Unnamed: 0
int64
0
832k
id
float64
2.49B
32.1B
type
stringclasses
1 value
created_at
stringlengths
19
19
repo
stringlengths
5
112
repo_url
stringlengths
34
141
action
stringclasses
3 values
title
stringlengths
1
855
labels
stringlengths
4
721
body
stringlengths
1
261k
index
stringclasses
13 values
text_combine
stringlengths
96
261k
label
stringclasses
2 values
text
stringlengths
96
240k
binary_label
int64
0
1
115,427
17,313,967,786
IssuesEvent
2021-07-27 01:37:49
jinuem/React-Type-Script-Starter
https://api.github.com/repos/jinuem/React-Type-Script-Starter
opened
WS-2020-0344 (High) detected in is-my-json-valid-2.15.0.tgz
security vulnerability
## WS-2020-0344 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>is-my-json-valid-2.15.0.tgz</b></p></summary> <p>A JSONSchema validator that uses code generation to be extremely fast</p> <p>Library home page: <a href="https://registry.npmjs.org/is-my-json-valid/-/is-my-json-valid-2.15.0.tgz">https://registry.npmjs.org/is-my-json-valid/-/is-my-json-valid-2.15.0.tgz</a></p> <p> Dependency Hierarchy: - react-scripts-ts-2.5.0.tgz (Root Library) - fsevents-1.0.17.tgz - node-pre-gyp-0.6.32.tgz - request-2.79.0.tgz - har-validator-2.0.6.tgz - :x: **is-my-json-valid-2.15.0.tgz** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Arbitrary Code Execution vulnerability was found in is-my-json-valid before 2.20.3 via the fromatName function. <p>Publish Date: 2020-06-09 <p>URL: <a href=https://github.com/mafintosh/is-my-json-valid/commit/3419563687df463b4ca709a2b46be8e15d6a2b3d>WS-2020-0344</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/mafintosh/is-my-json-valid/commit/c3fc04fc455d40e9b29537f8e2c73a28ce106edb">https://github.com/mafintosh/is-my-json-valid/commit/c3fc04fc455d40e9b29537f8e2c73a28ce106edb</a></p> <p>Release Date: 2020-06-09</p> <p>Fix Resolution: is-my-json-valid - 2.20.3</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
WS-2020-0344 (High) detected in is-my-json-valid-2.15.0.tgz - ## WS-2020-0344 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>is-my-json-valid-2.15.0.tgz</b></p></summary> <p>A JSONSchema validator that uses code generation to be extremely fast</p> <p>Library home page: <a href="https://registry.npmjs.org/is-my-json-valid/-/is-my-json-valid-2.15.0.tgz">https://registry.npmjs.org/is-my-json-valid/-/is-my-json-valid-2.15.0.tgz</a></p> <p> Dependency Hierarchy: - react-scripts-ts-2.5.0.tgz (Root Library) - fsevents-1.0.17.tgz - node-pre-gyp-0.6.32.tgz - request-2.79.0.tgz - har-validator-2.0.6.tgz - :x: **is-my-json-valid-2.15.0.tgz** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Arbitrary Code Execution vulnerability was found in is-my-json-valid before 2.20.3 via the fromatName function. <p>Publish Date: 2020-06-09 <p>URL: <a href=https://github.com/mafintosh/is-my-json-valid/commit/3419563687df463b4ca709a2b46be8e15d6a2b3d>WS-2020-0344</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/mafintosh/is-my-json-valid/commit/c3fc04fc455d40e9b29537f8e2c73a28ce106edb">https://github.com/mafintosh/is-my-json-valid/commit/c3fc04fc455d40e9b29537f8e2c73a28ce106edb</a></p> <p>Release Date: 2020-06-09</p> <p>Fix Resolution: is-my-json-valid - 2.20.3</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
ws high detected in is my json valid tgz ws high severity vulnerability vulnerable library is my json valid tgz a jsonschema validator that uses code generation to be extremely fast library home page a href dependency hierarchy react scripts ts tgz root library fsevents tgz node pre gyp tgz request tgz har validator tgz x is my json valid tgz vulnerable library vulnerability details arbitrary code execution vulnerability was found in is my json valid before via the fromatname function publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution is my json valid step up your open source security game with whitesource
0
155,906
13,636,654,684
IssuesEvent
2020-09-25 06:21:34
fuchicorp/terraform-helm-chart
https://api.github.com/repos/fuchicorp/terraform-helm-chart
closed
Please Update README file in Terraform-Helm-Chart
DevOps Documentation Helm Terraform
Please Update README file in terraform-helm-chart for remote chart deployment. so users can follow the steps and deploy the remote charts. Thanks Sprint Points: link for the file, that needs to be updated: https://github.com/fuchicorp/terraform-helm-chart/blob/master/README.md
1.0
Please Update README file in Terraform-Helm-Chart - Please Update README file in terraform-helm-chart for remote chart deployment. so users can follow the steps and deploy the remote charts. Thanks Sprint Points: link for the file, that needs to be updated: https://github.com/fuchicorp/terraform-helm-chart/blob/master/README.md
non_priority
please update readme file in terraform helm chart please update readme file in terraform helm chart for remote chart deployment so users can follow the steps and deploy the remote charts thanks sprint points link for the file that needs to be updated
0
82,732
7,851,162,391
IssuesEvent
2018-06-20 10:47:19
raiden-network/raiden
https://api.github.com/repos/raiden-network/raiden
closed
Create unit tests for new proxies
testing
Integration of new smart contracts: test basic contracts proxy functionality. - [x] secret registry - [x] token network registry - [x] token - [ ] token network - [x] new_netting_channel - [ ] channel_exists - [ ] detail_participant - [ ] detail_channel - [x] deposit - [ ] update transfer - [x] close - [ ] unlock - [ ] settle - [ ] events filter
1.0
Create unit tests for new proxies - Integration of new smart contracts: test basic contracts proxy functionality. - [x] secret registry - [x] token network registry - [x] token - [ ] token network - [x] new_netting_channel - [ ] channel_exists - [ ] detail_participant - [ ] detail_channel - [x] deposit - [ ] update transfer - [x] close - [ ] unlock - [ ] settle - [ ] events filter
non_priority
create unit tests for new proxies integration of new smart contracts test basic contracts proxy functionality secret registry token network registry token token network new netting channel channel exists detail participant detail channel deposit update transfer close unlock settle events filter
0
53,217
13,261,190,888
IssuesEvent
2020-08-20 19:26:53
icecube-trac/tix4
https://api.github.com/repos/icecube-trac/tix4
closed
Coordinate services documentation is Unhelpful (Trac #977)
Migrated from Trac combo reconstruction defect
Most Astronomers use a coordinate system called J2000 to locate the position of astronomical objects which where the pole is the celestial pole at January 1st 2000. However sometimes a coordinate system called current is used where the pole is wherever the hell the celestial pole it is at the time of observation. Both of these cooridinate systems are refered to as equatorial cooridinates. as the difference is at most 18 arcseconds for time scales on the order of icecubes's lifetime. coordinate-services handles these two cooridinate systems in a rather confusing way: to get from equatoraial to local cooridinates it provides two sets of functions: Local2RA(), Local2Dec() and Local2RA_no(), Local2Dec_no() as well as two sets of functions for the reverse transforms: Equa2LocalAzimuth, Equa2LocalZenith() and Equa2LocalAzimuth_inv(), Equal2LocalZenith_inv() It is completly unclear weather one should use the _no() functions or not and the _inv() functions or not, the function's doc strings only seem to add to the confusion In addition there are the totally confusing Equa2LocalRA and Equal2LocalDec which claim to take an RA and Dec and convert them to another RA and Dec, such a function should not have local in its name. furthermore all of these functions have epoch variables which is even more confusing, why would current coordinates need a local function. as well you need to be reading a pretty old paper to find anything in non J2000 coordinates. so epoch should never be anything but 2000 ( it looks like that is the default from the code, but you can't tell from the documentation) What is needed is to figure out which functions are are for J2000 and which ones are for current. and properly document them. Then depreciate the old functions and replace them with functions with the string "J2000" and "Current". none of which should have an epoch variable. ( If a new epoch becomes popular J2050 for example then new functions can be added ) Python examples should also be provided <details> <summary><em>Migrated from <a href="https://code.icecube.wisc.edu/projects/icecube/ticket/977">https://code.icecube.wisc.edu/projects/icecube/ticket/977</a>, reported by icecube</summary> <p> ```json { "status": "closed", "changetime": "2015-06-26T21:13:56", "_ts": "1435353236861155", "description": "Most Astronomers use a coordinate system called J2000 to locate the position of astronomical objects which where the pole is the celestial pole at January 1st 2000. However sometimes a coordinate system called current is used where the pole is wherever the hell the celestial pole it is at the time of observation. Both of these cooridinate systems are refered to as equatorial cooridinates. as the difference is at most 18 arcseconds for time scales on the order of icecubes's lifetime. \n\ncoordinate-services handles these two cooridinate systems in a rather confusing way: to get from equatoraial to local cooridinates it provides two sets of functions:\nLocal2RA(), Local2Dec() and Local2RA_no(), Local2Dec_no()\n\nas well as two sets of functions for the reverse transforms:\nEqua2LocalAzimuth, Equa2LocalZenith() and Equa2LocalAzimuth_inv(), Equal2LocalZenith_inv()\n\nIt is completly unclear weather one should use the _no() functions or not and the _inv() functions or not, the function's doc strings only seem to add to the confusion\n\nIn addition there are the totally confusing Equa2LocalRA and Equal2LocalDec which claim to take an RA and Dec and convert them to another RA and Dec, such a function should not have local in its name.\n\nfurthermore all of these functions have epoch variables which is even more confusing, why would current coordinates need a local function. as well you need to be reading a pretty old paper to find anything in non J2000 coordinates. so epoch should never be anything but 2000 ( it looks like that is the default from the code, but you can't tell from the documentation)\n\nWhat is needed is to figure out which functions are are for J2000 and which ones are for current. and properly document them. Then depreciate the old functions and replace them with functions with the string \"J2000\" and \"Current\". none of which should have an epoch variable. ( If a new epoch becomes popular J2050 for example then new functions can be added )\n\nPython examples should also be provided\n", "reporter": "icecube", "cc": "", "resolution": "wontfix", "time": "2015-05-13T16:30:51", "component": "combo reconstruction", "summary": "Coordinate services documentation is Unhelpful", "priority": "normal", "keywords": "", "milestone": "", "owner": "", "type": "defect" } ``` </p> </details>
1.0
Coordinate services documentation is Unhelpful (Trac #977) - Most Astronomers use a coordinate system called J2000 to locate the position of astronomical objects which where the pole is the celestial pole at January 1st 2000. However sometimes a coordinate system called current is used where the pole is wherever the hell the celestial pole it is at the time of observation. Both of these cooridinate systems are refered to as equatorial cooridinates. as the difference is at most 18 arcseconds for time scales on the order of icecubes's lifetime. coordinate-services handles these two cooridinate systems in a rather confusing way: to get from equatoraial to local cooridinates it provides two sets of functions: Local2RA(), Local2Dec() and Local2RA_no(), Local2Dec_no() as well as two sets of functions for the reverse transforms: Equa2LocalAzimuth, Equa2LocalZenith() and Equa2LocalAzimuth_inv(), Equal2LocalZenith_inv() It is completly unclear weather one should use the _no() functions or not and the _inv() functions or not, the function's doc strings only seem to add to the confusion In addition there are the totally confusing Equa2LocalRA and Equal2LocalDec which claim to take an RA and Dec and convert them to another RA and Dec, such a function should not have local in its name. furthermore all of these functions have epoch variables which is even more confusing, why would current coordinates need a local function. as well you need to be reading a pretty old paper to find anything in non J2000 coordinates. so epoch should never be anything but 2000 ( it looks like that is the default from the code, but you can't tell from the documentation) What is needed is to figure out which functions are are for J2000 and which ones are for current. and properly document them. Then depreciate the old functions and replace them with functions with the string "J2000" and "Current". none of which should have an epoch variable. ( If a new epoch becomes popular J2050 for example then new functions can be added ) Python examples should also be provided <details> <summary><em>Migrated from <a href="https://code.icecube.wisc.edu/projects/icecube/ticket/977">https://code.icecube.wisc.edu/projects/icecube/ticket/977</a>, reported by icecube</summary> <p> ```json { "status": "closed", "changetime": "2015-06-26T21:13:56", "_ts": "1435353236861155", "description": "Most Astronomers use a coordinate system called J2000 to locate the position of astronomical objects which where the pole is the celestial pole at January 1st 2000. However sometimes a coordinate system called current is used where the pole is wherever the hell the celestial pole it is at the time of observation. Both of these cooridinate systems are refered to as equatorial cooridinates. as the difference is at most 18 arcseconds for time scales on the order of icecubes's lifetime. \n\ncoordinate-services handles these two cooridinate systems in a rather confusing way: to get from equatoraial to local cooridinates it provides two sets of functions:\nLocal2RA(), Local2Dec() and Local2RA_no(), Local2Dec_no()\n\nas well as two sets of functions for the reverse transforms:\nEqua2LocalAzimuth, Equa2LocalZenith() and Equa2LocalAzimuth_inv(), Equal2LocalZenith_inv()\n\nIt is completly unclear weather one should use the _no() functions or not and the _inv() functions or not, the function's doc strings only seem to add to the confusion\n\nIn addition there are the totally confusing Equa2LocalRA and Equal2LocalDec which claim to take an RA and Dec and convert them to another RA and Dec, such a function should not have local in its name.\n\nfurthermore all of these functions have epoch variables which is even more confusing, why would current coordinates need a local function. as well you need to be reading a pretty old paper to find anything in non J2000 coordinates. so epoch should never be anything but 2000 ( it looks like that is the default from the code, but you can't tell from the documentation)\n\nWhat is needed is to figure out which functions are are for J2000 and which ones are for current. and properly document them. Then depreciate the old functions and replace them with functions with the string \"J2000\" and \"Current\". none of which should have an epoch variable. ( If a new epoch becomes popular J2050 for example then new functions can be added )\n\nPython examples should also be provided\n", "reporter": "icecube", "cc": "", "resolution": "wontfix", "time": "2015-05-13T16:30:51", "component": "combo reconstruction", "summary": "Coordinate services documentation is Unhelpful", "priority": "normal", "keywords": "", "milestone": "", "owner": "", "type": "defect" } ``` </p> </details>
non_priority
coordinate services documentation is unhelpful trac most astronomers use a coordinate system called to locate the position of astronomical objects which where the pole is the celestial pole at january however sometimes a coordinate system called current is used where the pole is wherever the hell the celestial pole it is at the time of observation both of these cooridinate systems are refered to as equatorial cooridinates as the difference is at most arcseconds for time scales on the order of icecubes s lifetime coordinate services handles these two cooridinate systems in a rather confusing way to get from equatoraial to local cooridinates it provides two sets of functions and no no as well as two sets of functions for the reverse transforms and inv inv it is completly unclear weather one should use the no functions or not and the inv functions or not the function s doc strings only seem to add to the confusion in addition there are the totally confusing and which claim to take an ra and dec and convert them to another ra and dec such a function should not have local in its name furthermore all of these functions have epoch variables which is even more confusing why would current coordinates need a local function as well you need to be reading a pretty old paper to find anything in non coordinates so epoch should never be anything but it looks like that is the default from the code but you can t tell from the documentation what is needed is to figure out which functions are are for and which ones are for current and properly document them then depreciate the old functions and replace them with functions with the string and current none of which should have an epoch variable if a new epoch becomes popular for example then new functions can be added python examples should also be provided migrated from json status closed changetime ts description most astronomers use a coordinate system called to locate the position of astronomical objects which where the pole is the celestial pole at january however sometimes a coordinate system called current is used where the pole is wherever the hell the celestial pole it is at the time of observation both of these cooridinate systems are refered to as equatorial cooridinates as the difference is at most arcseconds for time scales on the order of icecubes s lifetime n ncoordinate services handles these two cooridinate systems in a rather confusing way to get from equatoraial to local cooridinates it provides two sets of functions and no no n nas well as two sets of functions for the reverse transforms and inv inv n nit is completly unclear weather one should use the no functions or not and the inv functions or not the function s doc strings only seem to add to the confusion n nin addition there are the totally confusing and which claim to take an ra and dec and convert them to another ra and dec such a function should not have local in its name n nfurthermore all of these functions have epoch variables which is even more confusing why would current coordinates need a local function as well you need to be reading a pretty old paper to find anything in non coordinates so epoch should never be anything but it looks like that is the default from the code but you can t tell from the documentation n nwhat is needed is to figure out which functions are are for and which ones are for current and properly document them then depreciate the old functions and replace them with functions with the string and current none of which should have an epoch variable if a new epoch becomes popular for example then new functions can be added n npython examples should also be provided n reporter icecube cc resolution wontfix time component combo reconstruction summary coordinate services documentation is unhelpful priority normal keywords milestone owner type defect
0
227,828
18,103,060,952
IssuesEvent
2021-09-22 16:03:38
Azure/azure-sdk-for-js
https://api.github.com/repos/Azure/azure-sdk-for-js
closed
[Text Analytics] [AAD] TextAnalyticsClient LROs #health cancelled failing in nightly runs
Client Cognitive - Text Analytics test-reliability
Text Analytics nightly test runs are failing with: > Stack trace: > AssertionError: expected undefined to be truthy at Context.<anonymous> (test/public/textAnalyticsClient.spec.ts:2675:19) For more details check here: - https://dev.azure.com/azure-sdk/internal/_build/results?buildId=1107532&view=results
1.0
[Text Analytics] [AAD] TextAnalyticsClient LROs #health cancelled failing in nightly runs - Text Analytics nightly test runs are failing with: > Stack trace: > AssertionError: expected undefined to be truthy at Context.<anonymous> (test/public/textAnalyticsClient.spec.ts:2675:19) For more details check here: - https://dev.azure.com/azure-sdk/internal/_build/results?buildId=1107532&view=results
non_priority
textanalyticsclient lros health cancelled failing in nightly runs text analytics nightly test runs are failing with stack trace assertionerror expected undefined to be truthy at context test public textanalyticsclient spec ts for more details check here
0
329,164
24,210,210,630
IssuesEvent
2022-09-25 19:38:40
marcosdosea/AgendeMe
https://api.github.com/repos/marcosdosea/AgendeMe
closed
Alterar o tipo do atributo telefone da tabela cidadão
documentation 3.0
Alterar do tipo **INT** para o tipo **VARCHAR(20)** ## Antes ![image](https://user-images.githubusercontent.com/69280619/192159784-54736265-7399-4256-9dcd-e25d8d03b1ef.png) ## Depois ![image](https://user-images.githubusercontent.com/69280619/192159817-5f855306-b7b9-406a-a159-5badc195039b.png)
1.0
Alterar o tipo do atributo telefone da tabela cidadão - Alterar do tipo **INT** para o tipo **VARCHAR(20)** ## Antes ![image](https://user-images.githubusercontent.com/69280619/192159784-54736265-7399-4256-9dcd-e25d8d03b1ef.png) ## Depois ![image](https://user-images.githubusercontent.com/69280619/192159817-5f855306-b7b9-406a-a159-5badc195039b.png)
non_priority
alterar o tipo do atributo telefone da tabela cidadão alterar do tipo int para o tipo varchar antes depois
0
410,866
27,805,819,187
IssuesEvent
2023-03-17 19:47:44
liveview-native/liveview-client-swiftui
https://api.github.com/repos/liveview-native/liveview-client-swiftui
closed
Documentation: SwiftUI -> User Interface Element -> Controls and indicator -> Links: ShareLink
documentation
As a PO I'd like to have documentation for the [ShareLink](https://github.com/liveviewnative/liveview-client-swiftui/issues/65)
1.0
Documentation: SwiftUI -> User Interface Element -> Controls and indicator -> Links: ShareLink - As a PO I'd like to have documentation for the [ShareLink](https://github.com/liveviewnative/liveview-client-swiftui/issues/65)
non_priority
documentation swiftui user interface element controls and indicator links sharelink as a po i d like to have documentation for the
0
187,118
22,031,535,395
IssuesEvent
2022-05-28 00:39:48
vincenzodistasio97/Slack-Clone
https://api.github.com/repos/vincenzodistasio97/Slack-Clone
closed
CVE-2021-29060 (Medium) detected in color-string-1.5.3.tgz - autoclosed
security vulnerability
## CVE-2021-29060 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>color-string-1.5.3.tgz</b></p></summary> <p>Parser and generator for CSS color strings</p> <p>Library home page: <a href="https://registry.npmjs.org/color-string/-/color-string-1.5.3.tgz">https://registry.npmjs.org/color-string/-/color-string-1.5.3.tgz</a></p> <p>Path to dependency file: /server/package.json</p> <p>Path to vulnerable library: /server/node_modules/color-string/package.json</p> <p> Dependency Hierarchy: - winston-3.1.0.tgz (Root Library) - diagnostics-1.1.1.tgz - colorspace-1.1.1.tgz - color-3.0.0.tgz - :x: **color-string-1.5.3.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/vincenzodistasio97/Slack-Clone/commit/125be6381c29e8f8e1d4b2fed216db288fad9798">125be6381c29e8f8e1d4b2fed216db288fad9798</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A Regular Expression Denial of Service (ReDOS) vulnerability was discovered in Color-String version 1.5.5 and below which occurs when the application is provided and checks a crafted invalid HWB string. <p>Publish Date: 2021-06-21 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-29060>CVE-2021-29060</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-257v-vj4p-3w2h">https://github.com/advisories/GHSA-257v-vj4p-3w2h</a></p> <p>Release Date: 2021-06-21</p> <p>Fix Resolution (color-string): 1.5.5</p> <p>Direct dependency fix Resolution (winston): 3.2.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2021-29060 (Medium) detected in color-string-1.5.3.tgz - autoclosed - ## CVE-2021-29060 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>color-string-1.5.3.tgz</b></p></summary> <p>Parser and generator for CSS color strings</p> <p>Library home page: <a href="https://registry.npmjs.org/color-string/-/color-string-1.5.3.tgz">https://registry.npmjs.org/color-string/-/color-string-1.5.3.tgz</a></p> <p>Path to dependency file: /server/package.json</p> <p>Path to vulnerable library: /server/node_modules/color-string/package.json</p> <p> Dependency Hierarchy: - winston-3.1.0.tgz (Root Library) - diagnostics-1.1.1.tgz - colorspace-1.1.1.tgz - color-3.0.0.tgz - :x: **color-string-1.5.3.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/vincenzodistasio97/Slack-Clone/commit/125be6381c29e8f8e1d4b2fed216db288fad9798">125be6381c29e8f8e1d4b2fed216db288fad9798</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A Regular Expression Denial of Service (ReDOS) vulnerability was discovered in Color-String version 1.5.5 and below which occurs when the application is provided and checks a crafted invalid HWB string. <p>Publish Date: 2021-06-21 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-29060>CVE-2021-29060</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-257v-vj4p-3w2h">https://github.com/advisories/GHSA-257v-vj4p-3w2h</a></p> <p>Release Date: 2021-06-21</p> <p>Fix Resolution (color-string): 1.5.5</p> <p>Direct dependency fix Resolution (winston): 3.2.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in color string tgz autoclosed cve medium severity vulnerability vulnerable library color string tgz parser and generator for css color strings library home page a href path to dependency file server package json path to vulnerable library server node modules color string package json dependency hierarchy winston tgz root library diagnostics tgz colorspace tgz color tgz x color string tgz vulnerable library found in head commit a href found in base branch master vulnerability details a regular expression denial of service redos vulnerability was discovered in color string version and below which occurs when the application is provided and checks a crafted invalid hwb string publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution color string direct dependency fix resolution winston step up your open source security game with whitesource
0
96,199
19,913,572,569
IssuesEvent
2022-01-25 19:49:31
HumanCellAtlas/dcp2
https://api.github.com/repos/HumanCellAtlas/dcp2
closed
TDR's enumerateSnapshots response lacks name of Google project
orange enh no demo code
The response to a request to the `enumerateSnapshots` endpoint does not include the name of the Google project that hosts the BQ tables: ``` $ curl -X GET "https://jade-terra.datarepo-prod.broadinstitute.org/api/repository/v1/snapshots?limit=1" -H "accept: application/json" -H "authorization: Bearer REDACTED" | jq { "total": 22, "filteredTotal": 22, "items": [ { "id": "ec40aa9f-43aa-4839-98e3-6362c96a0bee", "name": "hca_prod_20201120_dcp2___20201124", "description": "Create snapshot hca_prod_20201120_dcp2___20201124", "createdDate": "2020-11-24T19:41:37.611318Z", "profileId": "db61c343-6dfe-4d14-84e9-60ddf97ea73f", "storage": [ { "region": "us", "cloudResource": "bigquery", "cloudPlatform": "gcp" }, { "region": "us-central1", "cloudResource": "bucket", "cloudPlatform": "gcp" }, { "region": "us-central1", "cloudResource": "firestore", "cloudPlatform": "gcp" } ] } ] } ``` The `retrieveSnapshot` response does (note the `dataProject` property): ``` $ curl -X GET "https://jade-terra.datarepo-prod.broadinstitute.org/api/repository/v1/snapshots/ec40aa9f-43aa-4839-98e3-6362c96a0bee?include=SOURCES&include=DATA_PROJECT" -H "accept: application/json" -H "authorization: Bearer REDACTED" | jq { "id": "ec40aa9f-43aa-4839-98e3-6362c96a0bee", "name": "hca_prod_20201120_dcp2___20201124", "description": "Create snapshot hca_prod_20201120_dcp2___20201124", "createdDate": "2020-11-24T19:41:37.611318Z", "source": [ { "dataset": { "id": "d30e68f8-c826-4639-88f3-ae35f00d4185", "name": "hca_prod_20201120_dcp2", "description": "Human Cell Atlas", "defaultProfileId": "db61c343-6dfe-4d14-84e9-60ddf97ea73f", "createdDate": "2020-11-20T19:46:28.951142Z", "storage": [ { "region": "us", "cloudResource": "bigquery", "cloudPlatform": "gcp" }, { "region": "us-central1", "cloudResource": "bucket", "cloudPlatform": "gcp" }, { "region": "us-central1", "cloudResource": "firestore", "cloudPlatform": "gcp" } ] }, "asset": null } ], "tables": null, "relationships": null, "profileId": null, "dataProject": "broad-datarepo-terra-prod-hca2", "accessInformation": null } ``` Azul needs the Google Project name to compose BQ queries against the tables in a snapshot. We also prefer to use the `enumerateSnapshot` endpoint to efficiently get information about multiple snapshots at once but the lack of the Google Project lack in the `enumerateSnapshot` response forces us also hit the `retrieveSnapshot` endpoint for each snapshot individually. So we currently need to make N + 1 requests instead of N. This is aggravated by the fact that N is now large (>100) since we intend to create one snapshot per HCA project. It seems that it should be relatively easy to add the `dataProject` property to the `enumerateSnapshot` response. Doing so would greatly reduce the latency of certain Azul requests, enhancing the overall user experience and reducing complexity in the Azul code base.
1.0
TDR's enumerateSnapshots response lacks name of Google project - The response to a request to the `enumerateSnapshots` endpoint does not include the name of the Google project that hosts the BQ tables: ``` $ curl -X GET "https://jade-terra.datarepo-prod.broadinstitute.org/api/repository/v1/snapshots?limit=1" -H "accept: application/json" -H "authorization: Bearer REDACTED" | jq { "total": 22, "filteredTotal": 22, "items": [ { "id": "ec40aa9f-43aa-4839-98e3-6362c96a0bee", "name": "hca_prod_20201120_dcp2___20201124", "description": "Create snapshot hca_prod_20201120_dcp2___20201124", "createdDate": "2020-11-24T19:41:37.611318Z", "profileId": "db61c343-6dfe-4d14-84e9-60ddf97ea73f", "storage": [ { "region": "us", "cloudResource": "bigquery", "cloudPlatform": "gcp" }, { "region": "us-central1", "cloudResource": "bucket", "cloudPlatform": "gcp" }, { "region": "us-central1", "cloudResource": "firestore", "cloudPlatform": "gcp" } ] } ] } ``` The `retrieveSnapshot` response does (note the `dataProject` property): ``` $ curl -X GET "https://jade-terra.datarepo-prod.broadinstitute.org/api/repository/v1/snapshots/ec40aa9f-43aa-4839-98e3-6362c96a0bee?include=SOURCES&include=DATA_PROJECT" -H "accept: application/json" -H "authorization: Bearer REDACTED" | jq { "id": "ec40aa9f-43aa-4839-98e3-6362c96a0bee", "name": "hca_prod_20201120_dcp2___20201124", "description": "Create snapshot hca_prod_20201120_dcp2___20201124", "createdDate": "2020-11-24T19:41:37.611318Z", "source": [ { "dataset": { "id": "d30e68f8-c826-4639-88f3-ae35f00d4185", "name": "hca_prod_20201120_dcp2", "description": "Human Cell Atlas", "defaultProfileId": "db61c343-6dfe-4d14-84e9-60ddf97ea73f", "createdDate": "2020-11-20T19:46:28.951142Z", "storage": [ { "region": "us", "cloudResource": "bigquery", "cloudPlatform": "gcp" }, { "region": "us-central1", "cloudResource": "bucket", "cloudPlatform": "gcp" }, { "region": "us-central1", "cloudResource": "firestore", "cloudPlatform": "gcp" } ] }, "asset": null } ], "tables": null, "relationships": null, "profileId": null, "dataProject": "broad-datarepo-terra-prod-hca2", "accessInformation": null } ``` Azul needs the Google Project name to compose BQ queries against the tables in a snapshot. We also prefer to use the `enumerateSnapshot` endpoint to efficiently get information about multiple snapshots at once but the lack of the Google Project lack in the `enumerateSnapshot` response forces us also hit the `retrieveSnapshot` endpoint for each snapshot individually. So we currently need to make N + 1 requests instead of N. This is aggravated by the fact that N is now large (>100) since we intend to create one snapshot per HCA project. It seems that it should be relatively easy to add the `dataProject` property to the `enumerateSnapshot` response. Doing so would greatly reduce the latency of certain Azul requests, enhancing the overall user experience and reducing complexity in the Azul code base.
non_priority
tdr s enumeratesnapshots response lacks name of google project the response to a request to the enumeratesnapshots endpoint does not include the name of the google project that hosts the bq tables curl x get h accept application json h authorization bearer redacted jq total filteredtotal items id name hca prod description create snapshot hca prod createddate profileid storage region us cloudresource bigquery cloudplatform gcp region us cloudresource bucket cloudplatform gcp region us cloudresource firestore cloudplatform gcp the retrievesnapshot response does note the dataproject property curl x get h accept application json h authorization bearer redacted jq id name hca prod description create snapshot hca prod createddate source dataset id name hca prod description human cell atlas defaultprofileid createddate storage region us cloudresource bigquery cloudplatform gcp region us cloudresource bucket cloudplatform gcp region us cloudresource firestore cloudplatform gcp asset null tables null relationships null profileid null dataproject broad datarepo terra prod accessinformation null azul needs the google project name to compose bq queries against the tables in a snapshot we also prefer to use the enumeratesnapshot endpoint to efficiently get information about multiple snapshots at once but the lack of the google project lack in the enumeratesnapshot response forces us also hit the retrievesnapshot endpoint for each snapshot individually so we currently need to make n requests instead of n this is aggravated by the fact that n is now large since we intend to create one snapshot per hca project it seems that it should be relatively easy to add the dataproject property to the enumeratesnapshot response doing so would greatly reduce the latency of certain azul requests enhancing the overall user experience and reducing complexity in the azul code base
0
16,891
9,545,302,684
IssuesEvent
2019-05-01 16:39:04
refinery-platform/refinery-platform
https://api.github.com/repos/refinery-platform/refinery-platform
opened
Impossible to delete certain data sets
HSCI requested bug dataset import important metadata performance server solr
* Specific code commit: v1.6.8 * Version of the web browser and OS: any * Environment where the error occurred: any ### Steps to reproduce 1. Set up a dev/test instance of SCC using a recent RDS snapshot 1. Open `/admin/core/dataset/319` (all.gene.FPKM) in a web browser 1. Delete the data set ### Observed behavior * After a few minutes web browser shows HTTP error 504 * Data set deleted after about 1 hour 20 minutes * CPU utilization stayed at ~50% (on a t2.medium instance) * Memory utilization went up to ~3GB: * Django: ~1.5GB of RAM (~40% of total system memory) * Solr: ~0.5GB ![Screen Shot 2019-05-01 at 12 27 30](https://user-images.githubusercontent.com/452575/57028510-4a64b780-6c0d-11e9-8e16-d9524c5d404b.png) ### Expected behavior Data set should be deleted in seconds without excessive CPU or memory utilization ### Notes See also: #463, #713, #2394, #2645
True
Impossible to delete certain data sets - * Specific code commit: v1.6.8 * Version of the web browser and OS: any * Environment where the error occurred: any ### Steps to reproduce 1. Set up a dev/test instance of SCC using a recent RDS snapshot 1. Open `/admin/core/dataset/319` (all.gene.FPKM) in a web browser 1. Delete the data set ### Observed behavior * After a few minutes web browser shows HTTP error 504 * Data set deleted after about 1 hour 20 minutes * CPU utilization stayed at ~50% (on a t2.medium instance) * Memory utilization went up to ~3GB: * Django: ~1.5GB of RAM (~40% of total system memory) * Solr: ~0.5GB ![Screen Shot 2019-05-01 at 12 27 30](https://user-images.githubusercontent.com/452575/57028510-4a64b780-6c0d-11e9-8e16-d9524c5d404b.png) ### Expected behavior Data set should be deleted in seconds without excessive CPU or memory utilization ### Notes See also: #463, #713, #2394, #2645
non_priority
impossible to delete certain data sets specific code commit version of the web browser and os any environment where the error occurred any steps to reproduce set up a dev test instance of scc using a recent rds snapshot open admin core dataset all gene fpkm in a web browser delete the data set observed behavior after a few minutes web browser shows http error data set deleted after about hour minutes cpu utilization stayed at on a medium instance memory utilization went up to django of ram of total system memory solr expected behavior data set should be deleted in seconds without excessive cpu or memory utilization notes see also
0
124,991
12,244,456,057
IssuesEvent
2020-05-05 11:10:13
pounard/goat-query
https://api.github.com/repos/pounard/goat-query
closed
Documentation : QueryBuilder - insertValues VS insertQuery
documentation
It's not clear the difference between insertValues and insertQuery in QueryuBuilder class. They have the same description, maybe it could be nice to have an example in function annotations. ``` /** * Create an insert query builder * * @param string|ExpressionRelation $relation * SQL from statement relation name */ public function insertValues($relation): InsertValuesQuery; /** * Create an insert with query builder * * @param string|ExpressionRelation $relation * SQL from statement relation name */ public function insertQuery($relation): InsertQueryQuery; ```
1.0
Documentation : QueryBuilder - insertValues VS insertQuery - It's not clear the difference between insertValues and insertQuery in QueryuBuilder class. They have the same description, maybe it could be nice to have an example in function annotations. ``` /** * Create an insert query builder * * @param string|ExpressionRelation $relation * SQL from statement relation name */ public function insertValues($relation): InsertValuesQuery; /** * Create an insert with query builder * * @param string|ExpressionRelation $relation * SQL from statement relation name */ public function insertQuery($relation): InsertQueryQuery; ```
non_priority
documentation querybuilder insertvalues vs insertquery it s not clear the difference between insertvalues and insertquery in queryubuilder class they have the same description maybe it could be nice to have an example in function annotations create an insert query builder param string expressionrelation relation sql from statement relation name public function insertvalues relation insertvaluesquery create an insert with query builder param string expressionrelation relation sql from statement relation name public function insertquery relation insertqueryquery
0
249,269
18,858,177,527
IssuesEvent
2021-11-12 09:28:18
JinxinZhao315/pe
https://api.github.com/repos/JinxinZhao315/pe
opened
Multiple DG use cases missing some extensions
severity.Medium type.DocumentationBug
In the "add student" use case in DG, the only two extensions written are "module not found" and "student ID already exists". However, things can go wrong in other ways when adding a student: 1) The command may be in invalid format: ![Screenshot 2021-11-12 at 17.27.39.png](https://raw.githubusercontent.com/JinxinZhao315/pe/main/files/471da885-1eae-4276-ab36-26137b244001.png) Missing compulsory fields such as tele handle and email 2) The student details provided may be in invalid format: ![Screenshot 2021-11-12 at 17.22.28.png](https://raw.githubusercontent.com/JinxinZhao315/pe/main/files/31239dbe-15ed-4d86-873c-49e75a577e5f.png) Student ID is in invalid format, or name, tele handle, and email are in invalid format These possible extensions are not included. This problem is also present for `edit student`, `add module`, `edit module`, `add task`, and `edit task` use cases. The "invalid command" and "invalid detail" extensions are not in these use cases either. <!--session: 1636704077350-5d00af5a-5d13-4ca5-ab0a-4089d2c81805--> <!--Version: Web v3.4.1-->
1.0
Multiple DG use cases missing some extensions - In the "add student" use case in DG, the only two extensions written are "module not found" and "student ID already exists". However, things can go wrong in other ways when adding a student: 1) The command may be in invalid format: ![Screenshot 2021-11-12 at 17.27.39.png](https://raw.githubusercontent.com/JinxinZhao315/pe/main/files/471da885-1eae-4276-ab36-26137b244001.png) Missing compulsory fields such as tele handle and email 2) The student details provided may be in invalid format: ![Screenshot 2021-11-12 at 17.22.28.png](https://raw.githubusercontent.com/JinxinZhao315/pe/main/files/31239dbe-15ed-4d86-873c-49e75a577e5f.png) Student ID is in invalid format, or name, tele handle, and email are in invalid format These possible extensions are not included. This problem is also present for `edit student`, `add module`, `edit module`, `add task`, and `edit task` use cases. The "invalid command" and "invalid detail" extensions are not in these use cases either. <!--session: 1636704077350-5d00af5a-5d13-4ca5-ab0a-4089d2c81805--> <!--Version: Web v3.4.1-->
non_priority
multiple dg use cases missing some extensions in the add student use case in dg the only two extensions written are module not found and student id already exists however things can go wrong in other ways when adding a student the command may be in invalid format missing compulsory fields such as tele handle and email the student details provided may be in invalid format student id is in invalid format or name tele handle and email are in invalid format these possible extensions are not included this problem is also present for edit student add module edit module add task and edit task use cases the invalid command and invalid detail extensions are not in these use cases either
0
72,352
8,723,533,540
IssuesEvent
2018-12-09 22:39:36
hypnospinner/Project-Focus
https://api.github.com/repos/hypnospinner/Project-Focus
closed
Создать back-end решение и настроить инфраструктуру
design groundwork important
Back-end приложение будет использовать .NET Core 2.1 микросервисы. В качестве языка наиболее выгодно использовать F# (алгебраические типы данных для команд и событий улучшат восприятие кода и ускорят разработку). В качестве СУБД предлагается использовать Mongo DB (структура хранимых типов данных будет сильно изменяться в ходе развития проекта) Возможность интеграции с реляционными СУБД на поздних стадиях развития проекта должна быть сохранена. В качестве шины событий предлагается использовать Rabbit MQ.
1.0
Создать back-end решение и настроить инфраструктуру - Back-end приложение будет использовать .NET Core 2.1 микросервисы. В качестве языка наиболее выгодно использовать F# (алгебраические типы данных для команд и событий улучшат восприятие кода и ускорят разработку). В качестве СУБД предлагается использовать Mongo DB (структура хранимых типов данных будет сильно изменяться в ходе развития проекта) Возможность интеграции с реляционными СУБД на поздних стадиях развития проекта должна быть сохранена. В качестве шины событий предлагается использовать Rabbit MQ.
non_priority
создать back end решение и настроить инфраструктуру back end приложение будет использовать net core микросервисы в качестве языка наиболее выгодно использовать f алгебраические типы данных для команд и событий улучшат восприятие кода и ускорят разработку в качестве субд предлагается использовать mongo db структура хранимых типов данных будет сильно изменяться в ходе развития проекта возможность интеграции с реляционными субд на поздних стадиях развития проекта должна быть сохранена в качестве шины событий предлагается использовать rabbit mq
0
34,803
4,955,847,377
IssuesEvent
2016-12-01 21:37:42
TransNexus/NexOSS
https://api.github.com/repos/TransNexus/NexOSS
closed
View Row Button does not work for Subnets
bug needs testing
#### Page Path /ui/Accounts_Subnets #### Description of Issue View Row button does not work for Subnets. Selected a row in the Subnets table, then click View Row. Nothing happens.
1.0
View Row Button does not work for Subnets - #### Page Path /ui/Accounts_Subnets #### Description of Issue View Row button does not work for Subnets. Selected a row in the Subnets table, then click View Row. Nothing happens.
non_priority
view row button does not work for subnets page path ui accounts subnets description of issue view row button does not work for subnets selected a row in the subnets table then click view row nothing happens
0
39,795
10,375,142,233
IssuesEvent
2019-09-09 11:18:13
widelands/widelands-issue-migration2
https://api.github.com/repos/widelands/widelands-issue-migration2
closed
CMake should offer a switch to disable GGZ support even if GGZ is found
Fix Released Low buildsystem cmake ggz
CMake should offer a switch to disable GGZ support even if GGZ is found This will reduce dependencies for people who want a standalone application, and don't even think about something called GGZ.
1.0
CMake should offer a switch to disable GGZ support even if GGZ is found - CMake should offer a switch to disable GGZ support even if GGZ is found This will reduce dependencies for people who want a standalone application, and don't even think about something called GGZ.
non_priority
cmake should offer a switch to disable ggz support even if ggz is found cmake should offer a switch to disable ggz support even if ggz is found this will reduce dependencies for people who want a standalone application and don t even think about something called ggz
0
205,017
15,586,226,009
IssuesEvent
2021-03-18 01:27:42
serum-390/soen390-team16-godzilla
https://api.github.com/repos/serum-390/soen390-team16-godzilla
closed
Add Docker container REST api tests
testing
Recently, there was a PR (#34) that broke some of the Spring APIs and it wasn't noticed until the CD pipeline failed to deploy to the AWS ECS cluster. It would be great if the Docker build had failed instead and the PR was blocked from merging. It would be very easy to implement a health check test in the Docker build phase of the CI and CD pipelines. The test should ping: `GET /` and see if it gets 200 (the error code from #28 was 404). Related work items: #17
1.0
Add Docker container REST api tests - Recently, there was a PR (#34) that broke some of the Spring APIs and it wasn't noticed until the CD pipeline failed to deploy to the AWS ECS cluster. It would be great if the Docker build had failed instead and the PR was blocked from merging. It would be very easy to implement a health check test in the Docker build phase of the CI and CD pipelines. The test should ping: `GET /` and see if it gets 200 (the error code from #28 was 404). Related work items: #17
non_priority
add docker container rest api tests recently there was a pr that broke some of the spring apis and it wasn t noticed until the cd pipeline failed to deploy to the aws ecs cluster it would be great if the docker build had failed instead and the pr was blocked from merging it would be very easy to implement a health check test in the docker build phase of the ci and cd pipelines the test should ping get and see if it gets the error code from was related work items
0
379,551
26,375,183,301
IssuesEvent
2023-01-12 01:25:15
plannigan/hyper-bump-it
https://api.github.com/repos/plannigan/hyper-bump-it
opened
Better terminal examples presentation
documentation enhancement
**Describe the solution you'd like** The current documentation shows the output from a number of terminal prompts to demonstrate the functionality of `hyper-bump-it`. However, these example do not do the best job of demonstrating the what using the application is like. Look into ways to show this output in a more visually appealing way. This could be an animated image or preferably a way to demonstrate the content in a text form that looks like a terminal prompt.
1.0
Better terminal examples presentation - **Describe the solution you'd like** The current documentation shows the output from a number of terminal prompts to demonstrate the functionality of `hyper-bump-it`. However, these example do not do the best job of demonstrating the what using the application is like. Look into ways to show this output in a more visually appealing way. This could be an animated image or preferably a way to demonstrate the content in a text form that looks like a terminal prompt.
non_priority
better terminal examples presentation describe the solution you d like the current documentation shows the output from a number of terminal prompts to demonstrate the functionality of hyper bump it however these example do not do the best job of demonstrating the what using the application is like look into ways to show this output in a more visually appealing way this could be an animated image or preferably a way to demonstrate the content in a text form that looks like a terminal prompt
0
434,147
30,444,589,539
IssuesEvent
2023-07-15 13:54:40
pypa/setuptools_scm
https://api.github.com/repos/pypa/setuptools_scm
closed
document a get_version pattern for editable installs staying as correct as sensible
enhancement help wanted deferred documentation
Is the following reasonable, e.g. for output of `--version`? I am using this to get the current version with editable installs, useful during development: ```python def get_version(): try: from setuptools_scm import get_version return get_version(root='..', relative_to=__file__) except (ImportError, LookupError): from pkg_resources import get_distribution return get_distribution(__package__).version ``` setup.py uses the basic: ```python use_scm_version=True, setup_requires=['setuptools_scm'], ``` btw: what is a use case for `write_to`? The file itself says that the file should not be tracked in the SCM itself. Ref: https://github.com/Vimjas/covimerage/pull/43
1.0
document a get_version pattern for editable installs staying as correct as sensible - Is the following reasonable, e.g. for output of `--version`? I am using this to get the current version with editable installs, useful during development: ```python def get_version(): try: from setuptools_scm import get_version return get_version(root='..', relative_to=__file__) except (ImportError, LookupError): from pkg_resources import get_distribution return get_distribution(__package__).version ``` setup.py uses the basic: ```python use_scm_version=True, setup_requires=['setuptools_scm'], ``` btw: what is a use case for `write_to`? The file itself says that the file should not be tracked in the SCM itself. Ref: https://github.com/Vimjas/covimerage/pull/43
non_priority
document a get version pattern for editable installs staying as correct as sensible is the following reasonable e g for output of version i am using this to get the current version with editable installs useful during development python def get version try from setuptools scm import get version return get version root relative to file except importerror lookuperror from pkg resources import get distribution return get distribution package version setup py uses the basic python use scm version true setup requires btw what is a use case for write to the file itself says that the file should not be tracked in the scm itself ref
0
25,689
18,984,505,175
IssuesEvent
2021-11-21 13:38:22
wordslab-org/wordslab
https://api.github.com/repos/wordslab-org/wordslab
opened
Port the command line installer to Linux (no GPU)
enhancement module-infrastructure
Create a Linux release Document the install procedure in the wordslab.org website
1.0
Port the command line installer to Linux (no GPU) - Create a Linux release Document the install procedure in the wordslab.org website
non_priority
port the command line installer to linux no gpu create a linux release document the install procedure in the wordslab org website
0
188,953
22,046,955,824
IssuesEvent
2022-05-30 03:36:27
praneethpanasala/linux
https://api.github.com/repos/praneethpanasala/linux
closed
CVE-2021-4090 (High) detected in linuxv4.19 - autoclosed
security vulnerability
## CVE-2021-4090 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linuxv4.19</b></p></summary> <p> <p>Linux kernel source tree</p> <p>Library home page: <a href=https://github.com/torvalds/linux.git>https://github.com/torvalds/linux.git</a></p> <p>Found in HEAD commit: <a href="https://api.github.com/repos/praneethpanasala/linux/commits/d80c4f847c91020292cb280132b15e2ea147f1a3">d80c4f847c91020292cb280132b15e2ea147f1a3</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (2)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/fs/nfsd/nfs4xdr.c</b> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/fs/nfsd/nfs4xdr.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> An out-of-bounds (OOB) memory write flaw was found in the NFSD in the Linux kernel. Missing sanity may lead to a write beyond bmval[bmlen-1] in nfsd4_decode_bitmap4 in fs/nfsd/nfs4xdr.c. In this flaw, a local attacker with user privilege may gain access to out-of-bounds memory, leading to a system integrity and confidentiality threat. <p>Publish Date: 2022-02-18 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-4090>CVE-2021-4090</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/torvalds/linux/commit/c0019b7db1d7ac62c711cda6b357a659d46428fe">https://github.com/torvalds/linux/commit/c0019b7db1d7ac62c711cda6b357a659d46428fe</a></p> <p>Release Date: 2022-02-18</p> <p>Fix Resolution: v5.16-rc2</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2021-4090 (High) detected in linuxv4.19 - autoclosed - ## CVE-2021-4090 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linuxv4.19</b></p></summary> <p> <p>Linux kernel source tree</p> <p>Library home page: <a href=https://github.com/torvalds/linux.git>https://github.com/torvalds/linux.git</a></p> <p>Found in HEAD commit: <a href="https://api.github.com/repos/praneethpanasala/linux/commits/d80c4f847c91020292cb280132b15e2ea147f1a3">d80c4f847c91020292cb280132b15e2ea147f1a3</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (2)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/fs/nfsd/nfs4xdr.c</b> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/fs/nfsd/nfs4xdr.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> An out-of-bounds (OOB) memory write flaw was found in the NFSD in the Linux kernel. Missing sanity may lead to a write beyond bmval[bmlen-1] in nfsd4_decode_bitmap4 in fs/nfsd/nfs4xdr.c. In this flaw, a local attacker with user privilege may gain access to out-of-bounds memory, leading to a system integrity and confidentiality threat. <p>Publish Date: 2022-02-18 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-4090>CVE-2021-4090</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/torvalds/linux/commit/c0019b7db1d7ac62c711cda6b357a659d46428fe">https://github.com/torvalds/linux/commit/c0019b7db1d7ac62c711cda6b357a659d46428fe</a></p> <p>Release Date: 2022-02-18</p> <p>Fix Resolution: v5.16-rc2</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in autoclosed cve high severity vulnerability vulnerable library linux kernel source tree library home page a href found in head commit a href found in base branch master vulnerable source files fs nfsd c fs nfsd c vulnerability details an out of bounds oob memory write flaw was found in the nfsd in the linux kernel missing sanity may lead to a write beyond bmval in decode in fs nfsd c in this flaw a local attacker with user privilege may gain access to out of bounds memory leading to a system integrity and confidentiality threat publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
0
162,553
12,680,489,276
IssuesEvent
2020-06-19 13:48:05
Oldes/Rebol-issues
https://api.github.com/repos/Oldes/Rebol-issues
closed
TO-VALUE function to convert unset to none
Test.written Type.wish
_Submitted by:_ **BrianH** I want a function that can take one normal parameter of any type, which returns that parameter unevaluated, except for an #[unset!] value. When it is passed an #[unset!](or end! I suppose if one of those escape) then it should return #[none] instead. This function will need to be native, since it would be used in core control flow to defang unsets. And I have no idea what to call it, so I'm looking for suggestions. ``` rebol ; Rebol code equivalent func [value [any-type!]] [unless unset? :value [:value]] ``` --- <sup>**Imported from:** **[CureCode](https://www.curecode.org/rebol3/ticket.rsp?id=2003)** [ Version: r3 master Type: Wish Platform: All Category: Native Reproduce: Always Fixed-in:none ]</sup> <sup>**Imported from**: https://github.com/rebol/rebol-issues/issues/2003</sup> Comments: --- > **Rebolbot** commented on Mar 22, 2013: _Submitted by:_ **BrianH** Fork suggested DEVOID for this in SO chat, which is metaphorically accurate and less whimsical than DEFANG. The downside is that it makes reference to the "void" type in C-like languages that serves a similar purpose to returning unset in Rebol, but Rebol isn't a C-like language. Another option would be TO-VALUE since it converts non-values like #[unset!] to values like #[none]. It's a little long, but it fits in with the other TO-\* functions, though without the copying that those do. I don't want to call it VALUE because that is a common variable name. Other suggestions would be welcome. --- > **Rebolbot** commented on Mar 22, 2013: _Submitted by:_ **Ladislav** I prefer the TO-VALUE alternative. --- > **Rebolbot** commented on Mar 22, 2013: _Submitted by:_ **abolka** I prefer TO-VALUE as well. --- > **Rebolbot** commented on Mar 6, 2014: _Submitted by:_ **BrianH** Implemented as TO-VALUE in https://github.com/rebol/rebol/pull/205 --- > **Rebolbot** mentioned this issue on Jan 12, 2016: > [Make NONE! values no-op in slots processing results of a conditional expression](https://github.com/Oldes/Rebol-issues/issues/2078) --- > **Rebolbot** mentioned this issue on Jan 22, 2016: > [[Epic] Holes in our evaluation model](https://github.com/Oldes/Rebol-issues/issues/2127) --- > **Hostilefork** mentioned this issue on May 1, 2018: > [Allow INDEX? to take none as an argument, return none](https://github.com/Oldes/Rebol-issues/issues/1611) --- > **Rebolbot** added the **Type.wish** on Jan 12, 2016 --- > **Hostilefork** added a commit to **[metaeducation/ren-c](https://github.com/metaeducation/ren-c/)** that referenced this issue on May 1, 2018: > [Retake TRY for TO-VALUE, make NULL void's API representation](https://github.com/metaeducation/ren-c/commit/04f236d3bf5eac62565d1cb9fe2186e98293c6eb) --- > **Hostilefork** added a commit to **[hostilefork/rebol](https://github.com/hostilefork/rebol/)** that referenced this issue on May 1, 2018: > [Retake TRY for TO-VALUE, make NULL void's API representation](https://github.com/hostilefork/rebol/commit/4e44fe58da5417d381e83f3dc779fdc59fd16942) --- > **Hostilefork** added a commit to **[hostilefork/rebol](https://github.com/hostilefork/rebol/)** that referenced this issue on May 1, 2018: > [Retake TRY for TO-VALUE, make NULL void's API representation](https://github.com/hostilefork/rebol/commit/20f64be4519e9e6a852329088ec115546abba828) ---
1.0
TO-VALUE function to convert unset to none - _Submitted by:_ **BrianH** I want a function that can take one normal parameter of any type, which returns that parameter unevaluated, except for an #[unset!] value. When it is passed an #[unset!](or end! I suppose if one of those escape) then it should return #[none] instead. This function will need to be native, since it would be used in core control flow to defang unsets. And I have no idea what to call it, so I'm looking for suggestions. ``` rebol ; Rebol code equivalent func [value [any-type!]] [unless unset? :value [:value]] ``` --- <sup>**Imported from:** **[CureCode](https://www.curecode.org/rebol3/ticket.rsp?id=2003)** [ Version: r3 master Type: Wish Platform: All Category: Native Reproduce: Always Fixed-in:none ]</sup> <sup>**Imported from**: https://github.com/rebol/rebol-issues/issues/2003</sup> Comments: --- > **Rebolbot** commented on Mar 22, 2013: _Submitted by:_ **BrianH** Fork suggested DEVOID for this in SO chat, which is metaphorically accurate and less whimsical than DEFANG. The downside is that it makes reference to the "void" type in C-like languages that serves a similar purpose to returning unset in Rebol, but Rebol isn't a C-like language. Another option would be TO-VALUE since it converts non-values like #[unset!] to values like #[none]. It's a little long, but it fits in with the other TO-\* functions, though without the copying that those do. I don't want to call it VALUE because that is a common variable name. Other suggestions would be welcome. --- > **Rebolbot** commented on Mar 22, 2013: _Submitted by:_ **Ladislav** I prefer the TO-VALUE alternative. --- > **Rebolbot** commented on Mar 22, 2013: _Submitted by:_ **abolka** I prefer TO-VALUE as well. --- > **Rebolbot** commented on Mar 6, 2014: _Submitted by:_ **BrianH** Implemented as TO-VALUE in https://github.com/rebol/rebol/pull/205 --- > **Rebolbot** mentioned this issue on Jan 12, 2016: > [Make NONE! values no-op in slots processing results of a conditional expression](https://github.com/Oldes/Rebol-issues/issues/2078) --- > **Rebolbot** mentioned this issue on Jan 22, 2016: > [[Epic] Holes in our evaluation model](https://github.com/Oldes/Rebol-issues/issues/2127) --- > **Hostilefork** mentioned this issue on May 1, 2018: > [Allow INDEX? to take none as an argument, return none](https://github.com/Oldes/Rebol-issues/issues/1611) --- > **Rebolbot** added the **Type.wish** on Jan 12, 2016 --- > **Hostilefork** added a commit to **[metaeducation/ren-c](https://github.com/metaeducation/ren-c/)** that referenced this issue on May 1, 2018: > [Retake TRY for TO-VALUE, make NULL void's API representation](https://github.com/metaeducation/ren-c/commit/04f236d3bf5eac62565d1cb9fe2186e98293c6eb) --- > **Hostilefork** added a commit to **[hostilefork/rebol](https://github.com/hostilefork/rebol/)** that referenced this issue on May 1, 2018: > [Retake TRY for TO-VALUE, make NULL void's API representation](https://github.com/hostilefork/rebol/commit/4e44fe58da5417d381e83f3dc779fdc59fd16942) --- > **Hostilefork** added a commit to **[hostilefork/rebol](https://github.com/hostilefork/rebol/)** that referenced this issue on May 1, 2018: > [Retake TRY for TO-VALUE, make NULL void's API representation](https://github.com/hostilefork/rebol/commit/20f64be4519e9e6a852329088ec115546abba828) ---
non_priority
to value function to convert unset to none submitted by brianh i want a function that can take one normal parameter of any type which returns that parameter unevaluated except for an value when it is passed an or end i suppose if one of those escape then it should return instead this function will need to be native since it would be used in core control flow to defang unsets and i have no idea what to call it so i m looking for suggestions rebol rebol code equivalent func imported from imported from comments rebolbot commented on mar submitted by brianh fork suggested devoid for this in so chat which is metaphorically accurate and less whimsical than defang the downside is that it makes reference to the void type in c like languages that serves a similar purpose to returning unset in rebol but rebol isn t a c like language another option would be to value since it converts non values like to values like it s a little long but it fits in with the other to functions though without the copying that those do i don t want to call it value because that is a common variable name other suggestions would be welcome rebolbot commented on mar submitted by ladislav i prefer the to value alternative rebolbot commented on mar submitted by abolka i prefer to value as well rebolbot commented on mar submitted by brianh implemented as to value in rebolbot mentioned this issue on jan rebolbot mentioned this issue on jan holes in our evaluation model hostilefork mentioned this issue on may rebolbot added the type wish on jan hostilefork added a commit to that referenced this issue on may hostilefork added a commit to that referenced this issue on may hostilefork added a commit to that referenced this issue on may
0
336,842
24,515,475,326
IssuesEvent
2022-10-11 04:21:35
TechWiz-3/who-unfollowed-me
https://api.github.com/repos/TechWiz-3/who-unfollowed-me
closed
Make `README.md` compatible with Pypi
documentation good first issue hacktoberfest
Make the README.md link to image links rather than file locations to allow Pypi to render the README properly. https://packaging.python.org/en/latest/guides/making-a-pypi-friendly-readme/ In `setup.py` add the repos README as the `long_description` as required by Pypi
1.0
Make `README.md` compatible with Pypi - Make the README.md link to image links rather than file locations to allow Pypi to render the README properly. https://packaging.python.org/en/latest/guides/making-a-pypi-friendly-readme/ In `setup.py` add the repos README as the `long_description` as required by Pypi
non_priority
make readme md compatible with pypi make the readme md link to image links rather than file locations to allow pypi to render the readme properly in setup py add the repos readme as the long description as required by pypi
0
129,067
18,070,758,728
IssuesEvent
2021-09-21 02:25:34
Kalskiman/gentelella
https://api.github.com/repos/Kalskiman/gentelella
opened
CVE-2021-32804 (High) detected in tar-2.2.1.tgz, tar-0.1.20.tgz
security vulnerability
## CVE-2021-32804 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>tar-2.2.1.tgz</b>, <b>tar-0.1.20.tgz</b></p></summary> <p> <details><summary><b>tar-2.2.1.tgz</b></p></summary> <p>tar for node</p> <p>Library home page: <a href="https://registry.npmjs.org/tar/-/tar-2.2.1.tgz">https://registry.npmjs.org/tar/-/tar-2.2.1.tgz</a></p> <p>Path to dependency file: gentelella/vendors/bootstrap/package.json</p> <p>Path to vulnerable library: gentelella/vendors/bootstrap/node_modules/tar/package.json</p> <p> Dependency Hierarchy: - node-sass-4.11.0.tgz (Root Library) - node-gyp-3.8.0.tgz - :x: **tar-2.2.1.tgz** (Vulnerable Library) </details> <details><summary><b>tar-0.1.20.tgz</b></p></summary> <p>tar for node</p> <p>Library home page: <a href="https://registry.npmjs.org/tar/-/tar-0.1.20.tgz">https://registry.npmjs.org/tar/-/tar-0.1.20.tgz</a></p> <p>Path to dependency file: gentelella/vendors/switchery/package.json</p> <p>Path to vulnerable library: gentelella/vendors/switchery/node_modules/tar/package.json,gentelella/vendors/switchery/node_modules/tar/package.json</p> <p> Dependency Hierarchy: - bower-1.2.8.tgz (Root Library) - :x: **tar-0.1.20.tgz** (Vulnerable Library) </details> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The npm package "tar" (aka node-tar) before versions 6.1.1, 5.0.6, 4.4.14, and 3.3.2 has a arbitrary File Creation/Overwrite vulnerability due to insufficient absolute path sanitization. node-tar aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the `preservePaths` flag is not set to `true`. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file. For example `/home/user/.bashrc` would turn into `home/user/.bashrc`. This logic was insufficient when file paths contained repeated path roots such as `////home/user/.bashrc`. `node-tar` would only strip a single path root from such paths. When given an absolute file path with repeating path roots, the resulting path (e.g. `///home/user/.bashrc`) would still resolve to an absolute path, thus allowing arbitrary file creation and overwrite. This issue was addressed in releases 3.2.2, 4.4.14, 5.0.6 and 6.1.1. Users may work around this vulnerability without upgrading by creating a custom `onentry` method which sanitizes the `entry.path` or a `filter` method which removes entries with absolute paths. See referenced GitHub Advisory for details. Be aware of CVE-2021-32803 which fixes a similar bug in later versions of tar. <p>Publish Date: 2021-08-03 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-32804>CVE-2021-32804</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9">https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9</a></p> <p>Release Date: 2021-08-03</p> <p>Fix Resolution: tar - 3.2.2, 4.4.14, 5.0.6, 6.1.1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2021-32804 (High) detected in tar-2.2.1.tgz, tar-0.1.20.tgz - ## CVE-2021-32804 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>tar-2.2.1.tgz</b>, <b>tar-0.1.20.tgz</b></p></summary> <p> <details><summary><b>tar-2.2.1.tgz</b></p></summary> <p>tar for node</p> <p>Library home page: <a href="https://registry.npmjs.org/tar/-/tar-2.2.1.tgz">https://registry.npmjs.org/tar/-/tar-2.2.1.tgz</a></p> <p>Path to dependency file: gentelella/vendors/bootstrap/package.json</p> <p>Path to vulnerable library: gentelella/vendors/bootstrap/node_modules/tar/package.json</p> <p> Dependency Hierarchy: - node-sass-4.11.0.tgz (Root Library) - node-gyp-3.8.0.tgz - :x: **tar-2.2.1.tgz** (Vulnerable Library) </details> <details><summary><b>tar-0.1.20.tgz</b></p></summary> <p>tar for node</p> <p>Library home page: <a href="https://registry.npmjs.org/tar/-/tar-0.1.20.tgz">https://registry.npmjs.org/tar/-/tar-0.1.20.tgz</a></p> <p>Path to dependency file: gentelella/vendors/switchery/package.json</p> <p>Path to vulnerable library: gentelella/vendors/switchery/node_modules/tar/package.json,gentelella/vendors/switchery/node_modules/tar/package.json</p> <p> Dependency Hierarchy: - bower-1.2.8.tgz (Root Library) - :x: **tar-0.1.20.tgz** (Vulnerable Library) </details> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The npm package "tar" (aka node-tar) before versions 6.1.1, 5.0.6, 4.4.14, and 3.3.2 has a arbitrary File Creation/Overwrite vulnerability due to insufficient absolute path sanitization. node-tar aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the `preservePaths` flag is not set to `true`. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file. For example `/home/user/.bashrc` would turn into `home/user/.bashrc`. This logic was insufficient when file paths contained repeated path roots such as `////home/user/.bashrc`. `node-tar` would only strip a single path root from such paths. When given an absolute file path with repeating path roots, the resulting path (e.g. `///home/user/.bashrc`) would still resolve to an absolute path, thus allowing arbitrary file creation and overwrite. This issue was addressed in releases 3.2.2, 4.4.14, 5.0.6 and 6.1.1. Users may work around this vulnerability without upgrading by creating a custom `onentry` method which sanitizes the `entry.path` or a `filter` method which removes entries with absolute paths. See referenced GitHub Advisory for details. Be aware of CVE-2021-32803 which fixes a similar bug in later versions of tar. <p>Publish Date: 2021-08-03 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-32804>CVE-2021-32804</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9">https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9</a></p> <p>Release Date: 2021-08-03</p> <p>Fix Resolution: tar - 3.2.2, 4.4.14, 5.0.6, 6.1.1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in tar tgz tar tgz cve high severity vulnerability vulnerable libraries tar tgz tar tgz tar tgz tar for node library home page a href path to dependency file gentelella vendors bootstrap package json path to vulnerable library gentelella vendors bootstrap node modules tar package json dependency hierarchy node sass tgz root library node gyp tgz x tar tgz vulnerable library tar tgz tar for node library home page a href path to dependency file gentelella vendors switchery package json path to vulnerable library gentelella vendors switchery node modules tar package json gentelella vendors switchery node modules tar package json dependency hierarchy bower tgz root library x tar tgz vulnerable library vulnerability details the npm package tar aka node tar before versions and has a arbitrary file creation overwrite vulnerability due to insufficient absolute path sanitization node tar aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the preservepaths flag is not set to true this is achieved by stripping the absolute path root from any absolute file paths contained in a tar file for example home user bashrc would turn into home user bashrc this logic was insufficient when file paths contained repeated path roots such as home user bashrc node tar would only strip a single path root from such paths when given an absolute file path with repeating path roots the resulting path e g home user bashrc would still resolve to an absolute path thus allowing arbitrary file creation and overwrite this issue was addressed in releases and users may work around this vulnerability without upgrading by creating a custom onentry method which sanitizes the entry path or a filter method which removes entries with absolute paths see referenced github advisory for details be aware of cve which fixes a similar bug in later versions of tar publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact none integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution tar step up your open source security game with whitesource
0
174,642
13,502,058,626
IssuesEvent
2020-09-13 06:16:13
AdaptableTools/adaptable
https://api.github.com/repos/AdaptableTools/adaptable
closed
Cannot enter a new Date into Bulk Update Toolbar
Function: Bulk Update Sigal Test Type: Bug
Even though it knows the column is a date it shows a textbox - needs to be a Date Picker The Bulk Update popup does allow new date creation but not the Toolbar control
1.0
Cannot enter a new Date into Bulk Update Toolbar - Even though it knows the column is a date it shows a textbox - needs to be a Date Picker The Bulk Update popup does allow new date creation but not the Toolbar control
non_priority
cannot enter a new date into bulk update toolbar even though it knows the column is a date it shows a textbox needs to be a date picker the bulk update popup does allow new date creation but not the toolbar control
0
243,244
26,277,982,710
IssuesEvent
2023-01-07 01:39:43
kapseliboi/coronavirus-dashboard
https://api.github.com/repos/kapseliboi/coronavirus-dashboard
opened
CVE-2021-4279 (High) detected in fast-json-patch-3.1.0.tgz
security vulnerability
## CVE-2021-4279 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>fast-json-patch-3.1.0.tgz</b></p></summary> <p>Fast implementation of JSON-Patch (RFC-6902) with duplex (observe changes) capabilities</p> <p>Library home page: <a href="https://registry.npmjs.org/fast-json-patch/-/fast-json-patch-3.1.0.tgz">https://registry.npmjs.org/fast-json-patch/-/fast-json-patch-3.1.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/fast-json-patch/package.json</p> <p> Dependency Hierarchy: - swagger-ui-react-4.1.3.tgz (Root Library) - swagger-client-3.17.0.tgz - :x: **fast-json-patch-3.1.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/kapseliboi/coronavirus-dashboard/commit/978d257a5c0738711e941b81eca0b20c284ec902">978d257a5c0738711e941b81eca0b20c284ec902</a></p> <p>Found in base branch: <b>v3-development</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A vulnerability has been found in Starcounter-Jack JSON-Patch up to 3.1.0 and classified as problematic. This vulnerability affects unknown code. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution'). The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.1.1 is able to address this issue. The name of the patch is 7ad6af41eabb2d799f698740a91284d762c955c9. It is recommended to upgrade the affected component. VDB-216778 is the identifier assigned to this vulnerability. <p>Publish Date: 2022-12-25 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-4279>CVE-2021-4279</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.cve.org/CVERecord?id=CVE-2021-4279">https://www.cve.org/CVERecord?id=CVE-2021-4279</a></p> <p>Release Date: 2022-12-25</p> <p>Fix Resolution (fast-json-patch): 3.1.1</p> <p>Direct dependency fix Resolution (swagger-ui-react): 4.2.1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2021-4279 (High) detected in fast-json-patch-3.1.0.tgz - ## CVE-2021-4279 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>fast-json-patch-3.1.0.tgz</b></p></summary> <p>Fast implementation of JSON-Patch (RFC-6902) with duplex (observe changes) capabilities</p> <p>Library home page: <a href="https://registry.npmjs.org/fast-json-patch/-/fast-json-patch-3.1.0.tgz">https://registry.npmjs.org/fast-json-patch/-/fast-json-patch-3.1.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/fast-json-patch/package.json</p> <p> Dependency Hierarchy: - swagger-ui-react-4.1.3.tgz (Root Library) - swagger-client-3.17.0.tgz - :x: **fast-json-patch-3.1.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/kapseliboi/coronavirus-dashboard/commit/978d257a5c0738711e941b81eca0b20c284ec902">978d257a5c0738711e941b81eca0b20c284ec902</a></p> <p>Found in base branch: <b>v3-development</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A vulnerability has been found in Starcounter-Jack JSON-Patch up to 3.1.0 and classified as problematic. This vulnerability affects unknown code. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution'). The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.1.1 is able to address this issue. The name of the patch is 7ad6af41eabb2d799f698740a91284d762c955c9. It is recommended to upgrade the affected component. VDB-216778 is the identifier assigned to this vulnerability. <p>Publish Date: 2022-12-25 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-4279>CVE-2021-4279</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.cve.org/CVERecord?id=CVE-2021-4279">https://www.cve.org/CVERecord?id=CVE-2021-4279</a></p> <p>Release Date: 2022-12-25</p> <p>Fix Resolution (fast-json-patch): 3.1.1</p> <p>Direct dependency fix Resolution (swagger-ui-react): 4.2.1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in fast json patch tgz cve high severity vulnerability vulnerable library fast json patch tgz fast implementation of json patch rfc with duplex observe changes capabilities library home page a href path to dependency file package json path to vulnerable library node modules fast json patch package json dependency hierarchy swagger ui react tgz root library swagger client tgz x fast json patch tgz vulnerable library found in head commit a href found in base branch development vulnerability details a vulnerability has been found in starcounter jack json patch up to and classified as problematic this vulnerability affects unknown code the manipulation leads to improperly controlled modification of object prototype attributes prototype pollution the attack can be initiated remotely the exploit has been disclosed to the public and may be used upgrading to version is able to address this issue the name of the patch is it is recommended to upgrade the affected component vdb is the identifier assigned to this vulnerability publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution fast json patch direct dependency fix resolution swagger ui react step up your open source security game with mend
0
144,883
22,582,929,170
IssuesEvent
2022-06-28 13:10:58
LanguageDev/Fresh-Language-suggestions
https://api.github.com/repos/LanguageDev/Fresh-Language-suggestions
opened
[WIP] Exceptions, try-catch-finally
Design document Syntax
<!-- Exceptions --> ## Introduction Since there is not a lot of variation or redesign-choices here, I'll just propose the constructs for throwing and try-catch-finally. ## Throwing construct There is not a lot of variation here, throwing itself is an expression with the syntax: `throw expr` The returned expression type (even though the expression does not evaluate to anything, it needs a type) could be converted to any type implicitly, so type-inference does not trip up in cases like this: ```swift func div(a: int, b: int): int = if (b == 0) throw DivByZeroExcepton() else a / b; ``` ## Try-catch-finally This is the point where there is a bit more variation, I'll go through all I've come across. Since all other of our control structures are expressions, it would make sense for try-catch-finally as well. ### C# Since the C# variant does not evaluate to values like expressions, it's not that interesting for us. In the most general form, try is mandatory, after that either a catch or finally block has to follow. If there is a finally block, there can be any number of catch blocks. Catch blocks try to match the exception type to the thrown exception, even allowing for a filter expression with the keyword `when`, implementing a limited pattern matching system. [Full docs can be found here.](https://docs.microsoft.com/en-us/dotnet/csharp/fundamentals/exceptions/) Personally, I think it's a bit overengineered, and became a bit inconsistent after pattern matching hit the scene. It's a decision from the past, so there's really no one to blame for it. ### F# F# decided to introduce two different constructs, [try-with](https://docs.microsoft.com/en-us/dotnet/fsharp/language-reference/exception-handling/the-try-with-expression) and [try-finally](https://docs.microsoft.com/en-us/dotnet/fsharp/language-reference/exception-handling/the-try-finally-expression). This means, if you need all 3 blocks, you'd have to nest them (example taken from the docs): ```fs let function1 x y = try try if x = y then raise (InnerError("inner")) else raise (OuterError("outer")) with | InnerError(str) -> printfn "Error1 %s" str finally printfn "Always print this." ``` An interesting note is that `with` (which is the equivalent of `catch` in C#) is actually a regular pattern-matching construct, which actually makes a lot of sense. Instead of implementing specialized systems with multiple catch blocks and filters, F# simply utilizes the fact that it already has pattern matching. In `try-with`, if there are no exceptions, the `try` body is evaluated as a result, otherwise, an exception is matched in `with`, and the corresponding value is returned. In `try-finally`, only the `try` contributes to the result. Personally, I think this nesting can be really annoying, and it was a quite inelegant design. ### Kotlin In Kotlin, `try-catch-finally` is also an expression: ```kt val a: Int? = try { input.toInt() } catch (e: NumberFormatException) { null } ``` The semantics is very simple: if there are no exceptions, the body of `try` is returned, otherwise the body of the corresponding `catch` block is returned. The `finally` block does not contribute to the expression result. Personally, I find this the best semantics out of all. What I found odd, is that Kotlin also does multiple catch blocks instead of utilizing its pattern-matching. ### Proposed for Fresh I'd like to propose a mixture of Kotlin and F# for our construct. More precisely, the evaluation semantics of Kotlin, and the pattern matching of F#. This way we get multi-catch free, get the filters of C# free and are able to utilize everything that will be present in the language for pattern matching. Syntax proposal: ```kt val a = try { int.Parse(line) / b } catch { DivByZeroException -> int.MaxValue; _ -> 0; }; ``` We could even have a one-liner versions, or a version of catch that simply matches everything and returns the specified value ("swallow-all" catch): ```kt // Catch that simply ignores val a = try { int.Parse(line) } catch { 0 }; // One-liner version val a = try int.Parse(line) catch 0; ``` The `finally` block does not contribute to the evaluated expression, it is simply executed after the evaluation of try-catch. Example: ```kt val a = try { int.Parse(line) / b } catch { DivByZeroException -> int.MaxValue; _ -> 0; } finally { WriteLine("This is always printed"); }; ``` There can only be a single catch and a single finally block and at least one has to be present (there can't be a `try` block by itself). If there is a `catch` block, it has to evaluate to a compatible type with `try`.
1.0
[WIP] Exceptions, try-catch-finally - <!-- Exceptions --> ## Introduction Since there is not a lot of variation or redesign-choices here, I'll just propose the constructs for throwing and try-catch-finally. ## Throwing construct There is not a lot of variation here, throwing itself is an expression with the syntax: `throw expr` The returned expression type (even though the expression does not evaluate to anything, it needs a type) could be converted to any type implicitly, so type-inference does not trip up in cases like this: ```swift func div(a: int, b: int): int = if (b == 0) throw DivByZeroExcepton() else a / b; ``` ## Try-catch-finally This is the point where there is a bit more variation, I'll go through all I've come across. Since all other of our control structures are expressions, it would make sense for try-catch-finally as well. ### C# Since the C# variant does not evaluate to values like expressions, it's not that interesting for us. In the most general form, try is mandatory, after that either a catch or finally block has to follow. If there is a finally block, there can be any number of catch blocks. Catch blocks try to match the exception type to the thrown exception, even allowing for a filter expression with the keyword `when`, implementing a limited pattern matching system. [Full docs can be found here.](https://docs.microsoft.com/en-us/dotnet/csharp/fundamentals/exceptions/) Personally, I think it's a bit overengineered, and became a bit inconsistent after pattern matching hit the scene. It's a decision from the past, so there's really no one to blame for it. ### F# F# decided to introduce two different constructs, [try-with](https://docs.microsoft.com/en-us/dotnet/fsharp/language-reference/exception-handling/the-try-with-expression) and [try-finally](https://docs.microsoft.com/en-us/dotnet/fsharp/language-reference/exception-handling/the-try-finally-expression). This means, if you need all 3 blocks, you'd have to nest them (example taken from the docs): ```fs let function1 x y = try try if x = y then raise (InnerError("inner")) else raise (OuterError("outer")) with | InnerError(str) -> printfn "Error1 %s" str finally printfn "Always print this." ``` An interesting note is that `with` (which is the equivalent of `catch` in C#) is actually a regular pattern-matching construct, which actually makes a lot of sense. Instead of implementing specialized systems with multiple catch blocks and filters, F# simply utilizes the fact that it already has pattern matching. In `try-with`, if there are no exceptions, the `try` body is evaluated as a result, otherwise, an exception is matched in `with`, and the corresponding value is returned. In `try-finally`, only the `try` contributes to the result. Personally, I think this nesting can be really annoying, and it was a quite inelegant design. ### Kotlin In Kotlin, `try-catch-finally` is also an expression: ```kt val a: Int? = try { input.toInt() } catch (e: NumberFormatException) { null } ``` The semantics is very simple: if there are no exceptions, the body of `try` is returned, otherwise the body of the corresponding `catch` block is returned. The `finally` block does not contribute to the expression result. Personally, I find this the best semantics out of all. What I found odd, is that Kotlin also does multiple catch blocks instead of utilizing its pattern-matching. ### Proposed for Fresh I'd like to propose a mixture of Kotlin and F# for our construct. More precisely, the evaluation semantics of Kotlin, and the pattern matching of F#. This way we get multi-catch free, get the filters of C# free and are able to utilize everything that will be present in the language for pattern matching. Syntax proposal: ```kt val a = try { int.Parse(line) / b } catch { DivByZeroException -> int.MaxValue; _ -> 0; }; ``` We could even have a one-liner versions, or a version of catch that simply matches everything and returns the specified value ("swallow-all" catch): ```kt // Catch that simply ignores val a = try { int.Parse(line) } catch { 0 }; // One-liner version val a = try int.Parse(line) catch 0; ``` The `finally` block does not contribute to the evaluated expression, it is simply executed after the evaluation of try-catch. Example: ```kt val a = try { int.Parse(line) / b } catch { DivByZeroException -> int.MaxValue; _ -> 0; } finally { WriteLine("This is always printed"); }; ``` There can only be a single catch and a single finally block and at least one has to be present (there can't be a `try` block by itself). If there is a `catch` block, it has to evaluate to a compatible type with `try`.
non_priority
exceptions try catch finally introduction since there is not a lot of variation or redesign choices here i ll just propose the constructs for throwing and try catch finally throwing construct there is not a lot of variation here throwing itself is an expression with the syntax throw expr the returned expression type even though the expression does not evaluate to anything it needs a type could be converted to any type implicitly so type inference does not trip up in cases like this swift func div a int b int int if b throw divbyzeroexcepton else a b try catch finally this is the point where there is a bit more variation i ll go through all i ve come across since all other of our control structures are expressions it would make sense for try catch finally as well c since the c variant does not evaluate to values like expressions it s not that interesting for us in the most general form try is mandatory after that either a catch or finally block has to follow if there is a finally block there can be any number of catch blocks catch blocks try to match the exception type to the thrown exception even allowing for a filter expression with the keyword when implementing a limited pattern matching system personally i think it s a bit overengineered and became a bit inconsistent after pattern matching hit the scene it s a decision from the past so there s really no one to blame for it f f decided to introduce two different constructs and this means if you need all blocks you d have to nest them example taken from the docs fs let x y try try if x y then raise innererror inner else raise outererror outer with innererror str printfn s str finally printfn always print this an interesting note is that with which is the equivalent of catch in c is actually a regular pattern matching construct which actually makes a lot of sense instead of implementing specialized systems with multiple catch blocks and filters f simply utilizes the fact that it already has pattern matching in try with if there are no exceptions the try body is evaluated as a result otherwise an exception is matched in with and the corresponding value is returned in try finally only the try contributes to the result personally i think this nesting can be really annoying and it was a quite inelegant design kotlin in kotlin try catch finally is also an expression kt val a int try input toint catch e numberformatexception null the semantics is very simple if there are no exceptions the body of try is returned otherwise the body of the corresponding catch block is returned the finally block does not contribute to the expression result personally i find this the best semantics out of all what i found odd is that kotlin also does multiple catch blocks instead of utilizing its pattern matching proposed for fresh i d like to propose a mixture of kotlin and f for our construct more precisely the evaluation semantics of kotlin and the pattern matching of f this way we get multi catch free get the filters of c free and are able to utilize everything that will be present in the language for pattern matching syntax proposal kt val a try int parse line b catch divbyzeroexception int maxvalue we could even have a one liner versions or a version of catch that simply matches everything and returns the specified value swallow all catch kt catch that simply ignores val a try int parse line catch one liner version val a try int parse line catch the finally block does not contribute to the evaluated expression it is simply executed after the evaluation of try catch example kt val a try int parse line b catch divbyzeroexception int maxvalue finally writeline this is always printed there can only be a single catch and a single finally block and at least one has to be present there can t be a try block by itself if there is a catch block it has to evaluate to a compatible type with try
0
132,704
18,268,849,561
IssuesEvent
2021-10-04 11:42:32
artsking/linux-3.0.35
https://api.github.com/repos/artsking/linux-3.0.35
opened
CVE-2016-2143 (High) detected in linux-stable-rtv3.8.6
security vulnerability
## CVE-2016-2143 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-stable-rtv3.8.6</b></p></summary> <p> <p>Julia Cartwright's fork of linux-stable-rt.git</p> <p>Library home page: <a href=https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git>https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git</a></p> <p>Found in HEAD commit: <a href="https://github.com/artsking/linux-3.0.35/commit/5992fa81c6ac1b4e9db13f5408d914525c5b7875">5992fa81c6ac1b4e9db13f5408d914525c5b7875</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary> <p></p> <p> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The fork implementation in the Linux kernel before 4.5 on s390 platforms mishandles the case of four page-table levels, which allows local users to cause a denial of service (system crash) or possibly have unspecified other impact via a crafted application, related to arch/s390/include/asm/mmu_context.h and arch/s390/include/asm/pgalloc.h. <p>Publish Date: 2016-04-27 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-2143>CVE-2016-2143</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2016-2143">https://nvd.nist.gov/vuln/detail/CVE-2016-2143</a></p> <p>Release Date: 2016-04-27</p> <p>Fix Resolution: 4.5</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2016-2143 (High) detected in linux-stable-rtv3.8.6 - ## CVE-2016-2143 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-stable-rtv3.8.6</b></p></summary> <p> <p>Julia Cartwright's fork of linux-stable-rt.git</p> <p>Library home page: <a href=https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git>https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git</a></p> <p>Found in HEAD commit: <a href="https://github.com/artsking/linux-3.0.35/commit/5992fa81c6ac1b4e9db13f5408d914525c5b7875">5992fa81c6ac1b4e9db13f5408d914525c5b7875</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary> <p></p> <p> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The fork implementation in the Linux kernel before 4.5 on s390 platforms mishandles the case of four page-table levels, which allows local users to cause a denial of service (system crash) or possibly have unspecified other impact via a crafted application, related to arch/s390/include/asm/mmu_context.h and arch/s390/include/asm/pgalloc.h. <p>Publish Date: 2016-04-27 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-2143>CVE-2016-2143</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2016-2143">https://nvd.nist.gov/vuln/detail/CVE-2016-2143</a></p> <p>Release Date: 2016-04-27</p> <p>Fix Resolution: 4.5</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in linux stable cve high severity vulnerability vulnerable library linux stable julia cartwright s fork of linux stable rt git library home page a href found in head commit a href found in base branch master vulnerable source files vulnerability details the fork implementation in the linux kernel before on platforms mishandles the case of four page table levels which allows local users to cause a denial of service system crash or possibly have unspecified other impact via a crafted application related to arch include asm mmu context h and arch include asm pgalloc h publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
0
112,606
17,092,588,914
IssuesEvent
2021-07-08 19:40:31
Tim-sandbox/WebGoat
https://api.github.com/repos/Tim-sandbox/WebGoat
opened
CVE-2020-11023 (Medium) detected in jquery-2.1.4.min.js, jquery-3.4.1.min.js
security vulnerability
## CVE-2020-11023 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>jquery-2.1.4.min.js</b>, <b>jquery-3.4.1.min.js</b></p></summary> <p> <details><summary><b>jquery-2.1.4.min.js</b></p></summary> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/2.1.4/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/2.1.4/jquery.min.js</a></p> <p>Path to vulnerable library: WebGoat/webgoat-container/src/main/resources/static/js/libs/jquery-2.1.4.min.js,WebGoat/webgoat-container/target/classes/static/js/libs/jquery-2.1.4.min.js</p> <p> Dependency Hierarchy: - :x: **jquery-2.1.4.min.js** (Vulnerable Library) </details> <details><summary><b>jquery-3.4.1.min.js</b></p></summary> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/3.4.1/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/3.4.1/jquery.min.js</a></p> <p>Path to vulnerable library: WebGoat/webgoat-container/src/main/resources/static/js/libs/jquery.min.js,WebGoat/webgoat-container/target/classes/static/js/libs/jquery.min.js</p> <p> Dependency Hierarchy: - :x: **jquery-3.4.1.min.js** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/Tim-sandbox/WebGoat/commit/349164cb2ad66ba492c478574891b87f1c69d350">349164cb2ad66ba492c478574891b87f1c69d350</a></p> <p>Found in base branch: <b>develop</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0. <p>Publish Date: 2020-04-29 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11023>CVE-2020-11023</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11023">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11023</a></p> <p>Release Date: 2020-04-29</p> <p>Fix Resolution: jquery - 3.5.0</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"JavaScript","packageName":"jquery","packageVersion":"2.1.4","packageFilePaths":[],"isTransitiveDependency":false,"dependencyTree":"jquery:2.1.4","isMinimumFixVersionAvailable":true,"minimumFixVersion":"jquery - 3.5.0"},{"packageType":"JavaScript","packageName":"jquery","packageVersion":"3.4.1","packageFilePaths":[],"isTransitiveDependency":false,"dependencyTree":"jquery:3.4.1","isMinimumFixVersionAvailable":true,"minimumFixVersion":"jquery - 3.5.0"}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2020-11023","vulnerabilityDetails":"In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing \u003coption\u003e elements from untrusted sources - even after sanitizing it - to one of jQuery\u0027s DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11023","cvss3Severity":"medium","cvss3Score":"6.1","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Changed","C":"Low","UI":"Required","AV":"Network","I":"Low"},"extraData":{}}</REMEDIATE> -->
True
CVE-2020-11023 (Medium) detected in jquery-2.1.4.min.js, jquery-3.4.1.min.js - ## CVE-2020-11023 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>jquery-2.1.4.min.js</b>, <b>jquery-3.4.1.min.js</b></p></summary> <p> <details><summary><b>jquery-2.1.4.min.js</b></p></summary> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/2.1.4/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/2.1.4/jquery.min.js</a></p> <p>Path to vulnerable library: WebGoat/webgoat-container/src/main/resources/static/js/libs/jquery-2.1.4.min.js,WebGoat/webgoat-container/target/classes/static/js/libs/jquery-2.1.4.min.js</p> <p> Dependency Hierarchy: - :x: **jquery-2.1.4.min.js** (Vulnerable Library) </details> <details><summary><b>jquery-3.4.1.min.js</b></p></summary> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/3.4.1/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/3.4.1/jquery.min.js</a></p> <p>Path to vulnerable library: WebGoat/webgoat-container/src/main/resources/static/js/libs/jquery.min.js,WebGoat/webgoat-container/target/classes/static/js/libs/jquery.min.js</p> <p> Dependency Hierarchy: - :x: **jquery-3.4.1.min.js** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/Tim-sandbox/WebGoat/commit/349164cb2ad66ba492c478574891b87f1c69d350">349164cb2ad66ba492c478574891b87f1c69d350</a></p> <p>Found in base branch: <b>develop</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0. <p>Publish Date: 2020-04-29 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11023>CVE-2020-11023</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11023">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11023</a></p> <p>Release Date: 2020-04-29</p> <p>Fix Resolution: jquery - 3.5.0</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"JavaScript","packageName":"jquery","packageVersion":"2.1.4","packageFilePaths":[],"isTransitiveDependency":false,"dependencyTree":"jquery:2.1.4","isMinimumFixVersionAvailable":true,"minimumFixVersion":"jquery - 3.5.0"},{"packageType":"JavaScript","packageName":"jquery","packageVersion":"3.4.1","packageFilePaths":[],"isTransitiveDependency":false,"dependencyTree":"jquery:3.4.1","isMinimumFixVersionAvailable":true,"minimumFixVersion":"jquery - 3.5.0"}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2020-11023","vulnerabilityDetails":"In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing \u003coption\u003e elements from untrusted sources - even after sanitizing it - to one of jQuery\u0027s DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11023","cvss3Severity":"medium","cvss3Score":"6.1","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Changed","C":"Low","UI":"Required","AV":"Network","I":"Low"},"extraData":{}}</REMEDIATE> -->
non_priority
cve medium detected in jquery min js jquery min js cve medium severity vulnerability vulnerable libraries jquery min js jquery min js jquery min js javascript library for dom operations library home page a href path to vulnerable library webgoat webgoat container src main resources static js libs jquery min js webgoat webgoat container target classes static js libs jquery min js dependency hierarchy x jquery min js vulnerable library jquery min js javascript library for dom operations library home page a href path to vulnerable library webgoat webgoat container src main resources static js libs jquery min js webgoat webgoat container target classes static js libs jquery min js dependency hierarchy x jquery min js vulnerable library found in head commit a href found in base branch develop vulnerability details in jquery versions greater than or equal to and before passing html containing elements from untrusted sources even after sanitizing it to one of jquery s dom manipulation methods i e html append and others may execute untrusted code this problem is patched in jquery publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution jquery isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency false dependencytree jquery isminimumfixversionavailable true minimumfixversion jquery packagetype javascript packagename jquery packageversion packagefilepaths istransitivedependency false dependencytree jquery isminimumfixversionavailable true minimumfixversion jquery basebranches vulnerabilityidentifier cve vulnerabilitydetails in jquery versions greater than or equal to and before passing html containing elements from untrusted sources even after sanitizing it to one of jquery dom manipulation methods i e html append and others may execute untrusted code this problem is patched in jquery vulnerabilityurl
0
379,479
26,372,847,741
IssuesEvent
2023-01-11 22:22:04
Bench-ai/Jula
https://api.github.com/repos/Bench-ai/Jula
opened
Send zip
documentation enhancement API-DB
Downloads layer files Model representation, entire throne app reqs.text, and many more. Zips it and sends it to the user
1.0
Send zip - Downloads layer files Model representation, entire throne app reqs.text, and many more. Zips it and sends it to the user
non_priority
send zip downloads layer files model representation entire throne app reqs text and many more zips it and sends it to the user
0
55,246
7,966,773,186
IssuesEvent
2018-07-15 04:13:12
errbit/errbit
https://api.github.com/repos/errbit/errbit
closed
Document ERRBIT_ADMIN_USER, ERRBIT_ADMIN_EMAIL and ERRBIT_ADMIN_PASSWORD
documentation help-wanted
https://github.com/errbit/errbit/blob/master/db/seeds.rb ERRBIT_ADMIN_USER, ERRBIT_ADMIN_EMAIL and ERRBIT_ADMIN_PASSWORD can be set to help define the admin user They are missing at https://github.com/errbit/errbit/blob/master/docs/configuration.md This is related to Pull Request #1221
1.0
Document ERRBIT_ADMIN_USER, ERRBIT_ADMIN_EMAIL and ERRBIT_ADMIN_PASSWORD - https://github.com/errbit/errbit/blob/master/db/seeds.rb ERRBIT_ADMIN_USER, ERRBIT_ADMIN_EMAIL and ERRBIT_ADMIN_PASSWORD can be set to help define the admin user They are missing at https://github.com/errbit/errbit/blob/master/docs/configuration.md This is related to Pull Request #1221
non_priority
document errbit admin user errbit admin email and errbit admin password errbit admin user errbit admin email and errbit admin password can be set to help define the admin user they are missing at this is related to pull request
0
142,787
21,884,497,377
IssuesEvent
2022-05-19 17:11:33
bcgov/cas-cif
https://api.github.com/repos/bcgov/cas-cif
closed
Prepare for wireframe testing session
Task UX Design UX Research
#### Describe the task Prepare for testing session with the Ops team (ideally at 3rd week of May) #### Acceptance Criteria - [x] Create research goals - [x] Create script - [x] Finalize script after reviewing with team - [x] Create observation notes file - [x] Set up meeting sessions with Ops team
1.0
Prepare for wireframe testing session - #### Describe the task Prepare for testing session with the Ops team (ideally at 3rd week of May) #### Acceptance Criteria - [x] Create research goals - [x] Create script - [x] Finalize script after reviewing with team - [x] Create observation notes file - [x] Set up meeting sessions with Ops team
non_priority
prepare for wireframe testing session describe the task prepare for testing session with the ops team ideally at week of may acceptance criteria create research goals create script finalize script after reviewing with team create observation notes file set up meeting sessions with ops team
0
31,498
8,705,609,116
IssuesEvent
2018-12-05 23:01:14
Microsoft/openenclave
https://api.github.com/repos/Microsoft/openenclave
opened
Set libcxx headers as SYSTEM headers
build
Like we did for the musl headers, we may want to set libcxx as SYSTEM headers so that CMake uses `-isystem`. However, we may run into a header ordering problem.
1.0
Set libcxx headers as SYSTEM headers - Like we did for the musl headers, we may want to set libcxx as SYSTEM headers so that CMake uses `-isystem`. However, we may run into a header ordering problem.
non_priority
set libcxx headers as system headers like we did for the musl headers we may want to set libcxx as system headers so that cmake uses isystem however we may run into a header ordering problem
0
360,137
25,275,565,297
IssuesEvent
2022-11-16 12:23:12
apache/apisix-docker
https://api.github.com/repos/apache/apisix-docker
opened
Remove separate section for APISIX Docker docs
documentation
Currently, the APISIX website has an Apache APISIX Docker subsection of documentation. This is unnecessary as all the documentation mentioned on the page could be moved to APISIX documentation. This could make it easier to discover docs as they will be within the APISIX docs.
1.0
Remove separate section for APISIX Docker docs - Currently, the APISIX website has an Apache APISIX Docker subsection of documentation. This is unnecessary as all the documentation mentioned on the page could be moved to APISIX documentation. This could make it easier to discover docs as they will be within the APISIX docs.
non_priority
remove separate section for apisix docker docs currently the apisix website has an apache apisix docker subsection of documentation this is unnecessary as all the documentation mentioned on the page could be moved to apisix documentation this could make it easier to discover docs as they will be within the apisix docs
0
76,172
14,581,310,733
IssuesEvent
2020-12-18 10:31:26
joomla/joomla-cms
https://api.github.com/repos/joomla/joomla-cms
closed
[4.0] Feature request: Make 'save as copy' available in front end
New Feature No Code Attached Yet
### Is your feature request related to a problem? Please describe. For non-techy editors who don't know much html or css, it is difficult to start some articles from scratch, especially if they'd like to keep it more or less the same format as existing articles. At the moment, the only way to do this is to: 1. open an existing article, 2. copy the code, 3. close the article, 4. start a new one, 5. paste in the code and then 6. Edit ### Describe the solution you'd like Add the 'Save as Copy' option to the front editor so, 1. Open article 2. Click 'save as copy' 3. Edit ### Additional context
1.0
[4.0] Feature request: Make 'save as copy' available in front end - ### Is your feature request related to a problem? Please describe. For non-techy editors who don't know much html or css, it is difficult to start some articles from scratch, especially if they'd like to keep it more or less the same format as existing articles. At the moment, the only way to do this is to: 1. open an existing article, 2. copy the code, 3. close the article, 4. start a new one, 5. paste in the code and then 6. Edit ### Describe the solution you'd like Add the 'Save as Copy' option to the front editor so, 1. Open article 2. Click 'save as copy' 3. Edit ### Additional context
non_priority
feature request make save as copy available in front end is your feature request related to a problem please describe for non techy editors who don t know much html or css it is difficult to start some articles from scratch especially if they d like to keep it more or less the same format as existing articles at the moment the only way to do this is to open an existing article copy the code close the article start a new one paste in the code and then edit describe the solution you d like add the save as copy option to the front editor so open article click save as copy edit additional context
0
384,888
26,606,636,516
IssuesEvent
2023-01-23 19:56:15
cisagov/ScubaGear
https://api.github.com/repos/cisagov/ScubaGear
opened
Update the README to provide details on the tool file unblocking based on end-user environment's PowerShell execution policy.
documentation
# 💡 Summary # The ScubaGear is implemented with code signing through #120. While testing the code-signing with different end-user environments, found a few oddities when the execution policy is set to 'unrestricted'. The recommendation from #120 is to document expected behavior based on end-user's PowerShell ExecutionPolicy and/or note the discrepancy for the 'unrestricted policy'. The README updates are recommended to be done close to Dolphin v0.3.0 release. ## Motivation and context ## This would be useful to ScubaGear users to check their PowerShell execution policy and understand/debug the unblocking behavior of the tool. ## Implementation notes ## Update the README ## Acceptance criteria ## README lists the expected behavior for 'Unrestricted' policy along with a best practice recommendation.
1.0
Update the README to provide details on the tool file unblocking based on end-user environment's PowerShell execution policy. - # 💡 Summary # The ScubaGear is implemented with code signing through #120. While testing the code-signing with different end-user environments, found a few oddities when the execution policy is set to 'unrestricted'. The recommendation from #120 is to document expected behavior based on end-user's PowerShell ExecutionPolicy and/or note the discrepancy for the 'unrestricted policy'. The README updates are recommended to be done close to Dolphin v0.3.0 release. ## Motivation and context ## This would be useful to ScubaGear users to check their PowerShell execution policy and understand/debug the unblocking behavior of the tool. ## Implementation notes ## Update the README ## Acceptance criteria ## README lists the expected behavior for 'Unrestricted' policy along with a best practice recommendation.
non_priority
update the readme to provide details on the tool file unblocking based on end user environment s powershell execution policy 💡 summary the scubagear is implemented with code signing through while testing the code signing with different end user environments found a few oddities when the execution policy is set to unrestricted the recommendation from is to document expected behavior based on end user s powershell executionpolicy and or note the discrepancy for the unrestricted policy the readme updates are recommended to be done close to dolphin release motivation and context this would be useful to scubagear users to check their powershell execution policy and understand debug the unblocking behavior of the tool implementation notes update the readme acceptance criteria readme lists the expected behavior for unrestricted policy along with a best practice recommendation
0
148,011
23,298,515,392
IssuesEvent
2022-08-07 00:36:41
zuri-training/Proj-T_C_Gen-Team-74
https://api.github.com/repos/zuri-training/Proj-T_C_Gen-Team-74
closed
Conceive and Implement the designs for the login page
Design
## Design the login modal. # The Login should appear as a modal with a backdrop
1.0
Conceive and Implement the designs for the login page - ## Design the login modal. # The Login should appear as a modal with a backdrop
non_priority
conceive and implement the designs for the login page design the login modal the login should appear as a modal with a backdrop
0
14,415
8,580,156,245
IssuesEvent
2018-11-13 11:08:13
Yoast/wordpress-seo
https://api.github.com/repos/Yoast/wordpress-seo
opened
Functional goal: Markings
UX backlog component: performance
# UX As a user I want to: - have markings always show the relevant parts for the selected analysis - be able to modify the content or SEO attributes (keyphrase, synonyms) and have updated markings - have (near) instant feedback/results when I modify the content - have a "notification" whenever I resolved all marked problems # Technical - When a marker is active, only update the annotations when the list of what we need to annotate changes (annotations API should take care of this). _We should always be able to just provide a list, caching and performance should not be our concern._
True
Functional goal: Markings - # UX As a user I want to: - have markings always show the relevant parts for the selected analysis - be able to modify the content or SEO attributes (keyphrase, synonyms) and have updated markings - have (near) instant feedback/results when I modify the content - have a "notification" whenever I resolved all marked problems # Technical - When a marker is active, only update the annotations when the list of what we need to annotate changes (annotations API should take care of this). _We should always be able to just provide a list, caching and performance should not be our concern._
non_priority
functional goal markings ux as a user i want to have markings always show the relevant parts for the selected analysis be able to modify the content or seo attributes keyphrase synonyms and have updated markings have near instant feedback results when i modify the content have a notification whenever i resolved all marked problems technical when a marker is active only update the annotations when the list of what we need to annotate changes annotations api should take care of this we should always be able to just provide a list caching and performance should not be our concern
0
100,689
11,202,247,180
IssuesEvent
2020-01-04 10:55:13
KaTeX/KaTeX
https://api.github.com/repos/KaTeX/KaTeX
closed
mhchem for server-side Katex
documentation
**Is your feature request related to a problem? Please describe.** As far as I'm aware, there's no way to enable Katex's mhchem implementation when rendering server-side (in NodeJS). Some of us want to use this extension outside of the browser. **Describe the solution you'd like:** I'm not sure what the appropriate solution is. It sounds like what needs to happen is... 1. skip __defineMacro() invocations if running outside of a browser. 2. provide a streamlined way of injecting the relevant macros into KatexOptions when invoking renderToString(). ```js const out = katex.renderToString('...', { macros: { "\\ce": function(context) { return chemParse(context.consumeArgs(1)[0], "ce") }, "\\pu": function(context) { return chemParse(context.consumeArgs(1)[0], "pu"); }, "\\tripledash": "{\\vphantom{-}\\raisebox{2.56mu}{$\\mkern2mu" + "\\tiny\\text{-}\\mkern1mu\\text{-}\\mkern1mu\\text{-}\\mkern2mu$}}" } }) ``` **Link to or name of a (La)TeX package that provides the same feature:** N/A **Describe alternatives you've considered:** So far all I've tried is forking mhchem.js. **Additional context:** N/A
1.0
mhchem for server-side Katex - **Is your feature request related to a problem? Please describe.** As far as I'm aware, there's no way to enable Katex's mhchem implementation when rendering server-side (in NodeJS). Some of us want to use this extension outside of the browser. **Describe the solution you'd like:** I'm not sure what the appropriate solution is. It sounds like what needs to happen is... 1. skip __defineMacro() invocations if running outside of a browser. 2. provide a streamlined way of injecting the relevant macros into KatexOptions when invoking renderToString(). ```js const out = katex.renderToString('...', { macros: { "\\ce": function(context) { return chemParse(context.consumeArgs(1)[0], "ce") }, "\\pu": function(context) { return chemParse(context.consumeArgs(1)[0], "pu"); }, "\\tripledash": "{\\vphantom{-}\\raisebox{2.56mu}{$\\mkern2mu" + "\\tiny\\text{-}\\mkern1mu\\text{-}\\mkern1mu\\text{-}\\mkern2mu$}}" } }) ``` **Link to or name of a (La)TeX package that provides the same feature:** N/A **Describe alternatives you've considered:** So far all I've tried is forking mhchem.js. **Additional context:** N/A
non_priority
mhchem for server side katex is your feature request related to a problem please describe as far as i m aware there s no way to enable katex s mhchem implementation when rendering server side in nodejs some of us want to use this extension outside of the browser describe the solution you d like i m not sure what the appropriate solution is it sounds like what needs to happen is skip definemacro invocations if running outside of a browser provide a streamlined way of injecting the relevant macros into katexoptions when invoking rendertostring js const out katex rendertostring macros ce function context return chemparse context consumeargs ce pu function context return chemparse context consumeargs pu tripledash vphantom raisebox tiny text text text link to or name of a la tex package that provides the same feature n a describe alternatives you ve considered so far all i ve tried is forking mhchem js additional context n a
0
7,384
7,918,725,692
IssuesEvent
2018-07-04 14:13:02
Drakkar-Software/OctoBot
https://api.github.com/repos/Drakkar-Software/OctoBot
opened
[Profitability] Add market average change when displaying profitability
enhancement services & interfaces trading & exchanges
When asking for profitability, also display the overall market (all crypto watched) average move from t0 (bot init) to tx (profitability ask time)
1.0
[Profitability] Add market average change when displaying profitability - When asking for profitability, also display the overall market (all crypto watched) average move from t0 (bot init) to tx (profitability ask time)
non_priority
add market average change when displaying profitability when asking for profitability also display the overall market all crypto watched average move from bot init to tx profitability ask time
0
29,682
24,171,400,532
IssuesEvent
2022-09-22 19:35:07
dotnet/arcade
https://api.github.com/repos/dotnet/arcade
opened
[AsmDiff] Types whose attributes are changed, but its child APIs don't have changes, do not get empty braces added
area-Infrastructure-libraries
Example: https://github.com/dotnet/core/pull/7808/files#r972460989 The empty "{}" should've been added afterwards.
1.0
[AsmDiff] Types whose attributes are changed, but its child APIs don't have changes, do not get empty braces added - Example: https://github.com/dotnet/core/pull/7808/files#r972460989 The empty "{}" should've been added afterwards.
non_priority
types whose attributes are changed but its child apis don t have changes do not get empty braces added example the empty should ve been added afterwards
0
99,364
30,356,752,180
IssuesEvent
2023-07-12 00:50:51
ziglang/zig
https://api.github.com/repos/ziglang/zig
closed
build: memory corruption on linux kernel 6.4.0
bug os-linux downstream arch-x86_64 zig build system regression
Known bad kernel versions: * 6.4.0 * 6.4.1 * 6.4.2 Mitigation: 6.4.3 :tada: This causes a surprisingly large variety of fun crashes of which here are just a very small sampling that were encountered while trying to run the behavior tests: ``` error: unknown CPU feature: 'fp64' thread 90061 panic: integer overflow zig test Debug native: error: OutOfMemory lib/std/Build/Step/Compile.zig:1933:21: 0x3c2a69 in make (build) args_length += arg.len + 1; // +1 to account for null terminator lib/std/heap/arena_allocator.zig:165:36: 0x36122e in createNode (build) const len = big_enough_len + big_enough_len / 2; lib/std/heap/arena_allocator.zig:190:74: 0x360e51 in alloc (build) const adjusted_index = self.state.end_index + (adjusted_addr - addr); zig test Debug aarch64-linux-none: error: error: UnknownArchitecture zig test Debug aarch64-linux-gnu: error: error: unable to open zig lib directory '': FileNotFound Segmentation fault at address 0x0 lib/std/Thread/Pool.zig:133:18: 0x3eecc3 in worker (build) runFn(&run_node.data); lib/std/Thread.zig:412:13: 0x39fcfd in callFn__anon_27109 (build) @call(.auto, f, args); lib/std/Build/Step/Compile.zig:1941:23: 0x3c2cde in make (build) for (arg, 0..) |c, arg_idx| { thread 80960 panic: start index 16 is larger than end index 0 zig test Debug aarch64-windows-gnu: error: error: unrecognized file extension of parameter '' thread 84528 panic: reached unreachable code lib/std/Thread/Mutex.zig:91:15: 0x2fdb65 in unlock (build) assert(self.locking_thread.load(.Unordered) == Thread.getCurrentId()); thread 91966 panic: Deadlock detected lib/std/Thread/Mutex.zig:84:13: 0x2fd9d3 in lock (build) @panic("Deadlock detected"); error: the following build command crashed: <infinite loop> ``` [upstream bug](https://bugzilla.kernel.org/show_bug.cgi?id=217624)
1.0
build: memory corruption on linux kernel 6.4.0 - Known bad kernel versions: * 6.4.0 * 6.4.1 * 6.4.2 Mitigation: 6.4.3 :tada: This causes a surprisingly large variety of fun crashes of which here are just a very small sampling that were encountered while trying to run the behavior tests: ``` error: unknown CPU feature: 'fp64' thread 90061 panic: integer overflow zig test Debug native: error: OutOfMemory lib/std/Build/Step/Compile.zig:1933:21: 0x3c2a69 in make (build) args_length += arg.len + 1; // +1 to account for null terminator lib/std/heap/arena_allocator.zig:165:36: 0x36122e in createNode (build) const len = big_enough_len + big_enough_len / 2; lib/std/heap/arena_allocator.zig:190:74: 0x360e51 in alloc (build) const adjusted_index = self.state.end_index + (adjusted_addr - addr); zig test Debug aarch64-linux-none: error: error: UnknownArchitecture zig test Debug aarch64-linux-gnu: error: error: unable to open zig lib directory '': FileNotFound Segmentation fault at address 0x0 lib/std/Thread/Pool.zig:133:18: 0x3eecc3 in worker (build) runFn(&run_node.data); lib/std/Thread.zig:412:13: 0x39fcfd in callFn__anon_27109 (build) @call(.auto, f, args); lib/std/Build/Step/Compile.zig:1941:23: 0x3c2cde in make (build) for (arg, 0..) |c, arg_idx| { thread 80960 panic: start index 16 is larger than end index 0 zig test Debug aarch64-windows-gnu: error: error: unrecognized file extension of parameter '' thread 84528 panic: reached unreachable code lib/std/Thread/Mutex.zig:91:15: 0x2fdb65 in unlock (build) assert(self.locking_thread.load(.Unordered) == Thread.getCurrentId()); thread 91966 panic: Deadlock detected lib/std/Thread/Mutex.zig:84:13: 0x2fd9d3 in lock (build) @panic("Deadlock detected"); error: the following build command crashed: <infinite loop> ``` [upstream bug](https://bugzilla.kernel.org/show_bug.cgi?id=217624)
non_priority
build memory corruption on linux kernel known bad kernel versions mitigation tada this causes a surprisingly large variety of fun crashes of which here are just a very small sampling that were encountered while trying to run the behavior tests error unknown cpu feature thread panic integer overflow zig test debug native error outofmemory lib std build step compile zig in make build args length arg len to account for null terminator lib std heap arena allocator zig in createnode build const len big enough len big enough len lib std heap arena allocator zig in alloc build const adjusted index self state end index adjusted addr addr zig test debug linux none error error unknownarchitecture zig test debug linux gnu error error unable to open zig lib directory filenotfound segmentation fault at address lib std thread pool zig in worker build runfn run node data lib std thread zig in callfn anon build call auto f args lib std build step compile zig in make build for arg c arg idx thread panic start index is larger than end index zig test debug windows gnu error error unrecognized file extension of parameter thread panic reached unreachable code lib std thread mutex zig in unlock build assert self locking thread load unordered thread getcurrentid thread panic deadlock detected lib std thread mutex zig in lock build panic deadlock detected error the following build command crashed
0
62,871
15,375,829,964
IssuesEvent
2021-03-02 15:20:33
ZogopZ/to-do
https://api.github.com/repos/ZogopZ/to-do
closed
Add clock instance animation.
[clock] -> animations build-up
- [x] Add a nudge-like animation to the clock instance when the user tries to press IME_ACTION_DONE before completely filling in all the clock views.
1.0
Add clock instance animation. - - [x] Add a nudge-like animation to the clock instance when the user tries to press IME_ACTION_DONE before completely filling in all the clock views.
non_priority
add clock instance animation add a nudge like animation to the clock instance when the user tries to press ime action done before completely filling in all the clock views
0
48,574
10,262,258,125
IssuesEvent
2019-08-22 11:54:20
atomist-blogs/org-visualizer
https://api.github.com/repos/atomist-blogs/org-visualizer
closed
Code Inspection: Tslint on org-visualizer
bug code-inspection
### no-implicit-dependencies - [`lib/aspect/k8s/spec.ts:32`](https://github.com/atomist-blogs/org-visualizer/blob/13e2721ded51ea2a95fe3f6afe95cf95352eacd6/lib/aspect/k8s/spec.ts#L32): _(error)_ Module 'js-yaml' is not listed as dependency in package.json - [`lib/aspect/k8s/spec.ts:33`](https://github.com/atomist-blogs/org-visualizer/blob/13e2721ded51ea2a95fe3f6afe95cf95352eacd6/lib/aspect/k8s/spec.ts#L33): _(error)_ Module 'json-stable-stringify' is not listed as dependency in package.json - [`lib/aspect/node/npmDependencies.ts:39`](https://github.com/atomist-blogs/org-visualizer/blob/13e2721ded51ea2a95fe3f6afe95cf95352eacd6/lib/aspect/node/npmDependencies.ts#L39): _(error)_ Module 'lodash' is not listed as dependency in package.json - [`lib/aspect/node/TsLint.ts:23`](https://github.com/atomist-blogs/org-visualizer/blob/13e2721ded51ea2a95fe3f6afe95cf95352eacd6/lib/aspect/node/TsLint.ts#L23): _(error)_ Module 'lodash' is not listed as dependency in package.json - [`lib/aspect/node/TypeScriptVersion.ts:33`](https://github.com/atomist-blogs/org-visualizer/blob/13e2721ded51ea2a95fe3f6afe95cf95352eacd6/lib/aspect/node/TypeScriptVersion.ts#L33): _(error)_ Module 'lodash' is not listed as dependency in package.json - [`lib/aspect/travis/travisAspects.ts:25`](https://github.com/atomist-blogs/org-visualizer/blob/13e2721ded51ea2a95fe3f6afe95cf95352eacd6/lib/aspect/travis/travisAspects.ts#L25): _(error)_ Module 'yamljs' is not listed as dependency in package.json - [`lib/scorer/commonScorers.ts:31`](https://github.com/atomist-blogs/org-visualizer/blob/13e2721ded51ea2a95fe3f6afe95cf95352eacd6/lib/scorer/commonScorers.ts#L31): _(error)_ Module 'lodash' is not listed as dependency in package.json [atomist:code-inspection:org-visualizer=@atomist/atomist-sdm]
1.0
Code Inspection: Tslint on org-visualizer - ### no-implicit-dependencies - [`lib/aspect/k8s/spec.ts:32`](https://github.com/atomist-blogs/org-visualizer/blob/13e2721ded51ea2a95fe3f6afe95cf95352eacd6/lib/aspect/k8s/spec.ts#L32): _(error)_ Module 'js-yaml' is not listed as dependency in package.json - [`lib/aspect/k8s/spec.ts:33`](https://github.com/atomist-blogs/org-visualizer/blob/13e2721ded51ea2a95fe3f6afe95cf95352eacd6/lib/aspect/k8s/spec.ts#L33): _(error)_ Module 'json-stable-stringify' is not listed as dependency in package.json - [`lib/aspect/node/npmDependencies.ts:39`](https://github.com/atomist-blogs/org-visualizer/blob/13e2721ded51ea2a95fe3f6afe95cf95352eacd6/lib/aspect/node/npmDependencies.ts#L39): _(error)_ Module 'lodash' is not listed as dependency in package.json - [`lib/aspect/node/TsLint.ts:23`](https://github.com/atomist-blogs/org-visualizer/blob/13e2721ded51ea2a95fe3f6afe95cf95352eacd6/lib/aspect/node/TsLint.ts#L23): _(error)_ Module 'lodash' is not listed as dependency in package.json - [`lib/aspect/node/TypeScriptVersion.ts:33`](https://github.com/atomist-blogs/org-visualizer/blob/13e2721ded51ea2a95fe3f6afe95cf95352eacd6/lib/aspect/node/TypeScriptVersion.ts#L33): _(error)_ Module 'lodash' is not listed as dependency in package.json - [`lib/aspect/travis/travisAspects.ts:25`](https://github.com/atomist-blogs/org-visualizer/blob/13e2721ded51ea2a95fe3f6afe95cf95352eacd6/lib/aspect/travis/travisAspects.ts#L25): _(error)_ Module 'yamljs' is not listed as dependency in package.json - [`lib/scorer/commonScorers.ts:31`](https://github.com/atomist-blogs/org-visualizer/blob/13e2721ded51ea2a95fe3f6afe95cf95352eacd6/lib/scorer/commonScorers.ts#L31): _(error)_ Module 'lodash' is not listed as dependency in package.json [atomist:code-inspection:org-visualizer=@atomist/atomist-sdm]
non_priority
code inspection tslint on org visualizer no implicit dependencies error module js yaml is not listed as dependency in package json error module json stable stringify is not listed as dependency in package json error module lodash is not listed as dependency in package json error module lodash is not listed as dependency in package json error module lodash is not listed as dependency in package json error module yamljs is not listed as dependency in package json error module lodash is not listed as dependency in package json
0
83,850
16,380,793,316
IssuesEvent
2021-05-17 01:56:06
alibaba/nacos
https://api.github.com/repos/alibaba/nacos
reopened
[Code Quality] [nacos-config] [sub issue] improve the code quality of module nacos-config.
kind/code quality
<!-- Here is for bug reports and feature requests ONLY! If you're looking for help, please check our mail list、WeChat group and the Gitter room. Please try to use English to describe your issue, or at least provide a snippet of English translation. 我们鼓励使用英文,如果不能直接使用,可以使用翻译软件,您仍旧可以保留中文原文。 --> **Description** Module: `nacos-config` This issue is the sub issue of #5726 , it will improve the code quality of module nacos-config. we improve the code quality by directory. **the PR list** | dirctory | PR | status | | ---- | ---- | ---- | | aspect | #5730 | open | | auth | #5729 | open | | controller | #5731 | open | | remote | #5732 | open | | service | #5744 #5752| open | | utils | waiting | |
1.0
[Code Quality] [nacos-config] [sub issue] improve the code quality of module nacos-config. - <!-- Here is for bug reports and feature requests ONLY! If you're looking for help, please check our mail list、WeChat group and the Gitter room. Please try to use English to describe your issue, or at least provide a snippet of English translation. 我们鼓励使用英文,如果不能直接使用,可以使用翻译软件,您仍旧可以保留中文原文。 --> **Description** Module: `nacos-config` This issue is the sub issue of #5726 , it will improve the code quality of module nacos-config. we improve the code quality by directory. **the PR list** | dirctory | PR | status | | ---- | ---- | ---- | | aspect | #5730 | open | | auth | #5729 | open | | controller | #5731 | open | | remote | #5732 | open | | service | #5744 #5752| open | | utils | waiting | |
non_priority
improve the code quality of module nacos config here is for bug reports and feature requests only if you re looking for help please check our mail list、wechat group and the gitter room please try to use english to describe your issue or at least provide a snippet of english translation 我们鼓励使用英文,如果不能直接使用,可以使用翻译软件,您仍旧可以保留中文原文。 description module nacos config this issue is the sub issue of it will improve the code quality of module nacos config we improve the code quality by directory the pr list dirctory pr status aspect open auth open controller open remote open service open utils waiting
0
216,224
16,653,313,555
IssuesEvent
2021-06-05 03:48:35
AshokKumarChoppadandi/dev-environments
https://api.github.com/repos/AshokKumarChoppadandi/dev-environments
opened
Setting up Static IP
documentation
Prepare a document with all the steps to set the Static IP on Virtual / Physical Machine with screenshots for reference.
1.0
Setting up Static IP - Prepare a document with all the steps to set the Static IP on Virtual / Physical Machine with screenshots for reference.
non_priority
setting up static ip prepare a document with all the steps to set the static ip on virtual physical machine with screenshots for reference
0
306,706
26,491,971,050
IssuesEvent
2023-01-17 23:53:44
Xyaneon/Xyaneon.Games.Cards
https://api.github.com/repos/Xyaneon/Xyaneon.Games.Cards
closed
DefaultShuffleAlgorithm is missing unit test coverage
testing
Coveralls is reporting that the `DefaultShuffleAlgorithm` class has no unit test coverage as of the [first build on `main`](https://coveralls.io/builds/55964559) with it enabled.
1.0
DefaultShuffleAlgorithm is missing unit test coverage - Coveralls is reporting that the `DefaultShuffleAlgorithm` class has no unit test coverage as of the [first build on `main`](https://coveralls.io/builds/55964559) with it enabled.
non_priority
defaultshufflealgorithm is missing unit test coverage coveralls is reporting that the defaultshufflealgorithm class has no unit test coverage as of the with it enabled
0
227,247
18,054,216,376
IssuesEvent
2021-09-20 05:15:31
logicmoo/logicmoo_workspace
https://api.github.com/repos/logicmoo/logicmoo_workspace
opened
logicmoo.pfc.test.sanity_base.VERBATUMS_05 JUnit
Test_9999 logicmoo.pfc.test.sanity_base unit_test VERBATUMS_05 Failing
(cd /var/lib/jenkins/workspace/logicmoo_workspace/packs_sys/pfc/t/sanity_base ; timeout --foreground --preserve-status -s SIGKILL -k 10s 10s swipl -x /var/lib/jenkins/workspace/logicmoo_workspace/bin/lmoo-clif verbatums_05.pfc) % ISSUE: https://github.com/logicmoo/logicmoo_workspace/issues/ % EDIT: https://github.com/logicmoo/logicmoo_workspace/edit/master/packs_sys/pfc/t/sanity_base/verbatums_05.pfc % JENKINS: https://jenkins.logicmoo.org/job/logicmoo_workspace/lastBuild/testReport/logicmoo.pfc.test.sanity_base/VERBATUMS_05/logicmoo_pfc_test_sanity_base_VERBATUMS_05_JUnit/ % ISSUE_SEARCH: https://github.com/logicmoo/logicmoo_workspace/issues?q=is%3Aissue+label%3AVERBATUMS_05 ``` %~ init_phase(after_load) %~ init_phase(restore_state) % running('/var/lib/jenkins/workspace/logicmoo_workspace/packs_sys/pfc/t/sanity_base/verbatums_05.pfc'), %~ /var/lib/jenkins/.local/share/swi-prolog/pack/logicmoo_utils/prolog/logicmoo_test_header.pl:93 %~ this_test_might_need( :-( use_module( library(logicmoo_plarkc)))) :- dynamic(total_income/3). % RULES % RULES income(Person,_Source,Year,Dollars) ==> {increment_income(Person,Year,Dollars)}. ==> do_and_undo(increment_income(P,Y,D),decrement_income(P,Y,D)). increment_income(P,Y,D) :- (retract(total_income(P,Y,Old)) -> New is Old+D ; New = D), assert(total_income(P,Y,New)). decrement_income(P,Y,D) :- retract(total_income(P,Y,Old)), New is Old-D, assert(total_income(P,Y,New)). % FACTS % FACTS income(person,sourceOne,2035,6666). income(person,sourceTwo,2035,1111). income(person,sourceTwo,2036,2222). % RESULTS PT 1 % RESULTS PT 1 :- listing(total_income/3). %~ skipped( listing( total_income/3)) /* total_income(person, 2035, 7777). total_income(person, 2036, 2222). */ % UPDATE Remove some income \+ income(person,_,2035,1111). % RESULTS PT 2 %~ debugm( baseKB, %~ show_success( baseKB, %~ baseKB : mpred_withdraw( income(person,sourceTwo,2035,1111), %~ ( mfl4(BaseKB,baseKB,'* https://logicmoo.org:2082/gitlab/logicmoo/logicmoo_workspace/-/edit/master/packs_sys/pfc/t/sanity_base/verbatums_05.pfc ',50) , %~ ax)))) % RESULTS PT 2 :- listing(total_income/3). %~ skipped( listing( total_income/3)) %~ unused(no_junit_results) %~ test_completed_exit(0) ``` totalTime=1.000 FAILED: /var/lib/jenkins/workspace/logicmoo_workspace/bin/lmoo-junit-minor -k verbatums_05.pfc (returned 0) Add_LABELS='' Rem_LABELS='Skipped,Skipped,Errors,Warnings,Overtime,Skipped,Skipped'
3.0
logicmoo.pfc.test.sanity_base.VERBATUMS_05 JUnit - (cd /var/lib/jenkins/workspace/logicmoo_workspace/packs_sys/pfc/t/sanity_base ; timeout --foreground --preserve-status -s SIGKILL -k 10s 10s swipl -x /var/lib/jenkins/workspace/logicmoo_workspace/bin/lmoo-clif verbatums_05.pfc) % ISSUE: https://github.com/logicmoo/logicmoo_workspace/issues/ % EDIT: https://github.com/logicmoo/logicmoo_workspace/edit/master/packs_sys/pfc/t/sanity_base/verbatums_05.pfc % JENKINS: https://jenkins.logicmoo.org/job/logicmoo_workspace/lastBuild/testReport/logicmoo.pfc.test.sanity_base/VERBATUMS_05/logicmoo_pfc_test_sanity_base_VERBATUMS_05_JUnit/ % ISSUE_SEARCH: https://github.com/logicmoo/logicmoo_workspace/issues?q=is%3Aissue+label%3AVERBATUMS_05 ``` %~ init_phase(after_load) %~ init_phase(restore_state) % running('/var/lib/jenkins/workspace/logicmoo_workspace/packs_sys/pfc/t/sanity_base/verbatums_05.pfc'), %~ /var/lib/jenkins/.local/share/swi-prolog/pack/logicmoo_utils/prolog/logicmoo_test_header.pl:93 %~ this_test_might_need( :-( use_module( library(logicmoo_plarkc)))) :- dynamic(total_income/3). % RULES % RULES income(Person,_Source,Year,Dollars) ==> {increment_income(Person,Year,Dollars)}. ==> do_and_undo(increment_income(P,Y,D),decrement_income(P,Y,D)). increment_income(P,Y,D) :- (retract(total_income(P,Y,Old)) -> New is Old+D ; New = D), assert(total_income(P,Y,New)). decrement_income(P,Y,D) :- retract(total_income(P,Y,Old)), New is Old-D, assert(total_income(P,Y,New)). % FACTS % FACTS income(person,sourceOne,2035,6666). income(person,sourceTwo,2035,1111). income(person,sourceTwo,2036,2222). % RESULTS PT 1 % RESULTS PT 1 :- listing(total_income/3). %~ skipped( listing( total_income/3)) /* total_income(person, 2035, 7777). total_income(person, 2036, 2222). */ % UPDATE Remove some income \+ income(person,_,2035,1111). % RESULTS PT 2 %~ debugm( baseKB, %~ show_success( baseKB, %~ baseKB : mpred_withdraw( income(person,sourceTwo,2035,1111), %~ ( mfl4(BaseKB,baseKB,'* https://logicmoo.org:2082/gitlab/logicmoo/logicmoo_workspace/-/edit/master/packs_sys/pfc/t/sanity_base/verbatums_05.pfc ',50) , %~ ax)))) % RESULTS PT 2 :- listing(total_income/3). %~ skipped( listing( total_income/3)) %~ unused(no_junit_results) %~ test_completed_exit(0) ``` totalTime=1.000 FAILED: /var/lib/jenkins/workspace/logicmoo_workspace/bin/lmoo-junit-minor -k verbatums_05.pfc (returned 0) Add_LABELS='' Rem_LABELS='Skipped,Skipped,Errors,Warnings,Overtime,Skipped,Skipped'
non_priority
logicmoo pfc test sanity base verbatums junit cd var lib jenkins workspace logicmoo workspace packs sys pfc t sanity base timeout foreground preserve status s sigkill k swipl x var lib jenkins workspace logicmoo workspace bin lmoo clif verbatums pfc issue edit jenkins issue search init phase after load init phase restore state running var lib jenkins workspace logicmoo workspace packs sys pfc t sanity base verbatums pfc var lib jenkins local share swi prolog pack logicmoo utils prolog logicmoo test header pl this test might need use module library logicmoo plarkc dynamic total income rules rules income person source year dollars increment income person year dollars do and undo increment income p y d decrement income p y d increment income p y d retract total income p y old new is old d new d assert total income p y new decrement income p y d retract total income p y old new is old d assert total income p y new facts facts income person sourceone income person sourcetwo income person sourcetwo results pt results pt listing total income skipped listing total income total income person total income person update remove some income income person results pt debugm basekb show success basekb basekb mpred withdraw income person sourcetwo basekb basekb ax results pt listing total income skipped listing total income unused no junit results test completed exit totaltime failed var lib jenkins workspace logicmoo workspace bin lmoo junit minor k verbatums pfc returned add labels rem labels skipped skipped errors warnings overtime skipped skipped
0
196,694
22,497,941,781
IssuesEvent
2022-06-23 09:13:06
padloc/padloc
https://api.github.com/repos/padloc/padloc
closed
Reproducible builds
security maintenance
Provide reproducible builds for all targets along with clear instructions on how to verify that published binaries match with what is published on Github. Not sure to what degree that is even possible for iOS and Android but at the very least it should be possible for the PWA, desktop apps and web extension.
True
Reproducible builds - Provide reproducible builds for all targets along with clear instructions on how to verify that published binaries match with what is published on Github. Not sure to what degree that is even possible for iOS and Android but at the very least it should be possible for the PWA, desktop apps and web extension.
non_priority
reproducible builds provide reproducible builds for all targets along with clear instructions on how to verify that published binaries match with what is published on github not sure to what degree that is even possible for ios and android but at the very least it should be possible for the pwa desktop apps and web extension
0
140,373
21,089,959,149
IssuesEvent
2022-04-04 03:03:16
Lakhankumawat/smart-home-app
https://api.github.com/repos/Lakhankumawat/smart-home-app
closed
Implement Set Event Screen
enhancement good first issue design develop GSSoC22 Assigned
### Description I'd like to work upon building the Set Event Screen as per the below shown UI Design ![image](https://user-images.githubusercontent.com/80041092/157485971-660ce3f3-327d-4ee8-85b1-674b03caaf93.png) ### Domain UI/UX ### Type of Contribution Addition ### Code of Conduct - [X] I follow [Contributing Guidelines](https://github.com/Lakhankumawat/smart-home-app/blob/master/Contributing.md) & [Code of conduct](https://github.com/Lakhankumawat/smart-home-app/blob/master/.github/CODE_OF_CONDUCT.md) of Smart Home App.
1.0
Implement Set Event Screen - ### Description I'd like to work upon building the Set Event Screen as per the below shown UI Design ![image](https://user-images.githubusercontent.com/80041092/157485971-660ce3f3-327d-4ee8-85b1-674b03caaf93.png) ### Domain UI/UX ### Type of Contribution Addition ### Code of Conduct - [X] I follow [Contributing Guidelines](https://github.com/Lakhankumawat/smart-home-app/blob/master/Contributing.md) & [Code of conduct](https://github.com/Lakhankumawat/smart-home-app/blob/master/.github/CODE_OF_CONDUCT.md) of Smart Home App.
non_priority
implement set event screen description i d like to work upon building the set event screen as per the below shown ui design domain ui ux type of contribution addition code of conduct i follow of smart home app
0
25,217
24,903,264,673
IssuesEvent
2022-10-29 00:42:32
bevyengine/bevy
https://api.github.com/repos/bevyengine/bevy
closed
Implement Reflect traits for `NonZero` numeric types
D-Good-First-Issue C-Usability A-Reflection
## What problem does this solve or what need does it fill? I want to use these types in my code, but cannot impl `Reflect` due to orphan rules. ## What solution would you like? Use the macro to impl this for all the numeric types in https://doc.rust-lang.org/stable/std/num/index.html. ## What alternative(s) have you considered? Write my own NonZeroU32 type :(
True
Implement Reflect traits for `NonZero` numeric types - ## What problem does this solve or what need does it fill? I want to use these types in my code, but cannot impl `Reflect` due to orphan rules. ## What solution would you like? Use the macro to impl this for all the numeric types in https://doc.rust-lang.org/stable/std/num/index.html. ## What alternative(s) have you considered? Write my own NonZeroU32 type :(
non_priority
implement reflect traits for nonzero numeric types what problem does this solve or what need does it fill i want to use these types in my code but cannot impl reflect due to orphan rules what solution would you like use the macro to impl this for all the numeric types in what alternative s have you considered write my own type
0
269,822
28,960,304,233
IssuesEvent
2023-05-10 01:31:11
praneethpanasala/linux
https://api.github.com/repos/praneethpanasala/linux
reopened
CVE-2022-0264 (Medium) detected in linuxlinux-4.19.6
Mend: dependency security vulnerability
## CVE-2022-0264 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linuxlinux-4.19.6</b></p></summary> <p> <p>Apache Software Foundation (ASF)</p> <p>Library home page: <a href=https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux>https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux</a></p> <p>Found in HEAD commit: <a href="https://api.github.com/repos/praneethpanasala/linux/commits/d80c4f847c91020292cb280132b15e2ea147f1a3">d80c4f847c91020292cb280132b15e2ea147f1a3</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/kernel/bpf/verifier.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Vulnerability Details</summary> <p> A vulnerability was found in the Linux kernel's eBPF verifier when handling internal data structures. Internal memory locations could be returned to userspace. A local attacker with the permissions to insert eBPF code to the kernel can use this to leak internal kernel memory details defeating some of the exploit mitigations in place for the kernel. This flaws affects kernel versions < v5.16-rc6 <p>Publish Date: 2022-02-04 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-0264>CVE-2022-0264</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.linuxkernelcves.com/cves/CVE-2022-0264">https://www.linuxkernelcves.com/cves/CVE-2022-0264</a></p> <p>Release Date: 2022-02-04</p> <p>Fix Resolution: v5.15.11,v5.16-rc6</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2022-0264 (Medium) detected in linuxlinux-4.19.6 - ## CVE-2022-0264 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linuxlinux-4.19.6</b></p></summary> <p> <p>Apache Software Foundation (ASF)</p> <p>Library home page: <a href=https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux>https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux</a></p> <p>Found in HEAD commit: <a href="https://api.github.com/repos/praneethpanasala/linux/commits/d80c4f847c91020292cb280132b15e2ea147f1a3">d80c4f847c91020292cb280132b15e2ea147f1a3</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/kernel/bpf/verifier.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Vulnerability Details</summary> <p> A vulnerability was found in the Linux kernel's eBPF verifier when handling internal data structures. Internal memory locations could be returned to userspace. A local attacker with the permissions to insert eBPF code to the kernel can use this to leak internal kernel memory details defeating some of the exploit mitigations in place for the kernel. This flaws affects kernel versions < v5.16-rc6 <p>Publish Date: 2022-02-04 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-0264>CVE-2022-0264</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.linuxkernelcves.com/cves/CVE-2022-0264">https://www.linuxkernelcves.com/cves/CVE-2022-0264</a></p> <p>Release Date: 2022-02-04</p> <p>Fix Resolution: v5.15.11,v5.16-rc6</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in linuxlinux cve medium severity vulnerability vulnerable library linuxlinux apache software foundation asf library home page a href found in head commit a href found in base branch master vulnerable source files kernel bpf verifier c vulnerability details a vulnerability was found in the linux kernel s ebpf verifier when handling internal data structures internal memory locations could be returned to userspace a local attacker with the permissions to insert ebpf code to the kernel can use this to leak internal kernel memory details defeating some of the exploit mitigations in place for the kernel this flaws affects kernel versions publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend
0
6,426
8,721,484,757
IssuesEvent
2018-12-08 23:42:15
metarhia/impress
https://api.github.com/repos/metarhia/impress
closed
Compare host name without RegExp
compatibility optimization performance
In `lib/core.js/impress.dispatcher` we need no hostsRx (RegExp precompiled from `/applications/appName/confog/hosts.js`). We may add another restriction: only one `*` in host name. So we can use `startsWith` and `endsWith` instead of multiple regular expressions combined together. Also remove `lib/config.js/Config.preprocessConfig`
True
Compare host name without RegExp - In `lib/core.js/impress.dispatcher` we need no hostsRx (RegExp precompiled from `/applications/appName/confog/hosts.js`). We may add another restriction: only one `*` in host name. So we can use `startsWith` and `endsWith` instead of multiple regular expressions combined together. Also remove `lib/config.js/Config.preprocessConfig`
non_priority
compare host name without regexp in lib core js impress dispatcher we need no hostsrx regexp precompiled from applications appname confog hosts js we may add another restriction only one in host name so we can use startswith and endswith instead of multiple regular expressions combined together also remove lib config js config preprocessconfig
0
64,339
7,786,911,212
IssuesEvent
2018-06-06 20:32:46
quicwg/base-drafts
https://api.github.com/repos/quicwg/base-drafts
closed
Flags in HTTP/QUIC frames are wasted space
-http design has-proposal
Of the frame types defined in the draft, only one frame type actually defines any flags. Otherwise, the flags byte is a wasted byte per frame, every frame. For the frames which don't use flags, the byte can simply be dropped from the generic frame definition without ill effect. For the one which does (PRIORITY), there are a few reasonable choices: - Define a flags byte as the first byte of PRIORITY's payload; PRIORITY effectively remains unchanged - Follow QUIC's lead: embed the flags in the type byte; PRIORITY consumes eight values in the frame type space - Consider putting priority changes on a separate unidirectional stream (as in #1359) and not using control stream frames for them at all. They only need order with respect to each other, not anything else.
1.0
Flags in HTTP/QUIC frames are wasted space - Of the frame types defined in the draft, only one frame type actually defines any flags. Otherwise, the flags byte is a wasted byte per frame, every frame. For the frames which don't use flags, the byte can simply be dropped from the generic frame definition without ill effect. For the one which does (PRIORITY), there are a few reasonable choices: - Define a flags byte as the first byte of PRIORITY's payload; PRIORITY effectively remains unchanged - Follow QUIC's lead: embed the flags in the type byte; PRIORITY consumes eight values in the frame type space - Consider putting priority changes on a separate unidirectional stream (as in #1359) and not using control stream frames for them at all. They only need order with respect to each other, not anything else.
non_priority
flags in http quic frames are wasted space of the frame types defined in the draft only one frame type actually defines any flags otherwise the flags byte is a wasted byte per frame every frame for the frames which don t use flags the byte can simply be dropped from the generic frame definition without ill effect for the one which does priority there are a few reasonable choices define a flags byte as the first byte of priority s payload priority effectively remains unchanged follow quic s lead embed the flags in the type byte priority consumes eight values in the frame type space consider putting priority changes on a separate unidirectional stream as in and not using control stream frames for them at all they only need order with respect to each other not anything else
0
106,293
23,206,181,805
IssuesEvent
2022-08-02 05:40:15
microsoft/vsmarketplace
https://api.github.com/repos/microsoft/vsmarketplace
closed
i cant install live server
need-information vscode
Issue Type: <b>Feature Request</b> cant install live server extension VS Code version: Code 1.69.2 (3b889b090b5ad5793f524b5d1d39fda662b96a2a, 2022-07-18T16:12:52.460Z) OS version: Windows_NT x64 10.0.19044 Restricted Mode: No <!-- generated by issue reporter -->
1.0
i cant install live server - Issue Type: <b>Feature Request</b> cant install live server extension VS Code version: Code 1.69.2 (3b889b090b5ad5793f524b5d1d39fda662b96a2a, 2022-07-18T16:12:52.460Z) OS version: Windows_NT x64 10.0.19044 Restricted Mode: No <!-- generated by issue reporter -->
non_priority
i cant install live server issue type feature request cant install live server extension vs code version code os version windows nt restricted mode no
0
177,222
21,468,763,664
IssuesEvent
2022-04-26 07:34:58
Satheesh575555/external_tcpdump_AOSP10_r33
https://api.github.com/repos/Satheesh575555/external_tcpdump_AOSP10_r33
opened
CVE-2018-10105 (High) detected in tcpdumptcpdump-4.9.2
security vulnerability
## CVE-2018-10105 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>tcpdumptcpdump-4.9.2</b></p></summary> <p> <p>the TCPdump network dissector</p> <p>Library home page: <a href=https://github.com/the-tcpdump-group/tcpdump.git>https://github.com/the-tcpdump-group/tcpdump.git</a></p> <p>Found in HEAD commit: <a href="https://github.com/Satheesh575555/external_tcpdump_AOSP10_r33/commit/2dfdd1ca649c09239da90330faa390fd66d5fc18">2dfdd1ca649c09239da90330faa390fd66d5fc18</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/print-smb.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> tcpdump before 4.9.3 mishandles the printing of SMB data (issue 2 of 2). <p>Publish Date: 2019-10-03 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-10105>CVE-2018-10105</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/the-tcpdump-group/tcpdump/commit/428c37e02aa0d286da52185ecc365b22175ffcb8">https://github.com/the-tcpdump-group/tcpdump/commit/428c37e02aa0d286da52185ecc365b22175ffcb8</a></p> <p>Release Date: 2019-10-03</p> <p>Fix Resolution: 4.9.3</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2018-10105 (High) detected in tcpdumptcpdump-4.9.2 - ## CVE-2018-10105 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>tcpdumptcpdump-4.9.2</b></p></summary> <p> <p>the TCPdump network dissector</p> <p>Library home page: <a href=https://github.com/the-tcpdump-group/tcpdump.git>https://github.com/the-tcpdump-group/tcpdump.git</a></p> <p>Found in HEAD commit: <a href="https://github.com/Satheesh575555/external_tcpdump_AOSP10_r33/commit/2dfdd1ca649c09239da90330faa390fd66d5fc18">2dfdd1ca649c09239da90330faa390fd66d5fc18</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/print-smb.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> tcpdump before 4.9.3 mishandles the printing of SMB data (issue 2 of 2). <p>Publish Date: 2019-10-03 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-10105>CVE-2018-10105</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/the-tcpdump-group/tcpdump/commit/428c37e02aa0d286da52185ecc365b22175ffcb8">https://github.com/the-tcpdump-group/tcpdump/commit/428c37e02aa0d286da52185ecc365b22175ffcb8</a></p> <p>Release Date: 2019-10-03</p> <p>Fix Resolution: 4.9.3</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in tcpdumptcpdump cve high severity vulnerability vulnerable library tcpdumptcpdump the tcpdump network dissector library home page a href found in head commit a href found in base branch master vulnerable source files print smb c vulnerability details tcpdump before mishandles the printing of smb data issue of publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
0
200,768
15,148,400,478
IssuesEvent
2021-02-11 10:33:30
hrwakeford/ExoTiC-ISM
https://api.github.com/repos/hrwakeford/ExoTiC-ISM
closed
Increase CI test coverage
Testing
We have set up CI with GitHub Actions which runs on every open PR, however our code coverage is extremely low and should be increased in the future to ensure robustness with new code and updates.
1.0
Increase CI test coverage - We have set up CI with GitHub Actions which runs on every open PR, however our code coverage is extremely low and should be increased in the future to ensure robustness with new code and updates.
non_priority
increase ci test coverage we have set up ci with github actions which runs on every open pr however our code coverage is extremely low and should be increased in the future to ensure robustness with new code and updates
0
10,468
8,575,850,226
IssuesEvent
2018-11-12 18:30:46
coddingtonbear/inthe.am
https://api.github.com/repos/coddingtonbear/inthe.am
closed
`update_statistics` and `gc_large_repos` overnight tasks are not executing currently.
bug infrastructure
When investigating a problem this morning, I found this notice in the logs for the above: ``` System check identified some issues: WARNINGS: taskmanager.UserMetadata.user: (fields.W342) Setting unique=True on a ForeignKey has the same effect as using a OneToOneField. HINT: ForeignKey(unique=True) is usually better served by a OneToOneField. Traceback (most recent call last): File "/var/www/twweb/manage.py", line 15, in <module> execute_from_command_line(sys.argv) File "/var/www/envs/twweb/local/lib/python2.7/site-packages/django/core/management/__init__.py", line 354, in execute_from_command_line utility.execute() File "/var/www/envs/twweb/local/lib/python2.7/site-packages/django/core/management/__init__.py", line 346, in execute self.fetch_command(subcommand).run_from_argv(self.argv) File "/var/www/envs/twweb/local/lib/python2.7/site-packages/django/core/management/base.py", line 394, in run_from_argv self.execute(*args, **cmd_options) File "/var/www/envs/twweb/local/lib/python2.7/site-packages/django/core/management/base.py", line 445, in execute output = self.handle(*args, **options) File "/var/www/twweb/inthe_am/taskmanager/management/commands/taskstore.py", line 107, in handle for store in TaskStore.objects.order_by('-last_synced'): File "/var/www/envs/twweb/local/lib/python2.7/site-packages/django/db/models/query.py", line 162, in __iter__ self._fetch_all() File "/var/www/envs/twweb/local/lib/python2.7/site-packages/django/db/models/query.py", line 965, in _fetch_all self._result_cache = list(self.iterator()) File "/var/www/envs/twweb/local/lib/python2.7/site-packages/django/db/models/query.py", line 238, in iterator results = compiler.execute_sql() File "/var/www/envs/twweb/local/lib/python2.7/site-packages/django/db/models/sql/compiler.py", line 840, in execute_sql cursor.execute(sql, params) File "/var/www/envs/twweb/local/lib/python2.7/site-packages/django/db/backends/utils.py", line 64, in execute return self.cursor.execute(sql, params) File "/var/www/envs/twweb/local/lib/python2.7/site-packages/django/db/utils.py", line 98, in __exit__ six.reraise(dj_exc_type, dj_exc_value, traceback) File "/var/www/envs/twweb/local/lib/python2.7/site-packages/django/db/backends/utils.py", line 64, in execute return self.cursor.execute(sql, params) File "/var/www/envs/twweb/local/lib/python2.7/site-packages/django/db/backends/sqlite3/base.py", line 318, in execute return Database.Cursor.execute(self, query, params) django.db.utils.OperationalError: no such column: taskmanager_taskstore.secret_id ``` _Clearly_ it's connecting to sqlite (like it would for a dev environment) for some reason rather than the proper database backend. This is...a problem.
1.0
`update_statistics` and `gc_large_repos` overnight tasks are not executing currently. - When investigating a problem this morning, I found this notice in the logs for the above: ``` System check identified some issues: WARNINGS: taskmanager.UserMetadata.user: (fields.W342) Setting unique=True on a ForeignKey has the same effect as using a OneToOneField. HINT: ForeignKey(unique=True) is usually better served by a OneToOneField. Traceback (most recent call last): File "/var/www/twweb/manage.py", line 15, in <module> execute_from_command_line(sys.argv) File "/var/www/envs/twweb/local/lib/python2.7/site-packages/django/core/management/__init__.py", line 354, in execute_from_command_line utility.execute() File "/var/www/envs/twweb/local/lib/python2.7/site-packages/django/core/management/__init__.py", line 346, in execute self.fetch_command(subcommand).run_from_argv(self.argv) File "/var/www/envs/twweb/local/lib/python2.7/site-packages/django/core/management/base.py", line 394, in run_from_argv self.execute(*args, **cmd_options) File "/var/www/envs/twweb/local/lib/python2.7/site-packages/django/core/management/base.py", line 445, in execute output = self.handle(*args, **options) File "/var/www/twweb/inthe_am/taskmanager/management/commands/taskstore.py", line 107, in handle for store in TaskStore.objects.order_by('-last_synced'): File "/var/www/envs/twweb/local/lib/python2.7/site-packages/django/db/models/query.py", line 162, in __iter__ self._fetch_all() File "/var/www/envs/twweb/local/lib/python2.7/site-packages/django/db/models/query.py", line 965, in _fetch_all self._result_cache = list(self.iterator()) File "/var/www/envs/twweb/local/lib/python2.7/site-packages/django/db/models/query.py", line 238, in iterator results = compiler.execute_sql() File "/var/www/envs/twweb/local/lib/python2.7/site-packages/django/db/models/sql/compiler.py", line 840, in execute_sql cursor.execute(sql, params) File "/var/www/envs/twweb/local/lib/python2.7/site-packages/django/db/backends/utils.py", line 64, in execute return self.cursor.execute(sql, params) File "/var/www/envs/twweb/local/lib/python2.7/site-packages/django/db/utils.py", line 98, in __exit__ six.reraise(dj_exc_type, dj_exc_value, traceback) File "/var/www/envs/twweb/local/lib/python2.7/site-packages/django/db/backends/utils.py", line 64, in execute return self.cursor.execute(sql, params) File "/var/www/envs/twweb/local/lib/python2.7/site-packages/django/db/backends/sqlite3/base.py", line 318, in execute return Database.Cursor.execute(self, query, params) django.db.utils.OperationalError: no such column: taskmanager_taskstore.secret_id ``` _Clearly_ it's connecting to sqlite (like it would for a dev environment) for some reason rather than the proper database backend. This is...a problem.
non_priority
update statistics and gc large repos overnight tasks are not executing currently when investigating a problem this morning i found this notice in the logs for the above system check identified some issues warnings taskmanager usermetadata user fields setting unique true on a foreignkey has the same effect as using a onetoonefield hint foreignkey unique true is usually better served by a onetoonefield traceback most recent call last file var www twweb manage py line in execute from command line sys argv file var www envs twweb local lib site packages django core management init py line in execute from command line utility execute file var www envs twweb local lib site packages django core management init py line in execute self fetch command subcommand run from argv self argv file var www envs twweb local lib site packages django core management base py line in run from argv self execute args cmd options file var www envs twweb local lib site packages django core management base py line in execute output self handle args options file var www twweb inthe am taskmanager management commands taskstore py line in handle for store in taskstore objects order by last synced file var www envs twweb local lib site packages django db models query py line in iter self fetch all file var www envs twweb local lib site packages django db models query py line in fetch all self result cache list self iterator file var www envs twweb local lib site packages django db models query py line in iterator results compiler execute sql file var www envs twweb local lib site packages django db models sql compiler py line in execute sql cursor execute sql params file var www envs twweb local lib site packages django db backends utils py line in execute return self cursor execute sql params file var www envs twweb local lib site packages django db utils py line in exit six reraise dj exc type dj exc value traceback file var www envs twweb local lib site packages django db backends utils py line in execute return self cursor execute sql params file var www envs twweb local lib site packages django db backends base py line in execute return database cursor execute self query params django db utils operationalerror no such column taskmanager taskstore secret id clearly it s connecting to sqlite like it would for a dev environment for some reason rather than the proper database backend this is a problem
0
20,514
11,457,112,861
IssuesEvent
2020-02-06 22:48:39
microsoft/vscode-cpptools
https://api.github.com/repos/microsoft/vscode-cpptools
closed
User snippets suggestions on variable declaration
Feature: Auto-complete Language Service duplicate
**Type: LanguageService** <!----- Input information below -----> **Describe the bug** - OS and Version: Linux (Arch and Ubuntu) - VS Code Version: 1.40.0 - C/C++ Extension Version: 0.26.2-insiders - Other extensions you installed (and if the issue persists after disabling them): Still happens when disabled * CMake - Docker - Devicetree - Indent to bracket - Markdown **To Reproduce** <!-- Steps to reproduce the behavior: --> <!-- *The most actionable issue reports include a code sample including configuration files such as c_cpp_properties.json* --> 1. Define a user snippet 2. Define a variable with the same prefix as the snippet **Expected behavior** No snippet suggestion on variable declaration After defining my user snippets I'm receiving suggestion for it on variable declarations that start with the same letter of the snippet prefix which can be annoying. This also makes unusable the `ctrl + space` binding for manually sugestions (which is useful for `structs`). I can say that this does not happen with the official extension snippets so it can be a problem with my definitions. Here they are: ``` "For": { "prefix": ["for"], "body": ["for (int ${idx} = 0; ${idx} < ${size}; ${idx}++) {", "\t$0", "}" ], "description": "For loop template" }, "If": { "prefix": ["if"], "body": ["if (${expr}) {", "\t$0", "}" ], "description": "if clause template" }, "Else": { "prefix": ["else"], "body": ["else {", "\t$0", "}" ], "description": "else clause template" }, "ElseIf": { "prefix": ["else if"], "body": ["else if (${expr}) {", "\t$0", "}" ], "description": "else if clause template" }, "while": { "prefix": ["while"], "body": ["while (${expr}) {", "\t$0", "}" ], "description": "while loop template" }, "do": { "prefix": ["do"], "body": ["do {", "\t$0", "} while (${expr});" ], "description": "do while loop template" }, "switch": { "prefix": ["switch"], "body": ["switch (${expr}) {", "case ${case_1}:", "\t", "default:", "\t$0return ${error};", "}" ], "description": "switch case template" }, ``` I can also say that I tried some other extensions defining their own snippets and the problem still occurred. As a workaround, I just disabled my snippets for now Honestly I'm not sure if this the right place to submit the issue (and not directly on code) so I apologize if it's not. Any help would be appreciated! Thanks! **Screenshots** <!-- If applicable, add screenshots to help explain your problem. --> ![image](https://user-images.githubusercontent.com/28741857/69040001-566b6780-09ed-11ea-882c-3c4a739ea481.png)
1.0
User snippets suggestions on variable declaration - **Type: LanguageService** <!----- Input information below -----> **Describe the bug** - OS and Version: Linux (Arch and Ubuntu) - VS Code Version: 1.40.0 - C/C++ Extension Version: 0.26.2-insiders - Other extensions you installed (and if the issue persists after disabling them): Still happens when disabled * CMake - Docker - Devicetree - Indent to bracket - Markdown **To Reproduce** <!-- Steps to reproduce the behavior: --> <!-- *The most actionable issue reports include a code sample including configuration files such as c_cpp_properties.json* --> 1. Define a user snippet 2. Define a variable with the same prefix as the snippet **Expected behavior** No snippet suggestion on variable declaration After defining my user snippets I'm receiving suggestion for it on variable declarations that start with the same letter of the snippet prefix which can be annoying. This also makes unusable the `ctrl + space` binding for manually sugestions (which is useful for `structs`). I can say that this does not happen with the official extension snippets so it can be a problem with my definitions. Here they are: ``` "For": { "prefix": ["for"], "body": ["for (int ${idx} = 0; ${idx} < ${size}; ${idx}++) {", "\t$0", "}" ], "description": "For loop template" }, "If": { "prefix": ["if"], "body": ["if (${expr}) {", "\t$0", "}" ], "description": "if clause template" }, "Else": { "prefix": ["else"], "body": ["else {", "\t$0", "}" ], "description": "else clause template" }, "ElseIf": { "prefix": ["else if"], "body": ["else if (${expr}) {", "\t$0", "}" ], "description": "else if clause template" }, "while": { "prefix": ["while"], "body": ["while (${expr}) {", "\t$0", "}" ], "description": "while loop template" }, "do": { "prefix": ["do"], "body": ["do {", "\t$0", "} while (${expr});" ], "description": "do while loop template" }, "switch": { "prefix": ["switch"], "body": ["switch (${expr}) {", "case ${case_1}:", "\t", "default:", "\t$0return ${error};", "}" ], "description": "switch case template" }, ``` I can also say that I tried some other extensions defining their own snippets and the problem still occurred. As a workaround, I just disabled my snippets for now Honestly I'm not sure if this the right place to submit the issue (and not directly on code) so I apologize if it's not. Any help would be appreciated! Thanks! **Screenshots** <!-- If applicable, add screenshots to help explain your problem. --> ![image](https://user-images.githubusercontent.com/28741857/69040001-566b6780-09ed-11ea-882c-3c4a739ea481.png)
non_priority
user snippets suggestions on variable declaration type languageservice describe the bug os and version linux arch and ubuntu vs code version c c extension version insiders other extensions you installed and if the issue persists after disabling them still happens when disabled cmake docker devicetree indent to bracket markdown to reproduce define a user snippet define a variable with the same prefix as the snippet expected behavior no snippet suggestion on variable declaration after defining my user snippets i m receiving suggestion for it on variable declarations that start with the same letter of the snippet prefix which can be annoying this also makes unusable the ctrl space binding for manually sugestions which is useful for structs i can say that this does not happen with the official extension snippets so it can be a problem with my definitions here they are for prefix body for int idx idx size idx t description for loop template if prefix body if expr t description if clause template else prefix body else t description else clause template elseif prefix body else if expr t description else if clause template while prefix body while expr t description while loop template do prefix body do t while expr description do while loop template switch prefix body switch expr case case t default t error description switch case template i can also say that i tried some other extensions defining their own snippets and the problem still occurred as a workaround i just disabled my snippets for now honestly i m not sure if this the right place to submit the issue and not directly on code so i apologize if it s not any help would be appreciated thanks screenshots
0
33,196
6,177,485,526
IssuesEvent
2017-07-02 00:51:10
bavc/signalserver
https://api.github.com/repos/bavc/signalserver
closed
add comments in frontend.sh
documentation
some commenting in frontend.sh would help re-assert the modifications that should be made to this file.
1.0
add comments in frontend.sh - some commenting in frontend.sh would help re-assert the modifications that should be made to this file.
non_priority
add comments in frontend sh some commenting in frontend sh would help re assert the modifications that should be made to this file
0
324,234
27,790,444,123
IssuesEvent
2023-03-17 08:29:53
microsoft/AzureStorageExplorer
https://api.github.com/repos/microsoft/AzureStorageExplorer
closed
The entities disappear when navigating to more than the 10th page then manually refreshing
:heavy_check_mark: merged 🧪 testing :gear: tables :beetle: regression
**Storage Explorer Version:** 1.29.0-dev **Build Number:** 20230224.3 **Branch:** feature/table-explorer-react **Platform/OS:** Windows 10/Linux Ubuntu 22.04/MacOS Ventura 13.2.1 (Apple M1 Pro) **Architecture:** ia32/x64 **How Found:** From running test cases **Regression From:** Previous release (1.28.0) ## Steps to Reproduce ## 1. Expand one storage account -> Tables. 2. Right click one table -> Click '[2] Open'. 3. Import more than 1000 entities. 4. Click 'Load more' -> Switch to the 11th page -> Click 'Refresh'. 5. Check whether the entities still display. ## Expected Experience ## The entities still display. ## Actual Experience ## The entities disappear. ![image](https://user-images.githubusercontent.com/87792676/222055174-3ba8ddf6-d37d-49c6-997f-bb6489c75959.png) ## Additional Context ## The page number changes to 1. ![image](https://user-images.githubusercontent.com/87792676/222055475-46d5cd70-6543-411d-916c-24a96c309dc6.png)
1.0
The entities disappear when navigating to more than the 10th page then manually refreshing - **Storage Explorer Version:** 1.29.0-dev **Build Number:** 20230224.3 **Branch:** feature/table-explorer-react **Platform/OS:** Windows 10/Linux Ubuntu 22.04/MacOS Ventura 13.2.1 (Apple M1 Pro) **Architecture:** ia32/x64 **How Found:** From running test cases **Regression From:** Previous release (1.28.0) ## Steps to Reproduce ## 1. Expand one storage account -> Tables. 2. Right click one table -> Click '[2] Open'. 3. Import more than 1000 entities. 4. Click 'Load more' -> Switch to the 11th page -> Click 'Refresh'. 5. Check whether the entities still display. ## Expected Experience ## The entities still display. ## Actual Experience ## The entities disappear. ![image](https://user-images.githubusercontent.com/87792676/222055174-3ba8ddf6-d37d-49c6-997f-bb6489c75959.png) ## Additional Context ## The page number changes to 1. ![image](https://user-images.githubusercontent.com/87792676/222055475-46d5cd70-6543-411d-916c-24a96c309dc6.png)
non_priority
the entities disappear when navigating to more than the page then manually refreshing storage explorer version dev build number branch feature table explorer react platform os windows linux ubuntu macos ventura apple pro architecture how found from running test cases regression from previous release steps to reproduce expand one storage account tables right click one table click open import more than entities click load more switch to the page click refresh check whether the entities still display expected experience the entities still display actual experience the entities disappear additional context the page number changes to
0
11,428
14,248,189,867
IssuesEvent
2020-11-19 12:35:01
tikv/tikv
https://api.github.com/repos/tikv/tikv
closed
AskTUG: Coprocessor support `bson` and `protocobuffers`
feature/review again sig/coprocessor status/help-wanted type/req-from-ask-tug
## Feature Request Could we support to push down functions for `bson` and `protocobuffers`? With the above feature, tikv will be more friendly to users from No-SQL such as MongoDB. Then the No-SQL users can use tikv's computation source as `TiDB` did. This is from [ask-tug](https://asktug.com/t/topic/34614/49?u=shirly-pingcap)
1.0
AskTUG: Coprocessor support `bson` and `protocobuffers` - ## Feature Request Could we support to push down functions for `bson` and `protocobuffers`? With the above feature, tikv will be more friendly to users from No-SQL such as MongoDB. Then the No-SQL users can use tikv's computation source as `TiDB` did. This is from [ask-tug](https://asktug.com/t/topic/34614/49?u=shirly-pingcap)
non_priority
asktug coprocessor support bson and protocobuffers feature request could we support to push down functions for bson and protocobuffers with the above feature tikv will be more friendly to users from no sql such as mongodb then the no sql users can use tikv s computation source as tidb did this is from
0
11,678
4,274,338,293
IssuesEvent
2016-07-13 20:11:59
joomla/joomla-cms
https://api.github.com/repos/joomla/joomla-cms
closed
Article voting in core joomla
No Code Attached Yet
I understand Joomla already have voting system where any article can be display with this voting also people can vote for the best article. but what happen next? there is no way we can find out which article received the highest vote also a report/identify list of articles which has any vote. There should be a component or mechanism to display this or a module to display with highest votes.
1.0
Article voting in core joomla - I understand Joomla already have voting system where any article can be display with this voting also people can vote for the best article. but what happen next? there is no way we can find out which article received the highest vote also a report/identify list of articles which has any vote. There should be a component or mechanism to display this or a module to display with highest votes.
non_priority
article voting in core joomla i understand joomla already have voting system where any article can be display with this voting also people can vote for the best article but what happen next there is no way we can find out which article received the highest vote also a report identify list of articles which has any vote there should be a component or mechanism to display this or a module to display with highest votes
0
409,690
27,748,614,823
IssuesEvent
2023-03-15 18:52:36
hpcng/warewulf
https://api.github.com/repos/hpcng/warewulf
opened
Update documentation for node images to point to GHCR
documentation stake:ciq
Given the inability to automatically build Warewulf node images from GitHub CI/CD with our existing account, and the success in doing so in ghcr * update the documentation to point to ghcr rather than DockerHub * update the node images directory here to point to the warewulf-node-images repository * update the DockerHub images to indicate that they are deprecated / no longer maintained
1.0
Update documentation for node images to point to GHCR - Given the inability to automatically build Warewulf node images from GitHub CI/CD with our existing account, and the success in doing so in ghcr * update the documentation to point to ghcr rather than DockerHub * update the node images directory here to point to the warewulf-node-images repository * update the DockerHub images to indicate that they are deprecated / no longer maintained
non_priority
update documentation for node images to point to ghcr given the inability to automatically build warewulf node images from github ci cd with our existing account and the success in doing so in ghcr update the documentation to point to ghcr rather than dockerhub update the node images directory here to point to the warewulf node images repository update the dockerhub images to indicate that they are deprecated no longer maintained
0
184,150
21,784,807,056
IssuesEvent
2022-05-14 01:23:27
AlexRogalskiy/customiere
https://api.github.com/repos/AlexRogalskiy/customiere
opened
CVE-2022-22970 (Medium) detected in spring-beans-5.2.9.RELEASE.jar
security vulnerability
## CVE-2022-22970 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>spring-beans-5.2.9.RELEASE.jar</b></p></summary> <p>Spring Beans</p> <p>Path to dependency file: /modules/customiere-metrics/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-beans/5.2.9.RELEASE/spring-beans-5.2.9.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-beans/5.2.9.RELEASE/spring-beans-5.2.9.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-beans/5.2.9.RELEASE/spring-beans-5.2.9.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-beans/5.2.9.RELEASE/spring-beans-5.2.9.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-beans/5.2.9.RELEASE/spring-beans-5.2.9.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-beans/5.2.9.RELEASE/spring-beans-5.2.9.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-beans/5.2.9.RELEASE/spring-beans-5.2.9.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-beans/5.2.9.RELEASE/spring-beans-5.2.9.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-beans/5.2.9.RELEASE/spring-beans-5.2.9.RELEASE.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-aop-2.3.4.RELEASE.jar (Root Library) - spring-aop-5.2.9.RELEASE.jar - :x: **spring-beans-5.2.9.RELEASE.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/AlexRogalskiy/customiere/commit/3f6027b95560e5bd6d2350b9d9f405245557f734">3f6027b95560e5bd6d2350b9d9f405245557f734</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In spring framework versions prior to 5.3.20+ , 5.2.22+ and old unsupported versions, applications that handle file uploads are vulnerable to DoS attack if they rely on data binding to set a MultipartFile or javax.servlet.Part to a field in a model object. <p>Publish Date: 2022-05-12 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-22970>CVE-2022-22970</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://tanzu.vmware.com/security/cve-2022-22970">https://tanzu.vmware.com/security/cve-2022-22970</a></p> <p>Release Date: 2022-05-12</p> <p>Fix Resolution: org.springframework:spring-beans:5.2.22,5.3.20;org.springframework:spring-core:5.2.22,5.3.20</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2022-22970 (Medium) detected in spring-beans-5.2.9.RELEASE.jar - ## CVE-2022-22970 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>spring-beans-5.2.9.RELEASE.jar</b></p></summary> <p>Spring Beans</p> <p>Path to dependency file: /modules/customiere-metrics/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-beans/5.2.9.RELEASE/spring-beans-5.2.9.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-beans/5.2.9.RELEASE/spring-beans-5.2.9.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-beans/5.2.9.RELEASE/spring-beans-5.2.9.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-beans/5.2.9.RELEASE/spring-beans-5.2.9.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-beans/5.2.9.RELEASE/spring-beans-5.2.9.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-beans/5.2.9.RELEASE/spring-beans-5.2.9.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-beans/5.2.9.RELEASE/spring-beans-5.2.9.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-beans/5.2.9.RELEASE/spring-beans-5.2.9.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-beans/5.2.9.RELEASE/spring-beans-5.2.9.RELEASE.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-aop-2.3.4.RELEASE.jar (Root Library) - spring-aop-5.2.9.RELEASE.jar - :x: **spring-beans-5.2.9.RELEASE.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/AlexRogalskiy/customiere/commit/3f6027b95560e5bd6d2350b9d9f405245557f734">3f6027b95560e5bd6d2350b9d9f405245557f734</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In spring framework versions prior to 5.3.20+ , 5.2.22+ and old unsupported versions, applications that handle file uploads are vulnerable to DoS attack if they rely on data binding to set a MultipartFile or javax.servlet.Part to a field in a model object. <p>Publish Date: 2022-05-12 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-22970>CVE-2022-22970</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://tanzu.vmware.com/security/cve-2022-22970">https://tanzu.vmware.com/security/cve-2022-22970</a></p> <p>Release Date: 2022-05-12</p> <p>Fix Resolution: org.springframework:spring-beans:5.2.22,5.3.20;org.springframework:spring-core:5.2.22,5.3.20</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in spring beans release jar cve medium severity vulnerability vulnerable library spring beans release jar spring beans path to dependency file modules customiere metrics pom xml path to vulnerable library home wss scanner repository org springframework spring beans release spring beans release jar home wss scanner repository org springframework spring beans release spring beans release jar home wss scanner repository org springframework spring beans release spring beans release jar home wss scanner repository org springframework spring beans release spring beans release jar home wss scanner repository org springframework spring beans release spring beans release jar home wss scanner repository org springframework spring beans release spring beans release jar home wss scanner repository org springframework spring beans release spring beans release jar home wss scanner repository org springframework spring beans release spring beans release jar home wss scanner repository org springframework spring beans release spring beans release jar dependency hierarchy spring boot starter aop release jar root library spring aop release jar x spring beans release jar vulnerable library found in head commit a href found in base branch master vulnerability details in spring framework versions prior to and old unsupported versions applications that handle file uploads are vulnerable to dos attack if they rely on data binding to set a multipartfile or javax servlet part to a field in a model object publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org springframework spring beans org springframework spring core step up your open source security game with whitesource
0
115,992
24,838,361,561
IssuesEvent
2022-10-26 10:40:47
SocialGouv/code-du-travail-numerique
https://api.github.com/repos/SocialGouv/code-du-travail-numerique
closed
Amélioration simulateurs (reduce) étape 1
o: indemnité licenciement :hammer_and_wrench: tech publicodes
- [ ] Remplacer l'attribut component sur le State par une fonction prenant le form en paramètre et retournant le Composant ([exemple](https://github.com/SocialGouv/code-du-travail-numerique/commit/2dfb3bfc47def8c4bb85d08ff95431e970f2759e#diff-b1a70da7c25b162efa18d75780820e6115bc3267ba710a256c77ae996820168dR35)) - [ ] Eviter de passer le form sur les composants n'ayant pas besoin (props drilling)
1.0
Amélioration simulateurs (reduce) étape 1 - - [ ] Remplacer l'attribut component sur le State par une fonction prenant le form en paramètre et retournant le Composant ([exemple](https://github.com/SocialGouv/code-du-travail-numerique/commit/2dfb3bfc47def8c4bb85d08ff95431e970f2759e#diff-b1a70da7c25b162efa18d75780820e6115bc3267ba710a256c77ae996820168dR35)) - [ ] Eviter de passer le form sur les composants n'ayant pas besoin (props drilling)
non_priority
amélioration simulateurs reduce étape remplacer l attribut component sur le state par une fonction prenant le form en paramètre et retournant le composant eviter de passer le form sur les composants n ayant pas besoin props drilling
0
180,541
14,786,011,884
IssuesEvent
2021-01-12 04:19:56
alia-peterson/whats-cooking
https://api.github.com/repos/alia-peterson/whats-cooking
opened
Fix images in README
documentation
**Description of what needs refactoring** A brief description of the code that needs refactoring and the reason for refactoring - readme currently has so me rather lewd kitchen behavior displayed **Additional Context** File/function name or additional reasoning for the changes - `readme.md` **Screenshot of Issue** Include a screenshot if it would help describe the issue
1.0
Fix images in README - **Description of what needs refactoring** A brief description of the code that needs refactoring and the reason for refactoring - readme currently has so me rather lewd kitchen behavior displayed **Additional Context** File/function name or additional reasoning for the changes - `readme.md` **Screenshot of Issue** Include a screenshot if it would help describe the issue
non_priority
fix images in readme description of what needs refactoring a brief description of the code that needs refactoring and the reason for refactoring readme currently has so me rather lewd kitchen behavior displayed additional context file function name or additional reasoning for the changes readme md screenshot of issue include a screenshot if it would help describe the issue
0
171,187
27,081,069,159
IssuesEvent
2023-02-14 14:04:23
Olian04/simply-reactive
https://api.github.com/repos/Olian04/simply-reactive
closed
Add createStateProxy
further design needed
```ts const S = createStateProxy({ foo: 42, bar: 'biz', }}); S.foo // get 42 S.foo = 3 // set 3 S.foo // get 3 ``` __Mock implementation:__ ```ts const createStateProxy = <T extends object>(defaultState: T, atomConstructor = createAtom) => { const key = getNextAutoKey(); const Grp = createGroup({ key, getDefault: propertyKey => atomConstructor({ key: `${key}_${propertyKey}`, default: defaultState[key], }) }); return new Proxy({} as T, { get: (__, key) => Grp.find(key).get(), set: (__, key, value) => Grp.find(key).set(value), }); } ```
1.0
Add createStateProxy - ```ts const S = createStateProxy({ foo: 42, bar: 'biz', }}); S.foo // get 42 S.foo = 3 // set 3 S.foo // get 3 ``` __Mock implementation:__ ```ts const createStateProxy = <T extends object>(defaultState: T, atomConstructor = createAtom) => { const key = getNextAutoKey(); const Grp = createGroup({ key, getDefault: propertyKey => atomConstructor({ key: `${key}_${propertyKey}`, default: defaultState[key], }) }); return new Proxy({} as T, { get: (__, key) => Grp.find(key).get(), set: (__, key, value) => Grp.find(key).set(value), }); } ```
non_priority
add createstateproxy ts const s createstateproxy foo bar biz s foo get s foo set s foo get mock implementation ts const createstateproxy defaultstate t atomconstructor createatom const key getnextautokey const grp creategroup key getdefault propertykey atomconstructor key key propertykey default defaultstate return new proxy as t get key grp find key get set key value grp find key set value
0
24,521
7,522,540,126
IssuesEvent
2018-04-12 20:46:35
golang/go
https://api.github.com/repos/golang/go
closed
x/build/cmd/pushback: fold into gopherbot
Builders
If maintner tracked PRs too (which it needs to for other reasons), then gopherbot can take over the x/build/cmd/pushback job and we could down that service and further unify our various bot functionality. /cc @kevinburke @andybons
1.0
x/build/cmd/pushback: fold into gopherbot - If maintner tracked PRs too (which it needs to for other reasons), then gopherbot can take over the x/build/cmd/pushback job and we could down that service and further unify our various bot functionality. /cc @kevinburke @andybons
non_priority
x build cmd pushback fold into gopherbot if maintner tracked prs too which it needs to for other reasons then gopherbot can take over the x build cmd pushback job and we could down that service and further unify our various bot functionality cc kevinburke andybons
0
266,880
28,480,230,999
IssuesEvent
2023-04-18 01:36:22
praneethpanasala/linux
https://api.github.com/repos/praneethpanasala/linux
opened
CVE-2023-30772 (Medium) detected in linuxlinux-4.19.6
Mend: dependency security vulnerability
## CVE-2023-30772 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linuxlinux-4.19.6</b></p></summary> <p> <p>Apache Software Foundation (ASF)</p> <p>Library home page: <a href=https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux>https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux</a></p> <p>Found in HEAD commit: <a href="https://api.github.com/repos/praneethpanasala/linux/commits/d80c4f847c91020292cb280132b15e2ea147f1a3">d80c4f847c91020292cb280132b15e2ea147f1a3</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (3)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/power/supply/da9150-charger.c</b> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/power/supply/da9150-charger.c</b> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/power/supply/da9150-charger.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Vulnerability Details</summary> <p> The Linux kernel before 6.2.9 has a race condition and resultant use-after-free in drivers/power/supply/da9150-charger.c if a physically proximate attacker unplugs a device. <p>Publish Date: 2023-04-16 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2023-30772>CVE-2023-30772</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.4</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: High - Privileges Required: High - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.linuxkernelcves.com/cves/CVE-2023-30772">https://www.linuxkernelcves.com/cves/CVE-2023-30772</a></p> <p>Release Date: 2023-04-16</p> <p>Fix Resolution: v4.14.312,v4.19.280,v5.4.240,v5.10.177,v5.15.105,v6.1.22,v6.2.9,v6.3-rc4</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2023-30772 (Medium) detected in linuxlinux-4.19.6 - ## CVE-2023-30772 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linuxlinux-4.19.6</b></p></summary> <p> <p>Apache Software Foundation (ASF)</p> <p>Library home page: <a href=https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux>https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux</a></p> <p>Found in HEAD commit: <a href="https://api.github.com/repos/praneethpanasala/linux/commits/d80c4f847c91020292cb280132b15e2ea147f1a3">d80c4f847c91020292cb280132b15e2ea147f1a3</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (3)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/power/supply/da9150-charger.c</b> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/power/supply/da9150-charger.c</b> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/power/supply/da9150-charger.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Vulnerability Details</summary> <p> The Linux kernel before 6.2.9 has a race condition and resultant use-after-free in drivers/power/supply/da9150-charger.c if a physically proximate attacker unplugs a device. <p>Publish Date: 2023-04-16 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2023-30772>CVE-2023-30772</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.4</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: High - Privileges Required: High - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.linuxkernelcves.com/cves/CVE-2023-30772">https://www.linuxkernelcves.com/cves/CVE-2023-30772</a></p> <p>Release Date: 2023-04-16</p> <p>Fix Resolution: v4.14.312,v4.19.280,v5.4.240,v5.10.177,v5.15.105,v6.1.22,v6.2.9,v6.3-rc4</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in linuxlinux cve medium severity vulnerability vulnerable library linuxlinux apache software foundation asf library home page a href found in head commit a href found in base branch master vulnerable source files drivers power supply charger c drivers power supply charger c drivers power supply charger c vulnerability details the linux kernel before has a race condition and resultant use after free in drivers power supply charger c if a physically proximate attacker unplugs a device publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity high privileges required high user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend
0
42,440
12,891,413,912
IssuesEvent
2020-07-13 17:41:23
jtimberlake/jazz
https://api.github.com/repos/jtimberlake/jazz
opened
CVE-2018-14732 (High) detected in webpack-dev-server-2.3.0.tgz, webpack-dev-server-2.11.5.tgz
security vulnerability
## CVE-2018-14732 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>webpack-dev-server-2.3.0.tgz</b>, <b>webpack-dev-server-2.11.5.tgz</b></p></summary> <p> <details><summary><b>webpack-dev-server-2.3.0.tgz</b></p></summary> <p>Serves a webpack app. Updates the browser on changes.</p> <p>Library home page: <a href="https://registry.npmjs.org/webpack-dev-server/-/webpack-dev-server-2.3.0.tgz">https://registry.npmjs.org/webpack-dev-server/-/webpack-dev-server-2.3.0.tgz</a></p> <p>Path to dependency file: /tmp/ws-scm/jazz/core/jazz_ui/src/app/primary-components/daterange-picker/ng2-datepicker/package.json</p> <p>Path to vulnerable library: /tmp/ws-scm/jazz/core/jazz_ui/src/app/primary-components/daterange-picker/ng2-datepicker/node_modules/webpack-dev-server/package.json</p> <p> Dependency Hierarchy: - cli-1.0.0-rc.0.tgz (Root Library) - :x: **webpack-dev-server-2.3.0.tgz** (Vulnerable Library) </details> <details><summary><b>webpack-dev-server-2.11.5.tgz</b></p></summary> <p>Serves a webpack app. Updates the browser on changes.</p> <p>Library home page: <a href="https://registry.npmjs.org/webpack-dev-server/-/webpack-dev-server-2.11.5.tgz">https://registry.npmjs.org/webpack-dev-server/-/webpack-dev-server-2.11.5.tgz</a></p> <p>Path to dependency file: /tmp/ws-scm/jazz/core/jazz_ui/package.json</p> <p>Path to vulnerable library: /tmp/ws-scm/jazz/core/jazz_ui/node_modules/webpack-dev-server/package.json</p> <p> Dependency Hierarchy: - cli-1.7.4.tgz (Root Library) - :x: **webpack-dev-server-2.11.5.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/jtimberlake/jazz/commit/f31a850168fa59ceb2dfbdfb70a04c1bbe9b9fec">f31a850168fa59ceb2dfbdfb70a04c1bbe9b9fec</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> An issue was discovered in lib/Server.js in webpack-dev-server before 3.1.6. Attackers are able to steal developer's code because the origin of requests is not checked by the WebSocket server, which is used for HMR (Hot Module Replacement). Anyone can receive the HMR message sent by the WebSocket server via a ws://127.0.0.1:8080/ connection from any origin. <p>Publish Date: 2018-09-21 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-14732>CVE-2018-14732</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2018-14732">https://nvd.nist.gov/vuln/detail/CVE-2018-14732</a></p> <p>Release Date: 2018-09-21</p> <p>Fix Resolution: 3.1.6</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"webpack-dev-server","packageVersion":"2.3.0","isTransitiveDependency":true,"dependencyTree":"@angular/cli:1.0.0-rc.0;webpack-dev-server:2.3.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"3.1.6"},{"packageType":"javascript/Node.js","packageName":"webpack-dev-server","packageVersion":"2.11.5","isTransitiveDependency":true,"dependencyTree":"@angular/cli:1.7.4;webpack-dev-server:2.11.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"3.1.6"}],"vulnerabilityIdentifier":"CVE-2018-14732","vulnerabilityDetails":"An issue was discovered in lib/Server.js in webpack-dev-server before 3.1.6. Attackers are able to steal developer\u0027s code because the origin of requests is not checked by the WebSocket server, which is used for HMR (Hot Module Replacement). Anyone can receive the HMR message sent by the WebSocket server via a ws://127.0.0.1:8080/ connection from any origin.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-14732","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> -->
True
CVE-2018-14732 (High) detected in webpack-dev-server-2.3.0.tgz, webpack-dev-server-2.11.5.tgz - ## CVE-2018-14732 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>webpack-dev-server-2.3.0.tgz</b>, <b>webpack-dev-server-2.11.5.tgz</b></p></summary> <p> <details><summary><b>webpack-dev-server-2.3.0.tgz</b></p></summary> <p>Serves a webpack app. Updates the browser on changes.</p> <p>Library home page: <a href="https://registry.npmjs.org/webpack-dev-server/-/webpack-dev-server-2.3.0.tgz">https://registry.npmjs.org/webpack-dev-server/-/webpack-dev-server-2.3.0.tgz</a></p> <p>Path to dependency file: /tmp/ws-scm/jazz/core/jazz_ui/src/app/primary-components/daterange-picker/ng2-datepicker/package.json</p> <p>Path to vulnerable library: /tmp/ws-scm/jazz/core/jazz_ui/src/app/primary-components/daterange-picker/ng2-datepicker/node_modules/webpack-dev-server/package.json</p> <p> Dependency Hierarchy: - cli-1.0.0-rc.0.tgz (Root Library) - :x: **webpack-dev-server-2.3.0.tgz** (Vulnerable Library) </details> <details><summary><b>webpack-dev-server-2.11.5.tgz</b></p></summary> <p>Serves a webpack app. Updates the browser on changes.</p> <p>Library home page: <a href="https://registry.npmjs.org/webpack-dev-server/-/webpack-dev-server-2.11.5.tgz">https://registry.npmjs.org/webpack-dev-server/-/webpack-dev-server-2.11.5.tgz</a></p> <p>Path to dependency file: /tmp/ws-scm/jazz/core/jazz_ui/package.json</p> <p>Path to vulnerable library: /tmp/ws-scm/jazz/core/jazz_ui/node_modules/webpack-dev-server/package.json</p> <p> Dependency Hierarchy: - cli-1.7.4.tgz (Root Library) - :x: **webpack-dev-server-2.11.5.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/jtimberlake/jazz/commit/f31a850168fa59ceb2dfbdfb70a04c1bbe9b9fec">f31a850168fa59ceb2dfbdfb70a04c1bbe9b9fec</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> An issue was discovered in lib/Server.js in webpack-dev-server before 3.1.6. Attackers are able to steal developer's code because the origin of requests is not checked by the WebSocket server, which is used for HMR (Hot Module Replacement). Anyone can receive the HMR message sent by the WebSocket server via a ws://127.0.0.1:8080/ connection from any origin. <p>Publish Date: 2018-09-21 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-14732>CVE-2018-14732</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2018-14732">https://nvd.nist.gov/vuln/detail/CVE-2018-14732</a></p> <p>Release Date: 2018-09-21</p> <p>Fix Resolution: 3.1.6</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"webpack-dev-server","packageVersion":"2.3.0","isTransitiveDependency":true,"dependencyTree":"@angular/cli:1.0.0-rc.0;webpack-dev-server:2.3.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"3.1.6"},{"packageType":"javascript/Node.js","packageName":"webpack-dev-server","packageVersion":"2.11.5","isTransitiveDependency":true,"dependencyTree":"@angular/cli:1.7.4;webpack-dev-server:2.11.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"3.1.6"}],"vulnerabilityIdentifier":"CVE-2018-14732","vulnerabilityDetails":"An issue was discovered in lib/Server.js in webpack-dev-server before 3.1.6. Attackers are able to steal developer\u0027s code because the origin of requests is not checked by the WebSocket server, which is used for HMR (Hot Module Replacement). Anyone can receive the HMR message sent by the WebSocket server via a ws://127.0.0.1:8080/ connection from any origin.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-14732","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> -->
non_priority
cve high detected in webpack dev server tgz webpack dev server tgz cve high severity vulnerability vulnerable libraries webpack dev server tgz webpack dev server tgz webpack dev server tgz serves a webpack app updates the browser on changes library home page a href path to dependency file tmp ws scm jazz core jazz ui src app primary components daterange picker datepicker package json path to vulnerable library tmp ws scm jazz core jazz ui src app primary components daterange picker datepicker node modules webpack dev server package json dependency hierarchy cli rc tgz root library x webpack dev server tgz vulnerable library webpack dev server tgz serves a webpack app updates the browser on changes library home page a href path to dependency file tmp ws scm jazz core jazz ui package json path to vulnerable library tmp ws scm jazz core jazz ui node modules webpack dev server package json dependency hierarchy cli tgz root library x webpack dev server tgz vulnerable library found in head commit a href vulnerability details an issue was discovered in lib server js in webpack dev server before attackers are able to steal developer s code because the origin of requests is not checked by the websocket server which is used for hmr hot module replacement anyone can receive the hmr message sent by the websocket server via a ws connection from any origin publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution isopenpronvulnerability false ispackagebased true isdefaultbranch true packages vulnerabilityidentifier cve vulnerabilitydetails an issue was discovered in lib server js in webpack dev server before attackers are able to steal developer code because the origin of requests is not checked by the websocket server which is used for hmr hot module replacement anyone can receive the hmr message sent by the websocket server via a ws connection from any origin vulnerabilityurl
0
253,893
21,712,543,502
IssuesEvent
2022-05-10 14:57:42
aldrichtr/infraspective
https://api.github.com/repos/aldrichtr/infraspective
opened
Refactor unit tests so they do not rely on the module being loaded
>refactor @tests
The Pester unit tests should load the file that we want to test, and mock any supporting functions so that they are truly _unit_ tests. If the module is loaded first, then most of the functions will be coupled with their supporting functions. Those types of tests should be in **integration** not **unit** tests.
1.0
Refactor unit tests so they do not rely on the module being loaded - The Pester unit tests should load the file that we want to test, and mock any supporting functions so that they are truly _unit_ tests. If the module is loaded first, then most of the functions will be coupled with their supporting functions. Those types of tests should be in **integration** not **unit** tests.
non_priority
refactor unit tests so they do not rely on the module being loaded the pester unit tests should load the file that we want to test and mock any supporting functions so that they are truly unit tests if the module is loaded first then most of the functions will be coupled with their supporting functions those types of tests should be in integration not unit tests
0
146,243
13,174,586,467
IssuesEvent
2020-08-11 22:54:04
up-banking/api
https://api.github.com/repos/up-banking/api
closed
Suggestion: Community provided examples
documentation feature request
I think it would be cool if there was a folder in this repo, let's call it `/examples` where there are community submitted examples of how the API is being leveraged. e.g ``` /examples /JS-android-widget-shortcut /RUBY-google-assistant-announcement ``` Thoughts? Happy to start it off by providing a PR.
1.0
Suggestion: Community provided examples - I think it would be cool if there was a folder in this repo, let's call it `/examples` where there are community submitted examples of how the API is being leveraged. e.g ``` /examples /JS-android-widget-shortcut /RUBY-google-assistant-announcement ``` Thoughts? Happy to start it off by providing a PR.
non_priority
suggestion community provided examples i think it would be cool if there was a folder in this repo let s call it examples where there are community submitted examples of how the api is being leveraged e g examples js android widget shortcut ruby google assistant announcement thoughts happy to start it off by providing a pr
0
45,766
24,202,468,090
IssuesEvent
2022-09-24 19:14:35
havochvatten/MSP-Symphony
https://api.github.com/repos/havochvatten/MSP-Symphony
opened
Add a GPU calculation backend
enhancement performance
Cumulative impact calculations are highly suitable for parallell processing since calculations in a pixel is independent of adjacent pixels (which is why the current implementation is a PointOp in the JAI API). The best calculation backend will thus be GPU-based since the massive amounts of cores could be expected to be utilized very well. Estimated performance increase is several orders of magnitude, and probably become largely IO-bound. Ideally all raster data would fit in GPU memory, which should enable extremely fast calculations. OpenCL or some API that would abstract away different GPU vendors differences would be best, but straight CUDA would also be very good (and perhaps fastest), and most server-based GPUs tend to come from Nvidia at the time of writing. A CUDA-based backend was developed has been developed in another Symphony implementation which has shown very good performance characteristics.
True
Add a GPU calculation backend - Cumulative impact calculations are highly suitable for parallell processing since calculations in a pixel is independent of adjacent pixels (which is why the current implementation is a PointOp in the JAI API). The best calculation backend will thus be GPU-based since the massive amounts of cores could be expected to be utilized very well. Estimated performance increase is several orders of magnitude, and probably become largely IO-bound. Ideally all raster data would fit in GPU memory, which should enable extremely fast calculations. OpenCL or some API that would abstract away different GPU vendors differences would be best, but straight CUDA would also be very good (and perhaps fastest), and most server-based GPUs tend to come from Nvidia at the time of writing. A CUDA-based backend was developed has been developed in another Symphony implementation which has shown very good performance characteristics.
non_priority
add a gpu calculation backend cumulative impact calculations are highly suitable for parallell processing since calculations in a pixel is independent of adjacent pixels which is why the current implementation is a pointop in the jai api the best calculation backend will thus be gpu based since the massive amounts of cores could be expected to be utilized very well estimated performance increase is several orders of magnitude and probably become largely io bound ideally all raster data would fit in gpu memory which should enable extremely fast calculations opencl or some api that would abstract away different gpu vendors differences would be best but straight cuda would also be very good and perhaps fastest and most server based gpus tend to come from nvidia at the time of writing a cuda based backend was developed has been developed in another symphony implementation which has shown very good performance characteristics
0
30,745
7,252,830,472
IssuesEvent
2018-02-16 00:59:39
Microsoft/vscode-python
https://api.github.com/repos/Microsoft/vscode-python
closed
Enable unit testing of experimental debugger other than just launching
awaiting 2-PR feature-debugging type-code health
The current debugger test works just for launching: To enable those tests: * set pythonPath to environment containing necessary python packages (PTVSD depedencies) * set `"env":{PYTHONPATH: "<fully qualified path to PTVSD repo>"`
1.0
Enable unit testing of experimental debugger other than just launching - The current debugger test works just for launching: To enable those tests: * set pythonPath to environment containing necessary python packages (PTVSD depedencies) * set `"env":{PYTHONPATH: "<fully qualified path to PTVSD repo>"`
non_priority
enable unit testing of experimental debugger other than just launching the current debugger test works just for launching to enable those tests set pythonpath to environment containing necessary python packages ptvsd depedencies set env pythonpath
0
338,570
24,590,910,613
IssuesEvent
2022-10-14 02:03:54
PMEAL/OpenPNM
https://api.github.com/repos/PMEAL/OpenPNM
closed
Refactor callouts in example notebooks
documentation
It [seems](https://github.com/orgs/executablebooks/discussions/834#discussioncomment-3806602) that we can't add a custom title to the predefined callouts (note, warning, etc.). But, we can define custom callouts with custom titles. Here's how: <div>```{admonition} Custom title<div/> Custom content.<div>```<div/> Personally, I'd say let's stick to the default callouts whenever possible (and consequently no title), and only use custom ones if we really care about the title.
1.0
Refactor callouts in example notebooks - It [seems](https://github.com/orgs/executablebooks/discussions/834#discussioncomment-3806602) that we can't add a custom title to the predefined callouts (note, warning, etc.). But, we can define custom callouts with custom titles. Here's how: <div>```{admonition} Custom title<div/> Custom content.<div>```<div/> Personally, I'd say let's stick to the default callouts whenever possible (and consequently no title), and only use custom ones if we really care about the title.
non_priority
refactor callouts in example notebooks it that we can t add a custom title to the predefined callouts note warning etc but we can define custom callouts with custom titles here s how admonition custom title custom content personally i d say let s stick to the default callouts whenever possible and consequently no title and only use custom ones if we really care about the title
0
56,803
8,125,890,469
IssuesEvent
2018-08-16 22:50:10
jmcnamara/XlsxWriter
https://api.github.com/repos/jmcnamara/XlsxWriter
closed
Feature request: Example creating and sending workbooks on-the-fly with Python 3 & Django
django documentation short term
```python import xlsxwriter from io import BytesIO from django.http import StreamingHttpResponse from django.views.generic import View def get_foo_table_data(): """ Some table data """ return [ [1, 2, 3], [4, 5, 6], [7, 8, 9], ] class MyView(View): def get(self, request): data = get_foo_table_data() # create workbook with worksheet output = BytesIO() book = xlsxwriter.Workbook(output) sheet = book.add_worksheet() # fill worksheet with foo data for row, columns in enumerate(data): for column, cell_data in enumerate(columns): sheet.write(row, column, cell_data) book.close() # close book and save it in "output" output.seek(0) # seek stream on begin to retrieve all data from it # send "output" object to stream with mimetype and filename response = StreamingHttpResponse( output, content_type='application/vnd.openxmlformats-officedocument.spreadsheetml.sheet' ) response['Content-Disposition'] = 'attachment; filename=foo.xlsx' return response ```
1.0
Feature request: Example creating and sending workbooks on-the-fly with Python 3 & Django - ```python import xlsxwriter from io import BytesIO from django.http import StreamingHttpResponse from django.views.generic import View def get_foo_table_data(): """ Some table data """ return [ [1, 2, 3], [4, 5, 6], [7, 8, 9], ] class MyView(View): def get(self, request): data = get_foo_table_data() # create workbook with worksheet output = BytesIO() book = xlsxwriter.Workbook(output) sheet = book.add_worksheet() # fill worksheet with foo data for row, columns in enumerate(data): for column, cell_data in enumerate(columns): sheet.write(row, column, cell_data) book.close() # close book and save it in "output" output.seek(0) # seek stream on begin to retrieve all data from it # send "output" object to stream with mimetype and filename response = StreamingHttpResponse( output, content_type='application/vnd.openxmlformats-officedocument.spreadsheetml.sheet' ) response['Content-Disposition'] = 'attachment; filename=foo.xlsx' return response ```
non_priority
feature request example creating and sending workbooks on the fly with python django python import xlsxwriter from io import bytesio from django http import streaminghttpresponse from django views generic import view def get foo table data some table data return class myview view def get self request data get foo table data create workbook with worksheet output bytesio book xlsxwriter workbook output sheet book add worksheet fill worksheet with foo data for row columns in enumerate data for column cell data in enumerate columns sheet write row column cell data book close close book and save it in output output seek seek stream on begin to retrieve all data from it send output object to stream with mimetype and filename response streaminghttpresponse output content type application vnd openxmlformats officedocument spreadsheetml sheet response attachment filename foo xlsx return response
0
177,185
13,686,054,447
IssuesEvent
2020-09-30 08:08:04
cockroachdb/cockroach
https://api.github.com/repos/cockroachdb/cockroach
opened
roachtest: scrub/index-only/tpcc/w=100 failed
C-test-failure O-roachtest O-robot branch-release-19.2 release-blocker
[(roachtest).scrub/index-only/tpcc/w=100 failed](https://teamcity.cockroachdb.com/viewLog.html?buildId=2332325&tab=buildLog) on [release-19.2@3da44c56c8353afc179eea905a058aeeeebeb7c5](https://github.com/cockroachdb/cockroach/commits/3da44c56c8353afc179eea905a058aeeeebeb7c5): ``` The test failed on branch=release-19.2, cloud=gce: test artifacts and logs in: /home/agent/work/.go/src/github.com/cockroachdb/cockroach/artifacts/scrub/index-only/tpcc/w=100/run_1 cluster.go:2209,tpcc.go:126,tpcc.go:138,tpcc.go:149,scrub.go:54,test_runner.go:755: output in run_080748.213_n5_workload_fixtures_import_tpcc: /home/agent/work/.go/src/github.com/cockroachdb/cockroach/bin/roachprod run teamcity-2332325-1601445095-62-n5cpu4:5 -- ./workload fixtures import tpcc --warehouses=100 --deprecated-fk-indexes {pgurl:1} returned: exit status 20 (1) attached stack trace -- stack trace: | main.(*cluster).RunE | /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/cluster.go:2287 | main.(*cluster).Run | /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/cluster.go:2207 | main.setupTPCC.func1 | /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/tpcc.go:126 | main.setupTPCC | /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/tpcc.go:138 | main.runTPCC | /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/tpcc.go:149 | main.makeScrubTPCCTest.func1 | /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/scrub.go:54 | main.(*testRunner).runTest.func2 | /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/test_runner.go:755 | runtime.goexit | /usr/local/go/src/runtime/asm_amd64.s:1357 Wraps: (2) output in run_080748.213_n5_workload_fixtures_import_tpcc Wraps: (3) /home/agent/work/.go/src/github.com/cockroachdb/cockroach/bin/roachprod run teamcity-2332325-1601445095-62-n5cpu4:5 -- ./workload fixtures import tpcc --warehouses=100 --deprecated-fk-indexes {pgurl:1} returned | stderr: | I200930 08:07:49.689400 1 ccl/workloadccl/fixture.go:342 starting import of 9 tables | Error: importing fixture: importing table warehouse: pq: expected tpcc version "2.2.0" but got "2.1.0" | Error: COMMAND_PROBLEM: exit status 1 | (1) COMMAND_PROBLEM | Wraps: (2) Node 5. Command with error: | | ``` | | ./workload fixtures import tpcc --warehouses=100 --deprecated-fk-indexes {pgurl:1} | | ``` | Wraps: (3) exit status 1 | Error types: (1) errors.Cmd (2) *hintdetail.withDetail (3) *exec.ExitError | | stdout: Wraps: (4) exit status 20 Error types: (1) *withstack.withStack (2) *errutil.withPrefix (3) *main.withCommandDetails (4) *exec.ExitError ``` <details><summary>More</summary><p> Artifacts: [/scrub/index-only/tpcc/w=100](https://teamcity.cockroachdb.com/viewLog.html?buildId=2332325&tab=artifacts#/scrub/index-only/tpcc/w=100) Related: - #44069 roachtest: scrub/index-only/tpcc/w=100 failed [C-test-failure](https://api.github.com/repos/cockroachdb/cockroach/labels/C-test-failure) [O-roachtest](https://api.github.com/repos/cockroachdb/cockroach/labels/O-roachtest) [O-robot](https://api.github.com/repos/cockroachdb/cockroach/labels/O-robot) [branch-master](https://api.github.com/repos/cockroachdb/cockroach/labels/branch-master) [See this test on roachdash](https://roachdash.crdb.dev/?filter=status%3Aopen+t%3A.%2Ascrub%2Findex-only%2Ftpcc%2Fw%3D100.%2A&sort=title&restgroup=false&display=lastcommented+project) <sub>powered by [pkg/cmd/internal/issues](https://github.com/cockroachdb/cockroach/tree/master/pkg/cmd/internal/issues)</sub></p></details>
2.0
roachtest: scrub/index-only/tpcc/w=100 failed - [(roachtest).scrub/index-only/tpcc/w=100 failed](https://teamcity.cockroachdb.com/viewLog.html?buildId=2332325&tab=buildLog) on [release-19.2@3da44c56c8353afc179eea905a058aeeeebeb7c5](https://github.com/cockroachdb/cockroach/commits/3da44c56c8353afc179eea905a058aeeeebeb7c5): ``` The test failed on branch=release-19.2, cloud=gce: test artifacts and logs in: /home/agent/work/.go/src/github.com/cockroachdb/cockroach/artifacts/scrub/index-only/tpcc/w=100/run_1 cluster.go:2209,tpcc.go:126,tpcc.go:138,tpcc.go:149,scrub.go:54,test_runner.go:755: output in run_080748.213_n5_workload_fixtures_import_tpcc: /home/agent/work/.go/src/github.com/cockroachdb/cockroach/bin/roachprod run teamcity-2332325-1601445095-62-n5cpu4:5 -- ./workload fixtures import tpcc --warehouses=100 --deprecated-fk-indexes {pgurl:1} returned: exit status 20 (1) attached stack trace -- stack trace: | main.(*cluster).RunE | /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/cluster.go:2287 | main.(*cluster).Run | /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/cluster.go:2207 | main.setupTPCC.func1 | /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/tpcc.go:126 | main.setupTPCC | /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/tpcc.go:138 | main.runTPCC | /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/tpcc.go:149 | main.makeScrubTPCCTest.func1 | /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/scrub.go:54 | main.(*testRunner).runTest.func2 | /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/test_runner.go:755 | runtime.goexit | /usr/local/go/src/runtime/asm_amd64.s:1357 Wraps: (2) output in run_080748.213_n5_workload_fixtures_import_tpcc Wraps: (3) /home/agent/work/.go/src/github.com/cockroachdb/cockroach/bin/roachprod run teamcity-2332325-1601445095-62-n5cpu4:5 -- ./workload fixtures import tpcc --warehouses=100 --deprecated-fk-indexes {pgurl:1} returned | stderr: | I200930 08:07:49.689400 1 ccl/workloadccl/fixture.go:342 starting import of 9 tables | Error: importing fixture: importing table warehouse: pq: expected tpcc version "2.2.0" but got "2.1.0" | Error: COMMAND_PROBLEM: exit status 1 | (1) COMMAND_PROBLEM | Wraps: (2) Node 5. Command with error: | | ``` | | ./workload fixtures import tpcc --warehouses=100 --deprecated-fk-indexes {pgurl:1} | | ``` | Wraps: (3) exit status 1 | Error types: (1) errors.Cmd (2) *hintdetail.withDetail (3) *exec.ExitError | | stdout: Wraps: (4) exit status 20 Error types: (1) *withstack.withStack (2) *errutil.withPrefix (3) *main.withCommandDetails (4) *exec.ExitError ``` <details><summary>More</summary><p> Artifacts: [/scrub/index-only/tpcc/w=100](https://teamcity.cockroachdb.com/viewLog.html?buildId=2332325&tab=artifacts#/scrub/index-only/tpcc/w=100) Related: - #44069 roachtest: scrub/index-only/tpcc/w=100 failed [C-test-failure](https://api.github.com/repos/cockroachdb/cockroach/labels/C-test-failure) [O-roachtest](https://api.github.com/repos/cockroachdb/cockroach/labels/O-roachtest) [O-robot](https://api.github.com/repos/cockroachdb/cockroach/labels/O-robot) [branch-master](https://api.github.com/repos/cockroachdb/cockroach/labels/branch-master) [See this test on roachdash](https://roachdash.crdb.dev/?filter=status%3Aopen+t%3A.%2Ascrub%2Findex-only%2Ftpcc%2Fw%3D100.%2A&sort=title&restgroup=false&display=lastcommented+project) <sub>powered by [pkg/cmd/internal/issues](https://github.com/cockroachdb/cockroach/tree/master/pkg/cmd/internal/issues)</sub></p></details>
non_priority
roachtest scrub index only tpcc w failed on the test failed on branch release cloud gce test artifacts and logs in home agent work go src github com cockroachdb cockroach artifacts scrub index only tpcc w run cluster go tpcc go tpcc go tpcc go scrub go test runner go output in run workload fixtures import tpcc home agent work go src github com cockroachdb cockroach bin roachprod run teamcity workload fixtures import tpcc warehouses deprecated fk indexes pgurl returned exit status attached stack trace stack trace main cluster rune home agent work go src github com cockroachdb cockroach pkg cmd roachtest cluster go main cluster run home agent work go src github com cockroachdb cockroach pkg cmd roachtest cluster go main setuptpcc home agent work go src github com cockroachdb cockroach pkg cmd roachtest tpcc go main setuptpcc home agent work go src github com cockroachdb cockroach pkg cmd roachtest tpcc go main runtpcc home agent work go src github com cockroachdb cockroach pkg cmd roachtest tpcc go main makescrubtpcctest home agent work go src github com cockroachdb cockroach pkg cmd roachtest scrub go main testrunner runtest home agent work go src github com cockroachdb cockroach pkg cmd roachtest test runner go runtime goexit usr local go src runtime asm s wraps output in run workload fixtures import tpcc wraps home agent work go src github com cockroachdb cockroach bin roachprod run teamcity workload fixtures import tpcc warehouses deprecated fk indexes pgurl returned stderr ccl workloadccl fixture go starting import of tables error importing fixture importing table warehouse pq expected tpcc version but got error command problem exit status command problem wraps node command with error workload fixtures import tpcc warehouses deprecated fk indexes pgurl wraps exit status error types errors cmd hintdetail withdetail exec exiterror stdout wraps exit status error types withstack withstack errutil withprefix main withcommanddetails exec exiterror more artifacts related roachtest scrub index only tpcc w failed powered by
0
87,183
15,756,116,434
IssuesEvent
2021-03-31 02:57:22
OSWeekends/eventpoints-backend
https://api.github.com/repos/OSWeekends/eventpoints-backend
opened
CVE-2021-28957 (Medium) detected in lxml-4.2.5-cp27-cp27mu-manylinux1_x86_64.whl
security vulnerability
## CVE-2021-28957 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>lxml-4.2.5-cp27-cp27mu-manylinux1_x86_64.whl</b></p></summary> <p>Powerful and Pythonic XML processing library combining libxml2/libxslt with the ElementTree API.</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/e5/14/f4343239f955442da9da1919a99f7311bc5627522741bada61b2349c8def/lxml-4.2.5-cp27-cp27mu-manylinux1_x86_64.whl">https://files.pythonhosted.org/packages/e5/14/f4343239f955442da9da1919a99f7311bc5627522741bada61b2349c8def/lxml-4.2.5-cp27-cp27mu-manylinux1_x86_64.whl</a></p> <p>Path to dependency file: eventpoints-backend/scrapers/requirements.txt</p> <p>Path to vulnerable library: eventpoints-backend/scrapers/requirements.txt</p> <p> Dependency Hierarchy: - Scrapy-1.5.1-py2.py3-none-any.whl (Root Library) - :x: **lxml-4.2.5-cp27-cp27mu-manylinux1_x86_64.whl** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/OSWeekends/eventpoints-backend/commit/51c25ecb67a2ad16fcee689d0e1dd491f1ccda8b">51c25ecb67a2ad16fcee689d0e1dd491f1ccda8b</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> lxml 4.6.2 allows XSS. It places the HTML action attribute into defs.link_attrs (in html/defs.py) for later use in input sanitization, but does not do the same for the HTML5 formaction attribute. <p>Publish Date: 2021-03-21 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-28957>CVE-2021-28957</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-jq4v-f5q6-mjqq">https://github.com/advisories/GHSA-jq4v-f5q6-mjqq</a></p> <p>Release Date: 2021-03-21</p> <p>Fix Resolution: 4.6.3</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2021-28957 (Medium) detected in lxml-4.2.5-cp27-cp27mu-manylinux1_x86_64.whl - ## CVE-2021-28957 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>lxml-4.2.5-cp27-cp27mu-manylinux1_x86_64.whl</b></p></summary> <p>Powerful and Pythonic XML processing library combining libxml2/libxslt with the ElementTree API.</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/e5/14/f4343239f955442da9da1919a99f7311bc5627522741bada61b2349c8def/lxml-4.2.5-cp27-cp27mu-manylinux1_x86_64.whl">https://files.pythonhosted.org/packages/e5/14/f4343239f955442da9da1919a99f7311bc5627522741bada61b2349c8def/lxml-4.2.5-cp27-cp27mu-manylinux1_x86_64.whl</a></p> <p>Path to dependency file: eventpoints-backend/scrapers/requirements.txt</p> <p>Path to vulnerable library: eventpoints-backend/scrapers/requirements.txt</p> <p> Dependency Hierarchy: - Scrapy-1.5.1-py2.py3-none-any.whl (Root Library) - :x: **lxml-4.2.5-cp27-cp27mu-manylinux1_x86_64.whl** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/OSWeekends/eventpoints-backend/commit/51c25ecb67a2ad16fcee689d0e1dd491f1ccda8b">51c25ecb67a2ad16fcee689d0e1dd491f1ccda8b</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> lxml 4.6.2 allows XSS. It places the HTML action attribute into defs.link_attrs (in html/defs.py) for later use in input sanitization, but does not do the same for the HTML5 formaction attribute. <p>Publish Date: 2021-03-21 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-28957>CVE-2021-28957</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-jq4v-f5q6-mjqq">https://github.com/advisories/GHSA-jq4v-f5q6-mjqq</a></p> <p>Release Date: 2021-03-21</p> <p>Fix Resolution: 4.6.3</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in lxml whl cve medium severity vulnerability vulnerable library lxml whl powerful and pythonic xml processing library combining libxslt with the elementtree api library home page a href path to dependency file eventpoints backend scrapers requirements txt path to vulnerable library eventpoints backend scrapers requirements txt dependency hierarchy scrapy none any whl root library x lxml whl vulnerable library found in head commit a href vulnerability details lxml allows xss it places the html action attribute into defs link attrs in html defs py for later use in input sanitization but does not do the same for the formaction attribute publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
0
390
2,517,856,538
IssuesEvent
2015-01-16 17:40:35
alimanfoo/petl
https://api.github.com/repos/alimanfoo/petl
closed
table mapping case study
Documentation
Proposed to write a case study illustrating row mapping based on clinical data mapping in malariagen.
1.0
table mapping case study - Proposed to write a case study illustrating row mapping based on clinical data mapping in malariagen.
non_priority
table mapping case study proposed to write a case study illustrating row mapping based on clinical data mapping in malariagen
0
194,903
14,692,156,266
IssuesEvent
2021-01-03 00:09:16
github-vet/rangeloop-pointer-findings
https://api.github.com/repos/github-vet/rangeloop-pointer-findings
closed
cosmos/cosmos-sdk: x/staking/keeper/historical_info_test.go; 3 LoC
fresh test tiny
Found a possible issue in [cosmos/cosmos-sdk](https://www.github.com/cosmos/cosmos-sdk) at [x/staking/keeper/historical_info_test.go](https://github.com/cosmos/cosmos-sdk/blob/6a9b0caa57810b6e11332a0edfada28e10d38930/x/staking/keeper/historical_info_test.go#L138-L140) Below is the message reported by the analyzer for this snippet of code. Beware that the analyzer only reports the first issue it finds, so please do not limit your consideration to the contents of the below message. > [Click here to see the code in its original context.](https://github.com/cosmos/cosmos-sdk/blob/6a9b0caa57810b6e11332a0edfada28e10d38930/x/staking/keeper/historical_info_test.go#L138-L140) <details> <summary>Click here to show the 3 line(s) of Go which triggered the analyzer.</summary> ```go for i, hi := range expHistInfos { app.StakingKeeper.SetHistoricalInfo(ctx, int64(10+i), &hi) } ``` </details> <details> <summary>Click here to show extra information the analyzer produced.</summary> ``` No path was found through the callgraph that could lead to a function which writes a pointer argument. No path was found through the callgraph that could lead to a function which passes a pointer to third-party code. root signature {SetHistoricalInfo 3} was not found in the callgraph; reference was passed directly to third-party code ``` </details> Leave a reaction on this issue to contribute to the project by classifying this instance as a **Bug** :-1:, **Mitigated** :+1:, or **Desirable Behavior** :rocket: See the descriptions of the classifications [here](https://github.com/github-vet/rangeclosure-findings#how-can-i-help) for more information. commit ID: 6a9b0caa57810b6e11332a0edfada28e10d38930
1.0
cosmos/cosmos-sdk: x/staking/keeper/historical_info_test.go; 3 LoC - Found a possible issue in [cosmos/cosmos-sdk](https://www.github.com/cosmos/cosmos-sdk) at [x/staking/keeper/historical_info_test.go](https://github.com/cosmos/cosmos-sdk/blob/6a9b0caa57810b6e11332a0edfada28e10d38930/x/staking/keeper/historical_info_test.go#L138-L140) Below is the message reported by the analyzer for this snippet of code. Beware that the analyzer only reports the first issue it finds, so please do not limit your consideration to the contents of the below message. > [Click here to see the code in its original context.](https://github.com/cosmos/cosmos-sdk/blob/6a9b0caa57810b6e11332a0edfada28e10d38930/x/staking/keeper/historical_info_test.go#L138-L140) <details> <summary>Click here to show the 3 line(s) of Go which triggered the analyzer.</summary> ```go for i, hi := range expHistInfos { app.StakingKeeper.SetHistoricalInfo(ctx, int64(10+i), &hi) } ``` </details> <details> <summary>Click here to show extra information the analyzer produced.</summary> ``` No path was found through the callgraph that could lead to a function which writes a pointer argument. No path was found through the callgraph that could lead to a function which passes a pointer to third-party code. root signature {SetHistoricalInfo 3} was not found in the callgraph; reference was passed directly to third-party code ``` </details> Leave a reaction on this issue to contribute to the project by classifying this instance as a **Bug** :-1:, **Mitigated** :+1:, or **Desirable Behavior** :rocket: See the descriptions of the classifications [here](https://github.com/github-vet/rangeclosure-findings#how-can-i-help) for more information. commit ID: 6a9b0caa57810b6e11332a0edfada28e10d38930
non_priority
cosmos cosmos sdk x staking keeper historical info test go loc found a possible issue in at below is the message reported by the analyzer for this snippet of code beware that the analyzer only reports the first issue it finds so please do not limit your consideration to the contents of the below message click here to show the line s of go which triggered the analyzer go for i hi range exphistinfos app stakingkeeper sethistoricalinfo ctx i hi click here to show extra information the analyzer produced no path was found through the callgraph that could lead to a function which writes a pointer argument no path was found through the callgraph that could lead to a function which passes a pointer to third party code root signature sethistoricalinfo was not found in the callgraph reference was passed directly to third party code leave a reaction on this issue to contribute to the project by classifying this instance as a bug mitigated or desirable behavior rocket see the descriptions of the classifications for more information commit id
0
229,608
25,362,290,551
IssuesEvent
2022-11-21 01:04:03
AkshayMukkavilli/Analyzing-the-Significance-of-Structure-in-Amazon-Review-Data-Using-Machine-Learning-Approaches
https://api.github.com/repos/AkshayMukkavilli/Analyzing-the-Significance-of-Structure-in-Amazon-Review-Data-Using-Machine-Learning-Approaches
opened
CVE-2022-41896 (Medium) detected in tensorflow-1.13.1-cp27-cp27mu-manylinux1_x86_64.whl
security vulnerability
## CVE-2022-41896 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>tensorflow-1.13.1-cp27-cp27mu-manylinux1_x86_64.whl</b></p></summary> <p>TensorFlow is an open source machine learning framework for everyone.</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/d2/ea/ab2c8c0e81bd051cc1180b104c75a865ab0fc66c89be992c4b20bbf6d624/tensorflow-1.13.1-cp27-cp27mu-manylinux1_x86_64.whl">https://files.pythonhosted.org/packages/d2/ea/ab2c8c0e81bd051cc1180b104c75a865ab0fc66c89be992c4b20bbf6d624/tensorflow-1.13.1-cp27-cp27mu-manylinux1_x86_64.whl</a></p> <p>Path to dependency file: /FinalProject/requirements.txt</p> <p>Path to vulnerable library: /teSource-ArchiveExtractor_8b9e071c-3b11-4aa9-ba60-cdeb60d053b7/20190525011350_65403/20190525011256_depth_0/9/tensorflow-1.13.1-cp27-cp27mu-manylinux1_x86_64/tensorflow-1.13.1.data/purelib/tensorflow</p> <p> Dependency Hierarchy: - :x: **tensorflow-1.13.1-cp27-cp27mu-manylinux1_x86_64.whl** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> TensorFlow is an open source platform for machine learning. If `ThreadUnsafeUnigramCandidateSampler` is given input `filterbank_channel_count` greater than the allowed max size, TensorFlow will crash. We have patched the issue in GitHub commit 39ec7eaf1428e90c37787e5b3fbd68ebd3c48860. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range. <p>Publish Date: 2022-11-18 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-41896>CVE-2022-41896</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>4.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: Low - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.cve.org/CVERecord?id=CVE-2022-41896">https://www.cve.org/CVERecord?id=CVE-2022-41896</a></p> <p>Release Date: 2022-11-18</p> <p>Fix Resolution: tensorflow - 2.8.4, 2.9.3, 2.10.1, 2.11.0, tensorflow-cpu - 2.8.4, 2.9.3, 2.10.1, 2.11.0, tensorflow-gpu - 2.8.4, 2.9.3, 2.10.1, 2.11.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2022-41896 (Medium) detected in tensorflow-1.13.1-cp27-cp27mu-manylinux1_x86_64.whl - ## CVE-2022-41896 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>tensorflow-1.13.1-cp27-cp27mu-manylinux1_x86_64.whl</b></p></summary> <p>TensorFlow is an open source machine learning framework for everyone.</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/d2/ea/ab2c8c0e81bd051cc1180b104c75a865ab0fc66c89be992c4b20bbf6d624/tensorflow-1.13.1-cp27-cp27mu-manylinux1_x86_64.whl">https://files.pythonhosted.org/packages/d2/ea/ab2c8c0e81bd051cc1180b104c75a865ab0fc66c89be992c4b20bbf6d624/tensorflow-1.13.1-cp27-cp27mu-manylinux1_x86_64.whl</a></p> <p>Path to dependency file: /FinalProject/requirements.txt</p> <p>Path to vulnerable library: /teSource-ArchiveExtractor_8b9e071c-3b11-4aa9-ba60-cdeb60d053b7/20190525011350_65403/20190525011256_depth_0/9/tensorflow-1.13.1-cp27-cp27mu-manylinux1_x86_64/tensorflow-1.13.1.data/purelib/tensorflow</p> <p> Dependency Hierarchy: - :x: **tensorflow-1.13.1-cp27-cp27mu-manylinux1_x86_64.whl** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> TensorFlow is an open source platform for machine learning. If `ThreadUnsafeUnigramCandidateSampler` is given input `filterbank_channel_count` greater than the allowed max size, TensorFlow will crash. We have patched the issue in GitHub commit 39ec7eaf1428e90c37787e5b3fbd68ebd3c48860. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range. <p>Publish Date: 2022-11-18 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-41896>CVE-2022-41896</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>4.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: Low - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.cve.org/CVERecord?id=CVE-2022-41896">https://www.cve.org/CVERecord?id=CVE-2022-41896</a></p> <p>Release Date: 2022-11-18</p> <p>Fix Resolution: tensorflow - 2.8.4, 2.9.3, 2.10.1, 2.11.0, tensorflow-cpu - 2.8.4, 2.9.3, 2.10.1, 2.11.0, tensorflow-gpu - 2.8.4, 2.9.3, 2.10.1, 2.11.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in tensorflow whl cve medium severity vulnerability vulnerable library tensorflow whl tensorflow is an open source machine learning framework for everyone library home page a href path to dependency file finalproject requirements txt path to vulnerable library tesource archiveextractor depth tensorflow tensorflow data purelib tensorflow dependency hierarchy x tensorflow whl vulnerable library vulnerability details tensorflow is an open source platform for machine learning if threadunsafeunigramcandidatesampler is given input filterbank channel count greater than the allowed max size tensorflow will crash we have patched the issue in github commit the fix will be included in tensorflow we will also cherrypick this commit on tensorflow and tensorflow as these are also affected and still in supported range publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required low user interaction required scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution tensorflow tensorflow cpu tensorflow gpu step up your open source security game with mend
0
54,869
6,877,856,752
IssuesEvent
2017-11-20 09:44:41
syndesisio/syndesis
https://api.github.com/repos/syndesisio/syndesis
opened
Integrations list: add export action to kebab menu
cat/enhancement module/ui notif/ux-design
We should consider adding `Export` as one of the the available action. Now it's only hidden in detail view page. ![screen shot 2017-11-20 at 10 43 05](https://user-images.githubusercontent.com/5637792/33011920-a43d5eb0-cddf-11e7-99c6-9429b803e2ed.png)
1.0
Integrations list: add export action to kebab menu - We should consider adding `Export` as one of the the available action. Now it's only hidden in detail view page. ![screen shot 2017-11-20 at 10 43 05](https://user-images.githubusercontent.com/5637792/33011920-a43d5eb0-cddf-11e7-99c6-9429b803e2ed.png)
non_priority
integrations list add export action to kebab menu we should consider adding export as one of the the available action now it s only hidden in detail view page
0
76,709
15,496,174,986
IssuesEvent
2021-03-11 02:11:55
mwilliams7197/zendo
https://api.github.com/repos/mwilliams7197/zendo
opened
CVE-2020-28498 (Medium) detected in elliptic-6.5.2.tgz
security vulnerability
## CVE-2020-28498 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>elliptic-6.5.2.tgz</b></p></summary> <p>EC cryptography</p> <p>Library home page: <a href="https://registry.npmjs.org/elliptic/-/elliptic-6.5.2.tgz">https://registry.npmjs.org/elliptic/-/elliptic-6.5.2.tgz</a></p> <p>Path to dependency file: zendo/package.json</p> <p>Path to vulnerable library: zendo/node_modules/elliptic/package.json</p> <p> Dependency Hierarchy: - react-scripts-1.0.7.tgz (Root Library) - webpack-2.6.1.tgz - node-libs-browser-2.2.1.tgz - crypto-browserify-3.12.0.tgz - browserify-sign-4.1.0.tgz - :x: **elliptic-6.5.2.tgz** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The package elliptic before 6.5.4 are vulnerable to Cryptographic Issues via the secp256k1 implementation in elliptic/ec/key.js. There is no check to confirm that the public key point passed into the derive function actually exists on the secp256k1 curve. This results in the potential for the private key used in this implementation to be revealed after a number of ECDH operations are performed. <p>Publish Date: 2021-02-02 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-28498>CVE-2020-28498</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Changed - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28498">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28498</a></p> <p>Release Date: 2021-02-02</p> <p>Fix Resolution: v6.5.4</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"elliptic","packageVersion":"6.5.2","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"react-scripts:1.0.7;webpack:2.6.1;node-libs-browser:2.2.1;crypto-browserify:3.12.0;browserify-sign:4.1.0;elliptic:6.5.2","isMinimumFixVersionAvailable":true,"minimumFixVersion":"v6.5.4"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-28498","vulnerabilityDetails":"The package elliptic before 6.5.4 are vulnerable to Cryptographic Issues via the secp256k1 implementation in elliptic/ec/key.js. There is no check to confirm that the public key point passed into the derive function actually exists on the secp256k1 curve. This results in the potential for the private key used in this implementation to be revealed after a number of ECDH operations are performed.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-28498","cvss3Severity":"medium","cvss3Score":"6.8","cvss3Metrics":{"A":"None","AC":"High","PR":"None","S":"Changed","C":"High","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> -->
True
CVE-2020-28498 (Medium) detected in elliptic-6.5.2.tgz - ## CVE-2020-28498 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>elliptic-6.5.2.tgz</b></p></summary> <p>EC cryptography</p> <p>Library home page: <a href="https://registry.npmjs.org/elliptic/-/elliptic-6.5.2.tgz">https://registry.npmjs.org/elliptic/-/elliptic-6.5.2.tgz</a></p> <p>Path to dependency file: zendo/package.json</p> <p>Path to vulnerable library: zendo/node_modules/elliptic/package.json</p> <p> Dependency Hierarchy: - react-scripts-1.0.7.tgz (Root Library) - webpack-2.6.1.tgz - node-libs-browser-2.2.1.tgz - crypto-browserify-3.12.0.tgz - browserify-sign-4.1.0.tgz - :x: **elliptic-6.5.2.tgz** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The package elliptic before 6.5.4 are vulnerable to Cryptographic Issues via the secp256k1 implementation in elliptic/ec/key.js. There is no check to confirm that the public key point passed into the derive function actually exists on the secp256k1 curve. This results in the potential for the private key used in this implementation to be revealed after a number of ECDH operations are performed. <p>Publish Date: 2021-02-02 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-28498>CVE-2020-28498</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Changed - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28498">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28498</a></p> <p>Release Date: 2021-02-02</p> <p>Fix Resolution: v6.5.4</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"elliptic","packageVersion":"6.5.2","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"react-scripts:1.0.7;webpack:2.6.1;node-libs-browser:2.2.1;crypto-browserify:3.12.0;browserify-sign:4.1.0;elliptic:6.5.2","isMinimumFixVersionAvailable":true,"minimumFixVersion":"v6.5.4"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-28498","vulnerabilityDetails":"The package elliptic before 6.5.4 are vulnerable to Cryptographic Issues via the secp256k1 implementation in elliptic/ec/key.js. There is no check to confirm that the public key point passed into the derive function actually exists on the secp256k1 curve. This results in the potential for the private key used in this implementation to be revealed after a number of ECDH operations are performed.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-28498","cvss3Severity":"medium","cvss3Score":"6.8","cvss3Metrics":{"A":"None","AC":"High","PR":"None","S":"Changed","C":"High","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> -->
non_priority
cve medium detected in elliptic tgz cve medium severity vulnerability vulnerable library elliptic tgz ec cryptography library home page a href path to dependency file zendo package json path to vulnerable library zendo node modules elliptic package json dependency hierarchy react scripts tgz root library webpack tgz node libs browser tgz crypto browserify tgz browserify sign tgz x elliptic tgz vulnerable library found in base branch master vulnerability details the package elliptic before are vulnerable to cryptographic issues via the implementation in elliptic ec key js there is no check to confirm that the public key point passed into the derive function actually exists on the curve this results in the potential for the private key used in this implementation to be revealed after a number of ecdh operations are performed publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope changed impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree react scripts webpack node libs browser crypto browserify browserify sign elliptic isminimumfixversionavailable true minimumfixversion basebranches vulnerabilityidentifier cve vulnerabilitydetails the package elliptic before are vulnerable to cryptographic issues via the implementation in elliptic ec key js there is no check to confirm that the public key point passed into the derive function actually exists on the curve this results in the potential for the private key used in this implementation to be revealed after a number of ecdh operations are performed vulnerabilityurl
0
68,471
7,097,662,429
IssuesEvent
2018-01-14 21:40:36
null511/PiServerLite
https://api.github.com/repos/null511/PiServerLite
closed
Route Intercepter
Testing enhancement
Create toggle-able option for intercepting all incoming HTTP requests. As an example, this allows you to temporarily redirect all incoming requests to a 'loading' page while the server is performing long-running operations. - Register `RouteOverride` object with `HttpReceiver` and unregister on `.Dispose()`.
1.0
Route Intercepter - Create toggle-able option for intercepting all incoming HTTP requests. As an example, this allows you to temporarily redirect all incoming requests to a 'loading' page while the server is performing long-running operations. - Register `RouteOverride` object with `HttpReceiver` and unregister on `.Dispose()`.
non_priority
route intercepter create toggle able option for intercepting all incoming http requests as an example this allows you to temporarily redirect all incoming requests to a loading page while the server is performing long running operations register routeoverride object with httpreceiver and unregister on dispose
0
366,766
25,600,657,082
IssuesEvent
2022-12-01 19:53:38
abenteuerzeit/viva-la-carte
https://api.github.com/repos/abenteuerzeit/viva-la-carte
closed
A free tool to allow the average health-conscience consumer a way to make positive food choices tailored to a set of nutritional goals
documentation good first issue
# User experience ## Story time! Characters — Victoria works at Viva La Carte, — James is a customer James wants to simplify his meal planning. In fact, he wishes he had his own personal nutritionist who would help him plan well-balanced meals for the week. At the same time, the nutritionist should know which foods James likes to eat and which foods he is allergic to or just doesn't like, or which foods he doesn't feel like eating at any particular moment. Here, the nutritionist shows James a meal plan for the week. Now, James can substitute meals to suit his tastes, or he just accepts whatever the nutritionist actually recommends. In addition, he can tell the nutritionist which brands he prefers over others. So James goes to Victoria's Shopping Service with the shopping list he needs to get the foods set from his meal plan. When he gives Victoria his list, she gets all the products he needs. Victoria shows James how many calories each item has and how the items compare to each other based on a standard metric, such as kcal per 100g. The prices in Victoria's store are displayed last and are viewed as the least important. Victoria makes it a priority to be familiar with her customers personally. That's why when she sees James for the first time, she first asks him his name. Chatting helps Victoria figure out exactly the type of food James likes and dislikes, and beyond that, she indulges in gossip. For example, she tells James about what her other customers have bought recently, what his friends got, and she can provide James with his entire grocery shopping history for easy reference. She suggests that James might want to replace items or add and remove specific items to or from his shopping cart. James has all the items he wants. He purchases them. Victoria takes note and thanks James. She asks him if he would like to set up his order for repeated delivery. James says yes, but he would need to modify some things. Victoria notes that and tells James about how they could arrange regular deliveries. ## Outline of Functionality 1. Register an account, login and logout 2. Enter personal data needed by the nutritionist. 3. Enter health goals and food and brand preferences 4. Generate a meal plan for a week. The customer can change the period. 5. Edit meal plan. Substitute parts by regenerating sections of the plan. E.g., for just one day, or just one meal. ## Flows > Key: > 1. Action > 1. Success. > 2. Failure ### Actions (CRUD or REST) #### Identity - ***Register a new account*** - ? View **Home page** - : Return *register page with error message* - ***Login to account*** - ? View **Home page** - : Return *Login page with error message* #### Profile Settings - ***Food preferences*** - USer interacts with **ProductPreferenceManager** to set preferences - Only 10 items can be favorite - Collect: Procuct.Id - Save for later viewing and editing (to change ratings) ```csharp public enum Ratings { reject, dislike, like, love, favorite } ``` - ***Meal preferences*** - Displayed on home page. You don't need an account to generate meals - User interacts with Meal Planner to view generated meals - Edit items - Add new item; change quantities/portion sizes, substitute products, delete items - **MealPlanManager** properties: - ```csharp public enum Diets { Whatever, Paleo, Vegetarian, Vegan, Keto, Mediterranean } public class MealPlanManager : IMealPlanManager { private double TotalCalories { get; set; } private int MealCount { get; set; } private Diets diet { get; set; } private List<Recipe> Meals { get; set; } ... } ``` ### Flows - Home Page displays Meal Plan Maker ⇒ User enters meal nutrition requirements and frequency ⇒ Accept / Modify / Reject meal plan. - each meal is composed of recipes (like: how to make a hamburger, how to make french fries, how to make lemonade). - User can see the nutritional data for the complete cart, an entire meal as well as for individual items - Accept Meal Plan ⇒ Map as shopping list ⇒ Get, display, modify products ⇒ Checkout (Create Order) ⇒ Process Payment ⇒ Delivery Service
1.0
A free tool to allow the average health-conscience consumer a way to make positive food choices tailored to a set of nutritional goals - # User experience ## Story time! Characters — Victoria works at Viva La Carte, — James is a customer James wants to simplify his meal planning. In fact, he wishes he had his own personal nutritionist who would help him plan well-balanced meals for the week. At the same time, the nutritionist should know which foods James likes to eat and which foods he is allergic to or just doesn't like, or which foods he doesn't feel like eating at any particular moment. Here, the nutritionist shows James a meal plan for the week. Now, James can substitute meals to suit his tastes, or he just accepts whatever the nutritionist actually recommends. In addition, he can tell the nutritionist which brands he prefers over others. So James goes to Victoria's Shopping Service with the shopping list he needs to get the foods set from his meal plan. When he gives Victoria his list, she gets all the products he needs. Victoria shows James how many calories each item has and how the items compare to each other based on a standard metric, such as kcal per 100g. The prices in Victoria's store are displayed last and are viewed as the least important. Victoria makes it a priority to be familiar with her customers personally. That's why when she sees James for the first time, she first asks him his name. Chatting helps Victoria figure out exactly the type of food James likes and dislikes, and beyond that, she indulges in gossip. For example, she tells James about what her other customers have bought recently, what his friends got, and she can provide James with his entire grocery shopping history for easy reference. She suggests that James might want to replace items or add and remove specific items to or from his shopping cart. James has all the items he wants. He purchases them. Victoria takes note and thanks James. She asks him if he would like to set up his order for repeated delivery. James says yes, but he would need to modify some things. Victoria notes that and tells James about how they could arrange regular deliveries. ## Outline of Functionality 1. Register an account, login and logout 2. Enter personal data needed by the nutritionist. 3. Enter health goals and food and brand preferences 4. Generate a meal plan for a week. The customer can change the period. 5. Edit meal plan. Substitute parts by regenerating sections of the plan. E.g., for just one day, or just one meal. ## Flows > Key: > 1. Action > 1. Success. > 2. Failure ### Actions (CRUD or REST) #### Identity - ***Register a new account*** - ? View **Home page** - : Return *register page with error message* - ***Login to account*** - ? View **Home page** - : Return *Login page with error message* #### Profile Settings - ***Food preferences*** - USer interacts with **ProductPreferenceManager** to set preferences - Only 10 items can be favorite - Collect: Procuct.Id - Save for later viewing and editing (to change ratings) ```csharp public enum Ratings { reject, dislike, like, love, favorite } ``` - ***Meal preferences*** - Displayed on home page. You don't need an account to generate meals - User interacts with Meal Planner to view generated meals - Edit items - Add new item; change quantities/portion sizes, substitute products, delete items - **MealPlanManager** properties: - ```csharp public enum Diets { Whatever, Paleo, Vegetarian, Vegan, Keto, Mediterranean } public class MealPlanManager : IMealPlanManager { private double TotalCalories { get; set; } private int MealCount { get; set; } private Diets diet { get; set; } private List<Recipe> Meals { get; set; } ... } ``` ### Flows - Home Page displays Meal Plan Maker ⇒ User enters meal nutrition requirements and frequency ⇒ Accept / Modify / Reject meal plan. - each meal is composed of recipes (like: how to make a hamburger, how to make french fries, how to make lemonade). - User can see the nutritional data for the complete cart, an entire meal as well as for individual items - Accept Meal Plan ⇒ Map as shopping list ⇒ Get, display, modify products ⇒ Checkout (Create Order) ⇒ Process Payment ⇒ Delivery Service
non_priority
a free tool to allow the average health conscience consumer a way to make positive food choices tailored to a set of nutritional goals user experience story time characters — victoria works at viva la carte — james is a customer james wants to simplify his meal planning in fact he wishes he had his own personal nutritionist who would help him plan well balanced meals for the week at the same time the nutritionist should know which foods james likes to eat and which foods he is allergic to or just doesn t like or which foods he doesn t feel like eating at any particular moment here the nutritionist shows james a meal plan for the week now james can substitute meals to suit his tastes or he just accepts whatever the nutritionist actually recommends in addition he can tell the nutritionist which brands he prefers over others so james goes to victoria s shopping service with the shopping list he needs to get the foods set from his meal plan when he gives victoria his list she gets all the products he needs victoria shows james how many calories each item has and how the items compare to each other based on a standard metric such as kcal per the prices in victoria s store are displayed last and are viewed as the least important victoria makes it a priority to be familiar with her customers personally that s why when she sees james for the first time she first asks him his name chatting helps victoria figure out exactly the type of food james likes and dislikes and beyond that she indulges in gossip for example she tells james about what her other customers have bought recently what his friends got and she can provide james with his entire grocery shopping history for easy reference she suggests that james might want to replace items or add and remove specific items to or from his shopping cart james has all the items he wants he purchases them victoria takes note and thanks james she asks him if he would like to set up his order for repeated delivery james says yes but he would need to modify some things victoria notes that and tells james about how they could arrange regular deliveries outline of functionality register an account login and logout enter personal data needed by the nutritionist enter health goals and food and brand preferences generate a meal plan for a week the customer can change the period edit meal plan substitute parts by regenerating sections of the plan e g for just one day or just one meal flows key action success failure actions crud or rest identity register a new account view home page return register page with error message login to account view home page return login page with error message profile settings food preferences user interacts with productpreferencemanager to set preferences only items can be favorite collect procuct id save for later viewing and editing to change ratings csharp public enum ratings reject dislike like love favorite meal preferences displayed on home page you don t need an account to generate meals user interacts with meal planner to view generated meals edit items add new item change quantities portion sizes substitute products delete items mealplanmanager properties csharp public enum diets whatever paleo vegetarian vegan keto mediterranean public class mealplanmanager imealplanmanager private double totalcalories get set private int mealcount get set private diets diet get set private list meals get set flows home page displays meal plan maker ⇒ user enters meal nutrition requirements and frequency ⇒ accept modify reject meal plan each meal is composed of recipes like how to make a hamburger how to make french fries how to make lemonade user can see the nutritional data for the complete cart an entire meal as well as for individual items accept meal plan ⇒ map as shopping list ⇒ get display modify products ⇒ checkout create order ⇒ process payment ⇒ delivery service
0
344,731
30,756,232,506
IssuesEvent
2023-07-29 04:43:10
stockOneQ/back
https://api.github.com/repos/stockOneQ/back
closed
File 관련 테스트코드를 작성한다
🔨 Refactor ✅ Test
## Description 🖊️ File 관련 테스트코드를 작성한다 ## To-do 🧑‍💻 - [ ] File Test 작성 - [ ] File Controller, Service 리팩토링
1.0
File 관련 테스트코드를 작성한다 - ## Description 🖊️ File 관련 테스트코드를 작성한다 ## To-do 🧑‍💻 - [ ] File Test 작성 - [ ] File Controller, Service 리팩토링
non_priority
file 관련 테스트코드를 작성한다 description 🖊️ file 관련 테스트코드를 작성한다 to do 🧑‍💻 file test 작성 file controller service 리팩토링
0
44,953
13,097,423,812
IssuesEvent
2020-08-03 17:26:16
jtimberlake/COSMOS
https://api.github.com/repos/jtimberlake/COSMOS
opened
CVE-2020-7598 (Medium) detected in minimist-0.0.8.tgz
security vulnerability
## CVE-2020-7598 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>minimist-0.0.8.tgz</b></p></summary> <p>parse argument options</p> <p>Library home page: <a href="https://registry.npmjs.org/minimist/-/minimist-0.0.8.tgz">https://registry.npmjs.org/minimist/-/minimist-0.0.8.tgz</a></p> <p>Path to dependency file: /tmp/ws-scm/COSMOS/extensions/vscode/client/package.json</p> <p>Path to vulnerable library: /tmp/ws-scm/COSMOS/extensions/vscode/client/node_modules/minimist/package.json,/tmp/ws-scm/COSMOS/extensions/vscode/client/node_modules/minimist/package.json</p> <p> Dependency Hierarchy: - mocha-2.5.3.tgz (Root Library) - mkdirp-0.5.1.tgz - :x: **minimist-0.0.8.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/jtimberlake/COSMOS/commit/e967c77766e1b731bec2bab4f5fafb6af874c2c1">e967c77766e1b731bec2bab4f5fafb6af874c2c1</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> minimist before 1.2.2 could be tricked into adding or modifying properties of Object.prototype using a "constructor" or "__proto__" payload. <p>Publish Date: 2020-03-11 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7598>CVE-2020-7598</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.6</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/substack/minimist/commit/63e7ed05aa4b1889ec2f3b196426db4500cbda94">https://github.com/substack/minimist/commit/63e7ed05aa4b1889ec2f3b196426db4500cbda94</a></p> <p>Release Date: 2020-03-11</p> <p>Fix Resolution: minimist - 0.2.1,1.2.3</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"minimist","packageVersion":"0.0.8","isTransitiveDependency":true,"dependencyTree":"mocha:2.5.3;mkdirp:0.5.1;minimist:0.0.8","isMinimumFixVersionAvailable":true,"minimumFixVersion":"minimist - 0.2.1,1.2.3"}],"vulnerabilityIdentifier":"CVE-2020-7598","vulnerabilityDetails":"minimist before 1.2.2 could be tricked into adding or modifying properties of Object.prototype using a \"constructor\" or \"__proto__\" payload.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7598","cvss3Severity":"medium","cvss3Score":"5.6","cvss3Metrics":{"A":"Low","AC":"High","PR":"None","S":"Unchanged","C":"Low","UI":"None","AV":"Network","I":"Low"},"extraData":{}}</REMEDIATE> -->
True
CVE-2020-7598 (Medium) detected in minimist-0.0.8.tgz - ## CVE-2020-7598 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>minimist-0.0.8.tgz</b></p></summary> <p>parse argument options</p> <p>Library home page: <a href="https://registry.npmjs.org/minimist/-/minimist-0.0.8.tgz">https://registry.npmjs.org/minimist/-/minimist-0.0.8.tgz</a></p> <p>Path to dependency file: /tmp/ws-scm/COSMOS/extensions/vscode/client/package.json</p> <p>Path to vulnerable library: /tmp/ws-scm/COSMOS/extensions/vscode/client/node_modules/minimist/package.json,/tmp/ws-scm/COSMOS/extensions/vscode/client/node_modules/minimist/package.json</p> <p> Dependency Hierarchy: - mocha-2.5.3.tgz (Root Library) - mkdirp-0.5.1.tgz - :x: **minimist-0.0.8.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/jtimberlake/COSMOS/commit/e967c77766e1b731bec2bab4f5fafb6af874c2c1">e967c77766e1b731bec2bab4f5fafb6af874c2c1</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> minimist before 1.2.2 could be tricked into adding or modifying properties of Object.prototype using a "constructor" or "__proto__" payload. <p>Publish Date: 2020-03-11 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7598>CVE-2020-7598</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.6</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/substack/minimist/commit/63e7ed05aa4b1889ec2f3b196426db4500cbda94">https://github.com/substack/minimist/commit/63e7ed05aa4b1889ec2f3b196426db4500cbda94</a></p> <p>Release Date: 2020-03-11</p> <p>Fix Resolution: minimist - 0.2.1,1.2.3</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"minimist","packageVersion":"0.0.8","isTransitiveDependency":true,"dependencyTree":"mocha:2.5.3;mkdirp:0.5.1;minimist:0.0.8","isMinimumFixVersionAvailable":true,"minimumFixVersion":"minimist - 0.2.1,1.2.3"}],"vulnerabilityIdentifier":"CVE-2020-7598","vulnerabilityDetails":"minimist before 1.2.2 could be tricked into adding or modifying properties of Object.prototype using a \"constructor\" or \"__proto__\" payload.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7598","cvss3Severity":"medium","cvss3Score":"5.6","cvss3Metrics":{"A":"Low","AC":"High","PR":"None","S":"Unchanged","C":"Low","UI":"None","AV":"Network","I":"Low"},"extraData":{}}</REMEDIATE> -->
non_priority
cve medium detected in minimist tgz cve medium severity vulnerability vulnerable library minimist tgz parse argument options library home page a href path to dependency file tmp ws scm cosmos extensions vscode client package json path to vulnerable library tmp ws scm cosmos extensions vscode client node modules minimist package json tmp ws scm cosmos extensions vscode client node modules minimist package json dependency hierarchy mocha tgz root library mkdirp tgz x minimist tgz vulnerable library found in head commit a href vulnerability details minimist before could be tricked into adding or modifying properties of object prototype using a constructor or proto payload publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact low availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution minimist isopenpronvulnerability false ispackagebased true isdefaultbranch true packages vulnerabilityidentifier cve vulnerabilitydetails minimist before could be tricked into adding or modifying properties of object prototype using a constructor or proto payload vulnerabilityurl
0
39,865
16,107,155,586
IssuesEvent
2021-04-27 16:12:14
graphprotocol/indexer
https://api.github.com/repos/graphprotocol/indexer
closed
Failed to query indexer allocations, keeping existing
bug indexer-agent indexer-service
From service: 3|start_indexer_service | {"level":20,"time":1608416975921,"pid":1874424,"hostname":"suntzu-server","name":"IndexerService","indexer":"0x4167EB613d784C910f5dc0F3f0515D61Ec6EC8DF","operator":"0xD96d4B52CAb35cF3DF1d58765bD2eA7cb1Fb6016","indexer":"0x4167EB613d784C910f5dc0F3f0515D61Ec6EC8DF","operator":"0xD96d4B52CAb35cF3DF1d58765bD2eA7cb1Fb6016","component":"AllocationMonitor","msg":"Refresh active allocations"} 3|start_indexer_service | {"level":40,"time":1608416976209,"pid":1874424,"hostname":"suntzu-server","name":"IndexerService","indexer":"0x4167EB613d784C910f5dc0F3f0515D61Ec6EC8DF","operator":"0xD96d4B52CAb35cF3DF1d58765bD2eA7cb1Fb6016","indexer":"0x4167EB613d784C910f5dc0F3f0515D61Ec6EC8DF","operator":"0xD96d4B52CAb35cF3DF1d58765bD2eA7cb1Fb6016","component":"AllocationMonitor","allocations":[],"err":{"type":"IndexerError","message":"Failed to query indexer allocations","stack":"IndexerError: Failed to query indexer allocations\n at Object.indexerError (/usr/local/lib/node_modules/@graphprotocol/indexer-service/node_modules/@graphprotocol/indexer-common/dist/errors.js:97:12)\n at /usr/local/lib/node_modules/@graphprotocol/indexer-service/dist/allocations.js:67:39\n at Generator.next (<anonymous>)\n at fulfilled (/usr/local/lib/node_modules/@graphprotocol/indexer-service/dist/allocations.js:5:58)\n at processTicksAndRejections (internal/process/task_queues.js:93:5)","code":"IE010","explanation":"https://github.com/graphprotocol/indexer/blob/master/docs/errors.md#ie010","cause":{"type":"Error","message":"Indexer not found on chain","stack":"Error: Indexer not found on chain\n at /usr/local/lib/node_modules/@graphprotocol/indexer-service/dist/allocations.js:59:23\n at Generator.next (<anonymous>)\n at fulfilled (/usr/local/lib/node_modules/@graphprotocol/indexer-service/dist/allocations.js:5:58)\n at processTicksAndRejections (internal/process/task_queues.js:93:5)"}},"msg":"Failed to query indexer allocations, keeping existing"}
1.0
Failed to query indexer allocations, keeping existing - From service: 3|start_indexer_service | {"level":20,"time":1608416975921,"pid":1874424,"hostname":"suntzu-server","name":"IndexerService","indexer":"0x4167EB613d784C910f5dc0F3f0515D61Ec6EC8DF","operator":"0xD96d4B52CAb35cF3DF1d58765bD2eA7cb1Fb6016","indexer":"0x4167EB613d784C910f5dc0F3f0515D61Ec6EC8DF","operator":"0xD96d4B52CAb35cF3DF1d58765bD2eA7cb1Fb6016","component":"AllocationMonitor","msg":"Refresh active allocations"} 3|start_indexer_service | {"level":40,"time":1608416976209,"pid":1874424,"hostname":"suntzu-server","name":"IndexerService","indexer":"0x4167EB613d784C910f5dc0F3f0515D61Ec6EC8DF","operator":"0xD96d4B52CAb35cF3DF1d58765bD2eA7cb1Fb6016","indexer":"0x4167EB613d784C910f5dc0F3f0515D61Ec6EC8DF","operator":"0xD96d4B52CAb35cF3DF1d58765bD2eA7cb1Fb6016","component":"AllocationMonitor","allocations":[],"err":{"type":"IndexerError","message":"Failed to query indexer allocations","stack":"IndexerError: Failed to query indexer allocations\n at Object.indexerError (/usr/local/lib/node_modules/@graphprotocol/indexer-service/node_modules/@graphprotocol/indexer-common/dist/errors.js:97:12)\n at /usr/local/lib/node_modules/@graphprotocol/indexer-service/dist/allocations.js:67:39\n at Generator.next (<anonymous>)\n at fulfilled (/usr/local/lib/node_modules/@graphprotocol/indexer-service/dist/allocations.js:5:58)\n at processTicksAndRejections (internal/process/task_queues.js:93:5)","code":"IE010","explanation":"https://github.com/graphprotocol/indexer/blob/master/docs/errors.md#ie010","cause":{"type":"Error","message":"Indexer not found on chain","stack":"Error: Indexer not found on chain\n at /usr/local/lib/node_modules/@graphprotocol/indexer-service/dist/allocations.js:59:23\n at Generator.next (<anonymous>)\n at fulfilled (/usr/local/lib/node_modules/@graphprotocol/indexer-service/dist/allocations.js:5:58)\n at processTicksAndRejections (internal/process/task_queues.js:93:5)"}},"msg":"Failed to query indexer allocations, keeping existing"}
non_priority
failed to query indexer allocations keeping existing from service start indexer service level time pid hostname suntzu server name indexerservice indexer operator indexer operator component allocationmonitor msg refresh active allocations start indexer service level time pid hostname suntzu server name indexerservice indexer operator indexer operator component allocationmonitor allocations err type indexererror message failed to query indexer allocations stack indexererror failed to query indexer allocations n at object indexererror usr local lib node modules graphprotocol indexer service node modules graphprotocol indexer common dist errors js n at usr local lib node modules graphprotocol indexer service dist allocations js n at generator next n at fulfilled usr local lib node modules graphprotocol indexer service dist allocations js n at processticksandrejections internal process task queues js code explanation not found on chain stack error indexer not found on chain n at usr local lib node modules graphprotocol indexer service dist allocations js n at generator next n at fulfilled usr local lib node modules graphprotocol indexer service dist allocations js n at processticksandrejections internal process task queues js msg failed to query indexer allocations keeping existing
0
236,588
18,102,755,797
IssuesEvent
2021-09-22 15:46:00
BlueBrain/nexus
https://api.github.com/repos/BlueBrain/nexus
closed
All links from W3 are broken
bug documentation
W3 has changed their website and their links are now broken. They didn't bother having a proper HTTP redirect, so we'll have to go one to one trying to find out what's their new Url. For example: - https://www.w3.org/TR/eventsource/ -> https://html.spec.whatwg.org/multipage/server-sent-events.html
1.0
All links from W3 are broken - W3 has changed their website and their links are now broken. They didn't bother having a proper HTTP redirect, so we'll have to go one to one trying to find out what's their new Url. For example: - https://www.w3.org/TR/eventsource/ -> https://html.spec.whatwg.org/multipage/server-sent-events.html
non_priority
all links from are broken has changed their website and their links are now broken they didn t bother having a proper http redirect so we ll have to go one to one trying to find out what s their new url for example
0
284,646
24,612,392,171
IssuesEvent
2022-10-14 23:45:55
harvester/harvester
https://api.github.com/repos/harvester/harvester
closed
[BUG] Cannot edit storage class when adding volume on edit VM page
kind/bug area/ui severity/2 reproduce/always not-require/test-plan
**Describe the bug** <!-- A clear and concise description of what the bug is. --> Cannot edit storage class when adding volume on edit VM page **To Reproduce** Steps to reproduce the behavior: 1. Go to edit VM page 2. Go volume tab 3. Click the "Add Volume" button **Expected behavior** <!-- A clear and concise description of what you expected to happen. --> "Storage class" should be editable **Support bundle** <!-- You can generate a support bundle in the bottom of Harvester UI (https://docs.harvesterhci.io/v1.0/troubleshooting/harvester/#generate-a-support-bundle). It includes logs and configurations that help diagnose the issue. Tokens, passwords, and secrets are automatically removed from support bundles. If you feel it's not appropriate to share the bundle files publicly, please consider: - Wait for a developer to reach you and provide the bundle file by any secure methods. - Join our Slack community (https://rancher-users.slack.com/archives/C01GKHKAG0K) to provide the bundle. - Send the bundle to harvester-support-bundle@suse.com with the correct issue ID. --> **Environment** - Harvester ISO version: - Underlying Infrastructure (e.g. Baremetal with Dell PowerEdge R630): **Additional context** Add any other context about the problem here. ![image](https://user-images.githubusercontent.com/18737885/195532628-92345b26-ccae-4c86-aa1d-adac49448a20.png)
1.0
[BUG] Cannot edit storage class when adding volume on edit VM page - **Describe the bug** <!-- A clear and concise description of what the bug is. --> Cannot edit storage class when adding volume on edit VM page **To Reproduce** Steps to reproduce the behavior: 1. Go to edit VM page 2. Go volume tab 3. Click the "Add Volume" button **Expected behavior** <!-- A clear and concise description of what you expected to happen. --> "Storage class" should be editable **Support bundle** <!-- You can generate a support bundle in the bottom of Harvester UI (https://docs.harvesterhci.io/v1.0/troubleshooting/harvester/#generate-a-support-bundle). It includes logs and configurations that help diagnose the issue. Tokens, passwords, and secrets are automatically removed from support bundles. If you feel it's not appropriate to share the bundle files publicly, please consider: - Wait for a developer to reach you and provide the bundle file by any secure methods. - Join our Slack community (https://rancher-users.slack.com/archives/C01GKHKAG0K) to provide the bundle. - Send the bundle to harvester-support-bundle@suse.com with the correct issue ID. --> **Environment** - Harvester ISO version: - Underlying Infrastructure (e.g. Baremetal with Dell PowerEdge R630): **Additional context** Add any other context about the problem here. ![image](https://user-images.githubusercontent.com/18737885/195532628-92345b26-ccae-4c86-aa1d-adac49448a20.png)
non_priority
cannot edit storage class when adding volume on edit vm page describe the bug cannot edit storage class when adding volume on edit vm page to reproduce steps to reproduce the behavior go to edit vm page go volume tab click the add volume button expected behavior storage class should be editable support bundle you can generate a support bundle in the bottom of harvester ui it includes logs and configurations that help diagnose the issue tokens passwords and secrets are automatically removed from support bundles if you feel it s not appropriate to share the bundle files publicly please consider wait for a developer to reach you and provide the bundle file by any secure methods join our slack community to provide the bundle send the bundle to harvester support bundle suse com with the correct issue id environment harvester iso version underlying infrastructure e g baremetal with dell poweredge additional context add any other context about the problem here
0
92,835
11,714,794,893
IssuesEvent
2020-03-09 13:03:46
EightShapes/esds-library
https://api.github.com/repos/EightShapes/esds-library
closed
Select [Design Asset]
Component [Design Asset]
### Design Starting Point ![Screen Shot 2020-02-24 at 10 47 11 AM](https://user-images.githubusercontent.com/1207666/75167425-53ba9580-56f3-11ea-969e-9acbf58404ce.png) ### Must Have * Follows input very closely * Settings: white, light, dark, black * States: default, selected/panel open, hover, focus, error, placeholder text, with value Note: we favor native controls, so by default this should use the browser default panel. When we have a custom select list, it uses the List and Popover components. ### Nice to Have * Sizes: `medium` and `small`
1.0
Select [Design Asset] - ### Design Starting Point ![Screen Shot 2020-02-24 at 10 47 11 AM](https://user-images.githubusercontent.com/1207666/75167425-53ba9580-56f3-11ea-969e-9acbf58404ce.png) ### Must Have * Follows input very closely * Settings: white, light, dark, black * States: default, selected/panel open, hover, focus, error, placeholder text, with value Note: we favor native controls, so by default this should use the browser default panel. When we have a custom select list, it uses the List and Popover components. ### Nice to Have * Sizes: `medium` and `small`
non_priority
select design starting point must have follows input very closely settings white light dark black states default selected panel open hover focus error placeholder text with value note we favor native controls so by default this should use the browser default panel when we have a custom select list it uses the list and popover components nice to have sizes medium and small
0
14,958
10,236,160,715
IssuesEvent
2019-08-19 10:53:45
terraform-providers/terraform-provider-azurerm
https://api.github.com/repos/terraform-providers/terraform-provider-azurerm
closed
Terraform Azure vm custom_data bash script
question service/virtual-machine
I'm deploying an Azure VM and trying to run a script to partition a data disk and mount it upon provisioning. I've been using _"custom_data"_, but for some reason it's not working. When I login into the VM, the script is nowhere to be found and nothing is executed. Terraform apply succeeds without errors. Any clues ? or perhaps I have the wrong setup here. As per Terraform docs: custom_data - (Optional) Specifies custom data to supply to the machine. On Linux-based systems, this can be used as a cloud-init script. On other systems, this will be copied as a file on disk. Internally, Terraform will base64 encode this value before sending it to the API. The maximum length of the binary array is 65535 bytes. ``` resource "azurerm_virtual_machine" "middleware_vm" { name = "${var.middleware_vm}" location = "${var.location}" resource_group_name = "${azurerm_resource_group.middleware.name}" network_interface_ids = ["${azurerm_network_interface.middleware.id}"] vm_size = "Standard_DS4_v2" storage_os_disk { name = "centos_os_disk" caching = "ReadWrite" create_option = "FromImage" managed_disk_type = "Premium_LRS" } storage_data_disk { name = "managed_backup_disk" create_option = "Empty" caching = "ReadWrite" disk_size_gb = "256" managed_disk_type = "Premium_LRS" lun = 0 } storage_image_reference { publisher = "OpenLogic" offer = "CentOS" sku = "7.5" version = "latest" } os_profile { computer_name = "${var.middleware_vm}" admin_username = "middlewareadmin" custom_data = "${file("scripts/middleware_disk.sh")}" #custom_data = "${path.root}/scripts/middleware_disk.sh" } ```
1.0
Terraform Azure vm custom_data bash script - I'm deploying an Azure VM and trying to run a script to partition a data disk and mount it upon provisioning. I've been using _"custom_data"_, but for some reason it's not working. When I login into the VM, the script is nowhere to be found and nothing is executed. Terraform apply succeeds without errors. Any clues ? or perhaps I have the wrong setup here. As per Terraform docs: custom_data - (Optional) Specifies custom data to supply to the machine. On Linux-based systems, this can be used as a cloud-init script. On other systems, this will be copied as a file on disk. Internally, Terraform will base64 encode this value before sending it to the API. The maximum length of the binary array is 65535 bytes. ``` resource "azurerm_virtual_machine" "middleware_vm" { name = "${var.middleware_vm}" location = "${var.location}" resource_group_name = "${azurerm_resource_group.middleware.name}" network_interface_ids = ["${azurerm_network_interface.middleware.id}"] vm_size = "Standard_DS4_v2" storage_os_disk { name = "centos_os_disk" caching = "ReadWrite" create_option = "FromImage" managed_disk_type = "Premium_LRS" } storage_data_disk { name = "managed_backup_disk" create_option = "Empty" caching = "ReadWrite" disk_size_gb = "256" managed_disk_type = "Premium_LRS" lun = 0 } storage_image_reference { publisher = "OpenLogic" offer = "CentOS" sku = "7.5" version = "latest" } os_profile { computer_name = "${var.middleware_vm}" admin_username = "middlewareadmin" custom_data = "${file("scripts/middleware_disk.sh")}" #custom_data = "${path.root}/scripts/middleware_disk.sh" } ```
non_priority
terraform azure vm custom data bash script i m deploying an azure vm and trying to run a script to partition a data disk and mount it upon provisioning i ve been using custom data but for some reason it s not working when i login into the vm the script is nowhere to be found and nothing is executed terraform apply succeeds without errors any clues or perhaps i have the wrong setup here as per terraform docs custom data optional specifies custom data to supply to the machine on linux based systems this can be used as a cloud init script on other systems this will be copied as a file on disk internally terraform will encode this value before sending it to the api the maximum length of the binary array is bytes resource azurerm virtual machine middleware vm name var middleware vm location var location resource group name azurerm resource group middleware name network interface ids vm size standard storage os disk name centos os disk caching readwrite create option fromimage managed disk type premium lrs storage data disk name managed backup disk create option empty caching readwrite disk size gb managed disk type premium lrs lun storage image reference publisher openlogic offer centos sku version latest os profile computer name var middleware vm admin username middlewareadmin custom data file scripts middleware disk sh custom data path root scripts middleware disk sh
0
91,060
8,288,423,599
IssuesEvent
2018-09-19 11:58:33
humera987/HumTestData
https://api.github.com/repos/humera987/HumTestData
opened
tested : account_create_invalid_Microsoft_VSTS_Git
tested
Project : tested Job : UAT 1&2 Env : UAT 1 Region : FXLabs/US_WEST_1 Result : fail Status Code : 404 Headers : {X-Content-Type-Options=[nosniff], X-XSS-Protection=[1; mode=block], Cache-Control=[no-cache, no-store, max-age=0, must-revalidate], Pragma=[no-cache], Expires=[0], X-Frame-Options=[DENY], Content-Type=[application/json;charset=UTF-8], Transfer-Encoding=[chunked], Date=[Wed, 19 Sep 2018 11:58:30 GMT]} Endpoint : http://13.56.210.25/accounts Request : { "name" : "Test-ldP4TESKiYG1WD6RQGO43CFs", "accountType" : "Microsoft_VSTS_Git", "accessKey" : " ", "secretKey" : "testing secretKey" } Response : { "timestamp" : "2018-09-19T11:58:30.282+0000", "status" : 404, "error" : "Not Found", "message" : "No message available", "path" : "/accounts" } Logs : Assertion [@Response.errors == true] resolved-to [ == true] result [Failed]Assertion [@StatusCode == 200] resolved-to [404 == 200] result [Failed] --- FX Bot ---
1.0
tested : account_create_invalid_Microsoft_VSTS_Git - Project : tested Job : UAT 1&2 Env : UAT 1 Region : FXLabs/US_WEST_1 Result : fail Status Code : 404 Headers : {X-Content-Type-Options=[nosniff], X-XSS-Protection=[1; mode=block], Cache-Control=[no-cache, no-store, max-age=0, must-revalidate], Pragma=[no-cache], Expires=[0], X-Frame-Options=[DENY], Content-Type=[application/json;charset=UTF-8], Transfer-Encoding=[chunked], Date=[Wed, 19 Sep 2018 11:58:30 GMT]} Endpoint : http://13.56.210.25/accounts Request : { "name" : "Test-ldP4TESKiYG1WD6RQGO43CFs", "accountType" : "Microsoft_VSTS_Git", "accessKey" : " ", "secretKey" : "testing secretKey" } Response : { "timestamp" : "2018-09-19T11:58:30.282+0000", "status" : 404, "error" : "Not Found", "message" : "No message available", "path" : "/accounts" } Logs : Assertion [@Response.errors == true] resolved-to [ == true] result [Failed]Assertion [@StatusCode == 200] resolved-to [404 == 200] result [Failed] --- FX Bot ---
non_priority
tested account create invalid microsoft vsts git project tested job uat env uat region fxlabs us west result fail status code headers x content type options x xss protection cache control pragma expires x frame options content type transfer encoding date endpoint request name test accounttype microsoft vsts git accesskey secretkey testing secretkey response timestamp status error not found message no message available path accounts logs assertion resolved to result assertion resolved to result fx bot
0
11,450
4,227,128,798
IssuesEvent
2016-07-02 23:48:51
rubberduck-vba/Rubberduck
https://api.github.com/repos/rubberduck-vba/Rubberduck
closed
Return value of function 'iReturnSomething' is never used
bug code-inspections code-parsing status-norepro
Inspection results have numerous examples of false positives, for example I have a function called OffSet like this: ``` Function OffSet(someTable As Table) As Integer OffSet = someTable.Rows.Count -1 End Function Sub UsesOffSet() Dim iOffSet as Integer iOffSet = modT.OffSet(Selection.Range.Tables(1)) <-- Result Used, but not detected End Sub ``` Build: 2.0.1.33906
2.0
Return value of function 'iReturnSomething' is never used - Inspection results have numerous examples of false positives, for example I have a function called OffSet like this: ``` Function OffSet(someTable As Table) As Integer OffSet = someTable.Rows.Count -1 End Function Sub UsesOffSet() Dim iOffSet as Integer iOffSet = modT.OffSet(Selection.Range.Tables(1)) <-- Result Used, but not detected End Sub ``` Build: 2.0.1.33906
non_priority
return value of function ireturnsomething is never used inspection results have numerous examples of false positives for example i have a function called offset like this function offset sometable as table as integer offset sometable rows count end function sub usesoffset dim ioffset as integer ioffset modt offset selection range tables result used but not detected end sub build
0
39,918
12,727,980,753
IssuesEvent
2020-06-25 01:00:52
dotnet/aspnetcore
https://api.github.com/repos/dotnet/aspnetcore
closed
Google Authentication Not working.
:heavy_check_mark: Resolution: Answered Needs: Attention :wave: Status: Resolved area-security
<!-- More information on our issue management policies can be found here: https://aka.ms/aspnet/issue-policies Please keep in mind that the GitHub issue tracker is not intended as a general support forum, but for reporting **non-security** bugs and feature requests. If you believe you have an issue that affects the SECURITY of the platform, please do NOT create an issue and instead email your issue details to secure@microsoft.com. Your report may be eligible for our [bug bounty](https://www.microsoft.com/en-us/msrc/bounty-dot-net-core) but ONLY if it is reported through email. For other types of questions, consider using [StackOverflow](https://stackoverflow.com). --> I get a 404 page can't be found error after trying to authenticate with google in my .NET Core web app. I get this error after choosing the account I want to you to login. Error: No webpage was found for the web address: https://unifiedcamp.com/signin-google?state=CfDJ8FgDy3E-NgdMteo6azrxmI9HCCgEc3Zf0hcoqjg-8PtEj8bkME4BFV8Agh-xacojlFk4qupR0tQNriHi7_ycCUEZmWhVjiFsESdYyTFKsgq_zXTPmvHvxRDZM7gdnUj6eqSm5MrJiKGmnmiqbSCvZH90vMzjaITx99KttXlVDQFrbSS4woI-LHa-1wcobKTaq4mExvs2bULAre4mzyoois1R9E51vRrHOdo529hlIVObVs1zX_7e7HWE61ye4mLJ-sdzHz8N9qGzoSUVnF-uzYM&code=4%2F1AGa7kFi2spNbE90nS9DyawYAN4FVUfmcpEabn69VeNA2ZUUIxOgHXq-x_Ng8FdClfUDYFoOZ_uVfVVR4ZYsyBs&scope=email+profile+openid+https%3A%2F%2Fwww.googleapis.com%2Fauth%2Fuserinfo.email+https%3A%2F%2Fwww.googleapis.com%2Fauth%2Fuserinfo.profile&authuser=1&prompt=none# I have temporarily removed the google auth because it is in production and do not want users to experience the issue at hand. ### To Reproduce <!-- We ❤ code! Point us to a minimalistic repro project hosted in a GitHub repo. For a repro project, create a new ASP.NET Core project using the template of your your choice, apply the minimum required code to result in the issue you're observing. We will close this issue if: - the repro project you share with us is complex. We can't investigate custom projects, so don't point us to such, please. - if we will not be able to repro the behavior you're reporting --> ### Exceptions (if any) <!-- Include the exception you get when facing this issue --> ### Further technical details - ASP.NET Core version - Include the output of `dotnet --info` - The IDE (VS / VS Code/ VS4Mac) you're running on, and it's version
True
Google Authentication Not working. - <!-- More information on our issue management policies can be found here: https://aka.ms/aspnet/issue-policies Please keep in mind that the GitHub issue tracker is not intended as a general support forum, but for reporting **non-security** bugs and feature requests. If you believe you have an issue that affects the SECURITY of the platform, please do NOT create an issue and instead email your issue details to secure@microsoft.com. Your report may be eligible for our [bug bounty](https://www.microsoft.com/en-us/msrc/bounty-dot-net-core) but ONLY if it is reported through email. For other types of questions, consider using [StackOverflow](https://stackoverflow.com). --> I get a 404 page can't be found error after trying to authenticate with google in my .NET Core web app. I get this error after choosing the account I want to you to login. Error: No webpage was found for the web address: https://unifiedcamp.com/signin-google?state=CfDJ8FgDy3E-NgdMteo6azrxmI9HCCgEc3Zf0hcoqjg-8PtEj8bkME4BFV8Agh-xacojlFk4qupR0tQNriHi7_ycCUEZmWhVjiFsESdYyTFKsgq_zXTPmvHvxRDZM7gdnUj6eqSm5MrJiKGmnmiqbSCvZH90vMzjaITx99KttXlVDQFrbSS4woI-LHa-1wcobKTaq4mExvs2bULAre4mzyoois1R9E51vRrHOdo529hlIVObVs1zX_7e7HWE61ye4mLJ-sdzHz8N9qGzoSUVnF-uzYM&code=4%2F1AGa7kFi2spNbE90nS9DyawYAN4FVUfmcpEabn69VeNA2ZUUIxOgHXq-x_Ng8FdClfUDYFoOZ_uVfVVR4ZYsyBs&scope=email+profile+openid+https%3A%2F%2Fwww.googleapis.com%2Fauth%2Fuserinfo.email+https%3A%2F%2Fwww.googleapis.com%2Fauth%2Fuserinfo.profile&authuser=1&prompt=none# I have temporarily removed the google auth because it is in production and do not want users to experience the issue at hand. ### To Reproduce <!-- We ❤ code! Point us to a minimalistic repro project hosted in a GitHub repo. For a repro project, create a new ASP.NET Core project using the template of your your choice, apply the minimum required code to result in the issue you're observing. We will close this issue if: - the repro project you share with us is complex. We can't investigate custom projects, so don't point us to such, please. - if we will not be able to repro the behavior you're reporting --> ### Exceptions (if any) <!-- Include the exception you get when facing this issue --> ### Further technical details - ASP.NET Core version - Include the output of `dotnet --info` - The IDE (VS / VS Code/ VS4Mac) you're running on, and it's version
non_priority
google authentication not working more information on our issue management policies can be found here please keep in mind that the github issue tracker is not intended as a general support forum but for reporting non security bugs and feature requests if you believe you have an issue that affects the security of the platform please do not create an issue and instead email your issue details to secure microsoft com your report may be eligible for our but only if it is reported through email for other types of questions consider using i get a page can t be found error after trying to authenticate with google in my net core web app i get this error after choosing the account i want to you to login error no webpage was found for the web address i have temporarily removed the google auth because it is in production and do not want users to experience the issue at hand to reproduce we ❤ code point us to a minimalistic repro project hosted in a github repo for a repro project create a new asp net core project using the template of your your choice apply the minimum required code to result in the issue you re observing we will close this issue if the repro project you share with us is complex we can t investigate custom projects so don t point us to such please if we will not be able to repro the behavior you re reporting exceptions if any include the exception you get when facing this issue further technical details asp net core version include the output of dotnet info the ide vs vs code you re running on and it s version
0
316,120
23,616,034,984
IssuesEvent
2022-08-24 15:56:49
PacktPublishing/Data-Engineering-with-Alteryx
https://api.github.com/repos/PacktPublishing/Data-Engineering-with-Alteryx
closed
Can't open workflows.
documentation
Every time I try to open one of your workflows, I get an error saying, ">" is an unexpected token. The expected token is "=", Line 16, position 76. Any ideas? I have tried with multiple workflows and multiple versions of Alteryx.
1.0
Can't open workflows. - Every time I try to open one of your workflows, I get an error saying, ">" is an unexpected token. The expected token is "=", Line 16, position 76. Any ideas? I have tried with multiple workflows and multiple versions of Alteryx.
non_priority
can t open workflows every time i try to open one of your workflows i get an error saying is an unexpected token the expected token is line position any ideas i have tried with multiple workflows and multiple versions of alteryx
0
336,644
30,212,138,803
IssuesEvent
2023-07-05 13:26:47
gameserverapp/Platform
https://api.github.com/repos/gameserverapp/Platform
closed
Patreon - Upgrades to Higher Tiers Only Being Partially Completed
status: to be tested
So - situation is that I had a player increase their patronage to a higher tier, but the actual actions that are supposed to take place when the system recognizes the upgrade did not take place. When the system recognizes the user as this tier, this is what actions are supposed to execute. ![image](https://user-images.githubusercontent.com/44717221/225220764-291deabc-8c9d-4951-bd57-dd30e8e02bed.png) This is the character in question - unfortunately, while my list of subscribers is starting to grow, this is the only example I have, as they are the only one that has increased their Patronage during the month. Here is a list of their roles they have - they still have the Supporter and Hatchling roles, when those should have been removed when they had "stopped" those Patreon tiers. ![image](https://user-images.githubusercontent.com/44717221/225221860-765a3f62-aa63-4485-886c-e5f9fb7d6ee6.png) They still have the Supporter and Hatchling roles, when those should have been removed when they had "stopped" those Patreon tiers. ![image](https://user-images.githubusercontent.com/44717221/225222192-440f1bc7-6df3-4edb-87f4-be54c662e2e1.png) ![image](https://user-images.githubusercontent.com/44717221/225222374-79006708-7aca-436d-bea8-415c5c89df5f.png) And here is the list of their transactions. Note the increase in Patreon tiers: ![image](https://user-images.githubusercontent.com/44717221/225221954-1816b2cb-0ec0-46b2-8896-cd22942fcc95.png) In addition, this part of GSA recognizes that Daydreamer is at the Juvie Nycta tier. ![image](https://user-images.githubusercontent.com/44717221/225227008-93ee9769-d8bc-42ea-8e7c-633678a8e84e.png) I've also pushed for a few sync attempts through the dashboard, but it doesn't seem to update the aforementioned tasks/triggers.
1.0
Patreon - Upgrades to Higher Tiers Only Being Partially Completed - So - situation is that I had a player increase their patronage to a higher tier, but the actual actions that are supposed to take place when the system recognizes the upgrade did not take place. When the system recognizes the user as this tier, this is what actions are supposed to execute. ![image](https://user-images.githubusercontent.com/44717221/225220764-291deabc-8c9d-4951-bd57-dd30e8e02bed.png) This is the character in question - unfortunately, while my list of subscribers is starting to grow, this is the only example I have, as they are the only one that has increased their Patronage during the month. Here is a list of their roles they have - they still have the Supporter and Hatchling roles, when those should have been removed when they had "stopped" those Patreon tiers. ![image](https://user-images.githubusercontent.com/44717221/225221860-765a3f62-aa63-4485-886c-e5f9fb7d6ee6.png) They still have the Supporter and Hatchling roles, when those should have been removed when they had "stopped" those Patreon tiers. ![image](https://user-images.githubusercontent.com/44717221/225222192-440f1bc7-6df3-4edb-87f4-be54c662e2e1.png) ![image](https://user-images.githubusercontent.com/44717221/225222374-79006708-7aca-436d-bea8-415c5c89df5f.png) And here is the list of their transactions. Note the increase in Patreon tiers: ![image](https://user-images.githubusercontent.com/44717221/225221954-1816b2cb-0ec0-46b2-8896-cd22942fcc95.png) In addition, this part of GSA recognizes that Daydreamer is at the Juvie Nycta tier. ![image](https://user-images.githubusercontent.com/44717221/225227008-93ee9769-d8bc-42ea-8e7c-633678a8e84e.png) I've also pushed for a few sync attempts through the dashboard, but it doesn't seem to update the aforementioned tasks/triggers.
non_priority
patreon upgrades to higher tiers only being partially completed so situation is that i had a player increase their patronage to a higher tier but the actual actions that are supposed to take place when the system recognizes the upgrade did not take place when the system recognizes the user as this tier this is what actions are supposed to execute this is the character in question unfortunately while my list of subscribers is starting to grow this is the only example i have as they are the only one that has increased their patronage during the month here is a list of their roles they have they still have the supporter and hatchling roles when those should have been removed when they had stopped those patreon tiers they still have the supporter and hatchling roles when those should have been removed when they had stopped those patreon tiers and here is the list of their transactions note the increase in patreon tiers in addition this part of gsa recognizes that daydreamer is at the juvie nycta tier i ve also pushed for a few sync attempts through the dashboard but it doesn t seem to update the aforementioned tasks triggers
0
16,007
9,667,994,572
IssuesEvent
2019-05-21 14:20:01
SitecorePowerShell/Console
https://api.github.com/repos/SitecorePowerShell/Console
closed
Get-User Filter returns no users when no wildcard provided
area-commands area-security
No results: `Get-User -Filter "exact@email.com"` Some results: `Get-User -Filter "exact@*email.com"` Reported by immanuel79 Slack.
True
Get-User Filter returns no users when no wildcard provided - No results: `Get-User -Filter "exact@email.com"` Some results: `Get-User -Filter "exact@*email.com"` Reported by immanuel79 Slack.
non_priority
get user filter returns no users when no wildcard provided no results get user filter exact email com some results get user filter exact email com reported by slack
0
119,581
17,620,342,127
IssuesEvent
2021-08-18 14:38:20
jgeraigery/experian-java
https://api.github.com/repos/jgeraigery/experian-java
closed
CVE-2018-14719 (High) detected in jackson-databind-2.9.2.jar - autoclosed
security vulnerability
## CVE-2018-14719 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.9.2.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: experian-java/MavenWorkspace/bis-services-lib/bis-services-base/pom.xml</p> <p>Path to vulnerable library: canner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.2/jackson-databind-2.9.2.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.9.2.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/jgeraigery/experian-java/commit/9ade2a959068cca30ecfdbb254939af6f67affb1">9ade2a959068cca30ecfdbb254939af6f67affb1</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to execute arbitrary code by leveraging failure to block the blaze-ds-opt and blaze-ds-core classes from polymorphic deserialization. <p>Publish Date: 2019-01-02 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-14719>CVE-2018-14719</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2018-14719">https://nvd.nist.gov/vuln/detail/CVE-2018-14719</a></p> <p>Release Date: 2019-01-02</p> <p>Fix Resolution: 2.9.7</p> </p> </details> <p></p> *** :rescue_worker_helmet: Automatic Remediation is available for this issue <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.9.2","packageFilePaths":["/MavenWorkspace/bis-services-lib/bis-services-base/pom.xml"],"isTransitiveDependency":false,"dependencyTree":"com.fasterxml.jackson.core:jackson-databind:2.9.2","isMinimumFixVersionAvailable":true,"minimumFixVersion":"2.9.7"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2018-14719","vulnerabilityDetails":"FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to execute arbitrary code by leveraging failure to block the blaze-ds-opt and blaze-ds-core classes from polymorphic deserialization.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-14719","cvss3Severity":"high","cvss3Score":"9.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> -->
True
CVE-2018-14719 (High) detected in jackson-databind-2.9.2.jar - autoclosed - ## CVE-2018-14719 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.9.2.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: experian-java/MavenWorkspace/bis-services-lib/bis-services-base/pom.xml</p> <p>Path to vulnerable library: canner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.2/jackson-databind-2.9.2.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.9.2.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/jgeraigery/experian-java/commit/9ade2a959068cca30ecfdbb254939af6f67affb1">9ade2a959068cca30ecfdbb254939af6f67affb1</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to execute arbitrary code by leveraging failure to block the blaze-ds-opt and blaze-ds-core classes from polymorphic deserialization. <p>Publish Date: 2019-01-02 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-14719>CVE-2018-14719</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2018-14719">https://nvd.nist.gov/vuln/detail/CVE-2018-14719</a></p> <p>Release Date: 2019-01-02</p> <p>Fix Resolution: 2.9.7</p> </p> </details> <p></p> *** :rescue_worker_helmet: Automatic Remediation is available for this issue <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.9.2","packageFilePaths":["/MavenWorkspace/bis-services-lib/bis-services-base/pom.xml"],"isTransitiveDependency":false,"dependencyTree":"com.fasterxml.jackson.core:jackson-databind:2.9.2","isMinimumFixVersionAvailable":true,"minimumFixVersion":"2.9.7"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2018-14719","vulnerabilityDetails":"FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to execute arbitrary code by leveraging failure to block the blaze-ds-opt and blaze-ds-core classes from polymorphic deserialization.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-14719","cvss3Severity":"high","cvss3Score":"9.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> -->
non_priority
cve high detected in jackson databind jar autoclosed cve high severity vulnerability vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file experian java mavenworkspace bis services lib bis services base pom xml path to vulnerable library canner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details fasterxml jackson databind x before might allow remote attackers to execute arbitrary code by leveraging failure to block the blaze ds opt and blaze ds core classes from polymorphic deserialization publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation is available for this issue isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency false dependencytree com fasterxml jackson core jackson databind isminimumfixversionavailable true minimumfixversion basebranches vulnerabilityidentifier cve vulnerabilitydetails fasterxml jackson databind x before might allow remote attackers to execute arbitrary code by leveraging failure to block the blaze ds opt and blaze ds core classes from polymorphic deserialization vulnerabilityurl
0
34,808
9,475,790,808
IssuesEvent
2019-04-19 12:50:23
codingchili/chili-core
https://api.github.com/repos/codingchili/chili-core
closed
CQEngine, ElasticSearch, MongoDB and Hazelcast as optional dependencies.
build
- [x] move :storage:elastic into :core - [x] document how to exclude optional dependencies - [x] document which dependencies that are optional - [x] make sure to not reference optional dependencies from core features.
1.0
CQEngine, ElasticSearch, MongoDB and Hazelcast as optional dependencies. - - [x] move :storage:elastic into :core - [x] document how to exclude optional dependencies - [x] document which dependencies that are optional - [x] make sure to not reference optional dependencies from core features.
non_priority
cqengine elasticsearch mongodb and hazelcast as optional dependencies move storage elastic into core document how to exclude optional dependencies document which dependencies that are optional make sure to not reference optional dependencies from core features
0