions x of asp net core where a specially crafted request can cause excess resource consumption in kestrel publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version release date fix resolution microsoft aspnetcore server kestrel core microsoft aspnetcore server kestrel transport abstractions microsoft aspnetcore server kestrel transport libuv microsoft aspnetcore all step up your open source security game with mend
0
253,111
19,091,727,462
IssuesEvent
2021-11-29 12:52:10
mrh0/createaddition
https://api.github.com/repos/mrh0/createaddition
opened
Create Crafts & Additions Discord
documentation
For any questions or help please join the Create Crafts & Additions Discord: https://discord.gg/mRbNnyKTEu
1.0
Create Crafts & Additions Discord - For any questions or help please join the Create Crafts & Additions Discord: https://discord.gg/mRbNnyKTEu
non_priority
create crafts additions discord for any questions or help please join the create crafts additions discord
0
23,882
4,050,343,517
IssuesEvent
2016-05-23 17:43:49
dotnet/roslyn
https://api.github.com/repos/dotnet/roslyn
closed
Re-generate error log baselines for VSI tests
Area-Analyzers Bug Test
https://github.com/dotnet/roslyn/pull/11233 moves compiler error logger to a newer version, we need to update the error log baseline in VSI tests once that is merged in.
1.0
Re-generate error log baselines for VSI tests - https://github.com/dotnet/roslyn/pull/11233 moves compiler error logger to a newer version, we need to update the error log baseline in VSI tests once that is merged in.
non_priority
re generate error log baselines for vsi tests moves compiler error logger to a newer version we need to update the error log baseline in vsi tests once that is merged in
0
379,609
26,377,574,416
IssuesEvent
2023-01-12 04:55:03
coq/coq
https://api.github.com/repos/coq/coq
opened
Documentation project
kind: documentation kind: meta
Attn: @Alizter @Zimmi48 I just looked at the User Documentation project (https://github.com/orgs/coq/projects/6/views/2). I suppose one of you created this and put some of the issues in categories. While better than nothing, I would like to see columns indicating priority/importance, size of effort required and date the issue was submitted and by whom. GitHub's interface seems a bit incomplete. Some of the older issues have been resolved. It needs triage. Are either of you interested in doing that? The test of well-done triage is that others (in particular, those who fix issues) agree with the priority assigned to each issue. The 150 items under "Other" need to be triaged. Really, we should think about what process we want to address these issues, what people are willing to commit to doing (bug fixing, reviews, triage, etc.) and whether we want to undertake that--it would be a significant ongoing effort. Then the question is how we can use the available GitHub tools to support that process.
1.0
Documentation project - Attn: @Alizter @Zimmi48 I just looked at the User Documentation project (https://github.com/orgs/coq/projects/6/views/2). I suppose one of you created this and put some of the issues in categories. While better than nothing, I would like to see columns indicating priority/importance, size of effort required and date the issue was submitted and by whom. GitHub's interface seems a bit incomplete. Some of the older issues have been resolved. It needs triage. Are either of you interested in doing that? The test of well-done triage is that others (in particular, those who fix issues) agree with the priority assigned to each issue. The 150 items under "Other" need to be triaged. Really, we should think about what process we want to address these issues, what people are willing to commit to doing (bug fixing, reviews, triage, etc.) and whether we want to undertake that--it would be a significant ongoing effort. Then the question is how we can use the available GitHub tools to support that process.
non_priority
documentation project attn alizter i just looked at the user documentation project i suppose one of you created this and put some of the issues in categories while better than nothing i would like to see columns indicating priority importance size of effort required and date the issue was submitted and by whom github s interface seems a bit incomplete some of the older issues have been resolved it needs triage are either of you interested in doing that the test of well done triage is that others in particular those who fix issues agree with the priority assigned to each issue the items under other need to be triaged really we should think about what process we want to address these issues what people are willing to commit to doing bug fixing reviews triage etc and whether we want to undertake that it would be a significant ongoing effort then the question is how we can use the available github tools to support that process
0
3,973
6,551,099,816
IssuesEvent
2017-09-05 13:41:44
substance/texture
https://api.github.com/repos/substance/texture
opened
ReproducibleJATS: <fig>
requirements
We are adding support for reproducible elements to JATS and Texture. Here's a first proposal on how we could model and display reproducible figures. The tagging guideline below was developed in June during a workshop at eLife. ```xml <fig id="f1"> <label>Figure 1</label> <!-- label is auto-generated --> <caption> <title>Biodiversity on Mars</title> <p>Lorem ipsum</p> </caption> <alternatives> <code executable="yes" specific-use="input" language="mini"> scatter3d(co_occurence_matrix) </code> <code specific-use="output" language="json"> { "execution_time": 322, "value_type": "plot-ly", "value": {...} } </code> <!-- static version for existing JATS toolchains --> <graphic xlink:href="89f8b53e361f.png"/> </alternatives> </fig> ``` In the user interface (if reproducible content is enabled) a new reproducible figure can be created via `Insert -> Reproducible Figure`. Next, the user can enter an expression that produces an output (e.g. an interactive graphic). It is important that a static image is created as well, this we can then encode as a graphic and use in static versions (e.g. HTML or PDF) of the manuscript. ![image](https://user-images.githubusercontent.com/2931/30059271-b0683746-923e-11e7-815d-7dbae67f6e98.png)
1.0
ReproducibleJATS: <fig> - We are adding support for reproducible elements to JATS and Texture. Here's a first proposal on how we could model and display reproducible figures. The tagging guideline below was developed in June during a workshop at eLife. ```xml <fig id="f1"> <label>Figure 1</label> <!-- label is auto-generated --> <caption> <title>Biodiversity on Mars</title> <p>Lorem ipsum</p> </caption> <alternatives> <code executable="yes" specific-use="input" language="mini"> scatter3d(co_occurence_matrix) </code> <code specific-use="output" language="json"> { "execution_time": 322, "value_type": "plot-ly", "value": {...} } </code> <!-- static version for existing JATS toolchains --> <graphic xlink:href="89f8b53e361f.png"/> </alternatives> </fig> ``` In the user interface (if reproducible content is enabled) a new reproducible figure can be created via `Insert -> Reproducible Figure`. Next, the user can enter an expression that produces an output (e.g. an interactive graphic). It is important that a static image is created as well, this we can then encode as a graphic and use in static versions (e.g. HTML or PDF) of the manuscript. ![image](https://user-images.githubusercontent.com/2931/30059271-b0683746-923e-11e7-815d-7dbae67f6e98.png)
non_priority
reproduciblejats we are adding support for reproducible elements to jats and texture here s a first proposal on how we could model and display reproducible figures the tagging guideline below was developed in june during a workshop at elife xml figure biodiversity on mars lorem ipsum co occurence matrix execution time value type plot ly value in the user interface if reproducible content is enabled a new reproducible figure can be created via insert reproducible figure next the user can enter an expression that produces an output e g an interactive graphic it is important that a static image is created as well this we can then encode as a graphic and use in static versions e g html or pdf of the manuscript
0
150,081
11,945,898,155
IssuesEvent
2020-04-03 07:00:32
ubtue/DatenProbleme
https://api.github.com/repos/ubtue/DatenProbleme
closed
Einspielung 29.2. | ISSN 1743-1727 Reformation and Renaissance review | Keywords und Abstract
Einspielung_Zotero_AUTO Fehlerquelle: Harvester Zotero_AUTO_RSS back to IT ready for testing
Auf den Webseiten der Aufsätze finden sich Keywords und Abstract. Diese fehlen bereits in unseren Daten. Vgl. etwa Hash B464C86520478B00E9E17BBDF49A6DD96C164BC9
1.0
Einspielung 29.2. | ISSN 1743-1727 Reformation and Renaissance review | Keywords und Abstract - Auf den Webseiten der Aufsätze finden sich Keywords und Abstract. Diese fehlen bereits in unseren Daten. Vgl. etwa Hash B464C86520478B00E9E17BBDF49A6DD96C164BC9
non_priority
einspielung issn reformation and renaissance review keywords und abstract auf den webseiten der aufsätze finden sich keywords und abstract diese fehlen bereits in unseren daten vgl etwa hash
0
87,935
25,256,970,765
IssuesEvent
2022-11-15 18:59:26
opensearch-project/OpenSearch
https://api.github.com/repos/opensearch-project/OpenSearch
opened
[Feature/extensions] Merge back to main tracking issue
Build Libraries & Interfaces untriaged
This is a tracking issue for merging the feature/extensions branch into main, and then backported to 2.x. The merge will be performed in four steps, and all functionality will be behind a feature flag. Meta-issue for experimental release: [139](https://github.com/opensearch-project/opensearch-sdk-java/issues/139) Sub-issues: • Initial extensions framework up to first gradle check pass ○ Commit ID: 394a0dd6f6ef87b27367745fc79065acbfe9d4f8 ○ PR Name: Added flag to check if connectToNodeRequest is coming from Extension ○ #[3830](https://github.com/opensearch-project/OpenSearch/pull/3830) • Extension points before REST implementation ○ Commit ID: edde6a403478d4d067bfd00b11ae7399016fcabf ○ PR Name: Adding ActionListener onFailure to ExtensionsOrchestrator ○ #[4191](https://github.com/opensearch-project/OpenSearch/pull/4191) • Initial REST implementation and getSettings() ○ Commit ID: 749b155fa59c16a587ebd3602371c29375896b60 ○ PR Name: Add getSettings support for AD ○ #[4529](https://github.com/opensearch-project/OpenSearch/pull/4519) • REST updates and EnvironmentSettings API (up to present) ○ Note: the below information will be updated if more PR's are merged before this issue is closed ○ Commit ID: c2ecebd12bb7096de6b685db414b3f12e895b29d ○ PR Name: Modified local node response ○ #[4862](https://github.com/opensearch-project/OpenSearch/pull/4862)
1.0
[Feature/extensions] Merge back to main tracking issue - This is a tracking issue for merging the feature/extensions branch into main, and then backported to 2.x. The merge will be performed in four steps, and all functionality will be behind a feature flag. Meta-issue for experimental release: [139](https://github.com/opensearch-project/opensearch-sdk-java/issues/139) Sub-issues: • Initial extensions framework up to first gradle check pass ○ Commit ID: 394a0dd6f6ef87b27367745fc79065acbfe9d4f8 ○ PR Name: Added flag to check if connectToNodeRequest is coming from Extension ○ #[3830](https://github.com/opensearch-project/OpenSearch/pull/3830) • Extension points before REST implementation ○ Commit ID: edde6a403478d4d067bfd00b11ae7399016fcabf ○ PR Name: Adding ActionListener onFailure to ExtensionsOrchestrator ○ #[4191](https://github.com/opensearch-project/OpenSearch/pull/4191) • Initial REST implementation and getSettings() ○ Commit ID: 749b155fa59c16a587ebd3602371c29375896b60 ○ PR Name: Add getSettings support for AD ○ #[4529](https://github.com/opensearch-project/OpenSearch/pull/4519) • REST updates and EnvironmentSettings API (up to present) ○ Note: the below information will be updated if more PR's are merged before this issue is closed ○ Commit ID: c2ecebd12bb7096de6b685db414b3f12e895b29d ○ PR Name: Modified local node response ○ #[4862](https://github.com/opensearch-project/OpenSearch/pull/4862)
non_priority
merge back to main tracking issue this is a tracking issue for merging the feature extensions branch into main and then backported to x the merge will be performed in four steps and all functionality will be behind a feature flag meta issue for experimental release sub issues • initial extensions framework up to first gradle check pass ○ commit id ○ pr name added flag to check if connecttonoderequest is coming from extension ○ • extension points before rest implementation ○ commit id ○ pr name adding actionlistener onfailure to extensionsorchestrator ○ • initial rest implementation and getsettings ○ commit id ○ pr name add getsettings support for ad ○ • rest updates and environmentsettings api up to present ○ note the below information will be updated if more pr s are merged before this issue is closed ○ commit id ○ pr name modified local node response ○
0
271,485
20,676,319,844
IssuesEvent
2022-03-10 09:37:45
telerik/kendo-react
https://api.github.com/repos/telerik/kendo-react
opened
Create a Chart accessibility article for KendoReact Chart.
documentation pkg:charts
Create a Chart accessibility article for KendoReact Chart. We have a similar article for Kendo UI for jQuery: https://docs.telerik.com/kendo-ui/accessibility/five-tips-for-accessible-charts-with-dataviz Similar options are available for the KendoReact Chart as well.
1.0
Create a Chart accessibility article for KendoReact Chart. - Create a Chart accessibility article for KendoReact Chart. We have a similar article for Kendo UI for jQuery: https://docs.telerik.com/kendo-ui/accessibility/five-tips-for-accessible-charts-with-dataviz Similar options are available for the KendoReact Chart as well.
non_priority
create a chart accessibility article for kendoreact chart create a chart accessibility article for kendoreact chart we have a similar article for kendo ui for jquery similar options are available for the kendoreact chart as well
0
106,253
16,673,248,653
IssuesEvent
2021-06-07 13:29:24
VivekBuzruk/Hygieia
https://api.github.com/repos/VivekBuzruk/Hygieia
closed
CVE-2020-26939 (Medium) detected in bcprov-jdk15on-1.48.jar - autoclosed
security vulnerability
## CVE-2020-26939 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>bcprov-jdk15on-1.48.jar</b></p></summary> <p>The Bouncy Castle Crypto package is a Java implementation of cryptographic algorithms. This jar contains JCE provider and lightweight API for the Bouncy Castle Cryptography APIs for JDK 1.5 to JDK 1.7.</p> <p>Library home page: <a href="http://www.bouncycastle.org/java.html">http://www.bouncycastle.org/java.html</a></p> <p>Path to dependency file: Hygieia/UI-tests/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/bouncycastle/bcprov-jdk15on/1.48/bcprov-jdk15on-1.48.jar</p> <p> Dependency Hierarchy: - serenity-core-1.2.2.jar (Root Library) - selenium-server-2.53.1.jar - :x: **bcprov-jdk15on-1.48.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/VivekBuzruk/Hygieia/commit/3c4f119e4343cf7fa276bb4756361b926902248e">3c4f119e4343cf7fa276bb4756361b926902248e</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In Legion of the Bouncy Castle BC before 1.61 and BC-FJA before 1.0.1.2, attackers can obtain sensitive information about a private exponent because of Observable Differences in Behavior to Error Inputs. This occurs in org.bouncycastle.crypto.encodings.OAEPEncoding. Sending invalid ciphertext that decrypts to a short payload in the OAEP Decoder could result in the throwing of an early exception, potentially leaking some information about the private exponent of the RSA private key performing the encryption. <p>Publish Date: 2020-11-02 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-26939>CVE-2020-26939</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/bcgit/bc-java/wiki/CVE-2020-26939">https://github.com/bcgit/bc-java/wiki/CVE-2020-26939</a></p> <p>Release Date: 2020-10-11</p> <p>Fix Resolution: org.bouncycastle:bcprov-jdk14:1.61,org.bouncycastle:bcprov-ext-debug-jdk15on:1.61,org.bouncycastle:bcprov-debug-jdk15on:1.61,org.bouncycastle:bcprov-ext-jdk15on:1.61,org.bouncycastle:bcprov-jdk15on:1.61</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2020-26939 (Medium) detected in bcprov-jdk15on-1.48.jar - autoclosed - ## CVE-2020-26939 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>bcprov-jdk15on-1.48.jar</b></p></summary> <p>The Bouncy Castle Crypto package is a Java implementation of cryptographic algorithms. This jar contains JCE provider and lightweight API for the Bouncy Castle Cryptography APIs for JDK 1.5 to JDK 1.7.</p> <p>Library home page: <a href="http://www.bouncycastle.org/java.html">http://www.bouncycastle.org/java.html</a></p> <p>Path to dependency file: Hygieia/UI-tests/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/bouncycastle/bcprov-jdk15on/1.48/bcprov-jdk15on-1.48.jar</p> <p> Dependency Hierarchy: - serenity-core-1.2.2.jar (Root Library) - selenium-server-2.53.1.jar - :x: **bcprov-jdk15on-1.48.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/VivekBuzruk/Hygieia/commit/3c4f119e4343cf7fa276bb4756361b926902248e">3c4f119e4343cf7fa276bb4756361b926902248e</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In Legion of the Bouncy Castle BC before 1.61 and BC-FJA before 1.0.1.2, attackers can obtain sensitive information about a private exponent because of Observable Differences in Behavior to Error Inputs. This occurs in org.bouncycastle.crypto.encodings.OAEPEncoding. Sending invalid ciphertext that decrypts to a short payload in the OAEP Decoder could result in the throwing of an early exception, potentially leaking some information about the private exponent of the RSA private key performing the encryption. <p>Publish Date: 2020-11-02 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-26939>CVE-2020-26939</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/bcgit/bc-java/wiki/CVE-2020-26939">https://github.com/bcgit/bc-java/wiki/CVE-2020-26939</a></p> <p>Release Date: 2020-10-11</p> <p>Fix Resolution: org.bouncycastle:bcprov-jdk14:1.61,org.bouncycastle:bcprov-ext-debug-jdk15on:1.61,org.bouncycastle:bcprov-debug-jdk15on:1.61,org.bouncycastle:bcprov-ext-jdk15on:1.61,org.bouncycastle:bcprov-jdk15on:1.61</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in bcprov jar autoclosed cve medium severity vulnerability vulnerable library bcprov jar the bouncy castle crypto package is a java implementation of cryptographic algorithms this jar contains jce provider and lightweight api for the bouncy castle cryptography apis for jdk to jdk library home page a href path to dependency file hygieia ui tests pom xml path to vulnerable library home wss scanner repository org bouncycastle bcprov bcprov jar dependency hierarchy serenity core jar root library selenium server jar x bcprov jar vulnerable library found in head commit a href found in base branch master vulnerability details in legion of the bouncy castle bc before and bc fja before attackers can obtain sensitive information about a private exponent because of observable differences in behavior to error inputs this occurs in org bouncycastle crypto encodings oaepencoding sending invalid ciphertext that decrypts to a short payload in the oaep decoder could result in the throwing of an early exception potentially leaking some information about the private exponent of the rsa private key performing the encryption publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org bouncycastle bcprov org bouncycastle bcprov ext debug org bouncycastle bcprov debug org bouncycastle bcprov ext org bouncycastle bcprov step up your open source security game with whitesource
0
3,149
3,810,294,708
IssuesEvent
2016-03-26 01:27:09
RoaringBitmap/RoaringBitmap
https://api.github.com/repos/RoaringBitmap/RoaringBitmap
opened
Equality between run containers and other containers (e.g. bitmap) is checked in an inefficient manner currently
performance
The code could be much faster.
True
Equality between run containers and other containers (e.g. bitmap) is checked in an inefficient manner currently - The code could be much faster.
non_priority
equality between run containers and other containers e g bitmap is checked in an inefficient manner currently the code could be much faster
0
198,973
15,017,420,026
IssuesEvent
2021-02-01 10:49:39
fabric8-ui/fabric8-planner
https://api.github.com/repos/fabric8-ui/fabric8-planner
closed
Improve test coverage of AlmSearchHighlight pipe
enhancement test
New unit tests for AlmSearchHighlight should be created: - should work when first parameter is an empty string - should work when second parameter is an empty string - should work when highlighting special characters such as !@#$%^&*()_+{}[]"|,./<>?`~ I'm not sure what should happen when search pattern contains only white spaces. Now it does following which doesn't feel right: ``` transform('Some string', ' ') => 'Some<b> </b>string' ```
1.0
Improve test coverage of AlmSearchHighlight pipe - New unit tests for AlmSearchHighlight should be created: - should work when first parameter is an empty string - should work when second parameter is an empty string - should work when highlighting special characters such as !@#$%^&*()_+{}[]"|,./<>?`~ I'm not sure what should happen when search pattern contains only white spaces. Now it does following which doesn't feel right: ``` transform('Some string', ' ') => 'Some<b> </b>string' ```
non_priority
improve test coverage of almsearchhighlight pipe new unit tests for almsearchhighlight should be created should work when first parameter is an empty string should work when second parameter is an empty string should work when highlighting special characters such as i m not sure what should happen when search pattern contains only white spaces now it does following which doesn t feel right transform some string some string
0
41,929
12,856,826,379
IssuesEvent
2020-07-09 08:18:13
simandebvu/series-scraper
https://api.github.com/repos/simandebvu/series-scraper
opened
CVE-2018-11694 (High) detected in node-sass-4.14.1.tgz, proyector-movil-proyector-movil-windows
security vulnerability
## CVE-2018-11694 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>node-sass-4.14.1.tgz</b></p></summary> <p> <details><summary><b>node-sass-4.14.1.tgz</b></p></summary> <p>Wrapper around libsass</p> <p>Library home page: <a href="https://registry.npmjs.org/node-sass/-/node-sass-4.14.1.tgz">https://registry.npmjs.org/node-sass/-/node-sass-4.14.1.tgz</a></p> <p>Path to dependency file: /tmp/ws-scm/series-scraper/package.json</p> <p>Path to vulnerable library: /tmp/ws-scm/series-scraper/node_modules/node-sass/package.json</p> <p> Dependency Hierarchy: - webpacker-4.2.2.tgz (Root Library) - :x: **node-sass-4.14.1.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/simandebvu/series-scraper/commit/6934e0cf5544ddb26c242c2ace1ae984a163bb8d">6934e0cf5544ddb26c242c2ace1ae984a163bb8d</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> An issue was discovered in LibSass through 3.5.4. A NULL pointer dereference was found in the function Sass::Functions::selector_append which could be leveraged by an attacker to cause a denial of service (application crash) or possibly have unspecified other impact. <p>Publish Date: 2018-06-04 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-11694>CVE-2018-11694</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11694">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11694</a></p> <p>Release Date: 2018-06-04</p> <p>Fix Resolution: LibSass - 3.6.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2018-11694 (High) detected in node-sass-4.14.1.tgz, proyector-movil-proyector-movil-windows - ## CVE-2018-11694 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>node-sass-4.14.1.tgz</b></p></summary> <p> <details><summary><b>node-sass-4.14.1.tgz</b></p></summary> <p>Wrapper around libsass</p> <p>Library home page: <a href="https://registry.npmjs.org/node-sass/-/node-sass-4.14.1.tgz">https://registry.npmjs.org/node-sass/-/node-sass-4.14.1.tgz</a></p> <p>Path to dependency file: /tmp/ws-scm/series-scraper/package.json</p> <p>Path to vulnerable library: /tmp/ws-scm/series-scraper/node_modules/node-sass/package.json</p> <p> Dependency Hierarchy: - webpacker-4.2.2.tgz (Root Library) - :x: **node-sass-4.14.1.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/simandebvu/series-scraper/commit/6934e0cf5544ddb26c242c2ace1ae984a163bb8d">6934e0cf5544ddb26c242c2ace1ae984a163bb8d</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> An issue was discovered in LibSass through 3.5.4. A NULL pointer dereference was found in the function Sass::Functions::selector_append which could be leveraged by an attacker to cause a denial of service (application crash) or possibly have unspecified other impact. <p>Publish Date: 2018-06-04 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-11694>CVE-2018-11694</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11694">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11694</a></p> <p>Release Date: 2018-06-04</p> <p>Fix Resolution: LibSass - 3.6.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in node sass tgz proyector movil proyector movil windows cve high severity vulnerability vulnerable libraries node sass tgz node sass tgz wrapper around libsass library home page a href path to dependency file tmp ws scm series scraper package json path to vulnerable library tmp ws scm series scraper node modules node sass package json dependency hierarchy webpacker tgz root library x node sass tgz vulnerable library found in head commit a href vulnerability details an issue was discovered in libsass through a null pointer dereference was found in the function sass functions selector append which could be leveraged by an attacker to cause a denial of service application crash or possibly have unspecified other impact publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution libsass step up your open source security game with whitesource
0
13,003
3,680,951,475
IssuesEvent
2016-02-24 00:23:24
flutter/flutter
https://api.github.com/repos/flutter/flutter
closed
getting started instructions and android
⚠ clear documentation
Our getting started instructions (for the mac) say to use `brew install android-platform-tools`. But it looks like this will only install `adb`. I think w/ the changes to our workflow re: building apks and running, adb isn't sufficient. We always (virtually always?) require the android sdk, in order to get the build-tools. brew also has a `android-sdk` distro. However, after installation the user need to run an app (`android`) to configure and download the rest of the sdk (build-tools, platform-tools). Not clear if we should keep recommending `brew install android-platform-tools` or another install which will require a lot more configuration on the user's part.
1.0
getting started instructions and android - Our getting started instructions (for the mac) say to use `brew install android-platform-tools`. But it looks like this will only install `adb`. I think w/ the changes to our workflow re: building apks and running, adb isn't sufficient. We always (virtually always?) require the android sdk, in order to get the build-tools. brew also has a `android-sdk` distro. However, after installation the user need to run an app (`android`) to configure and download the rest of the sdk (build-tools, platform-tools). Not clear if we should keep recommending `brew install android-platform-tools` or another install which will require a lot more configuration on the user's part.
non_priority
getting started instructions and android our getting started instructions for the mac say to use brew install android platform tools but it looks like this will only install adb i think w the changes to our workflow re building apks and running adb isn t sufficient we always virtually always require the android sdk in order to get the build tools brew also has a android sdk distro however after installation the user need to run an app android to configure and download the rest of the sdk build tools platform tools not clear if we should keep recommending brew install android platform tools or another install which will require a lot more configuration on the user s part
0
92,451
8,364,333,984
IssuesEvent
2018-10-03 22:34:02
learn-co-curriculum/javascript-fix-this
https://api.github.com/repos/learn-co-curriculum/javascript-fix-this
closed
requires strict mode
Test
the tests failed for about half the students in the class unless they were using strict mode. Is this a problem, or should we just add 'use strict' to the test file?
1.0
requires strict mode - the tests failed for about half the students in the class unless they were using strict mode. Is this a problem, or should we just add 'use strict' to the test file?
non_priority
requires strict mode the tests failed for about half the students in the class unless they were using strict mode is this a problem or should we just add use strict to the test file
0
80,467
23,215,369,046
IssuesEvent
2022-08-02 13:42:06
reapit/foundations
https://api.github.com/repos/reapit/foundations
closed
test and fix all entities
feature front-end app-builder
- [x] Contact - [x] list - [x] create - [x] update - [x] Negotiator - [x] list - [x] create - [x] update - [x] Property - [x] list - [x] create - [x] update - [x] Office - [x] list - [x] create - [x] update - [x] Applicant (needs office permissions) - [x] list - [x] create - [x] update [blocked by permissions issue] - [x] Appointment - [x] list * needs filters (start/end) - [x] create - [x] update [blocked by filters issue] - [x] Company - [x] list - [x] create - [x] update - [x] Offer - [x] list - [x] create - [x] update - [x] PropertyImage - [x] list * needs propertyId - [x] create - [x] update - [x] Department - [x] list - [x] appointment filter should be nicer
1.0
test and fix all entities - - [x] Contact - [x] list - [x] create - [x] update - [x] Negotiator - [x] list - [x] create - [x] update - [x] Property - [x] list - [x] create - [x] update - [x] Office - [x] list - [x] create - [x] update - [x] Applicant (needs office permissions) - [x] list - [x] create - [x] update [blocked by permissions issue] - [x] Appointment - [x] list * needs filters (start/end) - [x] create - [x] update [blocked by filters issue] - [x] Company - [x] list - [x] create - [x] update - [x] Offer - [x] list - [x] create - [x] update - [x] PropertyImage - [x] list * needs propertyId - [x] create - [x] update - [x] Department - [x] list - [x] appointment filter should be nicer
non_priority
test and fix all entities contact list create update negotiator list create update property list create update office list create update applicant needs office permissions list create update appointment list needs filters start end create update company list create update offer list create update propertyimage list needs propertyid create update department list appointment filter should be nicer
0
13,358
8,198,301,256
IssuesEvent
2018-08-31 15:56:07
IMA-WorldHealth/bhima-2.X
https://api.github.com/repos/IMA-WorldHealth/bhima-2.X
closed
Get rid of Topic
Refactor performance
The original vision was to have real-time events streamed to the client via websockets. It hasn't done anything to date and it is super buggy. Let's remove it for the time being. It will probably give us a performance boost in production as well, not having a Redis I/O going on while trying to perform financial operations.
True
Get rid of Topic - The original vision was to have real-time events streamed to the client via websockets. It hasn't done anything to date and it is super buggy. Let's remove it for the time being. It will probably give us a performance boost in production as well, not having a Redis I/O going on while trying to perform financial operations.
non_priority
get rid of topic the original vision was to have real time events streamed to the client via websockets it hasn t done anything to date and it is super buggy let s remove it for the time being it will probably give us a performance boost in production as well not having a redis i o going on while trying to perform financial operations
0
2,116
3,664,995,813
IssuesEvent
2016-02-19 14:25:59
shaarli/Shaarli
https://api.github.com/repos/shaarli/Shaarli
closed
Tags on private links should be also private
bug security unconfirmed
Try to share a link in private and add some new tags... The tag are listed in autocompletion and tag cloud and it could be a privacy issue don't you think? Expected: tags only in private links does not appear in public tag list/auto completion tag list
True
Tags on private links should be also private - Try to share a link in private and add some new tags... The tag are listed in autocompletion and tag cloud and it could be a privacy issue don't you think? Expected: tags only in private links does not appear in public tag list/auto completion tag list
non_priority
tags on private links should be also private try to share a link in private and add some new tags the tag are listed in autocompletion and tag cloud and it could be a privacy issue don t you think expected tags only in private links does not appear in public tag list auto completion tag list
0
26,459
26,875,976,655
IssuesEvent
2023-02-05 02:27:38
Leafwing-Studios/Emergence
https://api.github.com/repos/Leafwing-Studios/Emergence
closed
Add a `choose_max` pheromone transducer option for ants.
grab-bag usability
Currently, ants probabilistically follow a signal up a gradient (see: https://github.com/Leafwing-Studios/Emergence/blob/8e3cbcaaf31544ad678f333d1d86ed6b685e52f3/emergence_lib/src/organisms/units.rs#L166). As the signal diffuses, their wandering becomes less effective towards the source of the signal. When the signal they are following is a pheromone, this leads to non-ideal behaviour, as it seems the ants are "not really following" the signal. It could be frustrating to the player. Ants use a signal transducer to map an input signal into an output pathfinding weight (the higher the weight, the more likely it is the ants will move to that tile). When this signal is a pheromone, ants should (have the option) a transducer that assigns weight 1.0 to the neighbouring tile with the highest pheromone signal value out of all neighbours, and assign weight 0.0 to all tiles that do not have the highest pheromone signal value. If all tiles have the same pheromone signal value (unlikely, as we are using floating point numbers), we should weigh them all equally with 1.0.
True
Add a `choose_max` pheromone transducer option for ants. - Currently, ants probabilistically follow a signal up a gradient (see: https://github.com/Leafwing-Studios/Emergence/blob/8e3cbcaaf31544ad678f333d1d86ed6b685e52f3/emergence_lib/src/organisms/units.rs#L166). As the signal diffuses, their wandering becomes less effective towards the source of the signal. When the signal they are following is a pheromone, this leads to non-ideal behaviour, as it seems the ants are "not really following" the signal. It could be frustrating to the player. Ants use a signal transducer to map an input signal into an output pathfinding weight (the higher the weight, the more likely it is the ants will move to that tile). When this signal is a pheromone, ants should (have the option) a transducer that assigns weight 1.0 to the neighbouring tile with the highest pheromone signal value out of all neighbours, and assign weight 0.0 to all tiles that do not have the highest pheromone signal value. If all tiles have the same pheromone signal value (unlikely, as we are using floating point numbers), we should weigh them all equally with 1.0.
non_priority
add a choose max pheromone transducer option for ants currently ants probabilistically follow a signal up a gradient see as the signal diffuses their wandering becomes less effective towards the source of the signal when the signal they are following is a pheromone this leads to non ideal behaviour as it seems the ants are not really following the signal it could be frustrating to the player ants use a signal transducer to map an input signal into an output pathfinding weight the higher the weight the more likely it is the ants will move to that tile when this signal is a pheromone ants should have the option a transducer that assigns weight to the neighbouring tile with the highest pheromone signal value out of all neighbours and assign weight to all tiles that do not have the highest pheromone signal value if all tiles have the same pheromone signal value unlikely as we are using floating point numbers we should weigh them all equally with
0
4,749
4,605,917,507
IssuesEvent
2016-09-23 00:31:13
influxdata/influxdb
https://api.github.com/repos/influxdata/influxdb
closed
Simple SELECT makes Influx 1.0 OOM
area/queries performance
Running in AWS on an m4.large, Influx v1.0.0 running on Debian Jessie I have one particular measurement that seems like maybe it is corrupted somehow. When I run a simple SELECT statement on it, e.g. `select * from replay_outcome_stats limit 10` Influx hangs and the heap shoots straight up until the whole box becomes unresponsive. I have to restart the instance to recover. See the attached grafana graph of "Heap Alloc" and "Heap Idle" ![image](https://cloud.githubusercontent.com/assets/2694638/18692568/2cecda22-7f69-11e6-95bd-4f62fb92fc18.png) __shards__ http://pastebin.com/VEtq1JXAhttp://pastebin.com/VEtq1JXA __stats__ http://pastebin.com/sTQKbAFY __diagnostics__ http://pastebin.com/2qbgwcjK
True
Simple SELECT makes Influx 1.0 OOM - Running in AWS on an m4.large, Influx v1.0.0 running on Debian Jessie I have one particular measurement that seems like maybe it is corrupted somehow. When I run a simple SELECT statement on it, e.g. `select * from replay_outcome_stats limit 10` Influx hangs and the heap shoots straight up until the whole box becomes unresponsive. I have to restart the instance to recover. See the attached grafana graph of "Heap Alloc" and "Heap Idle" ![image](https://cloud.githubusercontent.com/assets/2694638/18692568/2cecda22-7f69-11e6-95bd-4f62fb92fc18.png) __shards__ http://pastebin.com/VEtq1JXAhttp://pastebin.com/VEtq1JXA __stats__ http://pastebin.com/sTQKbAFY __diagnostics__ http://pastebin.com/2qbgwcjK
non_priority
simple select makes influx oom running in aws on an large influx running on debian jessie i have one particular measurement that seems like maybe it is corrupted somehow when i run a simple select statement on it e g select from replay outcome stats limit influx hangs and the heap shoots straight up until the whole box becomes unresponsive i have to restart the instance to recover see the attached grafana graph of heap alloc and heap idle shards stats diagnostics
0
90,134
11,352,943,045
IssuesEvent
2020-01-24 14:39:42
YardSale2020/yard-sale-web-app
https://api.github.com/repos/YardSale2020/yard-sale-web-app
closed
Icons
design dev
- [] C Logo - [] Search - [] Close - [] Pin - Pink & Gray - [] Back arrow Once complete export sprite sheet and add it to the images folder.
1.0
Icons - - [] C Logo - [] Search - [] Close - [] Pin - Pink & Gray - [] Back arrow Once complete export sprite sheet and add it to the images folder.
non_priority
icons c logo search close pin pink gray back arrow once complete export sprite sheet and add it to the images folder
0
18,875
10,299,659,457
IssuesEvent
2019-08-28 11:05:32
DashboardHub/Website
https://api.github.com/repos/DashboardHub/Website
closed
CVE-2018-11696 (High) detected in node-sass-v4.12.0
security vulnerability
## CVE-2018-11696 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>node-sassv4.12.0</b></p></summary> <p> <p>:rainbow: Node.js bindings to libsass</p> <p>Library home page: <a href=https://github.com/sass/node-sass.git>https://github.com/sass/node-sass.git</a></p> <p>Found in HEAD commit: <a href="https://api.github.com/repos/DashboardHub/Website/commits/5f96f1e0a372b9087a833b3c4a74d093a24d6897">5f96f1e0a372b9087a833b3c4a74d093a24d6897</a></p> </p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Library Source Files (125)</summary> <p></p> <p> * The source files were matched to this source library based on a best effort match. Source libraries are selected from a list of probable public libraries.</p> <p> - /Website/node_modules/node-sass/src/libsass/src/expand.hpp - /Website/node_modules/node-sass/src/libsass/src/util.hpp - /Website/node_modules/node-sass/src/libsass/src/color_maps.cpp - /Website/node_modules/node-sass/src/libsass/src/sass_util.hpp - /Website/node_modules/node-sass/src/libsass/src/utf8/unchecked.h - /Website/node_modules/node-sass/src/libsass/src/output.hpp - /Website/node_modules/node-sass/src/libsass/src/sass_values.hpp - /Website/node_modules/node-sass/src/libsass/src/emitter.hpp - /Website/node_modules/node-sass/src/libsass/src/lexer.cpp - /Website/node_modules/node-sass/src/libsass/test/test_node.cpp - /Website/node_modules/node-sass/src/libsass/src/plugins.cpp - /Website/node_modules/node-sass/src/libsass/include/sass/base.h - /Website/node_modules/node-sass/src/libsass/src/position.hpp - /Website/node_modules/node-sass/src/libsass/src/subset_map.hpp - /Website/node_modules/node-sass/src/libsass/src/operation.hpp - /Website/node_modules/node-sass/src/libsass/src/remove_placeholders.cpp - /Website/node_modules/node-sass/src/libsass/src/error_handling.hpp - /Website/node_modules/node-sass/src/libsass/src/operators.cpp - /Website/node_modules/node-sass/src/custom_importer_bridge.cpp - /Website/node_modules/node-sass/src/libsass/contrib/plugin.cpp - /Website/node_modules/node-sass/src/libsass/src/functions.hpp - /Website/node_modules/node-sass/src/libsass/test/test_superselector.cpp - /Website/node_modules/node-sass/src/libsass/src/eval.hpp - /Website/node_modules/node-sass/src/libsass/src/utf8_string.hpp - /Website/node_modules/node-sass/src/libsass/src/error_handling.cpp - /Website/node_modules/node-sass/src/libsass/src/node.cpp - /Website/node_modules/node-sass/src/libsass/src/subset_map.cpp - /Website/node_modules/node-sass/src/libsass/src/emitter.cpp - /Website/node_modules/node-sass/src/libsass/src/listize.cpp - /Website/node_modules/node-sass/src/libsass/src/ast.hpp - /Website/node_modules/node-sass/src/libsass/src/sass_functions.hpp - /Website/node_modules/node-sass/src/libsass/src/memory/SharedPtr.cpp - /Website/node_modules/node-sass/src/libsass/src/output.cpp - /Website/node_modules/node-sass/src/libsass/src/check_nesting.cpp - /Website/node_modules/node-sass/src/libsass/src/expand.cpp - /Website/node_modules/node-sass/src/libsass/src/ast_def_macros.hpp - /Website/node_modules/node-sass/src/libsass/src/cssize.hpp - /Website/node_modules/node-sass/src/libsass/src/paths.hpp - /Website/node_modules/node-sass/src/libsass/src/ast_fwd_decl.hpp - /Website/node_modules/node-sass/src/libsass/src/inspect.hpp - /Website/node_modules/node-sass/src/sass_types/color.cpp - /Website/node_modules/node-sass/src/libsass/test/test_unification.cpp - /Website/node_modules/node-sass/src/libsass/src/values.cpp - /Website/node_modules/node-sass/src/libsass/src/sass_util.cpp - /Website/node_modules/node-sass/src/libsass/src/source_map.hpp - /Website/node_modules/node-sass/src/sass_types/list.h - /Website/node_modules/node-sass/src/libsass/src/check_nesting.hpp - /Website/node_modules/node-sass/src/libsass/src/json.cpp - /Website/node_modules/node-sass/src/libsass/src/units.cpp - /Website/node_modules/node-sass/src/libsass/src/units.hpp - /Website/node_modules/node-sass/src/libsass/src/context.cpp - /Website/node_modules/node-sass/src/libsass/src/utf8/checked.h - /Website/node_modules/node-sass/src/libsass/src/listize.hpp - /Website/node_modules/node-sass/src/sass_types/string.cpp - /Website/node_modules/node-sass/src/libsass/src/prelexer.hpp - /Website/node_modules/node-sass/src/libsass/src/context.hpp - /Website/node_modules/node-sass/src/sass_types/boolean.h - /Website/node_modules/node-sass/src/libsass/include/sass2scss.h - /Website/node_modules/node-sass/src/binding.cpp - /Website/node_modules/node-sass/src/libsass/src/prelexer.cpp - /Website/node_modules/node-sass/src/sass_types/factory.cpp - /Website/node_modules/node-sass/src/sass_types/boolean.cpp - /Website/node_modules/node-sass/src/libsass/src/source_map.cpp - /Website/node_modules/node-sass/src/sass_types/value.h - /Website/node_modules/node-sass/src/libsass/src/utf8_string.cpp - /Website/node_modules/node-sass/src/libsass/src/file.cpp - /Website/node_modules/node-sass/src/sass_context_wrapper.cpp - /Website/node_modules/node-sass/src/libsass/src/node.hpp - /Website/node_modules/node-sass/src/libsass/src/environment.cpp - /Website/node_modules/node-sass/src/libsass/src/extend.hpp - /Website/node_modules/node-sass/src/libsass/src/sass_context.hpp - /Website/node_modules/node-sass/src/libsass/src/operators.hpp - /Website/node_modules/node-sass/src/libsass/src/constants.hpp - /Website/node_modules/node-sass/src/libsass/src/sass.hpp - /Website/node_modules/node-sass/src/libsass/src/parser.cpp - /Website/node_modules/node-sass/src/libsass/src/ast_fwd_decl.cpp - /Website/node_modules/node-sass/src/libsass/src/constants.cpp - /Website/node_modules/node-sass/src/libsass/src/debugger.hpp - /Website/node_modules/node-sass/src/sass_types/list.cpp - /Website/node_modules/node-sass/src/libsass/include/sass/functions.h - /Website/node_modules/node-sass/src/libsass/src/util.cpp - /Website/node_modules/node-sass/src/custom_function_bridge.cpp - /Website/node_modules/node-sass/src/custom_importer_bridge.h - /Website/node_modules/node-sass/src/libsass/src/bind.cpp - /Website/node_modules/node-sass/src/libsass/src/sass_functions.cpp - /Website/node_modules/node-sass/src/libsass/src/backtrace.cpp - /Website/node_modules/node-sass/src/libsass/src/cencode.c - /Website/node_modules/node-sass/src/libsass/src/extend.cpp - /Website/node_modules/node-sass/src/sass_types/sass_value_wrapper.h - /Website/node_modules/node-sass/src/sass_context_wrapper.h - /Website/node_modules/node-sass/src/libsass/src/sass.cpp - /Website/node_modules/node-sass/src/libsass/src/base64vlq.cpp - /Website/node_modules/node-sass/src/sass_types/number.cpp - /Website/node_modules/node-sass/src/sass_types/color.h - /Website/node_modules/node-sass/src/libsass/src/c99func.c - /Website/node_modules/node-sass/src/libsass/src/position.cpp - /Website/node_modules/node-sass/src/libsass/src/remove_placeholders.hpp - /Website/node_modules/node-sass/src/libsass/src/sass_values.cpp - /Website/node_modules/node-sass/src/libsass/include/sass/values.h - /Website/node_modules/node-sass/src/libsass/src/inspect.cpp - /Website/node_modules/node-sass/src/libsass/test/test_subset_map.cpp - /Website/node_modules/node-sass/src/libsass/src/sass2scss.cpp - /Website/node_modules/node-sass/src/sass_types/null.cpp - /Website/node_modules/node-sass/src/libsass/src/functions.cpp - /Website/node_modules/node-sass/src/libsass/src/ast.cpp - /Website/node_modules/node-sass/src/libsass/include/sass/context.h - /Website/node_modules/node-sass/src/libsass/src/to_c.cpp - /Website/node_modules/node-sass/src/libsass/src/to_value.hpp - /Website/node_modules/node-sass/src/callback_bridge.h - /Website/node_modules/node-sass/src/libsass/src/color_maps.hpp - /Website/node_modules/node-sass/src/libsass/script/test-leaks.pl - /Website/node_modules/node-sass/src/libsass/src/cssize.cpp - /Website/node_modules/node-sass/src/libsass/src/lexer.hpp - /Website/node_modules/node-sass/src/libsass/src/memory/SharedPtr.hpp - /Website/node_modules/node-sass/src/libsass/src/eval.cpp - /Website/node_modules/node-sass/src/libsass/src/to_c.hpp - /Website/node_modules/node-sass/src/sass_types/map.cpp - /Website/node_modules/node-sass/src/libsass/src/to_value.cpp - /Website/node_modules/node-sass/src/libsass/src/b64/encode.h - /Website/node_modules/node-sass/src/libsass/src/file.hpp - /Website/node_modules/node-sass/src/libsass/src/environment.hpp - /Website/node_modules/node-sass/src/libsass/src/plugins.hpp - /Website/node_modules/node-sass/src/libsass/src/parser.hpp - /Website/node_modules/node-sass/src/libsass/src/sass_context.cpp - /Website/node_modules/node-sass/src/libsass/src/debug.hpp </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> An issue was discovered in LibSass through 3.5.4. A NULL pointer dereference was found in the function Sass::Inspect::operator which could be leveraged by an attacker to cause a denial of service (application crash) or possibly have unspecified other impact. <p>Publish Date: 2018-06-04 <p>URL: <a href=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11696>CVE-2018-11696</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2018-11696 (High) detected in node-sass-v4.12.0 - ## CVE-2018-11696 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>node-sassv4.12.0</b></p></summary> <p> <p>:rainbow: Node.js bindings to libsass</p> <p>Library home page: <a href=https://github.com/sass/node-sass.git>https://github.com/sass/node-sass.git</a></p> <p>Found in HEAD commit: <a href="https://api.github.com/repos/DashboardHub/Website/commits/5f96f1e0a372b9087a833b3c4a74d093a24d6897">5f96f1e0a372b9087a833b3c4a74d093a24d6897</a></p> </p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Library Source Files (125)</summary> <p></p> <p> * The source files were matched to this source library based on a best effort match. Source libraries are selected from a list of probable public libraries.</p> <p> - /Website/node_modules/node-sass/src/libsass/src/expand.hpp - /Website/node_modules/node-sass/src/libsass/src/util.hpp - /Website/node_modules/node-sass/src/libsass/src/color_maps.cpp - /Website/node_modules/node-sass/src/libsass/src/sass_util.hpp - /Website/node_modules/node-sass/src/libsass/src/utf8/unchecked.h - /Website/node_modules/node-sass/src/libsass/src/output.hpp - /Website/node_modules/node-sass/src/libsass/src/sass_values.hpp - /Website/node_modules/node-sass/src/libsass/src/emitter.hpp - /Website/node_modules/node-sass/src/libsass/src/lexer.cpp - /Website/node_modules/node-sass/src/libsass/test/test_node.cpp - /Website/node_modules/node-sass/src/libsass/src/plugins.cpp - /Website/node_modules/node-sass/src/libsass/include/sass/base.h - /Website/node_modules/node-sass/src/libsass/src/position.hpp - /Website/node_modules/node-sass/src/libsass/src/subset_map.hpp - /Website/node_modules/node-sass/src/libsass/src/operation.hpp - /Website/node_modules/node-sass/src/libsass/src/remove_placeholders.cpp - /Website/node_modules/node-sass/src/libsass/src/error_handling.hpp - /Website/node_modules/node-sass/src/libsass/src/operators.cpp - /Website/node_modules/node-sass/src/custom_importer_bridge.cpp - /Website/node_modules/node-sass/src/libsass/contrib/plugin.cpp - /Website/node_modules/node-sass/src/libsass/src/functions.hpp - /Website/node_modules/node-sass/src/libsass/test/test_superselector.cpp - /Website/node_modules/node-sass/src/libsass/src/eval.hpp - /Website/node_modules/node-sass/src/libsass/src/utf8_string.hpp - /Website/node_modules/node-sass/src/libsass/src/error_handling.cpp - /Website/node_modules/node-sass/src/libsass/src/node.cpp - /Website/node_modules/node-sass/src/libsass/src/subset_map.cpp - /Website/node_modules/node-sass/src/libsass/src/emitter.cpp - /Website/node_modules/node-sass/src/libsass/src/listize.cpp - /Website/node_modules/node-sass/src/libsass/src/ast.hpp - /Website/node_modules/node-sass/src/libsass/src/sass_functions.hpp - /Website/node_modules/node-sass/src/libsass/src/memory/SharedPtr.cpp - /Website/node_modules/node-sass/src/libsass/src/output.cpp - /Website/node_modules/node-sass/src/libsass/src/check_nesting.cpp - /Website/node_modules/node-sass/src/libsass/src/expand.cpp - /Website/node_modules/node-sass/src/libsass/src/ast_def_macros.hpp - /Website/node_modules/node-sass/src/libsass/src/cssize.hpp - /Website/node_modules/node-sass/src/libsass/src/paths.hpp - /Website/node_modules/node-sass/src/libsass/src/ast_fwd_decl.hpp - /Website/node_modules/node-sass/src/libsass/src/inspect.hpp - /Website/node_modules/node-sass/src/sass_types/color.cpp - /Website/node_modules/node-sass/src/libsass/test/test_unification.cpp - /Website/node_modules/node-sass/src/libsass/src/values.cpp - /Website/node_modules/node-sass/src/libsass/src/sass_util.cpp - /Website/node_modules/node-sass/src/libsass/src/source_map.hpp - /Website/node_modules/node-sass/src/sass_types/list.h - /Website/node_modules/node-sass/src/libsass/src/check_nesting.hpp - /Website/node_modules/node-sass/src/libsass/src/json.cpp - /Website/node_modules/node-sass/src/libsass/src/units.cpp - /Website/node_modules/node-sass/src/libsass/src/units.hpp - /Website/node_modules/node-sass/src/libsass/src/context.cpp - /Website/node_modules/node-sass/src/libsass/src/utf8/checked.h - /Website/node_modules/node-sass/src/libsass/src/listize.hpp - /Website/node_modules/node-sass/src/sass_types/string.cpp - /Website/node_modules/node-sass/src/libsass/src/prelexer.hpp - /Website/node_modules/node-sass/src/libsass/src/context.hpp - /Website/node_modules/node-sass/src/sass_types/boolean.h - /Website/node_modules/node-sass/src/libsass/include/sass2scss.h - /Website/node_modules/node-sass/src/binding.cpp - /Website/node_modules/node-sass/src/libsass/src/prelexer.cpp - /Website/node_modules/node-sass/src/sass_types/factory.cpp - /Website/node_modules/node-sass/src/sass_types/boolean.cpp - /Website/node_modules/node-sass/src/libsass/src/source_map.cpp - /Website/node_modules/node-sass/src/sass_types/value.h - /Website/node_modules/node-sass/src/libsass/src/utf8_string.cpp - /Website/node_modules/node-sass/src/libsass/src/file.cpp - /Website/node_modules/node-sass/src/sass_context_wrapper.cpp - /Website/node_modules/node-sass/src/libsass/src/node.hpp - /Website/node_modules/node-sass/src/libsass/src/environment.cpp - /Website/node_modules/node-sass/src/libsass/src/extend.hpp - /Website/node_modules/node-sass/src/libsass/src/sass_context.hpp - /Website/node_modules/node-sass/src/libsass/src/operators.hpp - /Website/node_modules/node-sass/src/libsass/src/constants.hpp - /Website/node_modules/node-sass/src/libsass/src/sass.hpp - /Website/node_modules/node-sass/src/libsass/src/parser.cpp - /Website/node_modules/node-sass/src/libsass/src/ast_fwd_decl.cpp - /Website/node_modules/node-sass/src/libsass/src/constants.cpp - /Website/node_modules/node-sass/src/libsass/src/debugger.hpp - /Website/node_modules/node-sass/src/sass_types/list.cpp - /Website/node_modules/node-sass/src/libsass/include/sass/functions.h - /Website/node_modules/node-sass/src/libsass/src/util.cpp - /Website/node_modules/node-sass/src/custom_function_bridge.cpp - /Website/node_modules/node-sass/src/custom_importer_bridge.h - /Website/node_modules/node-sass/src/libsass/src/bind.cpp - /Website/node_modules/node-sass/src/libsass/src/sass_functions.cpp - /Website/node_modules/node-sass/src/libsass/src/backtrace.cpp - /Website/node_modules/node-sass/src/libsass/src/cencode.c - /Website/node_modules/node-sass/src/libsass/src/extend.cpp - /Website/node_modules/node-sass/src/sass_types/sass_value_wrapper.h - /Website/node_modules/node-sass/src/sass_context_wrapper.h - /Website/node_modules/node-sass/src/libsass/src/sass.cpp - /Website/node_modules/node-sass/src/libsass/src/base64vlq.cpp - /Website/node_modules/node-sass/src/sass_types/number.cpp - /Website/node_modules/node-sass/src/sass_types/color.h - /Website/node_modules/node-sass/src/libsass/src/c99func.c - /Website/node_modules/node-sass/src/libsass/src/position.cpp - /Website/node_modules/node-sass/src/libsass/src/remove_placeholders.hpp - /Website/node_modules/node-sass/src/libsass/src/sass_values.cpp - /Website/node_modules/node-sass/src/libsass/include/sass/values.h - /Website/node_modules/node-sass/src/libsass/src/inspect.cpp - /Website/node_modules/node-sass/src/libsass/test/test_subset_map.cpp - /Website/node_modules/node-sass/src/libsass/src/sass2scss.cpp - /Website/node_modules/node-sass/src/sass_types/null.cpp - /Website/node_modules/node-sass/src/libsass/src/functions.cpp - /Website/node_modules/node-sass/src/libsass/src/ast.cpp - /Website/node_modules/node-sass/src/libsass/include/sass/context.h - /Website/node_modules/node-sass/src/libsass/src/to_c.cpp - /Website/node_modules/node-sass/src/libsass/src/to_value.hpp - /Website/node_modules/node-sass/src/callback_bridge.h - /Website/node_modules/node-sass/src/libsass/src/color_maps.hpp - /Website/node_modules/node-sass/src/libsass/script/test-leaks.pl - /Website/node_modules/node-sass/src/libsass/src/cssize.cpp - /Website/node_modules/node-sass/src/libsass/src/lexer.hpp - /Website/node_modules/node-sass/src/libsass/src/memory/SharedPtr.hpp - /Website/node_modules/node-sass/src/libsass/src/eval.cpp - /Website/node_modules/node-sass/src/libsass/src/to_c.hpp - /Website/node_modules/node-sass/src/sass_types/map.cpp - /Website/node_modules/node-sass/src/libsass/src/to_value.cpp - /Website/node_modules/node-sass/src/libsass/src/b64/encode.h - /Website/node_modules/node-sass/src/libsass/src/file.hpp - /Website/node_modules/node-sass/src/libsass/src/environment.hpp - /Website/node_modules/node-sass/src/libsass/src/plugins.hpp - /Website/node_modules/node-sass/src/libsass/src/parser.hpp - /Website/node_modules/node-sass/src/libsass/src/sass_context.cpp - /Website/node_modules/node-sass/src/libsass/src/debug.hpp </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> An issue was discovered in LibSass through 3.5.4. A NULL pointer dereference was found in the function Sass::Inspect::operator which could be leveraged by an attacker to cause a denial of service (application crash) or possibly have unspecified other impact. <p>Publish Date: 2018-06-04 <p>URL: <a href=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11696>CVE-2018-11696</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in node sass cve high severity vulnerability vulnerable library node rainbow node js bindings to libsass library home page a href found in head commit a href library source files the source files were matched to this source library based on a best effort match source libraries are selected from a list of probable public libraries website node modules node sass src libsass src expand hpp website node modules node sass src libsass src util hpp website node modules node sass src libsass src color maps cpp website node modules node sass src libsass src sass util hpp website node modules node sass src libsass src unchecked h website node modules node sass src libsass src output hpp website node modules node sass src libsass src sass values hpp website node modules node sass src libsass src emitter hpp website node modules node sass src libsass src lexer cpp website node modules node sass src libsass test test node cpp website node modules node sass src libsass src plugins cpp website node modules node sass src libsass include sass base h website node modules node sass src libsass src position hpp website node modules node sass src libsass src subset map hpp website node modules node sass src libsass src operation hpp website node modules node sass src libsass src remove placeholders cpp website node modules node sass src libsass src error handling hpp website node modules node sass src libsass src operators cpp website node modules node sass src custom importer bridge cpp website node modules node sass src libsass contrib plugin cpp website node modules node sass src libsass src functions hpp website node modules node sass src libsass test test superselector cpp website node modules node sass src libsass src eval hpp website node modules node sass src libsass src string hpp website node modules node sass src libsass src error handling cpp website node modules node sass src libsass src node cpp website node modules node sass src libsass src subset map cpp website node modules node sass src libsass src emitter cpp website node modules node sass src libsass src listize cpp website node modules node sass src libsass src ast hpp website node modules node sass src libsass src sass functions hpp website node modules node sass src libsass src memory sharedptr cpp website node modules node sass src libsass src output cpp website node modules node sass src libsass src check nesting cpp website node modules node sass src libsass src expand cpp website node modules node sass src libsass src ast def macros hpp website node modules node sass src libsass src cssize hpp website node modules node sass src libsass src paths hpp website node modules node sass src libsass src ast fwd decl hpp website node modules node sass src libsass src inspect hpp website node modules node sass src sass types color cpp website node modules node sass src libsass test test unification cpp website node modules node sass src libsass src values cpp website node modules node sass src libsass src sass util cpp website node modules node sass src libsass src source map hpp website node modules node sass src sass types list h website node modules node sass src libsass src check nesting hpp website node modules node sass src libsass src json cpp website node modules node sass src libsass src units cpp website node modules node sass src libsass src units hpp website node modules node sass src libsass src context cpp website node modules node sass src libsass src checked h website node modules node sass src libsass src listize hpp website node modules node sass src sass types string cpp website node modules node sass src libsass src prelexer hpp website node modules node sass src libsass src context hpp website node modules node sass src sass types boolean h website node modules node sass src libsass include h website node modules node sass src binding cpp website node modules node sass src libsass src prelexer cpp website node modules node sass src sass types factory cpp website node modules node sass src sass types boolean cpp website node modules node sass src libsass src source map cpp website node modules node sass src sass types value h website node modules node sass src libsass src string cpp website node modules node sass src libsass src file cpp website node modules node sass src sass context wrapper cpp website node modules node sass src libsass src node hpp website node modules node sass src libsass src environment cpp website node modules node sass src libsass src extend hpp website node modules node sass src libsass src sass context hpp website node modules node sass src libsass src operators hpp website node modules node sass src libsass src constants hpp website node modules node sass src libsass src sass hpp website node modules node sass src libsass src parser cpp website node modules node sass src libsass src ast fwd decl cpp website node modules node sass src libsass src constants cpp website node modules node sass src libsass src debugger hpp website node modules node sass src sass types list cpp website node modules node sass src libsass include sass functions h website node modules node sass src libsass src util cpp website node modules node sass src custom function bridge cpp website node modules node sass src custom importer bridge h website node modules node sass src libsass src bind cpp website node modules node sass src libsass src sass functions cpp website node modules node sass src libsass src backtrace cpp website node modules node sass src libsass src cencode c website node modules node sass src libsass src extend cpp website node modules node sass src sass types sass value wrapper h website node modules node sass src sass context wrapper h website node modules node sass src libsass src sass cpp website node modules node sass src libsass src cpp website node modules node sass src sass types number cpp website node modules node sass src sass types color h website node modules node sass src libsass src c website node modules node sass src libsass src position cpp website node modules node sass src libsass src remove placeholders hpp website node modules node sass src libsass src sass values cpp website node modules node sass src libsass include sass values h website node modules node sass src libsass src inspect cpp website node modules node sass src libsass test test subset map cpp website node modules node sass src libsass src cpp website node modules node sass src sass types null cpp website node modules node sass src libsass src functions cpp website node modules node sass src libsass src ast cpp website node modules node sass src libsass include sass context h website node modules node sass src libsass src to c cpp website node modules node sass src libsass src to value hpp website node modules node sass src callback bridge h website node modules node sass src libsass src color maps hpp website node modules node sass src libsass script test leaks pl website node modules node sass src libsass src cssize cpp website node modules node sass src libsass src lexer hpp website node modules node sass src libsass src memory sharedptr hpp website node modules node sass src libsass src eval cpp website node modules node sass src libsass src to c hpp website node modules node sass src sass types map cpp website node modules node sass src libsass src to value cpp website node modules node sass src libsass src encode h website node modules node sass src libsass src file hpp website node modules node sass src libsass src environment hpp website node modules node sass src libsass src plugins hpp website node modules node sass src libsass src parser hpp website node modules node sass src libsass src sass context cpp website node modules node sass src libsass src debug hpp vulnerability details an issue was discovered in libsass through a null pointer dereference was found in the function sass inspect operator which could be leveraged by an attacker to cause a denial of service application crash or possibly have unspecified other impact publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href step up your open source security game with whitesource
0
37,026
5,098,586,016
IssuesEvent
2017-01-04 02:31:50
Kademi/kademi-dev
https://api.github.com/repos/Kademi/kademi-dev
closed
Feature to allow ES queries to be transformed into tables
enhancement Ready to Test - Dev
The Queries feature allows developers to write elasticsearch queries, which are returned in the native ES format. This data can then be connected to histograms, tables, pie charts, etc. But often the data needs to be transformed to align with user expectations, and ES has very limited ability to do ad-hoc transformations. So a new feature is required which allows any arbitrary data, including ES queries but not limited to them, to be transformed to a regular tabular form for consumption by components. This should also allow the tabular data to be exported as csv in front end websites.
1.0
Feature to allow ES queries to be transformed into tables - The Queries feature allows developers to write elasticsearch queries, which are returned in the native ES format. This data can then be connected to histograms, tables, pie charts, etc. But often the data needs to be transformed to align with user expectations, and ES has very limited ability to do ad-hoc transformations. So a new feature is required which allows any arbitrary data, including ES queries but not limited to them, to be transformed to a regular tabular form for consumption by components. This should also allow the tabular data to be exported as csv in front end websites.
non_priority
feature to allow es queries to be transformed into tables the queries feature allows developers to write elasticsearch queries which are returned in the native es format this data can then be connected to histograms tables pie charts etc but often the data needs to be transformed to align with user expectations and es has very limited ability to do ad hoc transformations so a new feature is required which allows any arbitrary data including es queries but not limited to them to be transformed to a regular tabular form for consumption by components this should also allow the tabular data to be exported as csv in front end websites
0
54,001
23,122,414,250
IssuesEvent
2022-07-27 23:31:15
Azure/AppConfiguration
https://api.github.com/repos/Azure/AppConfiguration
closed
Reference another app configuration item
service question
In an App Configuration entry can I reference another entries value? For example I have 2 app configuration entries. One called MyApi:Uri with value https://myapi.azurewebsites.net and I have an entry ReverseProxy:Clusters:MyApi:Destinations:destination1:Address. This value should also be https://myapi.azurewebsites.net but I would like to add/maintain it only once. Note I am using one app configuration instance for several API's.
1.0
Reference another app configuration item - In an App Configuration entry can I reference another entries value? For example I have 2 app configuration entries. One called MyApi:Uri with value https://myapi.azurewebsites.net and I have an entry ReverseProxy:Clusters:MyApi:Destinations:destination1:Address. This value should also be https://myapi.azurewebsites.net but I would like to add/maintain it only once. Note I am using one app configuration instance for several API's.
non_priority
reference another app configuration item in an app configuration entry can i reference another entries value for example i have app configuration entries one called myapi uri with value and i have an entry reverseproxy clusters myapi destinations address this value should also be but i would like to add maintain it only once note i am using one app configuration instance for several api s
0
363,807
25,467,279,531
IssuesEvent
2022-11-25 06:28:07
Jovenasso/SistemaJudocas2022
https://api.github.com/repos/Jovenasso/SistemaJudocas2022
closed
Diagrama de Casos de Uso
documentation
- [x] Corrigir os atores do diagrama - [x] Adicionar os casos de usos da especificação de requisitos faltantes no diagrama - [x] Corrigir os formulários de casos de uso - [x] Adicionar no formulário de casos de uso os faltantes
1.0
Diagrama de Casos de Uso - - [x] Corrigir os atores do diagrama - [x] Adicionar os casos de usos da especificação de requisitos faltantes no diagrama - [x] Corrigir os formulários de casos de uso - [x] Adicionar no formulário de casos de uso os faltantes
non_priority
diagrama de casos de uso corrigir os atores do diagrama adicionar os casos de usos da especificação de requisitos faltantes no diagrama corrigir os formulários de casos de uso adicionar no formulário de casos de uso os faltantes
0
28,291
23,136,749,535
IssuesEvent
2022-07-28 14:52:54
airyhq/airy
https://api.github.com/repos/airyhq/airy
closed
Components looking for a minimum of 3 Kafka brokers
infrastructure
Some of the components are not starting because they are waiting for a minimum of three brokers, while by default we deploy one broker. ``` Caused by: org.apache.kafka.common.errors.InvalidReplicationFactorException: Replication factor: 3 larger than available brokers: 1. ```
1.0
Components looking for a minimum of 3 Kafka brokers - Some of the components are not starting because they are waiting for a minimum of three brokers, while by default we deploy one broker. ``` Caused by: org.apache.kafka.common.errors.InvalidReplicationFactorException: Replication factor: 3 larger than available brokers: 1. ```
non_priority
components looking for a minimum of kafka brokers some of the components are not starting because they are waiting for a minimum of three brokers while by default we deploy one broker caused by org apache kafka common errors invalidreplicationfactorexception replication factor larger than available brokers
0
8,498
5,766,182,439
IssuesEvent
2017-04-27 06:10:13
godotengine/godot
https://api.github.com/repos/godotengine/godot
closed
Feature request : Icon tooltips in scene tree to reflect the icons meaning
enhancement topic:editor usability
Currently if I highlight any of the icons in the scene tree, the tooltip says "Instance: res://[xyz].tscn Type: [abc]" These two screenshots (in my opinion) shouldn't show the same tooltip. ![shot1](https://cloud.githubusercontent.com/assets/5151242/21962263/aec62f0e-db75-11e6-8b05-05e050e0c6aa.png) ![shot2](https://cloud.githubusercontent.com/assets/5151242/21962276/03cd3970-db76-11e6-8a18-f33517de906f.png) I would like to request that this is changed (particularly as I can't find in the documentation a guide as to what the icons mean), so that each icons tooltip explains the icon the mouse is hovering over. eg. Hovering over the eye icon would say "Toggle Visibility". Hovering over the group icon would say "Group: [whatever the group name is]" etc.
True
Feature request : Icon tooltips in scene tree to reflect the icons meaning - Currently if I highlight any of the icons in the scene tree, the tooltip says "Instance: res://[xyz].tscn Type: [abc]" These two screenshots (in my opinion) shouldn't show the same tooltip. ![shot1](https://cloud.githubusercontent.com/assets/5151242/21962263/aec62f0e-db75-11e6-8b05-05e050e0c6aa.png) ![shot2](https://cloud.githubusercontent.com/assets/5151242/21962276/03cd3970-db76-11e6-8a18-f33517de906f.png) I would like to request that this is changed (particularly as I can't find in the documentation a guide as to what the icons mean), so that each icons tooltip explains the icon the mouse is hovering over. eg. Hovering over the eye icon would say "Toggle Visibility". Hovering over the group icon would say "Group: [whatever the group name is]" etc.
non_priority
feature request icon tooltips in scene tree to reflect the icons meaning currently if i highlight any of the icons in the scene tree the tooltip says instance res tscn type these two screenshots in my opinion shouldn t show the same tooltip i would like to request that this is changed particularly as i can t find in the documentation a guide as to what the icons mean so that each icons tooltip explains the icon the mouse is hovering over eg hovering over the eye icon would say toggle visibility hovering over the group icon would say group etc
0
85,487
10,618,355,246
IssuesEvent
2019-10-13 03:39:59
carbon-design-system/ibm-dotcom-library
https://api.github.com/repos/carbon-design-system/ibm-dotcom-library
opened
Pattern: rich overview, visual design specs
design design: visual migrate package: patterns
_Wonil-Suh1 created the following on Sep 08:_ ### User story As a user of IBM.com, I need a way to understand the benefits and value of the product / solution / offering presented on the page quickly through text and media such as video so that I can make a decision on whether I should continue with the page or not. ### Notes This is a pattern that is not clearly defined from our past work. ### Acceptance criteria - [ ] Specs have been produced for all responsive break points _Original issue: https://github.ibm.com/webstandards/digital-design/issues/1610_
2.0
Pattern: rich overview, visual design specs - _Wonil-Suh1 created the following on Sep 08:_ ### User story As a user of IBM.com, I need a way to understand the benefits and value of the product / solution / offering presented on the page quickly through text and media such as video so that I can make a decision on whether I should continue with the page or not. ### Notes This is a pattern that is not clearly defined from our past work. ### Acceptance criteria - [ ] Specs have been produced for all responsive break points _Original issue: https://github.ibm.com/webstandards/digital-design/issues/1610_
non_priority
pattern rich overview visual design specs wonil created the following on sep user story as a user of ibm com i need a way to understand the benefits and value of the product solution offering presented on the page quickly through text and media such as video so that i can make a decision on whether i should continue with the page or not notes this is a pattern that is not clearly defined from our past work acceptance criteria specs have been produced for all responsive break points original issue
0
343,259
24,766,303,601
IssuesEvent
2022-10-22 15:14:38
NixOS/nixpkgs
https://api.github.com/repos/NixOS/nixpkgs
opened
How to conditionally install packages for macOS >= 12?
9.needs: documentation
## Problem I can't find a way to make conditions based on darwin versions. I was looking for an helper like `stdenv.isDarwin` but for the version. My goal is to install or not a package if macOs version is >= 12 (Monterey). ## Checklist - [x] checked [latest Nixpkgs manual] \([source][nixpkgs-source]) and [latest NixOS manual] \([source][nixos-source]) - [x] checked [open documentation issues] for possible duplicates - [x] checked [open documentation pull requests] for possible solutions [latest Nixpkgs manual]: https://nixos.org/manual/nixpkgs/unstable/ [latest NixOS manual]: https://nixos.org/manual/nixos/unstable/ [nixpkgs-source]: https://github.com/NixOS/nixpkgs/tree/master/doc [nixos-source]: https://github.com/NixOS/nixpkgs/tree/master/nixos/doc/manual [open documentation issues]: https://github.com/NixOS/nixpkgs/issues?q=is%3Aissue+is%3Aopen+label%3A%229.needs%3A+documentation%22 [open documentation pull requests]: https://github.com/NixOS/nixpkgs/pulls?q=is%3Aopen+is%3Apr+label%3A%228.has%3A+documentation%22%2C%226.topic%3A+documentation%22 ## Proposal Add the helper if missing? Add an example in configuration.
1.0
How to conditionally install packages for macOS >= 12? - ## Problem I can't find a way to make conditions based on darwin versions. I was looking for an helper like `stdenv.isDarwin` but for the version. My goal is to install or not a package if macOs version is >= 12 (Monterey). ## Checklist - [x] checked [latest Nixpkgs manual] \([source][nixpkgs-source]) and [latest NixOS manual] \([source][nixos-source]) - [x] checked [open documentation issues] for possible duplicates - [x] checked [open documentation pull requests] for possible solutions [latest Nixpkgs manual]: https://nixos.org/manual/nixpkgs/unstable/ [latest NixOS manual]: https://nixos.org/manual/nixos/unstable/ [nixpkgs-source]: https://github.com/NixOS/nixpkgs/tree/master/doc [nixos-source]: https://github.com/NixOS/nixpkgs/tree/master/nixos/doc/manual [open documentation issues]: https://github.com/NixOS/nixpkgs/issues?q=is%3Aissue+is%3Aopen+label%3A%229.needs%3A+documentation%22 [open documentation pull requests]: https://github.com/NixOS/nixpkgs/pulls?q=is%3Aopen+is%3Apr+label%3A%228.has%3A+documentation%22%2C%226.topic%3A+documentation%22 ## Proposal Add the helper if missing? Add an example in configuration.
non_priority
how to conditionally install packages for macos problem i can t find a way to make conditions based on darwin versions i was looking for an helper like stdenv isdarwin but for the version my goal is to install or not a package if macos version is monterey checklist checked and checked for possible duplicates checked for possible solutions proposal add the helper if missing add an example in configuration
0
112,523
14,263,339,276
IssuesEvent
2020-11-20 14:18:31
sourcegraph/sourcegraph
https://api.github.com/repos/sourcegraph/sourcegraph
opened
campaigns frontend: number of entries in changeset list doesn't match numbers at top of view
needs-design team/campaigns
When a changeset is "processing" or "errored" it is counted towards the unpublished count at the top: ![screenshot_2020-11-20_15 17 32@2x](https://user-images.githubusercontent.com/1185253/99810105-8939c580-2b43-11eb-9a96-2d68d93de65e.png) But when it is `processing` or `errored` it doesn't show up in the list at the bottom: ![screenshot_2020-11-20_15 18 03@2x](https://user-images.githubusercontent.com/1185253/99810157-99ea3b80-2b43-11eb-8921-957f2967c975.png)
1.0
campaigns frontend: number of entries in changeset list doesn't match numbers at top of view - When a changeset is "processing" or "errored" it is counted towards the unpublished count at the top: ![screenshot_2020-11-20_15 17 32@2x](https://user-images.githubusercontent.com/1185253/99810105-8939c580-2b43-11eb-9a96-2d68d93de65e.png) But when it is `processing` or `errored` it doesn't show up in the list at the bottom: ![screenshot_2020-11-20_15 18 03@2x](https://user-images.githubusercontent.com/1185253/99810157-99ea3b80-2b43-11eb-8921-957f2967c975.png)
non_priority
campaigns frontend number of entries in changeset list doesn t match numbers at top of view when a changeset is processing or errored it is counted towards the unpublished count at the top but when it is processing or errored it doesn t show up in the list at the bottom
0
299,868
22,629,300,207
IssuesEvent
2022-06-30 13:27:04
mharrisb1/daglib
https://api.github.com/repos/mharrisb1/daglib
opened
Add more documentation
documentation
- [ ] Testing - [ ] Deployment - [ ] Use cases - [ ] Mapping tasks - [ ] Joining tasks - [ ] Chunked tasks - [ ] Advanced workflows - [ ] Run - [ ] Visualize
1.0
Add more documentation - - [ ] Testing - [ ] Deployment - [ ] Use cases - [ ] Mapping tasks - [ ] Joining tasks - [ ] Chunked tasks - [ ] Advanced workflows - [ ] Run - [ ] Visualize
non_priority
add more documentation testing deployment use cases mapping tasks joining tasks chunked tasks advanced workflows run visualize
0
43,704
17,633,740,585
IssuesEvent
2021-08-19 11:16:29
hashicorp/terraform-provider-azurerm
https://api.github.com/repos/hashicorp/terraform-provider-azurerm
closed
r/function_app: support for enabling Incoming client certificates and Certificate exclusion paths
enhancement service/functions
Hello According to [this issue](https://github.com/terraform-providers/terraform-provider-azurerm/issues/2004) there is an option to enable `Incoming client certificates` on `azurerm_function_app`. However: - There is no documentation on how to implement it - There is no mention of whether or not one can add `Certificate exclusion paths` once `Incoming client certificates` is enabled I was able to accomplish it via the az cli: ```console az functionapp update --set clientCertEnabled=true --set clientCertExclusionPaths="/foo;/bar;/hello;/world" --name jungoafadsgasdge-functio --resource-group azure-functions-test-rg ``` Is it supported in Terraform out-of-the-box and if so can you please share an example code on how to accomplish that? Thanks Omer
1.0
r/function_app: support for enabling Incoming client certificates and Certificate exclusion paths - Hello According to [this issue](https://github.com/terraform-providers/terraform-provider-azurerm/issues/2004) there is an option to enable `Incoming client certificates` on `azurerm_function_app`. However: - There is no documentation on how to implement it - There is no mention of whether or not one can add `Certificate exclusion paths` once `Incoming client certificates` is enabled I was able to accomplish it via the az cli: ```console az functionapp update --set clientCertEnabled=true --set clientCertExclusionPaths="/foo;/bar;/hello;/world" --name jungoafadsgasdge-functio --resource-group azure-functions-test-rg ``` Is it supported in Terraform out-of-the-box and if so can you please share an example code on how to accomplish that? Thanks Omer
non_priority
r function app support for enabling incoming client certificates and certificate exclusion paths hello according to there is an option to enable incoming client certificates on azurerm function app however there is no documentation on how to implement it there is no mention of whether or not one can add certificate exclusion paths once incoming client certificates is enabled i was able to accomplish it via the az cli console az functionapp update set clientcertenabled true set clientcertexclusionpaths foo bar hello world name jungoafadsgasdge functio resource group azure functions test rg is it supported in terraform out of the box and if so can you please share an example code on how to accomplish that thanks omer
0
171,756
14,344,550,719
IssuesEvent
2020-11-28 15:00:07
DmytroKorniienko/EmbUI
https://api.github.com/repos/DmytroKorniienko/EmbUI
closed
WiFi connect and frame-flush racing
bug documentation
В методах set_settings_wifi/set_settings_wifiAP переключение wifi происходит раньше чем закончится обработка кадра интерфейса. Веб-сокет не может закончит передачу. TODO: отложить переключение WiFi через планировщик
1.0
WiFi connect and frame-flush racing - В методах set_settings_wifi/set_settings_wifiAP переключение wifi происходит раньше чем закончится обработка кадра интерфейса. Веб-сокет не может закончит передачу. TODO: отложить переключение WiFi через планировщик
non_priority
wifi connect and frame flush racing в методах set settings wifi set settings wifiap переключение wifi происходит раньше чем закончится обработка кадра интерфейса веб сокет не может закончит передачу todo отложить переключение wifi через планировщик
0
406,991
27,591,302,329
IssuesEvent
2023-03-09 00:44:07
desenvolvimento-web-unifil/02-documentacao-group-rmksn
https://api.github.com/repos/desenvolvimento-web-unifil/02-documentacao-group-rmksn
opened
Criar tela de login
documentation enhancement
Criar tela de login de login para usuário ter possibilidade de acesso a sua conta. Usar as linguagens de marcação HTML e CSS e estruturar os campos nessa tela de login.
1.0
Criar tela de login - Criar tela de login de login para usuário ter possibilidade de acesso a sua conta. Usar as linguagens de marcação HTML e CSS e estruturar os campos nessa tela de login.
non_priority
criar tela de login criar tela de login de login para usuário ter possibilidade de acesso a sua conta usar as linguagens de marcação html e css e estruturar os campos nessa tela de login
0
54,918
13,942,794,461
IssuesEvent
2020-10-22 21:40:17
Whizkevina/uchi-sidebar-clone
https://api.github.com/repos/Whizkevina/uchi-sidebar-clone
opened
CVE-2020-11022 (Medium) detected in multiple libraries
security vulnerability
## CVE-2020-11022 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>jquery-1.7.2.min.js</b>, <b>jquery-1.9.0.min.js</b>, <b>jquery-1.11.3.js</b>, <b>jquery-1.11.2.min.js</b>, <b>jquery-1.11.1.min.js</b>, <b>jquery-1.7.1.min.js</b></p></summary> <p> <details><summary><b>jquery-1.7.2.min.js</b></p></summary> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.7.2/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/1.7.2/jquery.min.js</a></p> <p>Path to dependency file: uchi-sidebar-clone/node_modules/jmespath/index.html</p> <p>Path to vulnerable library: uchi-sidebar-clone/node_modules/jmespath/index.html</p> <p> Dependency Hierarchy: - :x: **jquery-1.7.2.min.js** (Vulnerable Library) </details> <details><summary><b>jquery-1.9.0.min.js</b></p></summary> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.9.0/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/1.9.0/jquery.min.js</a></p> <p>Path to dependency file: uchi-sidebar-clone/node_modules/es6-shim/test-sham/index.html</p> <p>Path to vulnerable library: uchi-sidebar-clone/node_modules/es6-shim/test-sham/index.html</p> <p> Dependency Hierarchy: - :x: **jquery-1.9.0.min.js** (Vulnerable Library) </details> <details><summary><b>jquery-1.11.3.js</b></p></summary> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.11.3/jquery.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/1.11.3/jquery.js</a></p> <p>Path to dependency file: uchi-sidebar-clone/node_modules/es6-shim/test/google-translate.html</p> <p>Path to vulnerable library: uchi-sidebar-clone/node_modules/es6-shim/test/google-translate.html</p> <p> Dependency Hierarchy: - :x: **jquery-1.11.3.js** (Vulnerable Library) </details> <details><summary><b>jquery-1.11.2.min.js</b></p></summary> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.11.2/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/1.11.2/jquery.min.js</a></p> <p>Path to dependency file: uchi-sidebar-clone/node_modules/svg-pan-zoom/demo/dynamic-load.html</p> <p>Path to vulnerable library: uchi-sidebar-clone/node_modules/svg-pan-zoom/demo/jquery.min.js</p> <p> Dependency Hierarchy: - :x: **jquery-1.11.2.min.js** (Vulnerable Library) </details> <details><summary><b>jquery-1.11.1.min.js</b></p></summary> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.11.1/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/1.11.1/jquery.min.js</a></p> <p>Path to dependency file: uchi-sidebar-clone/node_modules/svg-pan-zoom/demo/resize.html</p> <p>Path to vulnerable library: uchi-sidebar-clone/node_modules/svg-pan-zoom/demo/resize.html</p> <p> Dependency Hierarchy: - :x: **jquery-1.11.1.min.js** (Vulnerable Library) </details> <details><summary><b>jquery-1.7.1.min.js</b></p></summary> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.7.1/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/1.7.1/jquery.min.js</a></p> <p>Path to dependency file: uchi-sidebar-clone/node_modules/meteor-node-stubs/node_modules/vm-browserify/example/run/index.html</p> <p>Path to vulnerable library: uchi-sidebar-clone/node_modules/meteor-node-stubs/node_modules/vm-browserify/example/run/index.html</p> <p> Dependency Hierarchy: - :x: **jquery-1.7.1.min.js** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/Whizkevina/uchi-sidebar-clone/commit/5405eeecb088ab7acf45ef51e052988d72c3fe7f">5405eeecb088ab7acf45ef51e052988d72c3fe7f</a></p> <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0. <p>Publish Date: 2020-04-29 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11022>CVE-2020-11022</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/">https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/</a></p> <p>Release Date: 2020-04-29</p> <p>Fix Resolution: jQuery - 3.5.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2020-11022 (Medium) detected in multiple libraries - ## CVE-2020-11022 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>jquery-1.7.2.min.js</b>, <b>jquery-1.9.0.min.js</b>, <b>jquery-1.11.3.js</b>, <b>jquery-1.11.2.min.js</b>, <b>jquery-1.11.1.min.js</b>, <b>jquery-1.7.1.min.js</b></p></summary> <p> <details><summary><b>jquery-1.7.2.min.js</b></p></summary> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.7.2/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/1.7.2/jquery.min.js</a></p> <p>Path to dependency file: uchi-sidebar-clone/node_modules/jmespath/index.html</p> <p>Path to vulnerable library: uchi-sidebar-clone/node_modules/jmespath/index.html</p> <p> Dependency Hierarchy: - :x: **jquery-1.7.2.min.js** (Vulnerable Library) </details> <details><summary><b>jquery-1.9.0.min.js</b></p></summary> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.9.0/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/1.9.0/jquery.min.js</a></p> <p>Path to dependency file: uchi-sidebar-clone/node_modules/es6-shim/test-sham/index.html</p> <p>Path to vulnerable library: uchi-sidebar-clone/node_modules/es6-shim/test-sham/index.html</p> <p> Dependency Hierarchy: - :x: **jquery-1.9.0.min.js** (Vulnerable Library) </details> <details><summary><b>jquery-1.11.3.js</b></p></summary> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.11.3/jquery.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/1.11.3/jquery.js</a></p> <p>Path to dependency file: uchi-sidebar-clone/node_modules/es6-shim/test/google-translate.html</p> <p>Path to vulnerable library: uchi-sidebar-clone/node_modules/es6-shim/test/google-translate.html</p> <p> Dependency Hierarchy: - :x: **jquery-1.11.3.js** (Vulnerable Library) </details> <details><summary><b>jquery-1.11.2.min.js</b></p></summary> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.11.2/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/1.11.2/jquery.min.js</a></p> <p>Path to dependency file: uchi-sidebar-clone/node_modules/svg-pan-zoom/demo/dynamic-load.html</p> <p>Path to vulnerable library: uchi-sidebar-clone/node_modules/svg-pan-zoom/demo/jquery.min.js</p> <p> Dependency Hierarchy: - :x: **jquery-1.11.2.min.js** (Vulnerable Library) </details> <details><summary><b>jquery-1.11.1.min.js</b></p></summary> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.11.1/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/1.11.1/jquery.min.js</a></p> <p>Path to dependency file: uchi-sidebar-clone/node_modules/svg-pan-zoom/demo/resize.html</p> <p>Path to vulnerable library: uchi-sidebar-clone/node_modules/svg-pan-zoom/demo/resize.html</p> <p> Dependency Hierarchy: - :x: **jquery-1.11.1.min.js** (Vulnerable Library) </details> <details><summary><b>jquery-1.7.1.min.js</b></p></summary> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.7.1/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/1.7.1/jquery.min.js</a></p> <p>Path to dependency file: uchi-sidebar-clone/node_modules/meteor-node-stubs/node_modules/vm-browserify/example/run/index.html</p> <p>Path to vulnerable library: uchi-sidebar-clone/node_modules/meteor-node-stubs/node_modules/vm-browserify/example/run/index.html</p> <p> Dependency Hierarchy: - :x: **jquery-1.7.1.min.js** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/Whizkevina/uchi-sidebar-clone/commit/5405eeecb088ab7acf45ef51e052988d72c3fe7f">5405eeecb088ab7acf45ef51e052988d72c3fe7f</a></p> <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0. <p>Publish Date: 2020-04-29 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11022>CVE-2020-11022</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/">https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/</a></p> <p>Release Date: 2020-04-29</p> <p>Fix Resolution: jQuery - 3.5.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in multiple libraries cve medium severity vulnerability vulnerable libraries jquery min js jquery min js jquery js jquery min js jquery min js jquery min js jquery min js javascript library for dom operations library home page a href path to dependency file uchi sidebar clone node modules jmespath index html path to vulnerable library uchi sidebar clone node modules jmespath index html dependency hierarchy x jquery min js vulnerable library jquery min js javascript library for dom operations library home page a href path to dependency file uchi sidebar clone node modules shim test sham index html path to vulnerable library uchi sidebar clone node modules shim test sham index html dependency hierarchy x jquery min js vulnerable library jquery js javascript library for dom operations library home page a href path to dependency file uchi sidebar clone node modules shim test google translate html path to vulnerable library uchi sidebar clone node modules shim test google translate html dependency hierarchy x jquery js vulnerable library jquery min js javascript library for dom operations library home page a href path to dependency file uchi sidebar clone node modules svg pan zoom demo dynamic load html path to vulnerable library uchi sidebar clone node modules svg pan zoom demo jquery min js dependency hierarchy x jquery min js vulnerable library jquery min js javascript library for dom operations library home page a href path to dependency file uchi sidebar clone node modules svg pan zoom demo resize html path to vulnerable library uchi sidebar clone node modules svg pan zoom demo resize html dependency hierarchy x jquery min js vulnerable library jquery min js javascript library for dom operations library home page a href path to dependency file uchi sidebar clone node modules meteor node stubs node modules vm browserify example run index html path to vulnerable library uchi sidebar clone node modules meteor node stubs node modules vm browserify example run index html dependency hierarchy x jquery min js vulnerable library found in head commit a href found in base branch main vulnerability details in jquery versions greater than or equal to and before passing html from untrusted sources even after sanitizing it to one of jquery s dom manipulation methods i e html append and others may execute untrusted code this problem is patched in jquery publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution jquery step up your open source security game with whitesource
0
76,899
9,526,698,911
IssuesEvent
2019-04-28 22:10:11
magento/magento2
https://api.github.com/repos/magento/magento2
closed
Can't scroll in modal-popup on iOS
Area: Design/Frontend Component: Checkout Fixed in 2.3.x Issue: Clear Description Issue: Confirmed Issue: Format is valid Issue: Ready for Work Reproduced on 2.2.x Reproduced on 2.3.x
### Preconditions (*) 1. Magento 2.2.7 (https://github.com/magento/magento2/commit/76ae28f82032a0af152d3285bedc1ffa46ff2055) ### Steps to reproduce (*) 1. Open any modal-popup of which the height exceeds the viewport height 2. Try scrolling in the popup on an iPhone (tested on iPhone 6s Plus & iPhone X) ### Expected result (*) 1. Scrolling inside the .modal-popup element ### Actual result (*) 1. http://cloud.h-o.nl/dfe0e645138b
1.0
Can't scroll in modal-popup on iOS - ### Preconditions (*) 1. Magento 2.2.7 (https://github.com/magento/magento2/commit/76ae28f82032a0af152d3285bedc1ffa46ff2055) ### Steps to reproduce (*) 1. Open any modal-popup of which the height exceeds the viewport height 2. Try scrolling in the popup on an iPhone (tested on iPhone 6s Plus & iPhone X) ### Expected result (*) 1. Scrolling inside the .modal-popup element ### Actual result (*) 1. http://cloud.h-o.nl/dfe0e645138b
non_priority
can t scroll in modal popup on ios preconditions magento steps to reproduce open any modal popup of which the height exceeds the viewport height try scrolling in the popup on an iphone tested on iphone plus iphone x expected result scrolling inside the modal popup element actual result
0
128,056
17,400,088,655
IssuesEvent
2021-08-02 18:19:41
hypha-dao/dho-web-client
https://api.github.com/repos/hypha-dao/dho-web-client
opened
Commenting on Proposal Detail Page (Frontend)
EPIC: New Design
Summary: As a DHO user I would like to be able to leave and reply to comments on a proposal detail page in order to get clarity on new proposals. Description: Please add a "comment" widget below the description of new proposals on the proposal detail page. Acceptance Criteria: - [ ] Every user should be able to leave a comment - [ ] It should be possible to reply to comments (allow as many levels of comments as the user wants or max of 3?) - [ ] User should be able to reply with an emoticon. Standard emoticons available? - [ ] The total comment number should be visible on the preview card (to be designed by Massimo) - [ ] Notifications for when someone leaves a comment (later) Ressources: Attachement: Final Design to be done https://xd.adobe.com/view/500c58dc-9103-41f4-a82a-bb390323fbd8-055f/screen/c20e1ce9-f9cf-4900-b68a-9bf9f9828c3e
1.0
Commenting on Proposal Detail Page (Frontend) - Summary: As a DHO user I would like to be able to leave and reply to comments on a proposal detail page in order to get clarity on new proposals. Description: Please add a "comment" widget below the description of new proposals on the proposal detail page. Acceptance Criteria: - [ ] Every user should be able to leave a comment - [ ] It should be possible to reply to comments (allow as many levels of comments as the user wants or max of 3?) - [ ] User should be able to reply with an emoticon. Standard emoticons available? - [ ] The total comment number should be visible on the preview card (to be designed by Massimo) - [ ] Notifications for when someone leaves a comment (later) Ressources: Attachement: Final Design to be done https://xd.adobe.com/view/500c58dc-9103-41f4-a82a-bb390323fbd8-055f/screen/c20e1ce9-f9cf-4900-b68a-9bf9f9828c3e
non_priority
commenting on proposal detail page frontend summary as a dho user i would like to be able to leave and reply to comments on a proposal detail page in order to get clarity on new proposals description please add a comment widget below the description of new proposals on the proposal detail page acceptance criteria every user should be able to leave a comment it should be possible to reply to comments allow as many levels of comments as the user wants or max of user should be able to reply with an emoticon standard emoticons available the total comment number should be visible on the preview card to be designed by massimo notifications for when someone leaves a comment later ressources attachement final design to be done
0
72,139
13,788,649,608
IssuesEvent
2020-10-09 07:35:43
codimd/react-client
https://api.github.com/repos/codimd/react-client
opened
Try to move external-types
code quality
We should try to move as much as possible from `src/external-types` to either the projects repos or DefinetlyTyped.
1.0
Try to move external-types - We should try to move as much as possible from `src/external-types` to either the projects repos or DefinetlyTyped.
non_priority
try to move external types we should try to move as much as possible from src external types to either the projects repos or definetlytyped
0
108,319
13,614,322,609
IssuesEvent
2020-09-23 13:06:27
cgeo/cgeo
https://api.github.com/repos/cgeo/cgeo
closed
Hanging logging screen while log page loading is finished in the background
Bug Frontend Design
##### Detailed steps causing the problem: - Start logging a cache - The logging screen is shown - The progress spinner indicates that the log page is loaded from server in the background ##### Actual behavior after performing these steps: As soon as loading of log page is finished, I experience an unresponsive behaviour for a second. I guess, that is because the screen is redrawn now showing the "Problem" dop down menu. ##### Expected behavior after performing these steps: This is not a serious bug, however it is blocking the text input while typing, wich is kind of annoying and not a good user experience. While not having an idea about what happens in background...isn't it somehow possible to show the "Problem" menu already at start of the logging activity (just silently assuming it will be supported) and only remove it in case it is not needed/not supported? That should make this need for redraw much less often. ##### Version of c:geo used: 2018.05.01-NB ##### Is the problem reproducible for you? Yes
1.0
Hanging logging screen while log page loading is finished in the background - ##### Detailed steps causing the problem: - Start logging a cache - The logging screen is shown - The progress spinner indicates that the log page is loaded from server in the background ##### Actual behavior after performing these steps: As soon as loading of log page is finished, I experience an unresponsive behaviour for a second. I guess, that is because the screen is redrawn now showing the "Problem" dop down menu. ##### Expected behavior after performing these steps: This is not a serious bug, however it is blocking the text input while typing, wich is kind of annoying and not a good user experience. While not having an idea about what happens in background...isn't it somehow possible to show the "Problem" menu already at start of the logging activity (just silently assuming it will be supported) and only remove it in case it is not needed/not supported? That should make this need for redraw much less often. ##### Version of c:geo used: 2018.05.01-NB ##### Is the problem reproducible for you? Yes
non_priority
hanging logging screen while log page loading is finished in the background detailed steps causing the problem start logging a cache the logging screen is shown the progress spinner indicates that the log page is loaded from server in the background actual behavior after performing these steps as soon as loading of log page is finished i experience an unresponsive behaviour for a second i guess that is because the screen is redrawn now showing the problem dop down menu expected behavior after performing these steps this is not a serious bug however it is blocking the text input while typing wich is kind of annoying and not a good user experience while not having an idea about what happens in background isn t it somehow possible to show the problem menu already at start of the logging activity just silently assuming it will be supported and only remove it in case it is not needed not supported that should make this need for redraw much less often version of c geo used nb is the problem reproducible for you yes
0
15,717
27,796,230,149
IssuesEvent
2023-03-17 12:46:05
Azure/az-hop
https://api.github.com/repos/Azure/az-hop
closed
Metric alerts
kind/feature area/monitoring customer-requirement
## In what area(s)? <!-- Remove the '> ' to select --> /area administration > /area ansible > /area autoscaling > /area configuration > /area cyclecloud > /area documentation > /area image > /area job-scheduling > /area monitoring > /area ood > /area remote-visualization > /area user-management ## Describe the feature <!-- Please also discuss possible business value --> Hi Xavier, It would be nice if we could get alerted when disks are nearly running out of space. Today our ANF was nearly full and we've had times in the past where the OS disk was full on various VMs. Would it be possible to set up azure monitoring to notify us by email or something when it is full? Another option might even be to automatically increase the ANF size (but this might be abused). I think this would make our deployments more reliable for customers. cc @ltalirz
1.0
Metric alerts - ## In what area(s)? <!-- Remove the '> ' to select --> /area administration > /area ansible > /area autoscaling > /area configuration > /area cyclecloud > /area documentation > /area image > /area job-scheduling > /area monitoring > /area ood > /area remote-visualization > /area user-management ## Describe the feature <!-- Please also discuss possible business value --> Hi Xavier, It would be nice if we could get alerted when disks are nearly running out of space. Today our ANF was nearly full and we've had times in the past where the OS disk was full on various VMs. Would it be possible to set up azure monitoring to notify us by email or something when it is full? Another option might even be to automatically increase the ANF size (but this might be abused). I think this would make our deployments more reliable for customers. cc @ltalirz
non_priority
metric alerts in what area s to select area administration area ansible area autoscaling area configuration area cyclecloud area documentation area image area job scheduling area monitoring area ood area remote visualization area user management describe the feature hi xavier it would be nice if we could get alerted when disks are nearly running out of space today our anf was nearly full and we ve had times in the past where the os disk was full on various vms would it be possible to set up azure monitoring to notify us by email or something when it is full another option might even be to automatically increase the anf size but this might be abused i think this would make our deployments more reliable for customers cc ltalirz
0
137,298
18,752,679,598
IssuesEvent
2021-11-05 05:48:30
madhans23/linux-4.15
https://api.github.com/repos/madhans23/linux-4.15
opened
CVE-2019-3701 (Medium) detected in linux-stablev4.17.12
security vulnerability
## CVE-2019-3701 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-stablev4.17.12</b></p></summary> <p> <p>Linux kernel stable tree</p> <p>Library home page: <a href=https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git>https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git</a></p> <p>Found in HEAD commit: <a href="https://github.com/madhans23/linux-4.15/commit/d96ee498864d1a0b6222cfb17d64ca8196014940">d96ee498864d1a0b6222cfb17d64ca8196014940</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (2)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/net/can/gw.c</b> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/net/can/gw.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> An issue was discovered in can_can_gw_rcv in net/can/gw.c in the Linux kernel through 4.19.13. The CAN frame modification rules allow bitwise logical operations that can be also applied to the can_dlc field. The privileged user "root" with CAP_NET_ADMIN can create a CAN frame modification rule that makes the data length code a higher value than the available CAN frame data size. In combination with a configured checksum calculation where the result is stored relatively to the end of the data (e.g. cgw_csum_xor_rel) the tail of the skb (e.g. frag_list pointer in skb_shared_info) can be rewritten which finally can cause a system crash. Because of a missing check, the CAN drivers may write arbitrary content beyond the data registers in the CAN controller's I/O memory when processing can-gw manipulated outgoing frames. <p>Publish Date: 2019-01-03 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-3701>CVE-2019-3701</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>4.4</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: High - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3701">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3701</a></p> <p>Release Date: 2019-01-03</p> <p>Fix Resolution: v5.0-rc3</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2019-3701 (Medium) detected in linux-stablev4.17.12 - ## CVE-2019-3701 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-stablev4.17.12</b></p></summary> <p> <p>Linux kernel stable tree</p> <p>Library home page: <a href=https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git>https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git</a></p> <p>Found in HEAD commit: <a href="https://github.com/madhans23/linux-4.15/commit/d96ee498864d1a0b6222cfb17d64ca8196014940">d96ee498864d1a0b6222cfb17d64ca8196014940</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (2)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/net/can/gw.c</b> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/net/can/gw.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> An issue was discovered in can_can_gw_rcv in net/can/gw.c in the Linux kernel through 4.19.13. The CAN frame modification rules allow bitwise logical operations that can be also applied to the can_dlc field. The privileged user "root" with CAP_NET_ADMIN can create a CAN frame modification rule that makes the data length code a higher value than the available CAN frame data size. In combination with a configured checksum calculation where the result is stored relatively to the end of the data (e.g. cgw_csum_xor_rel) the tail of the skb (e.g. frag_list pointer in skb_shared_info) can be rewritten which finally can cause a system crash. Because of a missing check, the CAN drivers may write arbitrary content beyond the data registers in the CAN controller's I/O memory when processing can-gw manipulated outgoing frames. <p>Publish Date: 2019-01-03 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-3701>CVE-2019-3701</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>4.4</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: High - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3701">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3701</a></p> <p>Release Date: 2019-01-03</p> <p>Fix Resolution: v5.0-rc3</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in linux cve medium severity vulnerability vulnerable library linux linux kernel stable tree library home page a href found in head commit a href found in base branch master vulnerable source files net can gw c net can gw c vulnerability details an issue was discovered in can can gw rcv in net can gw c in the linux kernel through the can frame modification rules allow bitwise logical operations that can be also applied to the can dlc field the privileged user root with cap net admin can create a can frame modification rule that makes the data length code a higher value than the available can frame data size in combination with a configured checksum calculation where the result is stored relatively to the end of the data e g cgw csum xor rel the tail of the skb e g frag list pointer in skb shared info can be rewritten which finally can cause a system crash because of a missing check the can drivers may write arbitrary content beyond the data registers in the can controller s i o memory when processing can gw manipulated outgoing frames publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required high user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
0
97,253
10,997,382,990
IssuesEvent
2019-12-03 09:02:37
MicrosoftDocs/mslearn-live-migrating-to-the-cloud
https://api.github.com/repos/MicrosoftDocs/mslearn-live-migrating-to-the-cloud
closed
Script for Session 2 prep
documentation
I think we could further clarify the instructions for preparing for a session to indicate a student must have already forked this repo before running the script. ``` Repository 'UpdateSiteSourceControl' operation failed with Microsoft.Web.Hosting.SourceControls.OAuthException: GitHub GetRepository: Not Found at Microsoft.Web.Hosting.SourceControls.GitHubProxy.<GetRepository>d__9.MoveNext() --- End of stack trace from previous location where exception was thrown --- at System.Runtime.ExceptionServices.ExceptionDispatchInfo.Throw() at System.Runtime.CompilerServices.TaskAwaiter.HandleNonSuccessAndDebuggerNotification(Task task) at Microsoft.Web.Hosting.Administration.GitHubSiteRepositoryProvider.<UpdateSiteSourceControl>d__3.MoveNext() --- End of stack trace from previous location where exception was thrown --- at System.Runtime.ExceptionServices.ExceptionDispatchInfo.Throw() at System.Runtime.CompilerServices.TaskAwaiter.HandleNonSuccessAndDebuggerNotification(Task task) at Microsoft.Web.Hosting.Administration.WebCloudController.<>c__DisplayClass243_1.<<UpdateSiteSourceControl>b__1>d.MoveNext() --- End of stack trace from previous location where exception was thrown --- at System.Runtime.ExceptionServices.ExceptionDispatchInfo.Throw() at System.Runtime.CompilerServices.TaskAwaiter.HandleNonSuccessAndDebuggerNotification(Task task) at Microsoft.Web.Hosting.AsyncHelper.RunSync[TResult](Func`1 func) at Microsoft.Web.Hosting.Administration.WebCloudController.UpdateSiteSourceControl(String subscriptionName, String webspaceName, String name, SiteSourceControl siteSourceControl). Done. :-) ``` If they don't they will get the error above.
1.0
Script for Session 2 prep - I think we could further clarify the instructions for preparing for a session to indicate a student must have already forked this repo before running the script. ``` Repository 'UpdateSiteSourceControl' operation failed with Microsoft.Web.Hosting.SourceControls.OAuthException: GitHub GetRepository: Not Found at Microsoft.Web.Hosting.SourceControls.GitHubProxy.<GetRepository>d__9.MoveNext() --- End of stack trace from previous location where exception was thrown --- at System.Runtime.ExceptionServices.ExceptionDispatchInfo.Throw() at System.Runtime.CompilerServices.TaskAwaiter.HandleNonSuccessAndDebuggerNotification(Task task) at Microsoft.Web.Hosting.Administration.GitHubSiteRepositoryProvider.<UpdateSiteSourceControl>d__3.MoveNext() --- End of stack trace from previous location where exception was thrown --- at System.Runtime.ExceptionServices.ExceptionDispatchInfo.Throw() at System.Runtime.CompilerServices.TaskAwaiter.HandleNonSuccessAndDebuggerNotification(Task task) at Microsoft.Web.Hosting.Administration.WebCloudController.<>c__DisplayClass243_1.<<UpdateSiteSourceControl>b__1>d.MoveNext() --- End of stack trace from previous location where exception was thrown --- at System.Runtime.ExceptionServices.ExceptionDispatchInfo.Throw() at System.Runtime.CompilerServices.TaskAwaiter.HandleNonSuccessAndDebuggerNotification(Task task) at Microsoft.Web.Hosting.AsyncHelper.RunSync[TResult](Func`1 func) at Microsoft.Web.Hosting.Administration.WebCloudController.UpdateSiteSourceControl(String subscriptionName, String webspaceName, String name, SiteSourceControl siteSourceControl). Done. :-) ``` If they don't they will get the error above.
non_priority
script for session prep i think we could further clarify the instructions for preparing for a session to indicate a student must have already forked this repo before running the script repository updatesitesourcecontrol operation failed with microsoft web hosting sourcecontrols oauthexception github getrepository not found at microsoft web hosting sourcecontrols githubproxy d movenext end of stack trace from previous location where exception was thrown at system runtime exceptionservices exceptiondispatchinfo throw at system runtime compilerservices taskawaiter handlenonsuccessanddebuggernotification task task at microsoft web hosting administration githubsiterepositoryprovider d movenext end of stack trace from previous location where exception was thrown at system runtime exceptionservices exceptiondispatchinfo throw at system runtime compilerservices taskawaiter handlenonsuccessanddebuggernotification task task at microsoft web hosting administration webcloudcontroller c b d movenext end of stack trace from previous location where exception was thrown at system runtime exceptionservices exceptiondispatchinfo throw at system runtime compilerservices taskawaiter handlenonsuccessanddebuggernotification task task at microsoft web hosting asynchelper runsync func func at microsoft web hosting administration webcloudcontroller updatesitesourcecontrol string subscriptionname string webspacename string name sitesourcecontrol sitesourcecontrol done if they don t they will get the error above
0
47,244
19,582,193,650
IssuesEvent
2022-01-04 23:12:23
elastic/kibana
https://api.github.com/repos/elastic/kibana
closed
[Security Solution] [Platform] Need to resolve action connectors
bug v8.0.0 impact:high Team:Alerting Services Feature:Detection Rules Team:Detections and Resp Feature:Rule Actions Feature:Actions/ConnectorsManagement Feature:Alerting/RuleActions v8.1.0 Team:Security Solution Platform
If an action connector is created pre-8.0 in a non-default space, that connector will have a new id generated in > 8.0 and will not be found when trying to create new rules or importing rules into the security solution with references to that action connector. 1. ~We need to expose a `resolve` function in the actions client~ 2. ~We need to update [this line](https://github.com/elastic/kibana/blob/d5e199b8da21a0946fb2c3aaea8e88c47ae5a539/x-pack/plugins/security_solution/server/lib/detection_engine/routes/rules/utils.ts#L207) in the security solution to use the `resolve` function instead of the `getAll`~ Edit: After meeting with the team looks like this should be part of the work for https://github.com/elastic/kibana/issues/118767 and involves using those same functions the SOM uses for determining conflicts and/or updating fields on import
1.0
[Security Solution] [Platform] Need to resolve action connectors - If an action connector is created pre-8.0 in a non-default space, that connector will have a new id generated in > 8.0 and will not be found when trying to create new rules or importing rules into the security solution with references to that action connector. 1. ~We need to expose a `resolve` function in the actions client~ 2. ~We need to update [this line](https://github.com/elastic/kibana/blob/d5e199b8da21a0946fb2c3aaea8e88c47ae5a539/x-pack/plugins/security_solution/server/lib/detection_engine/routes/rules/utils.ts#L207) in the security solution to use the `resolve` function instead of the `getAll`~ Edit: After meeting with the team looks like this should be part of the work for https://github.com/elastic/kibana/issues/118767 and involves using those same functions the SOM uses for determining conflicts and/or updating fields on import
non_priority
need to resolve action connectors if an action connector is created pre in a non default space that connector will have a new id generated in and will not be found when trying to create new rules or importing rules into the security solution with references to that action connector we need to expose a resolve function in the actions client we need to update in the security solution to use the resolve function instead of the getall edit after meeting with the team looks like this should be part of the work for and involves using those same functions the som uses for determining conflicts and or updating fields on import
0
321,356
23,851,387,957
IssuesEvent
2022-09-06 18:17:05
aws-amplify/amplify-js
https://api.github.com/repos/aws-amplify/amplify-js
closed
Getting "no current user" error after redirect from Cognito Hosted UI
documentation Auth
### Before opening, please confirm: - [X] I have [searched for duplicate or closed issues](https://github.com/aws-amplify/amplify-js/issues?q=is%3Aissue+) and [discussions](https://github.com/aws-amplify/amplify-js/discussions). - [X] I have read the guide for [submitting bug reports](https://github.com/aws-amplify/amplify-js/blob/main/CONTRIBUTING.md#bug-reports). - [X] I have done my best to include a minimal, self-contained set of instructions for consistently reproducing the issue. ### JavaScript Framework React ### Amplify APIs Authentication ### Amplify Categories auth ### Environment information System: OS: macOS 10.15.5 CPU: (16) x64 Intel(R) Core(TM) i9-9880H CPU @ 2.30GHz Memory: 1.86 GB / 32.00 GB Shell: 5.7.1 - /bin/zsh Binaries: Node: 17.9.0 - /usr/local/bin/node Yarn: 1.22.18 - /usr/local/bin/yarn npm: 8.5.5 - /usr/local/bin/npm Browsers: Brave Browser: 93.1.29.79 Chrome: 101.0.4951.64 Firefox: 99.0.1 Safari: 13.1.1 npmPackages: @testing-library/jest-dom: ^5.16.4 => 5.16.4 @testing-library/react: ^13.1.1 => 13.1.1 @testing-library/user-event: ^13.5.0 => 13.5.0 aws-amplify: ^4.3.18 => 4.3.22 react: ^18.1.0 => 18.1.0 react-dom: ^18.1.0 => 18.1.0 react-router-dom: ^6.3.0 => 6.3.0 react-scripts: 5.0.1 => 5.0.1 web-vitals: ^2.1.4 => 2.1.4 npmGlobalPackages: @aws-amplify/cli: 4.18.0 eslint: 7.1.0 firebase-tools: 8.1.1 gulp-cli: 2.2.1 jest: 25.1.0 knex: 0.20.8 npm: 8.5.5 ts-node: 8.6.2 typescript: 3.7.4 ### Describe the bug Hi there, I am trying to learn authentication code grant flow with Cognito Hosted UI. Everything seems working until I get redirected back to my protected page. All the /authorize, /login and /token calls are getting completed successfully. I can also confirm that I see the URL with /code parameter generated which is then redirected again. As the final step when I use await Auth.currentAuthenticatedUser(); I get an error with "no current user". So, if I am not mistaken Amplify handles all the required OAUTH calls internally which I would then expect to get an authorized user at the end. I found a similar issue from #7742 and I added `cookieStorage` object with secure flag set to `false` but it didn't work as well. Here I also attached a screenshot to show all the related oauth calls are ending with success. ![oauth_calls](https://user-images.githubusercontent.com/6500753/169400410-90789bbb-1935-4a3d-8166-a4c734152e7f.png) ### Expected behavior Getting a successfull response from Auth.currentAuthenticatedUser() function call. ### Reproduction steps See attached code. ### Code Snippet **App.js** ``` import './App.css'; import React from 'react' import Amplify from 'aws-amplify'; Amplify.configure({ Auth: { // REQUIRED - Amazon Cognito Region region: 'us-east-1', // OPTIONAL - Amazon Cognito User Pool ID userPoolId: process.env.REACT_APP_USERPOOL_ID, // OPTIONAL - Amazon Cognito Web Client ID (26-char alphanumeric string) userPoolWebClientId: process.env.REACT_APP_USERPOOL_WEB_CLIENT_ID, // OPTIONAL - Enforce user authentication prior to accessing AWS resources or not mandatorySignIn: false, // OPTIONAL - Manually set the authentication flow type. Default is 'USER_SRP_AUTH' authenticationFlowType: 'USER_PASSWORD_AUTH', // OPTIONAL - Hosted UI configuration oauth: { domain: 'belttgvsdu.auth.us-east-1.amazoncognito.com', scope: ['myresourceserver/awesomeapi.read', 'myresourceserver/awesomeapi.write'], redirectSignIn: 'http://localhost:3000/dashboard', redirectSignOut: 'http://localhost:3000', responseType: 'code' } } }); function App(props) { return ( <div className="App"> <h1>This is Landing page</h1> <a href="https://belttgvsdu.auth.us-east-1.amazoncognito.com/oauth2/authorize?client_id=3chm4jkbcn767oqu2m9icconcs&response_type=code&scope=myresourceserver%2Fawesomeapi.read+myresourceserver%2Fawesomeapi.write&redirect_uri=http%3A%2F%2Flocalhost%3A3000%2Fdashboard">Login</a> </div> ); } export default App; ``` And here is the dashboard.js to render localhost:3000/dashboard ``` import React, {useEffect, useState} from 'react'; import '../App.css'; import {Auth} from 'aws-amplify'; import {Navigate} from "react-router-dom"; function Dashboard(props) { const [user, setUser] = useState(); const [isLoading, setIsLoading] = useState(true); async function getCurrentUser() { try { const authUser = await Auth.currentAuthenticatedUser(); console.log(JSON.stringify(authUser)); setUser(authUser); } catch (e) { console.log('error happened', e); setUser(null); setIsLoading(false); } } useEffect(() => { getCurrentUser(); }, []); async function handleSignOut(event) { event.preventDefault(); try { await Auth.signOut(); } catch (error) { console.log('error signing out: ', error); } setUser(null); setIsLoading(false); } if (!user && !isLoading) { return <Navigate to="/" replace={true} /> } return ( <div className="container"> <h1>Dashboard</h1> <button onClick={handleSignOut} className="fluid ui button blue">Sign Out</button> </div> ) } export default Dashboard; ``` ### Log output <details> ``` [DEBUG] 46:04.595 Amplify - amplify config Object { Auth: {…} } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.599 AuthClass - configure Auth [ConsoleLogger.ts:115](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.599 Parser - parse config Array(3) [ {…}, "to amplifyconfig", {…} ] [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.599 Hub - Dispatching to auth with Object { event: "parsingCallbackUrl", data: {…}, message: "The callback url is being parsed" } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.600 Hub - Dispatching to auth with Object { event: "parsingCallbackUrl", data: {…}, message: "The callback url is being parsed" } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.600 AnalyticsClass - on hub capsule auth Object { event: "parsingCallbackUrl", data: {…}, message: "The callback url is being parsed" } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.600 Hub - Dispatching to auth with Object { event: "parsingCallbackUrl", data: {…}, message: "The callback url is being parsed" } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.600 Hub - Dispatching to auth with Object { event: "parsingCallbackUrl", data: {…}, message: "The callback url is being parsed" } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.601 OAuth - Starting code flow with http://localhost:3000/dashboard?code=bee663b1-49d3-4e39-b94a-7e07457c3295 [ConsoleLogger.ts:115](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.602 Hub - Dispatching to auth with Object { event: "codeFlow", data: {}, message: "Retrieving tokens from https://belttgvsdu.auth.us-east-1.amazoncognito.com/oauth2/token" } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.602 Hub - Dispatching to auth with Object { event: "codeFlow", data: {}, message: "Retrieving tokens from https://belttgvsdu.auth.us-east-1.amazoncognito.com/oauth2/token" } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.602 AnalyticsClass - on hub capsule auth Object { event: "codeFlow", data: {}, message: "Retrieving tokens from https://belttgvsdu.auth.us-east-1.amazoncognito.com/oauth2/token" } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.602 Hub - Dispatching to auth with Object { event: "codeFlow", data: {}, message: "Retrieving tokens from https://belttgvsdu.auth.us-east-1.amazoncognito.com/oauth2/token" } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.604 Hub - Dispatching to auth with Object { event: "codeFlow", data: {}, message: "Retrieving tokens from https://belttgvsdu.auth.us-east-1.amazoncognito.com/oauth2/token" } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.604 OAuth - Calling token endpoint: https://belttgvsdu.auth.us-east-1.amazoncognito.com/oauth2/token with Object { grant_type: "authorization_code", code: "bee663b1-49d3-4e39-b94a-7e07457c3295", client_id: "3chm4jkbcn767oqu2m9icconcs", redirect_uri: "http://localhost:3000/dashboard" } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.604 Hub - Dispatching to auth with Object { event: "configured", data: null, message: "The Auth category has been configured successfully" } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.605 Hub - Dispatching to auth with Object { event: "configured", data: null, message: "The Auth category has been configured successfully" } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.605 AnalyticsClass - on hub capsule auth Object { event: "configured", data: null, message: "The Auth category has been configured successfully" } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.605 Hub - Dispatching to auth with Object { event: "configured", data: null, message: "The Auth category has been configured successfully" } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.605 Hub - Dispatching to auth with Object { event: "configured", data: null, message: "The Auth category has been configured successfully" } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.606 AnalyticsClass - configure Analytics Object { Auth: {…} } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.606 Parser - parse config Array(3) [ {…}, "to amplifyconfig", {…} ] [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.606 AWSPinpointProvider - configure Analytics Object { disabled: undefined, autoSessionRecord: true, Auth: {…} } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.606 Hub - Dispatching to analytics with Object { event: "configured", data: null, message: "The Analytics category has been configured successfully" } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.607 AnalyticsClass - on hub capsule analytics Object { event: "configured", data: null, message: "The Analytics category has been configured successfully" } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.607 AnalyticsClass - current configuration Object { autoSessionRecord: true, Auth: {…} } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.607 Storage - storage configure called [ConsoleLogger.ts:115](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.607 StorageClass - configure Storage [ConsoleLogger.ts:115](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.607 Parser - parse config Array(3) [ {…}, "to amplifyconfig", {…} ] [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.608 AWSS3Provider - configure Storage undefined [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.608 Storage - storage vault configure called [ConsoleLogger.ts:115](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.608 StorageClass - configure Storage [ConsoleLogger.ts:115](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.608 Parser - parse config Array(3) [ {…}, "to amplifyconfig", {…} ] [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.608 AWSS3Provider - configure Storage undefined [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.609 RestAPI - configure Rest API Object { opt: {…} } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.609 RestAPI - create Rest API instance [ConsoleLogger.ts:115](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.609 RestClient - API Options Object { endpoints: [], Auth: {…} } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.609 I18n - configure I18n [ConsoleLogger.ts:115](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.609 I18n - create I18n instance [ConsoleLogger.ts:115](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.609 PubSub - configure PubSub Object { opt: {…} } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.609 GraphQLAPI - configure GraphQL API Object { opt: {…} } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.609 GraphQLAPI - create Rest instance [ConsoleLogger.ts:115](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.609 RestClient - API Options Object { Auth: {…} } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.610 RestAPI - configure Rest API Object { opt: {…} } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.610 RestAPI - create Rest API instance [ConsoleLogger.ts:115](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.610 RestClient - API Options Object { endpoints: [], Auth: {…} } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.610 GraphQLAPI - configure GraphQL API Object { opt: {…} } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.610 GraphQLAPI - create Rest instance [ConsoleLogger.ts:115](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.610 RestClient - API Options Object { Auth: {…} } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.611 Interactions - configure Interactions Object { opt: {…} } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.611 XR - configure XR Object { opt: {…} } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.611 AbstractXRProvider - configure SumerianProvider Object { Auth: {…} } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.611 Predictions - configure Predictions Object { Auth: {…} } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.612 Geo - configure Geo [ConsoleLogger.ts:115](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.612 Parser - parse config Array(3) [ {…}, "to amplifyconfig", {…} ] [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.613 AmazonLocationServiceProvider - configure Amazon Location Service Provider undefined [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.624 AuthClass - getting current authenticated user [ConsoleLogger.ts:115](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.625 AuthClass - getting current authenticated user [ConsoleLogger.ts:115](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.626 AuthClass - get current authenticated userpool user 2 [ConsoleLogger.ts:115](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.626 AuthClass - OAuth signIn in progress, waiting for resolution... 2 [ConsoleLogger.ts:115](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.957 AuthClass - Error in cognito hosted auth response Error: Username and Pool information are required. CognitoUser CognitoUser.js:73 node_modules bundle.js:11432 node_modules bundle.js:11330 step bundle.js:8399 node_modules bundle.js:8330 fulfilled bundle.js:8284 promise callback*step bundle.js:8299 node_modules bundle.js:8302 node_modules bundle.js:8281 node_modules bundle.js:11243 node_modules bundle.js:8623 __WEBPACK_DEFAULT_EXPORT__ urlListener.ts:19 node_modules bundle.js:8614 node_modules bundle.js:14378 node_modules bundle.js:14377 js App.js:7 factory react refresh:6 Webpack 7 [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.957 Hub - Dispatching to auth with Object { event: "signIn_failure", data: Error, message: "The OAuth response flow failed" } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.957 Hub - Dispatching to auth with Object { event: "signIn_failure", data: Error, message: "The OAuth response flow failed" } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.958 AnalyticsClass - on hub capsule auth Object { event: "signIn_failure", data: Error, message: "The OAuth response flow failed" } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.958 Hub - Dispatching to auth with Object { event: "signIn_failure", data: Error, message: "The OAuth response flow failed" } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.959 Hub - Dispatching to auth with Object { event: "signIn_failure", data: Error, message: "The OAuth response flow failed" } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.959 Hub - Dispatching to auth with Object { event: "signIn_failure", data: Error, message: "The OAuth response flow failed" } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.959 Hub - Dispatching to auth with Object { event: "signIn_failure", data: Error, message: "The OAuth response flow failed" } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.959 Hub - Dispatching to auth with Object { event: "cognitoHostedUI_failure", data: Error, message: "A failure occurred when returning to the Cognito Hosted UI" } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.960 Hub - Dispatching to auth with Object { event: "cognitoHostedUI_failure", data: Error, message: "A failure occurred when returning to the Cognito Hosted UI" } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.960 AnalyticsClass - on hub capsule auth Object { event: "cognitoHostedUI_failure", data: Error, message: "A failure occurred when returning to the Cognito Hosted UI" } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.961 Hub - Dispatching to auth with Object { event: "cognitoHostedUI_failure", data: Error, message: "A failure occurred when returning to the Cognito Hosted UI" } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.962 Hub - Dispatching to auth with Object { event: "cognitoHostedUI_failure", data: Error, message: "A failure occurred when returning to the Cognito Hosted UI" } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.962 Hub - Dispatching to auth with Object { event: "cognitoHostedUI_failure", data: Error, message: "A failure occurred when returning to the Cognito Hosted UI" } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.963 AuthClass - OAuth signIn resolved: cognitoHostedUI_failure [ConsoleLogger.ts:115](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.963 Hub - Dispatching to auth with Object { event: "cognitoHostedUI_failure", data: Error, message: "A failure occurred when returning to the Cognito Hosted UI" } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.964 AuthClass - OAuth signIn resolved: cognitoHostedUI_failure [ConsoleLogger.ts:115](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.964 Hub - Dispatching to auth with Object { event: "customState_failure", data: Error, message: "A failure occurred when returning state" } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.964 Hub - Dispatching to auth with Object { event: "customState_failure", data: Error, message: "A failure occurred when returning state" } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.964 AnalyticsClass - on hub capsule auth Object { event: "customState_failure", data: Error, message: "A failure occurred when returning state" } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.964 Hub - Dispatching to auth with Object { event: "customState_failure", data: Error, message: "A failure occurred when returning state" } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.965 Hub - Dispatching to auth with Object { event: "customState_failure", data: Error, message: "A failure occurred when returning state" } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.965 AuthClass - Failed to get user from user pool 2 [ConsoleLogger.ts:115](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.965 AuthClass - The user is not authenticated by the error No current user 2 [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) error happened The user is not authenticated 2 [Dashboard.js:18](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/src/components/Dashboard.js) ``` </details> ### aws-exports.js _No response_ ### Manual configuration _No response_ ### Additional configuration _No response_ ### Mobile Device _No response_ ### Mobile Operating System _No response_ ### Mobile Browser _No response_ ### Mobile Browser Version _No response_ ### Additional information and screenshots _No response_
1.0
Getting "no current user" error after redirect from Cognito Hosted UI - ### Before opening, please confirm: - [X] I have [searched for duplicate or closed issues](https://github.com/aws-amplify/amplify-js/issues?q=is%3Aissue+) and [discussions](https://github.com/aws-amplify/amplify-js/discussions). - [X] I have read the guide for [submitting bug reports](https://github.com/aws-amplify/amplify-js/blob/main/CONTRIBUTING.md#bug-reports). - [X] I have done my best to include a minimal, self-contained set of instructions for consistently reproducing the issue. ### JavaScript Framework React ### Amplify APIs Authentication ### Amplify Categories auth ### Environment information System: OS: macOS 10.15.5 CPU: (16) x64 Intel(R) Core(TM) i9-9880H CPU @ 2.30GHz Memory: 1.86 GB / 32.00 GB Shell: 5.7.1 - /bin/zsh Binaries: Node: 17.9.0 - /usr/local/bin/node Yarn: 1.22.18 - /usr/local/bin/yarn npm: 8.5.5 - /usr/local/bin/npm Browsers: Brave Browser: 93.1.29.79 Chrome: 101.0.4951.64 Firefox: 99.0.1 Safari: 13.1.1 npmPackages: @testing-library/jest-dom: ^5.16.4 => 5.16.4 @testing-library/react: ^13.1.1 => 13.1.1 @testing-library/user-event: ^13.5.0 => 13.5.0 aws-amplify: ^4.3.18 => 4.3.22 react: ^18.1.0 => 18.1.0 react-dom: ^18.1.0 => 18.1.0 react-router-dom: ^6.3.0 => 6.3.0 react-scripts: 5.0.1 => 5.0.1 web-vitals: ^2.1.4 => 2.1.4 npmGlobalPackages: @aws-amplify/cli: 4.18.0 eslint: 7.1.0 firebase-tools: 8.1.1 gulp-cli: 2.2.1 jest: 25.1.0 knex: 0.20.8 npm: 8.5.5 ts-node: 8.6.2 typescript: 3.7.4 ### Describe the bug Hi there, I am trying to learn authentication code grant flow with Cognito Hosted UI. Everything seems working until I get redirected back to my protected page. All the /authorize, /login and /token calls are getting completed successfully. I can also confirm that I see the URL with /code parameter generated which is then redirected again. As the final step when I use await Auth.currentAuthenticatedUser(); I get an error with "no current user". So, if I am not mistaken Amplify handles all the required OAUTH calls internally which I would then expect to get an authorized user at the end. I found a similar issue from #7742 and I added `cookieStorage` object with secure flag set to `false` but it didn't work as well. Here I also attached a screenshot to show all the related oauth calls are ending with success. ![oauth_calls](https://user-images.githubusercontent.com/6500753/169400410-90789bbb-1935-4a3d-8166-a4c734152e7f.png) ### Expected behavior Getting a successfull response from Auth.currentAuthenticatedUser() function call. ### Reproduction steps See attached code. ### Code Snippet **App.js** ``` import './App.css'; import React from 'react' import Amplify from 'aws-amplify'; Amplify.configure({ Auth: { // REQUIRED - Amazon Cognito Region region: 'us-east-1', // OPTIONAL - Amazon Cognito User Pool ID userPoolId: process.env.REACT_APP_USERPOOL_ID, // OPTIONAL - Amazon Cognito Web Client ID (26-char alphanumeric string) userPoolWebClientId: process.env.REACT_APP_USERPOOL_WEB_CLIENT_ID, // OPTIONAL - Enforce user authentication prior to accessing AWS resources or not mandatorySignIn: false, // OPTIONAL - Manually set the authentication flow type. Default is 'USER_SRP_AUTH' authenticationFlowType: 'USER_PASSWORD_AUTH', // OPTIONAL - Hosted UI configuration oauth: { domain: 'belttgvsdu.auth.us-east-1.amazoncognito.com', scope: ['myresourceserver/awesomeapi.read', 'myresourceserver/awesomeapi.write'], redirectSignIn: 'http://localhost:3000/dashboard', redirectSignOut: 'http://localhost:3000', responseType: 'code' } } }); function App(props) { return ( <div className="App"> <h1>This is Landing page</h1> <a href="https://belttgvsdu.auth.us-east-1.amazoncognito.com/oauth2/authorize?client_id=3chm4jkbcn767oqu2m9icconcs&response_type=code&scope=myresourceserver%2Fawesomeapi.read+myresourceserver%2Fawesomeapi.write&redirect_uri=http%3A%2F%2Flocalhost%3A3000%2Fdashboard">Login</a> </div> ); } export default App; ``` And here is the dashboard.js to render localhost:3000/dashboard ``` import React, {useEffect, useState} from 'react'; import '../App.css'; import {Auth} from 'aws-amplify'; import {Navigate} from "react-router-dom"; function Dashboard(props) { const [user, setUser] = useState(); const [isLoading, setIsLoading] = useState(true); async function getCurrentUser() { try { const authUser = await Auth.currentAuthenticatedUser(); console.log(JSON.stringify(authUser)); setUser(authUser); } catch (e) { console.log('error happened', e); setUser(null); setIsLoading(false); } } useEffect(() => { getCurrentUser(); }, []); async function handleSignOut(event) { event.preventDefault(); try { await Auth.signOut(); } catch (error) { console.log('error signing out: ', error); } setUser(null); setIsLoading(false); } if (!user && !isLoading) { return <Navigate to="/" replace={true} /> } return ( <div className="container"> <h1>Dashboard</h1> <button onClick={handleSignOut} className="fluid ui button blue">Sign Out</button> </div> ) } export default Dashboard; ``` ### Log output <details> ``` [DEBUG] 46:04.595 Amplify - amplify config Object { Auth: {…} } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.599 AuthClass - configure Auth [ConsoleLogger.ts:115](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.599 Parser - parse config Array(3) [ {…}, "to amplifyconfig", {…} ] [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.599 Hub - Dispatching to auth with Object { event: "parsingCallbackUrl", data: {…}, message: "The callback url is being parsed" } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.600 Hub - Dispatching to auth with Object { event: "parsingCallbackUrl", data: {…}, message: "The callback url is being parsed" } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.600 AnalyticsClass - on hub capsule auth Object { event: "parsingCallbackUrl", data: {…}, message: "The callback url is being parsed" } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.600 Hub - Dispatching to auth with Object { event: "parsingCallbackUrl", data: {…}, message: "The callback url is being parsed" } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.600 Hub - Dispatching to auth with Object { event: "parsingCallbackUrl", data: {…}, message: "The callback url is being parsed" } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.601 OAuth - Starting code flow with http://localhost:3000/dashboard?code=bee663b1-49d3-4e39-b94a-7e07457c3295 [ConsoleLogger.ts:115](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.602 Hub - Dispatching to auth with Object { event: "codeFlow", data: {}, message: "Retrieving tokens from https://belttgvsdu.auth.us-east-1.amazoncognito.com/oauth2/token" } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.602 Hub - Dispatching to auth with Object { event: "codeFlow", data: {}, message: "Retrieving tokens from https://belttgvsdu.auth.us-east-1.amazoncognito.com/oauth2/token" } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.602 AnalyticsClass - on hub capsule auth Object { event: "codeFlow", data: {}, message: "Retrieving tokens from https://belttgvsdu.auth.us-east-1.amazoncognito.com/oauth2/token" } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.602 Hub - Dispatching to auth with Object { event: "codeFlow", data: {}, message: "Retrieving tokens from https://belttgvsdu.auth.us-east-1.amazoncognito.com/oauth2/token" } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.604 Hub - Dispatching to auth with Object { event: "codeFlow", data: {}, message: "Retrieving tokens from https://belttgvsdu.auth.us-east-1.amazoncognito.com/oauth2/token" } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.604 OAuth - Calling token endpoint: https://belttgvsdu.auth.us-east-1.amazoncognito.com/oauth2/token with Object { grant_type: "authorization_code", code: "bee663b1-49d3-4e39-b94a-7e07457c3295", client_id: "3chm4jkbcn767oqu2m9icconcs", redirect_uri: "http://localhost:3000/dashboard" } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.604 Hub - Dispatching to auth with Object { event: "configured", data: null, message: "The Auth category has been configured successfully" } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.605 Hub - Dispatching to auth with Object { event: "configured", data: null, message: "The Auth category has been configured successfully" } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.605 AnalyticsClass - on hub capsule auth Object { event: "configured", data: null, message: "The Auth category has been configured successfully" } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.605 Hub - Dispatching to auth with Object { event: "configured", data: null, message: "The Auth category has been configured successfully" } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.605 Hub - Dispatching to auth with Object { event: "configured", data: null, message: "The Auth category has been configured successfully" } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.606 AnalyticsClass - configure Analytics Object { Auth: {…} } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.606 Parser - parse config Array(3) [ {…}, "to amplifyconfig", {…} ] [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.606 AWSPinpointProvider - configure Analytics Object { disabled: undefined, autoSessionRecord: true, Auth: {…} } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.606 Hub - Dispatching to analytics with Object { event: "configured", data: null, message: "The Analytics category has been configured successfully" } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.607 AnalyticsClass - on hub capsule analytics Object { event: "configured", data: null, message: "The Analytics category has been configured successfully" } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.607 AnalyticsClass - current configuration Object { autoSessionRecord: true, Auth: {…} } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.607 Storage - storage configure called [ConsoleLogger.ts:115](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.607 StorageClass - configure Storage [ConsoleLogger.ts:115](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.607 Parser - parse config Array(3) [ {…}, "to amplifyconfig", {…} ] [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.608 AWSS3Provider - configure Storage undefined [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.608 Storage - storage vault configure called [ConsoleLogger.ts:115](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.608 StorageClass - configure Storage [ConsoleLogger.ts:115](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.608 Parser - parse config Array(3) [ {…}, "to amplifyconfig", {…} ] [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.608 AWSS3Provider - configure Storage undefined [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.609 RestAPI - configure Rest API Object { opt: {…} } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.609 RestAPI - create Rest API instance [ConsoleLogger.ts:115](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.609 RestClient - API Options Object { endpoints: [], Auth: {…} } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.609 I18n - configure I18n [ConsoleLogger.ts:115](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.609 I18n - create I18n instance [ConsoleLogger.ts:115](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.609 PubSub - configure PubSub Object { opt: {…} } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.609 GraphQLAPI - configure GraphQL API Object { opt: {…} } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.609 GraphQLAPI - create Rest instance [ConsoleLogger.ts:115](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.609 RestClient - API Options Object { Auth: {…} } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.610 RestAPI - configure Rest API Object { opt: {…} } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.610 RestAPI - create Rest API instance [ConsoleLogger.ts:115](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.610 RestClient - API Options Object { endpoints: [], Auth: {…} } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.610 GraphQLAPI - configure GraphQL API Object { opt: {…} } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.610 GraphQLAPI - create Rest instance [ConsoleLogger.ts:115](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.610 RestClient - API Options Object { Auth: {…} } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.611 Interactions - configure Interactions Object { opt: {…} } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.611 XR - configure XR Object { opt: {…} } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.611 AbstractXRProvider - configure SumerianProvider Object { Auth: {…} } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.611 Predictions - configure Predictions Object { Auth: {…} } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.612 Geo - configure Geo [ConsoleLogger.ts:115](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.612 Parser - parse config Array(3) [ {…}, "to amplifyconfig", {…} ] [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.613 AmazonLocationServiceProvider - configure Amazon Location Service Provider undefined [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.624 AuthClass - getting current authenticated user [ConsoleLogger.ts:115](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.625 AuthClass - getting current authenticated user [ConsoleLogger.ts:115](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.626 AuthClass - get current authenticated userpool user 2 [ConsoleLogger.ts:115](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.626 AuthClass - OAuth signIn in progress, waiting for resolution... 2 [ConsoleLogger.ts:115](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.957 AuthClass - Error in cognito hosted auth response Error: Username and Pool information are required. CognitoUser CognitoUser.js:73 node_modules bundle.js:11432 node_modules bundle.js:11330 step bundle.js:8399 node_modules bundle.js:8330 fulfilled bundle.js:8284 promise callback*step bundle.js:8299 node_modules bundle.js:8302 node_modules bundle.js:8281 node_modules bundle.js:11243 node_modules bundle.js:8623 __WEBPACK_DEFAULT_EXPORT__ urlListener.ts:19 node_modules bundle.js:8614 node_modules bundle.js:14378 node_modules bundle.js:14377 js App.js:7 factory react refresh:6 Webpack 7 [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.957 Hub - Dispatching to auth with Object { event: "signIn_failure", data: Error, message: "The OAuth response flow failed" } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.957 Hub - Dispatching to auth with Object { event: "signIn_failure", data: Error, message: "The OAuth response flow failed" } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.958 AnalyticsClass - on hub capsule auth Object { event: "signIn_failure", data: Error, message: "The OAuth response flow failed" } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.958 Hub - Dispatching to auth with Object { event: "signIn_failure", data: Error, message: "The OAuth response flow failed" } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.959 Hub - Dispatching to auth with Object { event: "signIn_failure", data: Error, message: "The OAuth response flow failed" } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.959 Hub - Dispatching to auth with Object { event: "signIn_failure", data: Error, message: "The OAuth response flow failed" } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.959 Hub - Dispatching to auth with Object { event: "signIn_failure", data: Error, message: "The OAuth response flow failed" } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.959 Hub - Dispatching to auth with Object { event: "cognitoHostedUI_failure", data: Error, message: "A failure occurred when returning to the Cognito Hosted UI" } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.960 Hub - Dispatching to auth with Object { event: "cognitoHostedUI_failure", data: Error, message: "A failure occurred when returning to the Cognito Hosted UI" } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.960 AnalyticsClass - on hub capsule auth Object { event: "cognitoHostedUI_failure", data: Error, message: "A failure occurred when returning to the Cognito Hosted UI" } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.961 Hub - Dispatching to auth with Object { event: "cognitoHostedUI_failure", data: Error, message: "A failure occurred when returning to the Cognito Hosted UI" } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.962 Hub - Dispatching to auth with Object { event: "cognitoHostedUI_failure", data: Error, message: "A failure occurred when returning to the Cognito Hosted UI" } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.962 Hub - Dispatching to auth with Object { event: "cognitoHostedUI_failure", data: Error, message: "A failure occurred when returning to the Cognito Hosted UI" } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.963 AuthClass - OAuth signIn resolved: cognitoHostedUI_failure [ConsoleLogger.ts:115](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.963 Hub - Dispatching to auth with Object { event: "cognitoHostedUI_failure", data: Error, message: "A failure occurred when returning to the Cognito Hosted UI" } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.964 AuthClass - OAuth signIn resolved: cognitoHostedUI_failure [ConsoleLogger.ts:115](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.964 Hub - Dispatching to auth with Object { event: "customState_failure", data: Error, message: "A failure occurred when returning state" } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.964 Hub - Dispatching to auth with Object { event: "customState_failure", data: Error, message: "A failure occurred when returning state" } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.964 AnalyticsClass - on hub capsule auth Object { event: "customState_failure", data: Error, message: "A failure occurred when returning state" } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.964 Hub - Dispatching to auth with Object { event: "customState_failure", data: Error, message: "A failure occurred when returning state" } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.965 Hub - Dispatching to auth with Object { event: "customState_failure", data: Error, message: "A failure occurred when returning state" } [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.965 AuthClass - Failed to get user from user pool 2 [ConsoleLogger.ts:115](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) [DEBUG] 46:04.965 AuthClass - The user is not authenticated by the error No current user 2 [ConsoleLogger.ts:125](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/node_modules/@aws-amplify/core/src/Logger/ConsoleLogger.ts) error happened The user is not authenticated 2 [Dashboard.js:18](http://localhost:3000/Users/buraktas/aws-cognito-hosted-ui-react/src/components/Dashboard.js) ``` </details> ### aws-exports.js _No response_ ### Manual configuration _No response_ ### Additional configuration _No response_ ### Mobile Device _No response_ ### Mobile Operating System _No response_ ### Mobile Browser _No response_ ### Mobile Browser Version _No response_ ### Additional information and screenshots _No response_
non_priority
getting no current user error after redirect from cognito hosted ui before opening please confirm i have and i have read the guide for i have done my best to include a minimal self contained set of instructions for consistently reproducing the issue javascript framework react amplify apis authentication amplify categories auth environment information system os macos cpu intel r core tm cpu memory gb gb shell bin zsh binaries node usr local bin node yarn usr local bin yarn npm usr local bin npm browsers brave browser chrome firefox safari npmpackages testing library jest dom testing library react testing library user event aws amplify react react dom react router dom react scripts web vitals npmglobalpackages aws amplify cli eslint firebase tools gulp cli jest knex npm ts node typescript describe the bug hi there i am trying to learn authentication code grant flow with cognito hosted ui everything seems working until i get redirected back to my protected page all the authorize login and token calls are getting completed successfully i can also confirm that i see the url with code parameter generated which is then redirected again as the final step when i use await auth currentauthenticateduser i get an error with no current user so if i am not mistaken amplify handles all the required oauth calls internally which i would then expect to get an authorized user at the end i found a similar issue from and i added cookiestorage object with secure flag set to false but it didn t work as well here i also attached a screenshot to show all the related oauth calls are ending with success expected behavior getting a successfull response from auth currentauthenticateduser function call reproduction steps see attached code code snippet app js import app css import react from react import amplify from aws amplify amplify configure auth required amazon cognito region region us east optional amazon cognito user pool id userpoolid process env react app userpool id optional amazon cognito web client id char alphanumeric string userpoolwebclientid process env react app userpool web client id optional enforce user authentication prior to accessing aws resources or not mandatorysignin false optional manually set the authentication flow type default is user srp auth authenticationflowtype user password auth optional hosted ui configuration oauth domain belttgvsdu auth us east amazoncognito com scope redirectsignin redirectsignout responsetype code function app props return this is landing page a href export default app and here is the dashboard js to render localhost dashboard import react useeffect usestate from react import app css import auth from aws amplify import navigate from react router dom function dashboard props const usestate const usestate true async function getcurrentuser try const authuser await auth currentauthenticateduser console log json stringify authuser setuser authuser catch e console log error happened e setuser null setisloading false useeffect getcurrentuser async function handlesignout event event preventdefault try await auth signout catch error console log error signing out error setuser null setisloading false if user isloading return return dashboard sign out export default dashboard log output amplify amplify config object auth … authclass configure auth parser parse config array hub dispatching to auth with object event parsingcallbackurl data … message the callback url is being parsed hub dispatching to auth with object event parsingcallbackurl data … message the callback url is being parsed analyticsclass on hub capsule auth object event parsingcallbackurl data … message the callback url is being parsed hub dispatching to auth with object event parsingcallbackurl data … message the callback url is being parsed hub dispatching to auth with object event parsingcallbackurl data … message the callback url is being parsed oauth starting code flow with hub dispatching to auth with object event codeflow data message retrieving tokens from hub dispatching to auth with object event codeflow data message retrieving tokens from analyticsclass on hub capsule auth object event codeflow data message retrieving tokens from hub dispatching to auth with object event codeflow data message retrieving tokens from hub dispatching to auth with object event codeflow data message retrieving tokens from oauth calling token endpoint with object grant type authorization code code client id redirect uri hub dispatching to auth with object event configured data null message the auth category has been configured successfully hub dispatching to auth with object event configured data null message the auth category has been configured successfully analyticsclass on hub capsule auth object event configured data null message the auth category has been configured successfully hub dispatching to auth with object event configured data null message the auth category has been configured successfully hub dispatching to auth with object event configured data null message the auth category has been configured successfully analyticsclass configure analytics object auth … parser parse config array awspinpointprovider configure analytics object disabled undefined autosessionrecord true auth … hub dispatching to analytics with object event configured data null message the analytics category has been configured successfully analyticsclass on hub capsule analytics object event configured data null message the analytics category has been configured successfully analyticsclass current configuration object autosessionrecord true auth … storage storage configure called storageclass configure storage parser parse config array configure storage undefined storage storage vault configure called storageclass configure storage parser parse config array configure storage undefined restapi configure rest api object opt … restapi create rest api instance restclient api options object endpoints auth … configure create instance pubsub configure pubsub object opt … graphqlapi configure graphql api object opt … graphqlapi create rest instance restclient api options object auth … restapi configure rest api object opt … restapi create rest api instance restclient api options object endpoints auth … graphqlapi configure graphql api object opt … graphqlapi create rest instance restclient api options object auth … interactions configure interactions object opt … xr configure xr object opt … abstractxrprovider configure sumerianprovider object auth … predictions configure predictions object auth … geo configure geo parser parse config array amazonlocationserviceprovider configure amazon location service provider undefined authclass getting current authenticated user authclass getting current authenticated user authclass get current authenticated userpool user authclass oauth signin in progress waiting for resolution authclass error in cognito hosted auth response error username and pool information are required cognitouser cognitouser js node modules bundle js node modules bundle js step bundle js node modules bundle js fulfilled bundle js promise callback step bundle js node modules bundle js node modules bundle js node modules bundle js node modules bundle js webpack default export urllistener ts node modules bundle js node modules bundle js node modules bundle js js app js factory react refresh webpack hub dispatching to auth with object event signin failure data error message the oauth response flow failed hub dispatching to auth with object event signin failure data error message the oauth response flow failed analyticsclass on hub capsule auth object event signin failure data error message the oauth response flow failed hub dispatching to auth with object event signin failure data error message the oauth response flow failed hub dispatching to auth with object event signin failure data error message the oauth response flow failed hub dispatching to auth with object event signin failure data error message the oauth response flow failed hub dispatching to auth with object event signin failure data error message the oauth response flow failed hub dispatching to auth with object event cognitohostedui failure data error message a failure occurred when returning to the cognito hosted ui hub dispatching to auth with object event cognitohostedui failure data error message a failure occurred when returning to the cognito hosted ui analyticsclass on hub capsule auth object event cognitohostedui failure data error message a failure occurred when returning to the cognito hosted ui hub dispatching to auth with object event cognitohostedui failure data error message a failure occurred when returning to the cognito hosted ui hub dispatching to auth with object event cognitohostedui failure data error message a failure occurred when returning to the cognito hosted ui hub dispatching to auth with object event cognitohostedui failure data error message a failure occurred when returning to the cognito hosted ui authclass oauth signin resolved cognitohostedui failure hub dispatching to auth with object event cognitohostedui failure data error message a failure occurred when returning to the cognito hosted ui authclass oauth signin resolved cognitohostedui failure hub dispatching to auth with object event customstate failure data error message a failure occurred when returning state hub dispatching to auth with object event customstate failure data error message a failure occurred when returning state analyticsclass on hub capsule auth object event customstate failure data error message a failure occurred when returning state hub dispatching to auth with object event customstate failure data error message a failure occurred when returning state hub dispatching to auth with object event customstate failure data error message a failure occurred when returning state authclass failed to get user from user pool authclass the user is not authenticated by the error no current user error happened the user is not authenticated aws exports js no response manual configuration no response additional configuration no response mobile device no response mobile operating system no response mobile browser no response mobile browser version no response additional information and screenshots no response
0
5,293
26,747,884,224
IssuesEvent
2023-01-30 17:13:58
mozilla/foundation.mozilla.org
https://api.github.com/repos/mozilla/foundation.mozilla.org
opened
"optimize:css:copy" task is not working
bug 🦠 engineering maintain
### Describe the bug "optimize:css:copy" task is not working ### To Reproduce Steps to reproduce the behavior: 1. run `docker-compose up` 2. observe error ### Expected behavior No errors ### Screenshots <img width="1326" alt="image" src="https://user-images.githubusercontent.com/2896608/215546456-04c9b7ba-278b-4827-852c-7d514b12d54b.png">
True
"optimize:css:copy" task is not working - ### Describe the bug "optimize:css:copy" task is not working ### To Reproduce Steps to reproduce the behavior: 1. run `docker-compose up` 2. observe error ### Expected behavior No errors ### Screenshots <img width="1326" alt="image" src="https://user-images.githubusercontent.com/2896608/215546456-04c9b7ba-278b-4827-852c-7d514b12d54b.png">
non_priority
optimize css copy task is not working describe the bug optimize css copy task is not working to reproduce steps to reproduce the behavior run docker compose up observe error expected behavior no errors screenshots img width alt image src
0
25,648
11,204,934,236
IssuesEvent
2020-01-05 10:29:50
logzio/microsoft-graph
https://api.github.com/repos/logzio/microsoft-graph
closed
CVE-2019-16942 (High) detected in jackson-databind-2.9.9.3.jar
security vulnerability
## CVE-2019-16942 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.9.9.3.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /tmp/ws-scm/microsoft-graph/pom.xml</p> <p>Path to vulnerable library: epository/com/fasterxml/jackson/core/jackson-databind/2.9.9.3/jackson-databind-2.9.9.3.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.9.9.3.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/logzio/microsoft-graph/commit/1ecd600ab1aa22efd25dcf4813063e893a4f829f">1ecd600ab1aa22efd25dcf4813063e893a4f829f</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the commons-dbcp (1.4) jar in the classpath, and an attacker can find an RMI service endpoint to access, it is possible to make the service execute a malicious payload. This issue exists because of org.apache.commons.dbcp.datasources.SharedPoolDataSource and org.apache.commons.dbcp.datasources.PerUserPoolDataSource mishandling. <p>Publish Date: 2019-10-01 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-16942>CVE-2019-16942</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16942">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16942</a></p> <p>Release Date: 2019-10-01</p> <p>Fix Resolution: 2.10.0.pr1</p> </p> </details> <p></p> *** <!-- REMEDIATE-OPEN-PR-START --> - [ ] Check this box to open an automated fix PR <!-- REMEDIATE-OPEN-PR-END --> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.9.9.3","isTransitiveDependency":false,"dependencyTree":"com.fasterxml.jackson.core:jackson-databind:2.9.9.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"2.10.0.pr1"}],"vulnerabilityIdentifier":"CVE-2019-16942","vulnerabilityDetails":"A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the commons-dbcp (1.4) jar in the classpath, and an attacker can find an RMI service endpoint to access, it is possible to make the service execute a malicious payload. This issue exists because of org.apache.commons.dbcp.datasources.SharedPoolDataSource and org.apache.commons.dbcp.datasources.PerUserPoolDataSource mishandling.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-16942","cvss3Severity":"high","cvss3Score":"9.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> -->
True
CVE-2019-16942 (High) detected in jackson-databind-2.9.9.3.jar - ## CVE-2019-16942 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.9.9.3.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /tmp/ws-scm/microsoft-graph/pom.xml</p> <p>Path to vulnerable library: epository/com/fasterxml/jackson/core/jackson-databind/2.9.9.3/jackson-databind-2.9.9.3.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.9.9.3.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/logzio/microsoft-graph/commit/1ecd600ab1aa22efd25dcf4813063e893a4f829f">1ecd600ab1aa22efd25dcf4813063e893a4f829f</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the commons-dbcp (1.4) jar in the classpath, and an attacker can find an RMI service endpoint to access, it is possible to make the service execute a malicious payload. This issue exists because of org.apache.commons.dbcp.datasources.SharedPoolDataSource and org.apache.commons.dbcp.datasources.PerUserPoolDataSource mishandling. <p>Publish Date: 2019-10-01 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-16942>CVE-2019-16942</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16942">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16942</a></p> <p>Release Date: 2019-10-01</p> <p>Fix Resolution: 2.10.0.pr1</p> </p> </details> <p></p> *** <!-- REMEDIATE-OPEN-PR-START --> - [ ] Check this box to open an automated fix PR <!-- REMEDIATE-OPEN-PR-END --> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.9.9.3","isTransitiveDependency":false,"dependencyTree":"com.fasterxml.jackson.core:jackson-databind:2.9.9.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"2.10.0.pr1"}],"vulnerabilityIdentifier":"CVE-2019-16942","vulnerabilityDetails":"A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the commons-dbcp (1.4) jar in the classpath, and an attacker can find an RMI service endpoint to access, it is possible to make the service execute a malicious payload. This issue exists because of org.apache.commons.dbcp.datasources.SharedPoolDataSource and org.apache.commons.dbcp.datasources.PerUserPoolDataSource mishandling.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-16942","cvss3Severity":"high","cvss3Score":"9.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> -->
non_priority
cve high detected in jackson databind jar cve high severity vulnerability vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file tmp ws scm microsoft graph pom xml path to vulnerable library epository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy x jackson databind jar vulnerable library found in head commit a href vulnerability details a polymorphic typing issue was discovered in fasterxml jackson databind through when default typing is enabled either globally or for a specific property for an externally exposed json endpoint and the service has the commons dbcp jar in the classpath and an attacker can find an rmi service endpoint to access it is possible to make the service execute a malicious payload this issue exists because of org apache commons dbcp datasources sharedpooldatasource and org apache commons dbcp datasources peruserpooldatasource mishandling publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution check this box to open an automated fix pr isopenpronvulnerability false ispackagebased true isdefaultbranch true packages vulnerabilityidentifier cve vulnerabilitydetails a polymorphic typing issue was discovered in fasterxml jackson databind through when default typing is enabled either globally or for a specific property for an externally exposed json endpoint and the service has the commons dbcp jar in the classpath and an attacker can find an rmi service endpoint to access it is possible to make the service execute a malicious payload this issue exists because of org apache commons dbcp datasources sharedpooldatasource and org apache commons dbcp datasources peruserpooldatasource mishandling vulnerabilityurl
0
92,254
18,796,217,925
IssuesEvent
2021-11-08 22:44:27
TeamAmaze/AmazeFileManager
https://api.github.com/repos/TeamAmaze/AmazeFileManager
opened
Add debug info for native code
Issue-Task (low) good first issue Area-CodeHealth
Add this to the gradle ``` android.buildTypes.release.ndk.debugSymbolLevel = FULL ``` so that debug info is added to logs from C.
1.0
Add debug info for native code - Add this to the gradle ``` android.buildTypes.release.ndk.debugSymbolLevel = FULL ``` so that debug info is added to logs from C.
non_priority
add debug info for native code add this to the gradle android buildtypes release ndk debugsymbollevel full so that debug info is added to logs from c
0
255,157
27,484,777,852
IssuesEvent
2023-03-04 01:18:12
panasalap/linux-4.1.15
https://api.github.com/repos/panasalap/linux-4.1.15
opened
CVE-2017-14954 (Medium) detected in linux-yocto-devv4.2.8
security vulnerability
## CVE-2017-14954 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-yocto-devv4.2.8</b></p></summary> <p> <p>Linux Embedded Kernel - tracks the next mainline release</p> <p>Library home page: <a href=https://git.yoctoproject.org/git/linux-yocto-dev>https://git.yoctoproject.org/git/linux-yocto-dev</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/kernel/exit.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The waitid implementation in kernel/exit.c in the Linux kernel through 4.13.4 accesses rusage data structures in unintended cases, which allows local users to obtain sensitive information, and bypass the KASLR protection mechanism, via a crafted system call. <p>Publish Date: 2017-10-02 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2017-14954>CVE-2017-14954</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-14954">http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-14954</a></p> <p>Release Date: 2017-10-02</p> <p>Fix Resolution: v4.14-rc3</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2017-14954 (Medium) detected in linux-yocto-devv4.2.8 - ## CVE-2017-14954 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-yocto-devv4.2.8</b></p></summary> <p> <p>Linux Embedded Kernel - tracks the next mainline release</p> <p>Library home page: <a href=https://git.yoctoproject.org/git/linux-yocto-dev>https://git.yoctoproject.org/git/linux-yocto-dev</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/kernel/exit.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The waitid implementation in kernel/exit.c in the Linux kernel through 4.13.4 accesses rusage data structures in unintended cases, which allows local users to obtain sensitive information, and bypass the KASLR protection mechanism, via a crafted system call. <p>Publish Date: 2017-10-02 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2017-14954>CVE-2017-14954</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-14954">http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-14954</a></p> <p>Release Date: 2017-10-02</p> <p>Fix Resolution: v4.14-rc3</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in linux yocto cve medium severity vulnerability vulnerable library linux yocto linux embedded kernel tracks the next mainline release library home page a href found in base branch master vulnerable source files kernel exit c vulnerability details the waitid implementation in kernel exit c in the linux kernel through accesses rusage data structures in unintended cases which allows local users to obtain sensitive information and bypass the kaslr protection mechanism via a crafted system call publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend
0
15,627
5,153,229,732
IssuesEvent
2017-01-14 09:04:51
themosis/documentation
https://api.github.com/repos/themosis/documentation
closed
Remove 'css' and 'js' asset type option
Code Missing
In assets documentation, version 1.3, remove the references to asset type options of 'js', 'css'. Not available 👎
1.0
Remove 'css' and 'js' asset type option - In assets documentation, version 1.3, remove the references to asset type options of 'js', 'css'. Not available 👎
non_priority
remove css and js asset type option in assets documentation version remove the references to asset type options of js css not available 👎
0
33,865
27,958,277,648
IssuesEvent
2023-03-24 13:57:13
python/core-workflow
https://api.github.com/repos/python/core-workflow
opened
Querying for the discord-bot deployment
infrastructure
# The short story We need to discuss the deployment options for the [discord-bot](https://github.com/python/discord-bot). # Long version @Mariatta and I are developing a discord bot that will utilize OpenAI APIs to enhance the productivity of the core development team. Currently, the bot is deployed on my Azure server(Standard D2as v4), but this setup is not sustainable. We would like to explore alternative options, such as requesting a quota for PSF Heroku deployment or any other viable alternatives. It would be greatly appreciated if we could discuss this matter further. cc @python/infrastructure-staff
1.0
Querying for the discord-bot deployment - # The short story We need to discuss the deployment options for the [discord-bot](https://github.com/python/discord-bot). # Long version @Mariatta and I are developing a discord bot that will utilize OpenAI APIs to enhance the productivity of the core development team. Currently, the bot is deployed on my Azure server(Standard D2as v4), but this setup is not sustainable. We would like to explore alternative options, such as requesting a quota for PSF Heroku deployment or any other viable alternatives. It would be greatly appreciated if we could discuss this matter further. cc @python/infrastructure-staff
non_priority
querying for the discord bot deployment the short story we need to discuss the deployment options for the long version mariatta and i are developing a discord bot that will utilize openai apis to enhance the productivity of the core development team currently the bot is deployed on my azure server standard but this setup is not sustainable we would like to explore alternative options such as requesting a quota for psf heroku deployment or any other viable alternatives it would be greatly appreciated if we could discuss this matter further cc python infrastructure staff
0
156,401
19,861,325,592
IssuesEvent
2022-01-22 00:09:30
pustovitDmytro/lalaps
https://api.github.com/repos/pustovitDmytro/lalaps
closed
CVE-2021-3918 (High) detected in json-schema-0.2.3.tgz - autoclosed
security vulnerability
## CVE-2021-3918 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>json-schema-0.2.3.tgz</b></p></summary> <p>JSON Schema validation and specifications</p> <p>Library home page: <a href="https://registry.npmjs.org/json-schema/-/json-schema-0.2.3.tgz">https://registry.npmjs.org/json-schema/-/json-schema-0.2.3.tgz</a></p> <p> Dependency Hierarchy: - coveralls-3.1.1.tgz (Root Library) - request-2.88.2.tgz - http-signature-1.2.0.tgz - jsprim-1.4.1.tgz - :x: **json-schema-0.2.3.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/pustovitDmytro/lalaps/commit/1e993b43d15c8311de22de5fda0b8cd072345189">1e993b43d15c8311de22de5fda0b8cd072345189</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> json-schema is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') <p>Publish Date: 2021-11-13 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-3918>CVE-2021-3918</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3918">https://nvd.nist.gov/vuln/detail/CVE-2021-3918</a></p> <p>Release Date: 2021-11-13</p> <p>Fix Resolution: json-schema - 0.4.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2021-3918 (High) detected in json-schema-0.2.3.tgz - autoclosed - ## CVE-2021-3918 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>json-schema-0.2.3.tgz</b></p></summary> <p>JSON Schema validation and specifications</p> <p>Library home page: <a href="https://registry.npmjs.org/json-schema/-/json-schema-0.2.3.tgz">https://registry.npmjs.org/json-schema/-/json-schema-0.2.3.tgz</a></p> <p> Dependency Hierarchy: - coveralls-3.1.1.tgz (Root Library) - request-2.88.2.tgz - http-signature-1.2.0.tgz - jsprim-1.4.1.tgz - :x: **json-schema-0.2.3.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/pustovitDmytro/lalaps/commit/1e993b43d15c8311de22de5fda0b8cd072345189">1e993b43d15c8311de22de5fda0b8cd072345189</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> json-schema is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') <p>Publish Date: 2021-11-13 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-3918>CVE-2021-3918</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3918">https://nvd.nist.gov/vuln/detail/CVE-2021-3918</a></p> <p>Release Date: 2021-11-13</p> <p>Fix Resolution: json-schema - 0.4.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in json schema tgz autoclosed cve high severity vulnerability vulnerable library json schema tgz json schema validation and specifications library home page a href dependency hierarchy coveralls tgz root library request tgz http signature tgz jsprim tgz x json schema tgz vulnerable library found in head commit a href found in base branch master vulnerability details json schema is vulnerable to improperly controlled modification of object prototype attributes prototype pollution publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution json schema step up your open source security game with whitesource
0
334,056
24,401,989,052
IssuesEvent
2022-10-05 02:58:16
RandomCoderOrg/ubuntu-on-android
https://api.github.com/repos/RandomCoderOrg/ubuntu-on-android
closed
Please help me
documentation question stale
Hey guys I am following the steps to install termux-11x but I always get this error please help me. ![IMG_20220918_175402](https://user-images.githubusercontent.com/86094668/190932009-f2faa294-ad22-4a79-a188-d773de2f7c0a.jpg) > **Error** ![IMG_20220918_175537](https://user-images.githubusercontent.com/86094668/190932032-abd3bf40-6e7b-4c12-8a0d-2741952ef862.jpg)
1.0
Please help me - Hey guys I am following the steps to install termux-11x but I always get this error please help me. ![IMG_20220918_175402](https://user-images.githubusercontent.com/86094668/190932009-f2faa294-ad22-4a79-a188-d773de2f7c0a.jpg) > **Error** ![IMG_20220918_175537](https://user-images.githubusercontent.com/86094668/190932032-abd3bf40-6e7b-4c12-8a0d-2741952ef862.jpg)
non_priority
please help me hey guys i am following the steps to install termux but i always get this error please help me error
0
182,537
14,140,323,343
IssuesEvent
2020-11-10 11:02:20
effector/patronum
https://api.github.com/repos/effector/patronum
closed
Cover methods with type tests
good first issue tests
- [x] `combineEvents` (#93) - [x] `condition` (#68) - [x] `debounce` (38) - [x] `debug` (#100) - [x] `delay` - [x] `every` - [x] `inFlight` (#84) - [x] `pending` (82) - [x] `reshape` (#100) - [x] `some` - [x] `splitMap` (#112) - [x] `spread` (#94) - [x] `status` (fcb2db523cf8bc2c76c5ca606e4e03492545f6da) - [x] `throttle`
1.0
Cover methods with type tests - - [x] `combineEvents` (#93) - [x] `condition` (#68) - [x] `debounce` (38) - [x] `debug` (#100) - [x] `delay` - [x] `every` - [x] `inFlight` (#84) - [x] `pending` (82) - [x] `reshape` (#100) - [x] `some` - [x] `splitMap` (#112) - [x] `spread` (#94) - [x] `status` (fcb2db523cf8bc2c76c5ca606e4e03492545f6da) - [x] `throttle`
non_priority
cover methods with type tests combineevents condition debounce debug delay every inflight pending reshape some splitmap spread status throttle
0
72,805
7,312,249,289
IssuesEvent
2018-02-28 20:21:10
curationexperts/epigaea
https://api.github.com/repos/curationexperts/epigaea
closed
Deleting Item from Epigea doesn't delete item from fcrepo's binary store.
acceptance testing in progress question
I don't think this is a bug, but this seems odd to me, and a bit problematic. I noticed this because I deleted everything from my deployed server, and then ingested a single image to make sure everything was working. When I was done I deleted the image but noticed that it was still in the fcrepo binary.store. I'm assuming this is because fcrepo keeps a tombstone? I guess I'm more curious if you've ran into this yourself? I'll look into what I can do to resolve it I guess. With batch ingest, this could get messy fast for us.
1.0
Deleting Item from Epigea doesn't delete item from fcrepo's binary store. - I don't think this is a bug, but this seems odd to me, and a bit problematic. I noticed this because I deleted everything from my deployed server, and then ingested a single image to make sure everything was working. When I was done I deleted the image but noticed that it was still in the fcrepo binary.store. I'm assuming this is because fcrepo keeps a tombstone? I guess I'm more curious if you've ran into this yourself? I'll look into what I can do to resolve it I guess. With batch ingest, this could get messy fast for us.
non_priority
deleting item from epigea doesn t delete item from fcrepo s binary store i don t think this is a bug but this seems odd to me and a bit problematic i noticed this because i deleted everything from my deployed server and then ingested a single image to make sure everything was working when i was done i deleted the image but noticed that it was still in the fcrepo binary store i m assuming this is because fcrepo keeps a tombstone i guess i m more curious if you ve ran into this yourself i ll look into what i can do to resolve it i guess with batch ingest this could get messy fast for us
0
29,318
4,489,173,010
IssuesEvent
2016-08-30 10:00:32
Microsoft/vsts-tasks
https://api.github.com/repos/Microsoft/vsts-tasks
closed
VSO Run Functional Tests , requires user to be logged on
Area: Test
In our Tfs build we have a Deploy VS agent Task. This task uses a Test Machine group and group uses a particular account that has local admin on the machine and is project admin in TFS. This Tasks deploys and configures the Test agent correctly with the same user on the remote machine but it will kick you off the remote session if you are logged on. Our issue is that when we run the Functional Test Task, the test fails every single time except if you re-log on to the remote machine with the user account. When re-logged on you can see a cmd window with the DTAExecutionHost.exe running and then the Tests run correctly. Why does the remote machine require the user to be logged on ? Why do the tests fail unless logged on ?
1.0
VSO Run Functional Tests , requires user to be logged on - In our Tfs build we have a Deploy VS agent Task. This task uses a Test Machine group and group uses a particular account that has local admin on the machine and is project admin in TFS. This Tasks deploys and configures the Test agent correctly with the same user on the remote machine but it will kick you off the remote session if you are logged on. Our issue is that when we run the Functional Test Task, the test fails every single time except if you re-log on to the remote machine with the user account. When re-logged on you can see a cmd window with the DTAExecutionHost.exe running and then the Tests run correctly. Why does the remote machine require the user to be logged on ? Why do the tests fail unless logged on ?
non_priority
vso run functional tests requires user to be logged on in our tfs build we have a deploy vs agent task this task uses a test machine group and group uses a particular account that has local admin on the machine and is project admin in tfs this tasks deploys and configures the test agent correctly with the same user on the remote machine but it will kick you off the remote session if you are logged on our issue is that when we run the functional test task the test fails every single time except if you re log on to the remote machine with the user account when re logged on you can see a cmd window with the dtaexecutionhost exe running and then the tests run correctly why does the remote machine require the user to be logged on why do the tests fail unless logged on
0
247,503
26,711,686,473
IssuesEvent
2023-01-28 01:23:36
panasalap/linux-4.1.15
https://api.github.com/repos/panasalap/linux-4.1.15
reopened
CVE-2019-2215 (High) detected in linuxlinux-4.1.17
security vulnerability
## CVE-2019-2215 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linuxlinux-4.1.17</b></p></summary> <p> <p>Apache Software Foundation (ASF)</p> <p>Library home page: <a href=https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux>https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux</a></p> <p>Found in HEAD commit: <a href="https://github.com/panasalap/linux-4.1.15/commit/aae4c2fa46027fd4c477372871df090c6b94f3f1">aae4c2fa46027fd4c477372871df090c6b94f3f1</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (2)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/android/binder.c</b> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/android/binder.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A use-after-free in binder.c allows an elevation of privilege from an application to the Linux Kernel. No user interaction is required to exploit this vulnerability, however exploitation does require either the installation of a malicious local application or a separate vulnerability in a network facing application.Product: AndroidAndroid ID: A-141720095 <p>Publish Date: 2019-10-11 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-2215>CVE-2019-2215</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2215">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2215</a></p> <p>Release Date: 2019-10-18</p> <p>Fix Resolution: v4.16-rc1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2019-2215 (High) detected in linuxlinux-4.1.17 - ## CVE-2019-2215 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linuxlinux-4.1.17</b></p></summary> <p> <p>Apache Software Foundation (ASF)</p> <p>Library home page: <a href=https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux>https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux</a></p> <p>Found in HEAD commit: <a href="https://github.com/panasalap/linux-4.1.15/commit/aae4c2fa46027fd4c477372871df090c6b94f3f1">aae4c2fa46027fd4c477372871df090c6b94f3f1</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (2)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/android/binder.c</b> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/android/binder.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A use-after-free in binder.c allows an elevation of privilege from an application to the Linux Kernel. No user interaction is required to exploit this vulnerability, however exploitation does require either the installation of a malicious local application or a separate vulnerability in a network facing application.Product: AndroidAndroid ID: A-141720095 <p>Publish Date: 2019-10-11 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-2215>CVE-2019-2215</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2215">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2215</a></p> <p>Release Date: 2019-10-18</p> <p>Fix Resolution: v4.16-rc1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in linuxlinux cve high severity vulnerability vulnerable library linuxlinux apache software foundation asf library home page a href found in head commit a href found in base branch master vulnerable source files drivers android binder c drivers android binder c vulnerability details a use after free in binder c allows an elevation of privilege from an application to the linux kernel no user interaction is required to exploit this vulnerability however exploitation does require either the installation of a malicious local application or a separate vulnerability in a network facing application product androidandroid id a publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend
0
180,139
14,740,216,467
IssuesEvent
2021-01-07 08:43:07
Tejas1510/Athavani
https://api.github.com/repos/Tejas1510/Athavani
closed
Suggest Improvement
DWOC Level-2 documentation good first issue help wanted
If you Think any issue would help to improve the project you can suggest that and we would think on it
1.0
Suggest Improvement - If you Think any issue would help to improve the project you can suggest that and we would think on it
non_priority
suggest improvement if you think any issue would help to improve the project you can suggest that and we would think on it
0
391,092
26,880,179,333
IssuesEvent
2023-02-05 14:42:06
trpc/trpc
https://api.github.com/repos/trpc/trpc
opened
docs: Use with Deno's Oak
📚 documentation / examples
### Area of Improvement It is a bit unclear how to integrate tRPC with Oak. I've been able to follow the instructions, up until the `server.ts`. Current documentation shows this: ```ts import { serve } from 'https://deno.land/std@0.140.0/http/server.ts'; import { fetchRequestHandler } from 'npm:@trpc/server/adapters/fetch'; import { createContext } from './context.ts'; import { appRouter } from './router.ts'; function handler(request) { return fetchRequestHandler({ endpoint: '/trpc', req: request, router: appRouter, createContext, }); } serve(handler); ``` However, I got stuck modifying this to work with Oak: ```ts import { Application, Router } from "https://deno.land/x/oak@v11.1.0/mod.ts"; import { fetchRequestHandler } from "npm:@trpc/server/adapters/fetch"; import { createContext } from "./v1/context.ts"; import { appRouter } from "./v1/routes.ts"; const app = new Application(); const router = new Router(); router.use("/", (ctx) => { return fetchRequestHandler({ endpoint: "/trpc", req: ctx.request.originalRequest, router: appRouter, createContext, }); }); app.use(router.routes()); app.use(router.allowedMethods()); await app.listen(); ``` The main issue is the `req: ctx.request.originalRequest`. It shows error: `Type 'ServerRequest' is missing the following properties from type 'Request': cache, credentials, destination, integrity, and 16 more.` I realized that there may be two different `Request` types, one for Deno's serve function, and the other for Oak's property of `Context`. But I'm not sure how to fix it. Is the fix as simple as using another property or function, or is a new Adapter for Deno required? ### Link to related docs https://trpc.io/docs/fetch#deno-deploy ### Additional information _No response_ ### 👨‍👧‍👦 Contributing - [ ] 🙋‍♂️ Yes, I'd be down to file a PR implementing the suggested changes!
1.0
docs: Use with Deno's Oak - ### Area of Improvement It is a bit unclear how to integrate tRPC with Oak. I've been able to follow the instructions, up until the `server.ts`. Current documentation shows this: ```ts import { serve } from 'https://deno.land/std@0.140.0/http/server.ts'; import { fetchRequestHandler } from 'npm:@trpc/server/adapters/fetch'; import { createContext } from './context.ts'; import { appRouter } from './router.ts'; function handler(request) { return fetchRequestHandler({ endpoint: '/trpc', req: request, router: appRouter, createContext, }); } serve(handler); ``` However, I got stuck modifying this to work with Oak: ```ts import { Application, Router } from "https://deno.land/x/oak@v11.1.0/mod.ts"; import { fetchRequestHandler } from "npm:@trpc/server/adapters/fetch"; import { createContext } from "./v1/context.ts"; import { appRouter } from "./v1/routes.ts"; const app = new Application(); const router = new Router(); router.use("/", (ctx) => { return fetchRequestHandler({ endpoint: "/trpc", req: ctx.request.originalRequest, router: appRouter, createContext, }); }); app.use(router.routes()); app.use(router.allowedMethods()); await app.listen(); ``` The main issue is the `req: ctx.request.originalRequest`. It shows error: `Type 'ServerRequest' is missing the following properties from type 'Request': cache, credentials, destination, integrity, and 16 more.` I realized that there may be two different `Request` types, one for Deno's serve function, and the other for Oak's property of `Context`. But I'm not sure how to fix it. Is the fix as simple as using another property or function, or is a new Adapter for Deno required? ### Link to related docs https://trpc.io/docs/fetch#deno-deploy ### Additional information _No response_ ### 👨‍👧‍👦 Contributing - [ ] 🙋‍♂️ Yes, I'd be down to file a PR implementing the suggested changes!
non_priority
docs use with deno s oak area of improvement it is a bit unclear how to integrate trpc with oak i ve been able to follow the instructions up until the server ts current documentation shows this ts import serve from import fetchrequesthandler from npm trpc server adapters fetch import createcontext from context ts import approuter from router ts function handler request return fetchrequesthandler endpoint trpc req request router approuter createcontext serve handler however i got stuck modifying this to work with oak ts import application router from import fetchrequesthandler from npm trpc server adapters fetch import createcontext from context ts import approuter from routes ts const app new application const router new router router use ctx return fetchrequesthandler endpoint trpc req ctx request originalrequest router approuter createcontext app use router routes app use router allowedmethods await app listen the main issue is the req ctx request originalrequest it shows error type serverrequest is missing the following properties from type request cache credentials destination integrity and more i realized that there may be two different request types one for deno s serve function and the other for oak s property of context but i m not sure how to fix it is the fix as simple as using another property or function or is a new adapter for deno required link to related docs additional information no response 👨‍👧‍👦 contributing 🙋‍♂️ yes i d be down to file a pr implementing the suggested changes
0
220,231
16,903,092,215
IssuesEvent
2021-06-24 01:32:58
rtshkmr/ped
https://api.github.com/repos/rtshkmr/ped
closed
Potentially Confusing use of `\` symbols
severity.VeryLow type.DocumentationBug
The `\` symbol has been used for file path delimiters (e.g. in `/data/myimage.png`) but at the same time has been used for indication alternative inputs like so `starting with https:// and ending with .jpg/jpeg/png`. While this is nitpicky, it provides some ambiguity to a non-tech user. ![image.png](https://raw.githubusercontent.com/rtshkmr/ped/main/files/d31aaba4-f346-446c-a782-4ac7b22b8f6c.png) <!--session: 1604045616185-b82433e7-d4b2-4d8e-b032-f4962463bad8-->
1.0
Potentially Confusing use of `\` symbols - The `\` symbol has been used for file path delimiters (e.g. in `/data/myimage.png`) but at the same time has been used for indication alternative inputs like so `starting with https:// and ending with .jpg/jpeg/png`. While this is nitpicky, it provides some ambiguity to a non-tech user. ![image.png](https://raw.githubusercontent.com/rtshkmr/ped/main/files/d31aaba4-f346-446c-a782-4ac7b22b8f6c.png) <!--session: 1604045616185-b82433e7-d4b2-4d8e-b032-f4962463bad8-->
non_priority
potentially confusing use of symbols the symbol has been used for file path delimiters e g in data myimage png but at the same time has been used for indication alternative inputs like so starting with https and ending with jpg jpeg png while this is nitpicky it provides some ambiguity to a non tech user
0
23,594
22,301,396,132
IssuesEvent
2022-06-13 09:03:12
gardener/gardener
https://api.github.com/repos/gardener/gardener
closed
Creation of a `Shoot` cluster can fail, if it is the first `Shoot` assigned to a `Seed`
kind/bug area/usability
**How to categorize this issue?** <!-- Please select area, kind, and priority for this issue. This helps the community categorizing it. Replace below TODOs or exchange the existing identifiers with those that fit best in your opinion. If multiple identifiers make sense you can also state the commands multiple times, e.g. /area control-plane /area auto-scaling ... "/area" identifiers: audit-logging|auto-scaling|backup|certification|control-plane-migration|control-plane|cost|delivery|dev-productivity|disaster-recovery|documentation|high-availability|logging|metering|monitoring|networking|open-source|ops-productivity|os|performance|quality|robustness|scalability|security|storage|testing|usability|user-management "/kind" identifiers: api-change|bug|cleanup|discussion|enhancement|epic|impediment|poc|post-mortem|question|regression|task|technical-debt|test --> /area usability /kind bug **What happened**: When the `APIServerSNI` feature gate is enabled, the sync period of the seed controller in `gardenlet` is relatively large and the dependency watchdog probe is enabled (`seed.spec.settings.dependencyWatchdog.probe.enabled=true`), creation of a shoot cluster (if that is the first shoot cluster on the seed) will fail initially because the `dependency-watchdog`'s external kube-apiserver probe fails and therefore KCM, MCM and CA are all scaled down. The probe will become successful after the seed has been reconciled and only if there already exists an istio `virtualservice` for the shoot's kube-apiserver. All of this happens because during seed bootstrap the following code is used to detect whether SNI is enabled or not: https://github.com/gardener/gardener/blob/8f819ffab82898c65be19a4376aeec3b5627c3ba/pkg/operation/seed/seed.go#L738 https://github.com/gardener/gardener/blob/8f819ffab82898c65be19a4376aeec3b5627c3ba/pkg/operation/botanist/component/kubeapiserverexposure/kube_apiserver_sni.go#L224-L237 And then a specific rule is added to the `allow-to-all-shoot-apiservers` `Networkpolicy` depending on whether SNI is enabled: https://github.com/gardener/gardener/blob/e7a25ef16f7452a7b81cf1a2c0724ab41d4af886/pkg/operation/botanist/component/networkpolicies/global.go#L162-L172 So if a `virtualservice` is not yet created for any shoots, `anySNI` will be evaluated to false. This will result in the `allow-to-all-shoot-apiservers` `Networkpolicy` not containing a rule that allows access to the `istio-ingressgateway` pod and therefore the `dependency-watchdog` cannot talk to it when trying to evaluate the external `kube-apiserver` probe. When `gardenlet`'s seed controller sync period is relatively small (~1m) this issue is not noticeable as the seed will be bootstrapped and `anySNY` evaluated every minute. Then the `allow-to-all-shoot-apiservers` `Networkpolicy` will be adapted accordingly before `dependency-watchdog`'s external `kube-apiserver` probe has a chance to fail. **What you expected to happen**: The `allow-to-all-shoot-apiservers` `Networkpolicy` to contain the appropriate rule: ``` - namespaceSelector: {} podSelector: matchLabels: app: istio-ingressgateway ``` independent of `gardenlet`'s seed controller sync period when the `APIServerSNI` feature gate is enabled. **How to reproduce it (as minimally and precisely as possible)**: In `gardenlet`'s component config set the `controllers.seed.syncPeriod` to 1h. Enable the `APIServerSNI` feature gate. Create a seed cluster and make sure that `seed.spec.settings.dependencyWatchdog.probe.enabled` is set to true and that there are no shoots already running on the seed. In the seed's `garden` namespace you can see that the `allow-to-all-shoot-apiservers` `Networkpolicy` does not contain the aforementioned rule. Create a shoot cluster and observe that it's KCM, MCM and CA all get scaled down. Once the 1h of the sync period has elapsed (or if you simply restart `gardenlet`), notice that `allow-to-all-shoot-apiservers` is edited accordingly and KCM, MCM and CA all get scaled up. **Anything else we need to know?**: Discovered this as part of: https://github.com/gardener/gardener/pull/5995#issuecomment-1138921606 **Environment**: - Gardener version: e7a25ef16f7452a7b81cf1a2c0724ab41d4af886
True
Creation of a `Shoot` cluster can fail, if it is the first `Shoot` assigned to a `Seed` - **How to categorize this issue?** <!-- Please select area, kind, and priority for this issue. This helps the community categorizing it. Replace below TODOs or exchange the existing identifiers with those that fit best in your opinion. If multiple identifiers make sense you can also state the commands multiple times, e.g. /area control-plane /area auto-scaling ... "/area" identifiers: audit-logging|auto-scaling|backup|certification|control-plane-migration|control-plane|cost|delivery|dev-productivity|disaster-recovery|documentation|high-availability|logging|metering|monitoring|networking|open-source|ops-productivity|os|performance|quality|robustness|scalability|security|storage|testing|usability|user-management "/kind" identifiers: api-change|bug|cleanup|discussion|enhancement|epic|impediment|poc|post-mortem|question|regression|task|technical-debt|test --> /area usability /kind bug **What happened**: When the `APIServerSNI` feature gate is enabled, the sync period of the seed controller in `gardenlet` is relatively large and the dependency watchdog probe is enabled (`seed.spec.settings.dependencyWatchdog.probe.enabled=true`), creation of a shoot cluster (if that is the first shoot cluster on the seed) will fail initially because the `dependency-watchdog`'s external kube-apiserver probe fails and therefore KCM, MCM and CA are all scaled down. The probe will become successful after the seed has been reconciled and only if there already exists an istio `virtualservice` for the shoot's kube-apiserver. All of this happens because during seed bootstrap the following code is used to detect whether SNI is enabled or not: https://github.com/gardener/gardener/blob/8f819ffab82898c65be19a4376aeec3b5627c3ba/pkg/operation/seed/seed.go#L738 https://github.com/gardener/gardener/blob/8f819ffab82898c65be19a4376aeec3b5627c3ba/pkg/operation/botanist/component/kubeapiserverexposure/kube_apiserver_sni.go#L224-L237 And then a specific rule is added to the `allow-to-all-shoot-apiservers` `Networkpolicy` depending on whether SNI is enabled: https://github.com/gardener/gardener/blob/e7a25ef16f7452a7b81cf1a2c0724ab41d4af886/pkg/operation/botanist/component/networkpolicies/global.go#L162-L172 So if a `virtualservice` is not yet created for any shoots, `anySNI` will be evaluated to false. This will result in the `allow-to-all-shoot-apiservers` `Networkpolicy` not containing a rule that allows access to the `istio-ingressgateway` pod and therefore the `dependency-watchdog` cannot talk to it when trying to evaluate the external `kube-apiserver` probe. When `gardenlet`'s seed controller sync period is relatively small (~1m) this issue is not noticeable as the seed will be bootstrapped and `anySNY` evaluated every minute. Then the `allow-to-all-shoot-apiservers` `Networkpolicy` will be adapted accordingly before `dependency-watchdog`'s external `kube-apiserver` probe has a chance to fail. **What you expected to happen**: The `allow-to-all-shoot-apiservers` `Networkpolicy` to contain the appropriate rule: ``` - namespaceSelector: {} podSelector: matchLabels: app: istio-ingressgateway ``` independent of `gardenlet`'s seed controller sync period when the `APIServerSNI` feature gate is enabled. **How to reproduce it (as minimally and precisely as possible)**: In `gardenlet`'s component config set the `controllers.seed.syncPeriod` to 1h. Enable the `APIServerSNI` feature gate. Create a seed cluster and make sure that `seed.spec.settings.dependencyWatchdog.probe.enabled` is set to true and that there are no shoots already running on the seed. In the seed's `garden` namespace you can see that the `allow-to-all-shoot-apiservers` `Networkpolicy` does not contain the aforementioned rule. Create a shoot cluster and observe that it's KCM, MCM and CA all get scaled down. Once the 1h of the sync period has elapsed (or if you simply restart `gardenlet`), notice that `allow-to-all-shoot-apiservers` is edited accordingly and KCM, MCM and CA all get scaled up. **Anything else we need to know?**: Discovered this as part of: https://github.com/gardener/gardener/pull/5995#issuecomment-1138921606 **Environment**: - Gardener version: e7a25ef16f7452a7b81cf1a2c0724ab41d4af886
non_priority
creation of a shoot cluster can fail if it is the first shoot assigned to a seed how to categorize this issue please select area kind and priority for this issue this helps the community categorizing it replace below todos or exchange the existing identifiers with those that fit best in your opinion if multiple identifiers make sense you can also state the commands multiple times e g area control plane area auto scaling area identifiers audit logging auto scaling backup certification control plane migration control plane cost delivery dev productivity disaster recovery documentation high availability logging metering monitoring networking open source ops productivity os performance quality robustness scalability security storage testing usability user management kind identifiers api change bug cleanup discussion enhancement epic impediment poc post mortem question regression task technical debt test area usability kind bug what happened when the apiserversni feature gate is enabled the sync period of the seed controller in gardenlet is relatively large and the dependency watchdog probe is enabled seed spec settings dependencywatchdog probe enabled true creation of a shoot cluster if that is the first shoot cluster on the seed will fail initially because the dependency watchdog s external kube apiserver probe fails and therefore kcm mcm and ca are all scaled down the probe will become successful after the seed has been reconciled and only if there already exists an istio virtualservice for the shoot s kube apiserver all of this happens because during seed bootstrap the following code is used to detect whether sni is enabled or not and then a specific rule is added to the allow to all shoot apiservers networkpolicy depending on whether sni is enabled so if a virtualservice is not yet created for any shoots anysni will be evaluated to false this will result in the allow to all shoot apiservers networkpolicy not containing a rule that allows access to the istio ingressgateway pod and therefore the dependency watchdog cannot talk to it when trying to evaluate the external kube apiserver probe when gardenlet s seed controller sync period is relatively small this issue is not noticeable as the seed will be bootstrapped and anysny evaluated every minute then the allow to all shoot apiservers networkpolicy will be adapted accordingly before dependency watchdog s external kube apiserver probe has a chance to fail what you expected to happen the allow to all shoot apiservers networkpolicy to contain the appropriate rule namespaceselector podselector matchlabels app istio ingressgateway independent of gardenlet s seed controller sync period when the apiserversni feature gate is enabled how to reproduce it as minimally and precisely as possible in gardenlet s component config set the controllers seed syncperiod to enable the apiserversni feature gate create a seed cluster and make sure that seed spec settings dependencywatchdog probe enabled is set to true and that there are no shoots already running on the seed in the seed s garden namespace you can see that the allow to all shoot apiservers networkpolicy does not contain the aforementioned rule create a shoot cluster and observe that it s kcm mcm and ca all get scaled down once the of the sync period has elapsed or if you simply restart gardenlet notice that allow to all shoot apiservers is edited accordingly and kcm mcm and ca all get scaled up anything else we need to know discovered this as part of environment gardener version
0
229,066
25,287,224,699
IssuesEvent
2022-11-16 20:23:23
elastic/beats
https://api.github.com/repos/elastic/beats
closed
[Filebeat] Support unix sockets and named pipes in httpjson input
enhancement Filebeat Team:Security-External Integrations
**Describe the enhancement:** Add support for connecting to HTTP services that are listening on unix sockets and named pipes (Windows). When a user configures a host URL that uses particular schemes then the input would know to connect over different transports. It would use these schemes to be consistent with [Metricbeat](https://www.elastic.co/guide/en/beats/metricbeat/current/configuration-metricbeat.html#module-http-config-options): - `http+unix://` to connect to UNIX sockets. - `http+npipe://` to connect to Windows named pipes. It should support HTTPS as well (I don't know if Metricbeat does, but I would expect `https+unix` and `https+npipe` to work). **Describe a specific use case for the enhancement or feature:** This would be used connect to internal services that are only exposed locally. Services like [Beats HTTP monitoring endpoint](https://www.elastic.co/guide/en/beats/filebeat/current/http-endpoint.html) and Docker have APIs that listen on unix sockets. It would be useful if `httpjson` (and any future inputs that also monitor arbitrary HTTP services) could monitor data from these local APIs.
True
[Filebeat] Support unix sockets and named pipes in httpjson input - **Describe the enhancement:** Add support for connecting to HTTP services that are listening on unix sockets and named pipes (Windows). When a user configures a host URL that uses particular schemes then the input would know to connect over different transports. It would use these schemes to be consistent with [Metricbeat](https://www.elastic.co/guide/en/beats/metricbeat/current/configuration-metricbeat.html#module-http-config-options): - `http+unix://` to connect to UNIX sockets. - `http+npipe://` to connect to Windows named pipes. It should support HTTPS as well (I don't know if Metricbeat does, but I would expect `https+unix` and `https+npipe` to work). **Describe a specific use case for the enhancement or feature:** This would be used connect to internal services that are only exposed locally. Services like [Beats HTTP monitoring endpoint](https://www.elastic.co/guide/en/beats/filebeat/current/http-endpoint.html) and Docker have APIs that listen on unix sockets. It would be useful if `httpjson` (and any future inputs that also monitor arbitrary HTTP services) could monitor data from these local APIs.
non_priority
support unix sockets and named pipes in httpjson input describe the enhancement add support for connecting to http services that are listening on unix sockets and named pipes windows when a user configures a host url that uses particular schemes then the input would know to connect over different transports it would use these schemes to be consistent with http unix to connect to unix sockets http npipe to connect to windows named pipes it should support https as well i don t know if metricbeat does but i would expect https unix and https npipe to work describe a specific use case for the enhancement or feature this would be used connect to internal services that are only exposed locally services like and docker have apis that listen on unix sockets it would be useful if httpjson and any future inputs that also monitor arbitrary http services could monitor data from these local apis
0
52,786
10,928,503,697
IssuesEvent
2019-11-22 19:11:42
eclipse/eclipse.jdt.ls
https://api.github.com/repos/eclipse/eclipse.jdt.ls
closed
Add quickfix to correct access to static elements
code-actions enhancement
Handle the following cases in QuickFixProcessor: ```java case IProblem.NonStaticAccessToStaticField: case IProblem.NonStaticAccessToStaticMethod: case IProblem.NonStaticOrAlienTypeReceiver: case IProblem.IndirectAccessToStaticField: case IProblem.IndirectAccessToStaticMethod: LocalCorrectionsSubProcessor.addCorrectAccessToStaticProposals(context, problem, proposals); ```
1.0
Add quickfix to correct access to static elements - Handle the following cases in QuickFixProcessor: ```java case IProblem.NonStaticAccessToStaticField: case IProblem.NonStaticAccessToStaticMethod: case IProblem.NonStaticOrAlienTypeReceiver: case IProblem.IndirectAccessToStaticField: case IProblem.IndirectAccessToStaticMethod: LocalCorrectionsSubProcessor.addCorrectAccessToStaticProposals(context, problem, proposals); ```
non_priority
add quickfix to correct access to static elements handle the following cases in quickfixprocessor java case iproblem nonstaticaccesstostaticfield case iproblem nonstaticaccesstostaticmethod case iproblem nonstaticoralientypereceiver case iproblem indirectaccesstostaticfield case iproblem indirectaccesstostaticmethod localcorrectionssubprocessor addcorrectaccesstostaticproposals context problem proposals
0
91,311
26,358,073,382
IssuesEvent
2023-01-11 11:14:01
vaticle/typedb
https://api.github.com/repos/vaticle/typedb
closed
Optimise web services repositories and hostings
type: feature domain: build
_This issue was originally posted by @haikalpribadi on 2018-09-08 16:31_. Why: We have quite a few web services at this point, such as Grakn's website (grakn.ai), docs (dev.grakn.ai), discuss (discuss.grakn.ai), slack signup (grakn.ai/slack), CMS (cms.grakn.ai) and so on. It's getting hard to manage and them, especially as they continue to grow. Right now there's repo in GitHub and Heroku for Grakn's website and docs, and both are hosted on Heroku. Discuss and CMS is hosted on Digital Ocean. How: We need to migrate all projects' source code to GitHub, and just have one repository each. We also need to migrate their hosting to all be on one platform, such Heroku.
1.0
Optimise web services repositories and hostings - _This issue was originally posted by @haikalpribadi on 2018-09-08 16:31_. Why: We have quite a few web services at this point, such as Grakn's website (grakn.ai), docs (dev.grakn.ai), discuss (discuss.grakn.ai), slack signup (grakn.ai/slack), CMS (cms.grakn.ai) and so on. It's getting hard to manage and them, especially as they continue to grow. Right now there's repo in GitHub and Heroku for Grakn's website and docs, and both are hosted on Heroku. Discuss and CMS is hosted on Digital Ocean. How: We need to migrate all projects' source code to GitHub, and just have one repository each. We also need to migrate their hosting to all be on one platform, such Heroku.
non_priority
optimise web services repositories and hostings this issue was originally posted by haikalpribadi on why we have quite a few web services at this point such as grakn s website grakn ai docs dev grakn ai discuss discuss grakn ai slack signup grakn ai slack cms cms grakn ai and so on it s getting hard to manage and them especially as they continue to grow right now there s repo in github and heroku for grakn s website and docs and both are hosted on heroku discuss and cms is hosted on digital ocean how we need to migrate all projects source code to github and just have one repository each we also need to migrate their hosting to all be on one platform such heroku
0
323,320
23,941,388,338
IssuesEvent
2022-09-11 23:37:19
saulpw/visidata
https://api.github.com/repos/saulpw/visidata
closed
[docs] -d is not a well-documented alias for --delimiter
help wanted documentation
Hi all, Thanks for this, so far I am loving it. Would it be possible to find a way to open space-separated tsvs without using `vd -f tsv --delimiter=" " filename.extension`? I was thinking either by parsing the delimiter automatically (e.g. finding the delimiter in the first x lines of code) or by creating a shorter flag for `--delimiter`? Edit: premature sending
1.0
[docs] -d is not a well-documented alias for --delimiter - Hi all, Thanks for this, so far I am loving it. Would it be possible to find a way to open space-separated tsvs without using `vd -f tsv --delimiter=" " filename.extension`? I was thinking either by parsing the delimiter automatically (e.g. finding the delimiter in the first x lines of code) or by creating a shorter flag for `--delimiter`? Edit: premature sending
non_priority
d is not a well documented alias for delimiter hi all thanks for this so far i am loving it would it be possible to find a way to open space separated tsvs without using vd f tsv delimiter filename extension i was thinking either by parsing the delimiter automatically e g finding the delimiter in the first x lines of code or by creating a shorter flag for delimiter edit premature sending
0
445,404
31,236,973,353
IssuesEvent
2023-08-20 12:00:09
yop-me/IoTProyecto
https://api.github.com/repos/yop-me/IoTProyecto
closed
Requerimientos no funcionales:
documentation
Implementar: -Interfaz de usuario intuitiva -Comunicacion estable - Seguridad de datos - Eficiencia energetica - Flexibilidad y escalabilidad
1.0
Requerimientos no funcionales: - Implementar: -Interfaz de usuario intuitiva -Comunicacion estable - Seguridad de datos - Eficiencia energetica - Flexibilidad y escalabilidad
non_priority
requerimientos no funcionales implementar interfaz de usuario intuitiva comunicacion estable seguridad de datos eficiencia energetica flexibilidad y escalabilidad
0
4,489
5,111,835,982
IssuesEvent
2017-01-06 08:36:41
phpmyadmin/phpmyadmin
https://api.github.com/repos/phpmyadmin/phpmyadmin
closed
Verify checksum after uploading
infrastructure
upload-release should verify the checksum of the uploaded file on disk matches the checksum generated by create-release.
1.0
Verify checksum after uploading - upload-release should verify the checksum of the uploaded file on disk matches the checksum generated by create-release.
non_priority
verify checksum after uploading upload release should verify the checksum of the uploaded file on disk matches the checksum generated by create release
0
167,189
26,469,875,097
IssuesEvent
2023-01-17 05:59:09
tijlleenders/ZinZen
https://api.github.com/repos/tijlleenders/ZinZen
closed
Design UX for drag and drop
design
How to change order of goals? How to move goals around in the hierarchy?
1.0
Design UX for drag and drop - How to change order of goals? How to move goals around in the hierarchy?
non_priority
design ux for drag and drop how to change order of goals how to move goals around in the hierarchy
0
5,176
3,179,323,162
IssuesEvent
2015-09-25 00:03:21
camalot/droidexplorer
https://api.github.com/repos/camalot/droidexplorer
closed
Auto Apply Update not working
bug CodePlex High
**This issue was imported from [CodePlex](http://de.codeplex.com/workitem/8457)** **[camalot](http://www.codeplex.com/site/users/view/camalot)** wrote 2009-08-12 at 06:40 the auto apply does not work correctly, it needs to do the following commands to work   mkdir -p /cache/recovery/ echo 'boot-recovery ' >/cache/recovery/command echo '--nandroid ' >> /cache/recovery/command '--update_package=SDCARD:update.zip' >> /cache/recovery/command reboot recovery   the --nandrod switch is if back up first. **[camalot](http://www.codeplex.com/site/users/view/camalot)** wrote 2009-08-13 at 13:08 can not get to work with the --nandroid command in, works with out it **[](http://www.codeplex.com/site/users/view/)** wrote 2009-08-13 at 16:08 **[](http://www.codeplex.com/site/users/view/)** wrote 2009-08-13 at 16:09 Associated with changeset 39812. **[](http://www.codeplex.com/site/users/view/)** wrote 2013-02-21 at 19:42 **[](http://www.codeplex.com/site/users/view/)** wrote 2013-05-16 at 07:29 **[](http://www.codeplex.com/site/users/view/)** wrote 2013-05-16 at 07:29 **[](http://www.codeplex.com/site/users/view/)** wrote 2013-06-14 at 02:35 **[](http://www.codeplex.com/site/users/view/)** wrote 2013-08-25 at 01:18
1.0
Auto Apply Update not working - **This issue was imported from [CodePlex](http://de.codeplex.com/workitem/8457)** **[camalot](http://www.codeplex.com/site/users/view/camalot)** wrote 2009-08-12 at 06:40 the auto apply does not work correctly, it needs to do the following commands to work   mkdir -p /cache/recovery/ echo 'boot-recovery ' >/cache/recovery/command echo '--nandroid ' >> /cache/recovery/command '--update_package=SDCARD:update.zip' >> /cache/recovery/command reboot recovery   the --nandrod switch is if back up first. **[camalot](http://www.codeplex.com/site/users/view/camalot)** wrote 2009-08-13 at 13:08 can not get to work with the --nandroid command in, works with out it **[](http://www.codeplex.com/site/users/view/)** wrote 2009-08-13 at 16:08 **[](http://www.codeplex.com/site/users/view/)** wrote 2009-08-13 at 16:09 Associated with changeset 39812. **[](http://www.codeplex.com/site/users/view/)** wrote 2013-02-21 at 19:42 **[](http://www.codeplex.com/site/users/view/)** wrote 2013-05-16 at 07:29 **[](http://www.codeplex.com/site/users/view/)** wrote 2013-05-16 at 07:29 **[](http://www.codeplex.com/site/users/view/)** wrote 2013-06-14 at 02:35 **[](http://www.codeplex.com/site/users/view/)** wrote 2013-08-25 at 01:18
non_priority
auto apply update not working this issue was imported from wrote at the auto apply does not work correctly it needs to do the following commands to work   mkdir p cache recovery echo boot recovery cache recovery command echo nandroid cache recovery command update package sdcard update zip cache recovery command reboot recovery   the nandrod switch is if back up first wrote at can not get to work with the nandroid command in works with out it wrote at wrote at associated with changeset wrote at wrote at wrote at wrote at wrote at
0
1,657
10,542,530,407
IssuesEvent
2019-10-02 13:22:06
elastic/apm-integration-testing
https://api.github.com/repos/elastic/apm-integration-testing
closed
apm-server + logstash + ILM
automation subtask
When using logstash to index apm-server output while ILM is enabled, this change is needed: ```patch diff --git a/docker/logstash/pipeline/apm.conf b/docker/logstash/pipeline/apm.conf index 1db7fdc..31fc1df 100644 --- a/docker/logstash/pipeline/apm.conf +++ b/docker/logstash/pipeline/apm.conf @@ -34,6 +34,6 @@ filter { output { elasticsearch { hosts => ["elasticsearch:9200"] - index => "%{[@metadata][beat]}-%{[@metadata][version]}%{[@metadata][index_suffix]}-%{+YYYY.MM.dd}" + index => "%{[@metadata][beat]}-%{[@metadata][version]}%{[@metadata][index_suffix]}" } } ``` it would also be nice to include `pipeline => "apm"` for versions that install that pipeline.
1.0
apm-server + logstash + ILM - When using logstash to index apm-server output while ILM is enabled, this change is needed: ```patch diff --git a/docker/logstash/pipeline/apm.conf b/docker/logstash/pipeline/apm.conf index 1db7fdc..31fc1df 100644 --- a/docker/logstash/pipeline/apm.conf +++ b/docker/logstash/pipeline/apm.conf @@ -34,6 +34,6 @@ filter { output { elasticsearch { hosts => ["elasticsearch:9200"] - index => "%{[@metadata][beat]}-%{[@metadata][version]}%{[@metadata][index_suffix]}-%{+YYYY.MM.dd}" + index => "%{[@metadata][beat]}-%{[@metadata][version]}%{[@metadata][index_suffix]}" } } ``` it would also be nice to include `pipeline => "apm"` for versions that install that pipeline.
non_priority
apm server logstash ilm when using logstash to index apm server output while ilm is enabled this change is needed patch diff git a docker logstash pipeline apm conf b docker logstash pipeline apm conf index a docker logstash pipeline apm conf b docker logstash pipeline apm conf filter output elasticsearch hosts index yyyy mm dd index it would also be nice to include pipeline apm for versions that install that pipeline
0
207,611
23,464,064,193
IssuesEvent
2022-08-16 15:15:20
elastic/cloudbeat
https://api.github.com/repos/elastic/cloudbeat
reopened
[BUG] Kibana - Findings flyout - some references links are broken
bug 8.5 candidate Team:Cloud Security Posture
**Describe the bug** When testing some of the links in the rule `references` (under `General` tab), they reference to pages that are no longer exists. **Preconditions** Kibana environment with csp plugin enabled Agent installed that generates findings **To Reproduce** Steps to reproduce the behavior: 1. Open findings for rule `Ensure that the --profiling argument is set to false (Automated)` 2. Click on `https://github.com/kubernetes/community/blob/master/contributors/devel/profiling.md` **Expected behavior** Opened page should be existing **Screenshots 📸** ![Screen Shot 2022-05-09 at 21 44 15](https://user-images.githubusercontent.com/61654899/167476455-fe84ca05-d525-409e-ae5a-4f3f4013ce69.png) **Desktop (please complete the following information):** - OS: - Browser: - Kibana Version: COMMIT: [df225b213b188c81888141cee2ec191424fc0649](https://github.com/elastic/kibana/commits/df225b213b188c81888141cee2ec191424fc0649) - Endpoint Version: - Other Version: - Cloudbeat Version: COMMIT [7e1f1a135fbb3459151232dda34531527291776e](https://github.com/elastic/cloudbeat/commits/7e1f1a135fbb3459151232dda34531527291776e) **Additional context**
True
[BUG] Kibana - Findings flyout - some references links are broken - **Describe the bug** When testing some of the links in the rule `references` (under `General` tab), they reference to pages that are no longer exists. **Preconditions** Kibana environment with csp plugin enabled Agent installed that generates findings **To Reproduce** Steps to reproduce the behavior: 1. Open findings for rule `Ensure that the --profiling argument is set to false (Automated)` 2. Click on `https://github.com/kubernetes/community/blob/master/contributors/devel/profiling.md` **Expected behavior** Opened page should be existing **Screenshots 📸** ![Screen Shot 2022-05-09 at 21 44 15](https://user-images.githubusercontent.com/61654899/167476455-fe84ca05-d525-409e-ae5a-4f3f4013ce69.png) **Desktop (please complete the following information):** - OS: - Browser: - Kibana Version: COMMIT: [df225b213b188c81888141cee2ec191424fc0649](https://github.com/elastic/kibana/commits/df225b213b188c81888141cee2ec191424fc0649) - Endpoint Version: - Other Version: - Cloudbeat Version: COMMIT [7e1f1a135fbb3459151232dda34531527291776e](https://github.com/elastic/cloudbeat/commits/7e1f1a135fbb3459151232dda34531527291776e) **Additional context**
non_priority
kibana findings flyout some references links are broken describe the bug when testing some of the links in the rule references under general tab they reference to pages that are no longer exists preconditions kibana environment with csp plugin enabled agent installed that generates findings to reproduce steps to reproduce the behavior open findings for rule ensure that the profiling argument is set to false automated click on expected behavior opened page should be existing screenshots 📸 desktop please complete the following information os browser kibana version commit endpoint version other version cloudbeat version commit additional context
0
9,955
7,867,210,539
IssuesEvent
2018-06-23 05:19:02
istio/old_issues_repo
https://api.github.com/repos/istio/old_issues_repo
closed
Istio Ingress TLS key management use ACM
area/networking area/security env/aws kind/enhancement
**Is this a BUG or FEATURE REQUEST?:** FEATURE REQUEST **Did you review https://istio.io/help/ and existing issues to identify if this is already solved or being worked on?**: **Bug:** N **What Version of Istio and Kubernetes are you using, where did you get Istio from, Installation details** ``` istioctl version 0.7.1 kubectl version 1.10.1 ``` **Is Istio Auth enabled or not ?** Not **What happened**: I deploy kubernetes cluster to aws use kops. Istio deployed on this cluster. Now I config Istio Ingress allow HTTPS use TLS Key on Amazon Certificate Manager (ACM) following: https://kubernetes.io/docs/concepts/services-networking/service/#ssl-support-on-aws But Ingress service throw error file not found: /etc/istio/ingress-certs or /etc/certs **What you expected to happen:** We can apply [ssl-support-on-aws](https://kubernetes.io/docs/concepts/services-networking/service/#ssl-support-on-aws) to istio ingress service. **Feature Request:** Y **Describe the feature:** Istio Ingress service support Amazon Certificate Management Reference: https://medium.com/kokster/how-to-setup-nginx-ingress-controller-on-aws-clusters-7bd244278509 https://github.com/kubernetes/ingress-nginx/tree/master/docs/examples/tls-termination
True
Istio Ingress TLS key management use ACM - **Is this a BUG or FEATURE REQUEST?:** FEATURE REQUEST **Did you review https://istio.io/help/ and existing issues to identify if this is already solved or being worked on?**: **Bug:** N **What Version of Istio and Kubernetes are you using, where did you get Istio from, Installation details** ``` istioctl version 0.7.1 kubectl version 1.10.1 ``` **Is Istio Auth enabled or not ?** Not **What happened**: I deploy kubernetes cluster to aws use kops. Istio deployed on this cluster. Now I config Istio Ingress allow HTTPS use TLS Key on Amazon Certificate Manager (ACM) following: https://kubernetes.io/docs/concepts/services-networking/service/#ssl-support-on-aws But Ingress service throw error file not found: /etc/istio/ingress-certs or /etc/certs **What you expected to happen:** We can apply [ssl-support-on-aws](https://kubernetes.io/docs/concepts/services-networking/service/#ssl-support-on-aws) to istio ingress service. **Feature Request:** Y **Describe the feature:** Istio Ingress service support Amazon Certificate Management Reference: https://medium.com/kokster/how-to-setup-nginx-ingress-controller-on-aws-clusters-7bd244278509 https://github.com/kubernetes/ingress-nginx/tree/master/docs/examples/tls-termination
non_priority
istio ingress tls key management use acm is this a bug or feature request feature request did you review and existing issues to identify if this is already solved or being worked on bug n what version of istio and kubernetes are you using where did you get istio from installation details istioctl version kubectl version is istio auth enabled or not not what happened i deploy kubernetes cluster to aws use kops istio deployed on this cluster now i config istio ingress allow https use tls key on amazon certificate manager acm following but ingress service throw error file not found etc istio ingress certs or etc certs what you expected to happen we can apply to istio ingress service feature request y describe the feature istio ingress service support amazon certificate management reference
0
186,177
15,049,888,743
IssuesEvent
2021-02-03 12:07:33
apache/buildstream
https://api.github.com/repos/apache/buildstream
closed
Re-think and document incremental workspaces better
documentation
[See original issue on GitLab](https://gitlab.com/BuildStream/buildstream/-/issues/694) In GitLab by [[Gitlab user @tlater]](https://gitlab.com/tlater) on Oct 3, 2018, 13:58 ## Background [//]: # (Provide a background or the root/source that justifies this task or action.) During the discussion of !812 we were reminded of an old feature that is very difficult to wrap your head around... Incremental workspaces! In essence, there is some crafty code that revolves around trying to update timestamps where we technically have none. A more detailed description can be found [here](https://gitlab.com/BuildStream/buildstream/merge_requests/812#note_103125727). In-code documentation for this is currently lackluster, and the comments should be updated to explain edge cases and our workarounds. Since the addition of artifact cache cleanup and failed build caching, this feature may also have grown new, un-covered edge cases for which tests need to be written, and perhaps we need to re-think the feature altogether, since there may be nicer ways to implement this now. ## Task description [//]: # (Short summary of the action to be executed) * [ ] Document the incremental-build timestamping codepaths better * [ ] Re-think these codepaths with cached failed builds in mind * [ ] Write tests for edge cases introduced with cache cleanup ## Acceptance Criteria [//]: # (Acceptance criteria should follow the S.M.A.R.T. principle https://en.wikipedia.org/wiki/SMART_criteria ) We should have a cleanly documented idea of how timestamps are handled with incremental builds and an implementation that takes into account failed build caching as well as artifact cache cleanup. ----
1.0
Re-think and document incremental workspaces better - [See original issue on GitLab](https://gitlab.com/BuildStream/buildstream/-/issues/694) In GitLab by [[Gitlab user @tlater]](https://gitlab.com/tlater) on Oct 3, 2018, 13:58 ## Background [//]: # (Provide a background or the root/source that justifies this task or action.) During the discussion of !812 we were reminded of an old feature that is very difficult to wrap your head around... Incremental workspaces! In essence, there is some crafty code that revolves around trying to update timestamps where we technically have none. A more detailed description can be found [here](https://gitlab.com/BuildStream/buildstream/merge_requests/812#note_103125727). In-code documentation for this is currently lackluster, and the comments should be updated to explain edge cases and our workarounds. Since the addition of artifact cache cleanup and failed build caching, this feature may also have grown new, un-covered edge cases for which tests need to be written, and perhaps we need to re-think the feature altogether, since there may be nicer ways to implement this now. ## Task description [//]: # (Short summary of the action to be executed) * [ ] Document the incremental-build timestamping codepaths better * [ ] Re-think these codepaths with cached failed builds in mind * [ ] Write tests for edge cases introduced with cache cleanup ## Acceptance Criteria [//]: # (Acceptance criteria should follow the S.M.A.R.T. principle https://en.wikipedia.org/wiki/SMART_criteria ) We should have a cleanly documented idea of how timestamps are handled with incremental builds and an implementation that takes into account failed build caching as well as artifact cache cleanup. ----
non_priority
re think and document incremental workspaces better in gitlab by on oct background provide a background or the root source that justifies this task or action during the discussion of we were reminded of an old feature that is very difficult to wrap your head around incremental workspaces in essence there is some crafty code that revolves around trying to update timestamps where we technically have none a more detailed description can be found in code documentation for this is currently lackluster and the comments should be updated to explain edge cases and our workarounds since the addition of artifact cache cleanup and failed build caching this feature may also have grown new un covered edge cases for which tests need to be written and perhaps we need to re think the feature altogether since there may be nicer ways to implement this now task description short summary of the action to be executed document the incremental build timestamping codepaths better re think these codepaths with cached failed builds in mind write tests for edge cases introduced with cache cleanup acceptance criteria acceptance criteria should follow the s m a r t principle we should have a cleanly documented idea of how timestamps are handled with incremental builds and an implementation that takes into account failed build caching as well as artifact cache cleanup
0
40,737
5,258,770,802
IssuesEvent
2017-02-03 00:36:02
core-wg/coap-tcp-tls
https://api.github.com/repos/core-wg/coap-tcp-tls
closed
Ping and Pong Messages: ... a single Pong message MUST be returned?
design signaling
In [Section 4.4 Ping and Pong Messages](https://tools.ietf.org/html/draft-ietf-core-coap-tcp-tls-05#section-4.4): _Upon receipt of a Ping message, a single Pong message is returned with the identical token._ This should be _**MUST** be returned_ ?
1.0
Ping and Pong Messages: ... a single Pong message MUST be returned? - In [Section 4.4 Ping and Pong Messages](https://tools.ietf.org/html/draft-ietf-core-coap-tcp-tls-05#section-4.4): _Upon receipt of a Ping message, a single Pong message is returned with the identical token._ This should be _**MUST** be returned_ ?
non_priority
ping and pong messages a single pong message must be returned in upon receipt of a ping message a single pong message is returned with the identical token this should be must be returned
0
173,751
21,177,104,344
IssuesEvent
2022-04-08 01:57:21
Thezone1975/Office-Add-in-NodeJS-SSO
https://api.github.com/repos/Thezone1975/Office-Add-in-NodeJS-SSO
opened
CVE-2021-44906 (High) detected in minimist-0.0.8.tgz, minimist-1.2.0.tgz
security vulnerability
## CVE-2021-44906 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>minimist-0.0.8.tgz</b>, <b>minimist-1.2.0.tgz</b></p></summary> <p> <details><summary><b>minimist-0.0.8.tgz</b></p></summary> <p>parse argument options</p> <p>Library home page: <a href="https://registry.npmjs.org/minimist/-/minimist-0.0.8.tgz">https://registry.npmjs.org/minimist/-/minimist-0.0.8.tgz</a></p> <p>Path to dependency file: /Office-Add-in-NodeJS-SSO/Before/package.json</p> <p>Path to vulnerable library: /Before/node_modules/minimist/package.json,/Before/node_modules/minimist/package.json,/Before/node_modules/minimist/package.json</p> <p> Dependency Hierarchy: - cpx-1.5.0.tgz (Root Library) - mkdirp-0.5.1.tgz - :x: **minimist-0.0.8.tgz** (Vulnerable Library) </details> <details><summary><b>minimist-1.2.0.tgz</b></p></summary> <p>parse argument options</p> <p>Library home page: <a href="https://registry.npmjs.org/minimist/-/minimist-1.2.0.tgz">https://registry.npmjs.org/minimist/-/minimist-1.2.0.tgz</a></p> <p>Path to dependency file: /Office-Add-in-NodeJS-SSO/Completed Multitenant/package.json</p> <p>Path to vulnerable library: /Before/node_modules/subarg/node_modules/minimist/package.json,/Before/node_modules/subarg/node_modules/minimist/package.json,/Before/node_modules/subarg/node_modules/minimist/package.json</p> <p> Dependency Hierarchy: - cpx-1.5.0.tgz (Root Library) - chokidar-1.7.0.tgz - fsevents-1.2.4.tgz - node-pre-gyp-0.10.0.tgz - rc-1.2.7.tgz - :x: **minimist-1.2.0.tgz** (Vulnerable Library) </details> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Minimist <=1.2.5 is vulnerable to Prototype Pollution via file index.js, function setKey() (lines 69-95). <p>Publish Date: 2022-03-17 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-44906>CVE-2021-44906</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/substack/minimist/issues/164">https://github.com/substack/minimist/issues/164</a></p> <p>Release Date: 2022-03-17</p> <p>Fix Resolution: minimist - 1.2.6</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2021-44906 (High) detected in minimist-0.0.8.tgz, minimist-1.2.0.tgz - ## CVE-2021-44906 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>minimist-0.0.8.tgz</b>, <b>minimist-1.2.0.tgz</b></p></summary> <p> <details><summary><b>minimist-0.0.8.tgz</b></p></summary> <p>parse argument options</p> <p>Library home page: <a href="https://registry.npmjs.org/minimist/-/minimist-0.0.8.tgz">https://registry.npmjs.org/minimist/-/minimist-0.0.8.tgz</a></p> <p>Path to dependency file: /Office-Add-in-NodeJS-SSO/Before/package.json</p> <p>Path to vulnerable library: /Before/node_modules/minimist/package.json,/Before/node_modules/minimist/package.json,/Before/node_modules/minimist/package.json</p> <p> Dependency Hierarchy: - cpx-1.5.0.tgz (Root Library) - mkdirp-0.5.1.tgz - :x: **minimist-0.0.8.tgz** (Vulnerable Library) </details> <details><summary><b>minimist-1.2.0.tgz</b></p></summary> <p>parse argument options</p> <p>Library home page: <a href="https://registry.npmjs.org/minimist/-/minimist-1.2.0.tgz">https://registry.npmjs.org/minimist/-/minimist-1.2.0.tgz</a></p> <p>Path to dependency file: /Office-Add-in-NodeJS-SSO/Completed Multitenant/package.json</p> <p>Path to vulnerable library: /Before/node_modules/subarg/node_modules/minimist/package.json,/Before/node_modules/subarg/node_modules/minimist/package.json,/Before/node_modules/subarg/node_modules/minimist/package.json</p> <p> Dependency Hierarchy: - cpx-1.5.0.tgz (Root Library) - chokidar-1.7.0.tgz - fsevents-1.2.4.tgz - node-pre-gyp-0.10.0.tgz - rc-1.2.7.tgz - :x: **minimist-1.2.0.tgz** (Vulnerable Library) </details> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Minimist <=1.2.5 is vulnerable to Prototype Pollution via file index.js, function setKey() (lines 69-95). <p>Publish Date: 2022-03-17 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-44906>CVE-2021-44906</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/substack/minimist/issues/164">https://github.com/substack/minimist/issues/164</a></p> <p>Release Date: 2022-03-17</p> <p>Fix Resolution: minimist - 1.2.6</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in minimist tgz minimist tgz cve high severity vulnerability vulnerable libraries minimist tgz minimist tgz minimist tgz parse argument options library home page a href path to dependency file office add in nodejs sso before package json path to vulnerable library before node modules minimist package json before node modules minimist package json before node modules minimist package json dependency hierarchy cpx tgz root library mkdirp tgz x minimist tgz vulnerable library minimist tgz parse argument options library home page a href path to dependency file office add in nodejs sso completed multitenant package json path to vulnerable library before node modules subarg node modules minimist package json before node modules subarg node modules minimist package json before node modules subarg node modules minimist package json dependency hierarchy cpx tgz root library chokidar tgz fsevents tgz node pre gyp tgz rc tgz x minimist tgz vulnerable library vulnerability details minimist is vulnerable to prototype pollution via file index js function setkey lines publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution minimist step up your open source security game with whitesource
0
29,937
8,443,782,253
IssuesEvent
2018-10-18 16:28:48
OpenFAST/openfast
https://api.github.com/repos/OpenFAST/openfast
closed
Build problems on Windows when downloading openfast/dev as a zip instead of a git clone
bug build-issues cmake visual-studio
I receive fatal build error: Not a git repository (or any parent up to mount point /cygdrive/c) Stopping at filesystem boundary (GIT_DISCOVERY_ACROSS_FILESYSTEM not set). At this point I have not investigated any further. Should test a non-Windows cmake build under the same conditions: zip download instead of git clone
1.0
Build problems on Windows when downloading openfast/dev as a zip instead of a git clone - I receive fatal build error: Not a git repository (or any parent up to mount point /cygdrive/c) Stopping at filesystem boundary (GIT_DISCOVERY_ACROSS_FILESYSTEM not set). At this point I have not investigated any further. Should test a non-Windows cmake build under the same conditions: zip download instead of git clone
non_priority
build problems on windows when downloading openfast dev as a zip instead of a git clone i receive fatal build error not a git repository or any parent up to mount point cygdrive c stopping at filesystem boundary git discovery across filesystem not set at this point i have not investigated any further should test a non windows cmake build under the same conditions zip download instead of git clone
0
250,309
27,066,449,481
IssuesEvent
2023-02-14 01:04:23
turkdevops/snyk
https://api.github.com/repos/turkdevops/snyk
opened
CVE-2022-44570 (High) detected in rack-1.6.4.gem
security vulnerability
## CVE-2022-44570 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>rack-1.6.4.gem</b></p></summary> <p>Rack provides a minimal, modular and adaptable interface for developing web applications in Ruby. By wrapping HTTP requests and responses in the simplest way possible, it unifies and distills the API for web servers, web frameworks, and software in between (the so-called middleware) into a single method call. Also see http://rack.github.io/. </p> <p>Library home page: <a href="https://rubygems.org/gems/rack-1.6.4.gem">https://rubygems.org/gems/rack-1.6.4.gem</a></p> <p> Dependency Hierarchy: - actionpack-4.2.5.gem (Root Library) - :x: **rack-1.6.4.gem** (Vulnerable Library) <p>Found in base branch: <b>ALL_HANDS/major-secrets</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A denial of service vulnerability in the Range header parsing component of Rack >= 1.5.0. A Carefully crafted input can cause the Range header parsing component in Rack to take an unexpected amount of time, possibly resulting in a denial of service attack vector. Any applications that deal with Range requests (such as streaming applications, or applications that serve files) may be impacted. <p>Publish Date: 2023-02-09 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-44570>CVE-2022-44570</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-65f5-mfpf-vfhj">https://github.com/advisories/GHSA-65f5-mfpf-vfhj</a></p> <p>Release Date: 2023-02-09</p> <p>Fix Resolution: rack - 2.0.9.2,2.1.4.2,2.2.6.2,3.0.4.1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2022-44570 (High) detected in rack-1.6.4.gem - ## CVE-2022-44570 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>rack-1.6.4.gem</b></p></summary> <p>Rack provides a minimal, modular and adaptable interface for developing web applications in Ruby. By wrapping HTTP requests and responses in the simplest way possible, it unifies and distills the API for web servers, web frameworks, and software in between (the so-called middleware) into a single method call. Also see http://rack.github.io/. </p> <p>Library home page: <a href="https://rubygems.org/gems/rack-1.6.4.gem">https://rubygems.org/gems/rack-1.6.4.gem</a></p> <p> Dependency Hierarchy: - actionpack-4.2.5.gem (Root Library) - :x: **rack-1.6.4.gem** (Vulnerable Library) <p>Found in base branch: <b>ALL_HANDS/major-secrets</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A denial of service vulnerability in the Range header parsing component of Rack >= 1.5.0. A Carefully crafted input can cause the Range header parsing component in Rack to take an unexpected amount of time, possibly resulting in a denial of service attack vector. Any applications that deal with Range requests (such as streaming applications, or applications that serve files) may be impacted. <p>Publish Date: 2023-02-09 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-44570>CVE-2022-44570</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-65f5-mfpf-vfhj">https://github.com/advisories/GHSA-65f5-mfpf-vfhj</a></p> <p>Release Date: 2023-02-09</p> <p>Fix Resolution: rack - 2.0.9.2,2.1.4.2,2.2.6.2,3.0.4.1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in rack gem cve high severity vulnerability vulnerable library rack gem rack provides a minimal modular and adaptable interface for developing web applications in ruby by wrapping http requests and responses in the simplest way possible it unifies and distills the api for web servers web frameworks and software in between the so called middleware into a single method call also see library home page a href dependency hierarchy actionpack gem root library x rack gem vulnerable library found in base branch all hands major secrets vulnerability details a denial of service vulnerability in the range header parsing component of rack a carefully crafted input can cause the range header parsing component in rack to take an unexpected amount of time possibly resulting in a denial of service attack vector any applications that deal with range requests such as streaming applications or applications that serve files may be impacted publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rack step up your open source security game with mend
0
145,355
11,686,440,188
IssuesEvent
2020-03-05 10:52:14
renovatebot/renovate
https://api.github.com/repos/renovatebot/renovate
opened
Memory leak during tests
#tests fix ready
Successful tests often end with this warning: `Running coverage on untested files...A worker process has failed to exit gracefully and has been force exited. This is likely caused by tests leaking due to improper teardown. Try running with --runInBand --detectOpenHandles to find leaks.` This is on OSX but may be platform-independent.
1.0
Memory leak during tests - Successful tests often end with this warning: `Running coverage on untested files...A worker process has failed to exit gracefully and has been force exited. This is likely caused by tests leaking due to improper teardown. Try running with --runInBand --detectOpenHandles to find leaks.` This is on OSX but may be platform-independent.
non_priority
memory leak during tests successful tests often end with this warning running coverage on untested files a worker process has failed to exit gracefully and has been force exited this is likely caused by tests leaking due to improper teardown try running with runinband detectopenhandles to find leaks this is on osx but may be platform independent
0
69,015
22,056,615,320
IssuesEvent
2022-05-30 13:26:15
hazelcast/hazelcast
https://api.github.com/repos/hazelcast/hazelcast
opened
ClientMessage frame read for a message may be broken in case of large messages
Type: Defect All Languages Should Check to-jira
Please see [this](https://github.com/hazelcast/hazelcast/blob/v5.1.1/hazelcast/src/main/java/com/hazelcast/client/impl/protocol/ClientMessageReader.java#L68) line of code. The ClientMessageReader is basically copying data from one buffer to another buffer. The source buffer (src in the code) is bytes received directly from the client socket connection. The destination buffer is an application byte[] , which is wrapped inside an object called ClientMessage. (Its actually slight more complex ... ClientMessage has multiple buffers called Frames, and within ClientMessage there is a linked list of Frames, each Frame has its own byte[]) There is an important variable called readOffset; this denotes the offset in the current destination buffer where we should put the next set of bytes. -1 is the initial state meaning no data has been copied yet. The reason that readOffset is a member variable is because the class is stateful and the main readFrom method in the class is called in a loop. This is important to understand , so here is an example ... we might invoke the readFrom method with 25,000 bytes in the src buffer. Within the readFrom method, we might derive the overall expected length of the frame is 75,000 bytes. The code will still copy the available 25,000 bytes from the src into the destination buffer, and it will set the readOffset to 25,000. The method will then complete and return false (false == 'incomplete'). Then on the next iteration/call to readFrom , we might have 30,000 new bytes in the src. Again it will copy those bytes into the destination (starting at the readOffset 25,000), then it will bump the readOffset pointer forward to 55,000, and so on and so on ... until it receives the full frame of 75,000 bytes. Once a frame is full (i.e. we have copied the number of bytes specified in the frame header) , the code will start populating a new frame. Once a frame is full and it is flagged as IS_FINAL_FLAG = true .. that whole ClientMessage is complete, and the readFrom will return true . Setup for error: We have large messages being sent from client to server therefore they tend to span fairly large number of tcp packets. We also have data being sent from cloud to onprem ... so sometimes those tcp packets can be a few micros apart. This leads to plenty of occurrences where readFrom is invoked when the src buffer does not have the entire dataset (frame) available. And thus our larger messages are often built up iteratively as described above. That generally works well ... apart from 1 case .. Sometimes when readFrom is called, the src buffer has the data needed to complete the destination message except the last few bytes of the final frame (5 bytes say). So, we process as described above what we have, and create an almost complete ClientMessage in memory in ClientMessageReader. Then micros later the remaining data becomes available in the src buffer, and we can append that by another call to readFrom. So that is invoked .. but it hits this check ... int remaining = src.remaining(); if (remaining < SIZE_OF_FRAME_LENGTH_AND_FLAGS) { // we don't have even the frame length and flags ready return false; } which won't read the src buffer if its size is less that 6 bytes. So, then we can't complete the frame / message because the residual part is too small to pass through the above check. The connection then stays in that state, until at some point later, something else is received in the src buffer (typically a hearbeat). At that point we get through this guard because the buffer exceeds the minimum size, and we can process the 5 bytes that have been sat there waiting (and the heartbeat). I think the above check should only occur when we are at the beginning of frames i.e. just moved down to iinside the if (readOffset == -1) { block.
1.0
ClientMessage frame read for a message may be broken in case of large messages - Please see [this](https://github.com/hazelcast/hazelcast/blob/v5.1.1/hazelcast/src/main/java/com/hazelcast/client/impl/protocol/ClientMessageReader.java#L68) line of code. The ClientMessageReader is basically copying data from one buffer to another buffer. The source buffer (src in the code) is bytes received directly from the client socket connection. The destination buffer is an application byte[] , which is wrapped inside an object called ClientMessage. (Its actually slight more complex ... ClientMessage has multiple buffers called Frames, and within ClientMessage there is a linked list of Frames, each Frame has its own byte[]) There is an important variable called readOffset; this denotes the offset in the current destination buffer where we should put the next set of bytes. -1 is the initial state meaning no data has been copied yet. The reason that readOffset is a member variable is because the class is stateful and the main readFrom method in the class is called in a loop. This is important to understand , so here is an example ... we might invoke the readFrom method with 25,000 bytes in the src buffer. Within the readFrom method, we might derive the overall expected length of the frame is 75,000 bytes. The code will still copy the available 25,000 bytes from the src into the destination buffer, and it will set the readOffset to 25,000. The method will then complete and return false (false == 'incomplete'). Then on the next iteration/call to readFrom , we might have 30,000 new bytes in the src. Again it will copy those bytes into the destination (starting at the readOffset 25,000), then it will bump the readOffset pointer forward to 55,000, and so on and so on ... until it receives the full frame of 75,000 bytes. Once a frame is full (i.e. we have copied the number of bytes specified in the frame header) , the code will start populating a new frame. Once a frame is full and it is flagged as IS_FINAL_FLAG = true .. that whole ClientMessage is complete, and the readFrom will return true . Setup for error: We have large messages being sent from client to server therefore they tend to span fairly large number of tcp packets. We also have data being sent from cloud to onprem ... so sometimes those tcp packets can be a few micros apart. This leads to plenty of occurrences where readFrom is invoked when the src buffer does not have the entire dataset (frame) available. And thus our larger messages are often built up iteratively as described above. That generally works well ... apart from 1 case .. Sometimes when readFrom is called, the src buffer has the data needed to complete the destination message except the last few bytes of the final frame (5 bytes say). So, we process as described above what we have, and create an almost complete ClientMessage in memory in ClientMessageReader. Then micros later the remaining data becomes available in the src buffer, and we can append that by another call to readFrom. So that is invoked .. but it hits this check ... int remaining = src.remaining(); if (remaining < SIZE_OF_FRAME_LENGTH_AND_FLAGS) { // we don't have even the frame length and flags ready return false; } which won't read the src buffer if its size is less that 6 bytes. So, then we can't complete the frame / message because the residual part is too small to pass through the above check. The connection then stays in that state, until at some point later, something else is received in the src buffer (typically a hearbeat). At that point we get through this guard because the buffer exceeds the minimum size, and we can process the 5 bytes that have been sat there waiting (and the heartbeat). I think the above check should only occur when we are at the beginning of frames i.e. just moved down to iinside the if (readOffset == -1) { block.
non_priority
clientmessage frame read for a message may be broken in case of large messages please see line of code the clientmessagereader is basically copying data from one buffer to another buffer the source buffer src in the code is bytes received directly from the client socket connection the destination buffer is an application byte which is wrapped inside an object called clientmessage its actually slight more complex clientmessage has multiple buffers called frames and within clientmessage there is a linked list of frames each frame has its own byte there is an important variable called readoffset this denotes the offset in the current destination buffer where we should put the next set of bytes is the initial state meaning no data has been copied yet the reason that readoffset is a member variable is because the class is stateful and the main readfrom method in the class is called in a loop this is important to understand so here is an example we might invoke the readfrom method with bytes in the src buffer within the readfrom method we might derive the overall expected length of the frame is bytes the code will still copy the available bytes from the src into the destination buffer and it will set the readoffset to the method will then complete and return false false incomplete then on the next iteration call to readfrom we might have new bytes in the src again it will copy those bytes into the destination starting at the readoffset then it will bump the readoffset pointer forward to and so on and so on until it receives the full frame of bytes once a frame is full i e we have copied the number of bytes specified in the frame header the code will start populating a new frame once a frame is full and it is flagged as is final flag true that whole clientmessage is complete and the readfrom will return true setup for error we have large messages being sent from client to server therefore they tend to span fairly large number of tcp packets we also have data being sent from cloud to onprem so sometimes those tcp packets can be a few micros apart this leads to plenty of occurrences where readfrom is invoked when the src buffer does not have the entire dataset frame available and thus our larger messages are often built up iteratively as described above that generally works well apart from case sometimes when readfrom is called the src buffer has the data needed to complete the destination message except the last few bytes of the final frame bytes say so we process as described above what we have and create an almost complete clientmessage in memory in clientmessagereader then micros later the remaining data becomes available in the src buffer and we can append that by another call to readfrom so that is invoked but it hits this check int remaining src remaining if remaining size of frame length and flags we don t have even the frame length and flags ready return false which won t read the src buffer if its size is less that bytes so then we can t complete the frame message because the residual part is too small to pass through the above check the connection then stays in that state until at some point later something else is received in the src buffer typically a hearbeat at that point we get through this guard because the buffer exceeds the minimum size and we can process the bytes that have been sat there waiting and the heartbeat i think the above check should only occur when we are at the beginning of frames i e just moved down to iinside the if readoffset block
0
41,077
21,467,350,999
IssuesEvent
2022-04-26 06:03:18
nineya/halo-theme-dream
https://api.github.com/repos/nineya/halo-theme-dream
closed
feat:body滚动条优化
performance
### 你当前使用的 Halo 版本 1.4.8 ### 你当前使用的 Dream 版本 2.0.0 ### 描述一下此特性 body滚动条支持背景透明 ### 附加信息 _No response_
True
feat:body滚动条优化 - ### 你当前使用的 Halo 版本 1.4.8 ### 你当前使用的 Dream 版本 2.0.0 ### 描述一下此特性 body滚动条支持背景透明 ### 附加信息 _No response_
non_priority
feat body滚动条优化 你当前使用的 halo 版本 你当前使用的 dream 版本 描述一下此特性 body滚动条支持背景透明 附加信息 no response
0
66,912
12,838,901,886
IssuesEvent
2020-07-07 18:19:08
cosmos/cosmos-sdk
https://api.github.com/repos/cosmos/cosmos-sdk
closed
Common test harness code for IBC tests
code-hygiene help wanted meta-issue tests x/ibc
De-duplicate this code & put it in a central location that can be imported. ToDos: - [x] add `x/ibc/testing/` pkg which sends through messages to create/update client, create connections/channels #6356 - [x] remove testchain from channel keeper #6400 - [x] remove testchain from connection keeper - [x] remove testchain from ibc/ante - [ ] remove testchain from clients cc @fedekunze
1.0
Common test harness code for IBC tests - De-duplicate this code & put it in a central location that can be imported. ToDos: - [x] add `x/ibc/testing/` pkg which sends through messages to create/update client, create connections/channels #6356 - [x] remove testchain from channel keeper #6400 - [x] remove testchain from connection keeper - [x] remove testchain from ibc/ante - [ ] remove testchain from clients cc @fedekunze
non_priority
common test harness code for ibc tests de duplicate this code put it in a central location that can be imported todos add x ibc testing pkg which sends through messages to create update client create connections channels remove testchain from channel keeper remove testchain from connection keeper remove testchain from ibc ante remove testchain from clients cc fedekunze
0
189,855
15,209,015,408
IssuesEvent
2021-02-17 04:12:56
Neorobrooke/neorobrooke-s4
https://api.github.com/repos/Neorobrooke/neorobrooke-s4
closed
Définir la communication série
documentation
Définir le format du JSON pour la communication série. Déterminer si on prend une librairie JSON (par exemple, comme le projet S3) ou si on fait un parseur (long pour rien selon moi). CRITÈRES: - Format JSON défini dans un fichier, avec les commandes, valeurs possibles, type des valeurs - librairie JSON choisie pour l'OpenCR - librairie JSON choisie pour Python
1.0
Définir la communication série - Définir le format du JSON pour la communication série. Déterminer si on prend une librairie JSON (par exemple, comme le projet S3) ou si on fait un parseur (long pour rien selon moi). CRITÈRES: - Format JSON défini dans un fichier, avec les commandes, valeurs possibles, type des valeurs - librairie JSON choisie pour l'OpenCR - librairie JSON choisie pour Python
non_priority
définir la communication série définir le format du json pour la communication série déterminer si on prend une librairie json par exemple comme le projet ou si on fait un parseur long pour rien selon moi critères format json défini dans un fichier avec les commandes valeurs possibles type des valeurs librairie json choisie pour l opencr librairie json choisie pour python
0
275,223
30,214,585,797
IssuesEvent
2023-07-05 14:47:44
amaybaum-dev/EasyBuggy2
https://api.github.com/repos/amaybaum-dev/EasyBuggy2
opened
xalan-2.7.0.jar: 1 vulnerabilities (highest severity is: 7.3) non-reachable
Mend: dependency security vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>xalan-2.7.0.jar</b></p></summary> <p></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /target/easybuggy-1-SNAPSHOT/WEB-INF/lib/xalan-2.7.0.jar,/home/wss-scanner/.m2/repository/xalan/xalan/2.7.0/xalan-2.7.0.jar</p> <p> <p>Found in HEAD commit: <a href="https://github.com/amaybaum-dev/EasyBuggy2/commit/925e7b95b9f4d369198fa40e6b14392536bcb113">925e7b95b9f4d369198fa40e6b14392536bcb113</a></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (xalan version) | Remediation Available | Reachability | | ------------- | ------------- | ----- | ----- | ----- | ------------- | --- | --- | | [CVE-2014-0107](https://www.mend.io/vulnerability-database/CVE-2014-0107) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 7.3 | xalan-2.7.0.jar | Direct | 2.7.2 | &#9989;|<p align="center"><a href="#">[<img src='https://whitesource-resources.whitesourcesoftware.com/viaGreen.png' width=19 height=20>](## 'The vulnerability is non-reachable.')</a></p> | ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> <img src='https://whitesource-resources.whitesourcesoftware.com/viaGreen.png' width=19 height=20> CVE-2014-0107</summary> ### Vulnerable Library - <b>xalan-2.7.0.jar</b></p> <p></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /target/easybuggy-1-SNAPSHOT/WEB-INF/lib/xalan-2.7.0.jar,/home/wss-scanner/.m2/repository/xalan/xalan/2.7.0/xalan-2.7.0.jar</p> <p> Dependency Hierarchy: - :x: **xalan-2.7.0.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/amaybaum-dev/EasyBuggy2/commit/925e7b95b9f4d369198fa40e6b14392536bcb113">925e7b95b9f4d369198fa40e6b14392536bcb113</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Reachability Analysis <p> <p>The vulnerable code is not reachable.</p> </p> <p></p> ### Vulnerability Details <p> The TransformerFactory in Apache Xalan-Java before 2.7.2 does not properly restrict access to certain properties when FEATURE_SECURE_PROCESSING is enabled, which allows remote attackers to bypass expected restrictions and load arbitrary classes or access external resources via a crafted (1) xalan:content-header, (2) xalan:entities, (3) xslt:content-header, or (4) xslt:entities property, or a Java property that is bound to the XSLT 1.0 system-property function. <p>Publish Date: 2014-04-15 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2014-0107>CVE-2014-0107</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.3</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0107">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0107</a></p> <p>Release Date: 2014-04-15</p> <p>Fix Resolution: 2.7.2</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details> *** <p>:rescue_worker_helmet: Automatic Remediation is available for this issue.</p>
True
xalan-2.7.0.jar: 1 vulnerabilities (highest severity is: 7.3) non-reachable - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>xalan-2.7.0.jar</b></p></summary> <p></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /target/easybuggy-1-SNAPSHOT/WEB-INF/lib/xalan-2.7.0.jar,/home/wss-scanner/.m2/repository/xalan/xalan/2.7.0/xalan-2.7.0.jar</p> <p> <p>Found in HEAD commit: <a href="https://github.com/amaybaum-dev/EasyBuggy2/commit/925e7b95b9f4d369198fa40e6b14392536bcb113">925e7b95b9f4d369198fa40e6b14392536bcb113</a></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (xalan version) | Remediation Available | Reachability | | ------------- | ------------- | ----- | ----- | ----- | ------------- | --- | --- | | [CVE-2014-0107](https://www.mend.io/vulnerability-database/CVE-2014-0107) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 7.3 | xalan-2.7.0.jar | Direct | 2.7.2 | &#9989;|<p align="center"><a href="#">[<img src='https://whitesource-resources.whitesourcesoftware.com/viaGreen.png' width=19 height=20>](## 'The vulnerability is non-reachable.')</a></p> | ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> <img src='https://whitesource-resources.whitesourcesoftware.com/viaGreen.png' width=19 height=20> CVE-2014-0107</summary> ### Vulnerable Library - <b>xalan-2.7.0.jar</b></p> <p></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /target/easybuggy-1-SNAPSHOT/WEB-INF/lib/xalan-2.7.0.jar,/home/wss-scanner/.m2/repository/xalan/xalan/2.7.0/xalan-2.7.0.jar</p> <p> Dependency Hierarchy: - :x: **xalan-2.7.0.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/amaybaum-dev/EasyBuggy2/commit/925e7b95b9f4d369198fa40e6b14392536bcb113">925e7b95b9f4d369198fa40e6b14392536bcb113</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Reachability Analysis <p> <p>The vulnerable code is not reachable.</p> </p> <p></p> ### Vulnerability Details <p> The TransformerFactory in Apache Xalan-Java before 2.7.2 does not properly restrict access to certain properties when FEATURE_SECURE_PROCESSING is enabled, which allows remote attackers to bypass expected restrictions and load arbitrary classes or access external resources via a crafted (1) xalan:content-header, (2) xalan:entities, (3) xslt:content-header, or (4) xslt:entities property, or a Java property that is bound to the XSLT 1.0 system-property function. <p>Publish Date: 2014-04-15 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2014-0107>CVE-2014-0107</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.3</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0107">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0107</a></p> <p>Release Date: 2014-04-15</p> <p>Fix Resolution: 2.7.2</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details> *** <p>:rescue_worker_helmet: Automatic Remediation is available for this issue.</p>
non_priority
xalan jar vulnerabilities highest severity is non reachable vulnerable library xalan jar path to dependency file pom xml path to vulnerable library target easybuggy snapshot web inf lib xalan jar home wss scanner repository xalan xalan xalan jar found in head commit a href vulnerabilities cve severity cvss dependency type fixed in xalan version remediation available reachability high xalan jar direct the vulnerability is non reachable details cve vulnerable library xalan jar path to dependency file pom xml path to vulnerable library target easybuggy snapshot web inf lib xalan jar home wss scanner repository xalan xalan xalan jar dependency hierarchy x xalan jar vulnerable library found in head commit a href found in base branch master reachability analysis the vulnerable code is not reachable vulnerability details the transformerfactory in apache xalan java before does not properly restrict access to certain properties when feature secure processing is enabled which allows remote attackers to bypass expected restrictions and load arbitrary classes or access external resources via a crafted xalan content header xalan entities xslt content header or xslt entities property or a java property that is bound to the xslt system property function publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact low availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation is available for this issue rescue worker helmet automatic remediation is available for this issue
0