Unnamed: 0
int64
0
832k
id
float64
2.49B
32.1B
type
stringclasses
1 value
created_at
stringlengths
19
19
repo
stringlengths
7
112
repo_url
stringlengths
36
141
action
stringclasses
3 values
title
stringlengths
2
665
labels
stringlengths
4
554
body
stringlengths
3
235k
index
stringclasses
6 values
text_combine
stringlengths
96
235k
label
stringclasses
2 values
text
stringlengths
96
196k
binary_label
int64
0
1
167,344
20,726,024,729
IssuesEvent
2022-03-14 02:03:40
peterwkc85/Java_Jackson
https://api.github.com/repos/peterwkc85/Java_Jackson
opened
CVE-2019-14439 (High) detected in jackson-databind-2.2.3.jar
security vulnerability
## CVE-2019-14439 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.2.3.jar</b></p></summary> <p>A high-performance JSON processor (parser, generator).</p> <p>Path to dependency file: /json-patch-master/json-patch-master/build.gradle</p> <p>Path to vulnerable library: /json-patch-master/json-patch-master/build.gradle</p> <p> Dependency Hierarchy: - jackson-coreutils-1.6.jar (Root Library) - :x: **jackson-databind-2.2.3.jar** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x before 2.9.9.2. This occurs when Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the logback jar in the classpath. <p>Publish Date: 2019-07-30 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-14439>CVE-2019-14439</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14439">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14439</a></p> <p>Release Date: 2020-08-24</p> <p>Fix Resolution: 2.9.9.2</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2019-14439 (High) detected in jackson-databind-2.2.3.jar - ## CVE-2019-14439 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.2.3.jar</b></p></summary> <p>A high-performance JSON processor (parser, generator).</p> <p>Path to dependency file: /json-patch-master/json-patch-master/build.gradle</p> <p>Path to vulnerable library: /json-patch-master/json-patch-master/build.gradle</p> <p> Dependency Hierarchy: - jackson-coreutils-1.6.jar (Root Library) - :x: **jackson-databind-2.2.3.jar** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x before 2.9.9.2. This occurs when Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the logback jar in the classpath. <p>Publish Date: 2019-07-30 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-14439>CVE-2019-14439</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14439">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14439</a></p> <p>Release Date: 2020-08-24</p> <p>Fix Resolution: 2.9.9.2</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_infrastructure
cve high detected in jackson databind jar cve high severity vulnerability vulnerable library jackson databind jar a high performance json processor parser generator path to dependency file json patch master json patch master build gradle path to vulnerable library json patch master json patch master build gradle dependency hierarchy jackson coreutils jar root library x jackson databind jar vulnerable library vulnerability details a polymorphic typing issue was discovered in fasterxml jackson databind x before this occurs when default typing is enabled either globally or for a specific property for an externally exposed json endpoint and the service has the logback jar in the classpath publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
0
23,665
16,507,591,743
IssuesEvent
2021-05-25 21:27:48
APSIMInitiative/ApsimX
https://api.github.com/repos/APSIMInitiative/ApsimX
closed
Experiment UI is slow to load with large number of simulations
bug interface/infrastructure
Clicking on an experiment node causes the UI to freeze until all simulations in the experiment are generated/loaded (~30 seconds for me in an experiment with ~40k sims).
1.0
Experiment UI is slow to load with large number of simulations - Clicking on an experiment node causes the UI to freeze until all simulations in the experiment are generated/loaded (~30 seconds for me in an experiment with ~40k sims).
infrastructure
experiment ui is slow to load with large number of simulations clicking on an experiment node causes the ui to freeze until all simulations in the experiment are generated loaded seconds for me in an experiment with sims
1
14,880
11,212,181,594
IssuesEvent
2020-01-06 16:59:34
dotnet/runtime
https://api.github.com/repos/dotnet/runtime
closed
dev.azure "Tests" view is only available for signed users.
area-Infrastructure bug
Open https://dev.azure.com/dnceng/public/_build/results?buildId=469032&view=results when you are signed with your Microsoft account, you will see: ![image](https://user-images.githubusercontent.com/22642771/71679902-883a5280-2d3d-11ea-87ca-59c51f3f3a16.png) but if you are not signed you won't see "Tests": ![image](https://user-images.githubusercontent.com/22642771/71679917-96886e80-2d3d-11ea-87f8-ff7008eae8cd.png) it is not a desired behavior, because we want external contributors to be able to analyze failures in their PRs. In the coreclr repo is was working fine, open https://dev.azure.com/dnceng/public/_build/results?buildId=425677&view=ms.vss-test-web.build-test-results-tab without signing in and you will see "Tests" there.
1.0
dev.azure "Tests" view is only available for signed users. - Open https://dev.azure.com/dnceng/public/_build/results?buildId=469032&view=results when you are signed with your Microsoft account, you will see: ![image](https://user-images.githubusercontent.com/22642771/71679902-883a5280-2d3d-11ea-87ca-59c51f3f3a16.png) but if you are not signed you won't see "Tests": ![image](https://user-images.githubusercontent.com/22642771/71679917-96886e80-2d3d-11ea-87f8-ff7008eae8cd.png) it is not a desired behavior, because we want external contributors to be able to analyze failures in their PRs. In the coreclr repo is was working fine, open https://dev.azure.com/dnceng/public/_build/results?buildId=425677&view=ms.vss-test-web.build-test-results-tab without signing in and you will see "Tests" there.
infrastructure
dev azure tests view is only available for signed users open when you are signed with your microsoft account you will see but if you are not signed you won t see tests it is not a desired behavior because we want external contributors to be able to analyze failures in their prs in the coreclr repo is was working fine open without signing in and you will see tests there
1
100,768
21,511,903,167
IssuesEvent
2022-04-28 05:58:47
samq-ghdemo/Java-Demo
https://api.github.com/repos/samq-ghdemo/Java-Demo
opened
Code Security Report: 16 high severity findings, 109 total findings
code security findings
# Code Security Report **Latest Scan:** 2022-04-28 05:58am **Total Findings:** 109 **Tested Project Files:** 102 **Detected Programming Languages:** 1 **Scan URL:** https://saas.whitesourcesoftware.com/sast/#/scans/100eea56-94d3-4e1e-acba-ce178c0e189d/details <!-- SAST-MANUAL-SCAN-START --> - [ ] Check this box to manually trigger a scan <!-- SAST-MANUAL-SCAN-END --> ## Language: Java | Severity | CWE | Vulnerability Type | Count | |-|-|-|-| |<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High|[CWE-89](https://cwe.mitre.org/data/definitions/89.html)|SQL Injection|3| |<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High|[CWE-22](https://cwe.mitre.org/data/definitions/22.html)|Path/Directory Traversal|10| |<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High|[CWE-94](https://cwe.mitre.org/data/definitions/84.html)|Code Injection|1| |<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High|[CWE-611](https://cwe.mitre.org/data/definitions/611.html)|XML External Entity (XXE) Injection|1| |<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High|[CWE-918](https://cwe.mitre.org/data/definitions/918.html)|Server Side Request Forgery|1| |<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium|[CWE-79](https://cwe.mitre.org/data/definitions/79.html)|Cross-Site Scripting|28| |<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium|[CWE-73](https://cwe.mitre.org/data/definitions/73.html)|File Manipulation|9| |<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium|[CWE-601](https://cwe.mitre.org/data/definitions/601.html)|Unvalidated/Open Redirect|17| |<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium|[CWE-113](https://cwe.mitre.org/data/definitions/113.html)|HTTP Header Injection|1| |<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium|[CWE-20](https://cwe.mitre.org/data/definitions/20.html)|Session Poisoning|5| |<img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> Low|[CWE-117](https://cwe.mitre.org/data/definitions/117.html)|Log Forging|6| |<img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> Low|[CWE-501](https://cwe.mitre.org/data/definitions/501.html)|Trust Boundary Violation|5| |<img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> Low|[CWE-244](https://cwe.mitre.org/data/definitions/244.html)|Heap Inspection|5| |<img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> Low|[CWE-209](https://cwe.mitre.org/data/definitions/209.html)|Error Messages Information Exposure|15| |<img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> Low|[CWE-338](https://cwe.mitre.org/data/definitions/338.html)|Weak Pseudo-Random|2| ### Details > Partial details (48 findings) are displayed below due to a content size limitation in GitHub. To view information on the remaining findings, navigate to the [WhiteSource SAST Application](https://saas.whitesourcesoftware.com/sast/#/scans/100eea56-94d3-4e1e-acba-ce178c0e189d/details). <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20>SQL Injection (CWE-89) : 3</summary> #### Findings <details> <summary>src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java:69</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L64-L69 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L28 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L45 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L60 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L69 </details> </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java:69</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L64-L69 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L28 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L39 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L45 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L60 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L69 </details> </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java:69</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L64-L69 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L28 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L45 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L60 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L69 </details> </details> </details> <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20>Path/Directory Traversal (CWE-22) : 10</summary> #### Findings <details> <summary>src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedSizeUploadServlet.java:127</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedSizeUploadServlet.java#L122-L127 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedSizeUploadServlet.java#L70 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/utils/MultiPartFileUtils.java#L57 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/utils/MultiPartFileUtils.java#L59 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedSizeUploadServlet.java#L71 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedSizeUploadServlet.java#L84 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedSizeUploadServlet.java#L111 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedSizeUploadServlet.java#L127 </details> </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/vulnerabilities/MailHeaderInjectionServlet.java:133</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/MailHeaderInjectionServlet.java#L128-L133 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/MailHeaderInjectionServlet.java#L125 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/utils/MultiPartFileUtils.java#L57 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/utils/MultiPartFileUtils.java#L59 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/MailHeaderInjectionServlet.java#L127 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/MailHeaderInjectionServlet.java#L133 </details> </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedExtensionUploadServlet.java:110</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedExtensionUploadServlet.java#L105-L110 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedExtensionUploadServlet.java#L69 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/utils/MultiPartFileUtils.java#L57 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/utils/MultiPartFileUtils.java#L59 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedExtensionUploadServlet.java#L76 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedExtensionUploadServlet.java#L84 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedExtensionUploadServlet.java#L106 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedExtensionUploadServlet.java#L110 </details> </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedExtensionUploadServlet.java:84</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedExtensionUploadServlet.java#L79-L84 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedExtensionUploadServlet.java#L69 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/utils/MultiPartFileUtils.java#L57 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/utils/MultiPartFileUtils.java#L59 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedExtensionUploadServlet.java#L76 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedExtensionUploadServlet.java#L84 </details> </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedSizeUploadServlet.java:114</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedSizeUploadServlet.java#L109-L114 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedSizeUploadServlet.java#L70 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/utils/MultiPartFileUtils.java#L57 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/utils/MultiPartFileUtils.java#L59 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedSizeUploadServlet.java#L71 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedSizeUploadServlet.java#L84 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedSizeUploadServlet.java#L111 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedSizeUploadServlet.java#L114 </details> </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/vulnerabilities/NullByteInjectionServlet.java:46</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/NullByteInjectionServlet.java#L41-L46 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/NullByteInjectionServlet.java#L35 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/NullByteInjectionServlet.java#L40 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/NullByteInjectionServlet.java#L46 </details> </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedExtensionUploadServlet.java:135</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedExtensionUploadServlet.java#L130-L135 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedExtensionUploadServlet.java#L69 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/utils/MultiPartFileUtils.java#L57 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/utils/MultiPartFileUtils.java#L59 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedExtensionUploadServlet.java#L76 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedExtensionUploadServlet.java#L84 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedExtensionUploadServlet.java#L106 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedExtensionUploadServlet.java#L135 </details> </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/vulnerabilities/NullByteInjectionServlet.java:53</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/NullByteInjectionServlet.java#L48-L53 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/NullByteInjectionServlet.java#L35 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/NullByteInjectionServlet.java#L40 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/NullByteInjectionServlet.java#L46 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/NullByteInjectionServlet.java#L53 </details> </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/vulnerabilities/XEEandXXEServlet.java:196</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/XEEandXXEServlet.java#L191-L196 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/XEEandXXEServlet.java#L141 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/utils/MultiPartFileUtils.java#L57 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/utils/MultiPartFileUtils.java#L59 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/XEEandXXEServlet.java#L148 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/XEEandXXEServlet.java#L161 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/XEEandXXEServlet.java#L192 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/XEEandXXEServlet.java#L196 </details> </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedSizeUploadServlet.java:84</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedSizeUploadServlet.java#L79-L84 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedSizeUploadServlet.java#L70 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/utils/MultiPartFileUtils.java#L57 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/utils/MultiPartFileUtils.java#L59 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedSizeUploadServlet.java#L71 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedSizeUploadServlet.java#L84 </details> </details> </details> <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20>Code Injection (CWE-94) : 1</summary> #### Findings <details> <summary>src/main/java/org/t246osslab/easybuggy/vulnerabilities/CodeInjectionServlet.java:65</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/CodeInjectionServlet.java#L60-L65 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/CodeInjectionServlet.java#L25 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/CodeInjectionServlet.java#L44 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/CodeInjectionServlet.java#L45 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/CodeInjectionServlet.java#L46 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/CodeInjectionServlet.java#L47 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/CodeInjectionServlet.java#L61 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/CodeInjectionServlet.java#L65 </details> </details> </details> <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20>XML External Entity (XXE) Injection (CWE-611) : 1</summary> #### Findings <details> <summary>src/main/java/org/t246osslab/easybuggy/vulnerabilities/XEEandXXEServlet.java:206</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/XEEandXXEServlet.java#L201-L206 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/XEEandXXEServlet.java#L141 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/utils/MultiPartFileUtils.java#L57 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/utils/MultiPartFileUtils.java#L59 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/XEEandXXEServlet.java#L148 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/XEEandXXEServlet.java#L161 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/XEEandXXEServlet.java#L192 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/XEEandXXEServlet.java#L196 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/XEEandXXEServlet.java#L206 </details> </details> </details> <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20>Server Side Request Forgery (CWE-918) : 1</summary> #### Findings <details> <summary>src/main/java/org/t246osslab/easybuggy/troubles/NetworkSocketLeakServlet.java:31</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/troubles/NetworkSocketLeakServlet.java#L26-L31 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/troubles/NetworkSocketLeakServlet.java#L27 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/troubles/NetworkSocketLeakServlet.java#L31 </details> </details> </details> <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20>Cross-Site Scripting (CWE-79) : 28</summary> #### Findings <details> <summary>src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java:82</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L77-L82 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L34 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L82 </details> </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java:82</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L77-L82 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L34 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L82 </details> </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java:94</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L89-L94 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L28 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L39 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L69 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L73 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L76 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L87 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L69 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L73 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L76 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L87 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L69 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L73 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L76 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L87 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L45 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L53 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L31 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L94 </details> </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java:94</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L89-L94 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedExtensionUploadServlet.java#L69 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/utils/MultiPartFileUtils.java#L57 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/utils/MultiPartFileUtils.java#L59 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedExtensionUploadServlet.java#L76 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedExtensionUploadServlet.java#L91 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedExtensionUploadServlet.java#L98 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L31 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L94 </details> </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java:94</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L89-L94 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedSizeUploadServlet.java#L70 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/utils/MultiPartFileUtils.java#L57 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/utils/MultiPartFileUtils.java#L59 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedSizeUploadServlet.java#L71 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedSizeUploadServlet.java#L91 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedSizeUploadServlet.java#L98 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L31 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L94 </details> </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java:94</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L89-L94 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/DefaultLoginServlet.java#L40 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/DefaultLoginServlet.java#L80 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L31 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L94 </details> </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java:94</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L89-L94 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L69 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L73 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L76 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L45 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L53 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L31 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L94 </details> </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java:94</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L89-L94 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/troubles/DBConnectionLeakServlet.java#L68 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/troubles/DBConnectionLeakServlet.java#L71 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/troubles/DBConnectionLeakServlet.java#L75 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/troubles/DBConnectionLeakServlet.java#L35 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/troubles/DBConnectionLeakServlet.java#L47 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L31 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L94 </details> </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java:94</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L89-L94 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/troubles/NetworkSocketLeakServlet.java#L27 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/troubles/NetworkSocketLeakServlet.java#L42 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/troubles/NetworkSocketLeakServlet.java#L54 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L31 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L94 </details> </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java:94</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L89-L94 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/troubles/RoundOffErrorServlet.java#L22 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/troubles/RoundOffErrorServlet.java#L30 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/troubles/RoundOffErrorServlet.java#L43 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L31 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L94 </details> </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java:82</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L77-L82 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L34 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L82 </details> </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/vulnerabilities/NullByteInjectionServlet.java:63</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/NullByteInjectionServlet.java#L58-L63 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/NullByteInjectionServlet.java#L62 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/NullByteInjectionServlet.java#L63 </details> </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java:94</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L89-L94 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/troubles/IntegerOverflowServlet.java#L24 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/troubles/IntegerOverflowServlet.java#L45 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/troubles/IntegerOverflowServlet.java#L68 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L31 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L94 </details> </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java:82</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L77-L82 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L34 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L82 </details> </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java:82</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L77-L82 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L34 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L82 </details> </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java:94</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L89-L94 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/OGNLExpressionInjectionServlet.java#L31 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/OGNLExpressionInjectionServlet.java#L34 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/OGNLExpressionInjectionServlet.java#L35 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/OGNLExpressionInjectionServlet.java#L59 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/OGNLExpressionInjectionServlet.java#L70 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L31 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L94 </details> </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java:94</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L89-L94 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/troubles/LossOfTrailingDigitsServlet.java#L22 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/troubles/LossOfTrailingDigitsServlet.java#L34 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/troubles/LossOfTrailingDigitsServlet.java#L47 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L31 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L94 </details> </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java:94</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L89-L94 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/troubles/EndlessWaitingServlet.java#L128 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/troubles/EndlessWaitingServlet.java#L132 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/troubles/EndlessWaitingServlet.java#L61 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/troubles/EndlessWaitingServlet.java#L70 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L31 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L94 </details> </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java:94</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L89-L94 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/troubles/EndlessWaitingServlet.java#L128 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/troubles/EndlessWaitingServlet.java#L132 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/troubles/EndlessWaitingServlet.java#L60 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/troubles/EndlessWaitingServlet.java#L70 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L31 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L94 </details> </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java:94</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L89-L94 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/XSSServlet.java#L22 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/XSSServlet.java#L38 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/XSSServlet.java#L39 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/XSSServlet.java#L48 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L31 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L94 </details> </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java:94</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L89-L94 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/performance/CreatingUnnecessaryObjectsServlet.java#L21 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/performance/CreatingUnnecessaryObjectsServlet.java#L28 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/performance/CreatingUnnecessaryObjectsServlet.java#L68 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L31 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L94 </details> </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java:82</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L77-L82 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L34 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L82 </details> </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java:94</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L89-L94 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/troubles/TruncationErrorServlet.java#L21 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/troubles/TruncationErrorServlet.java#L30 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/troubles/TruncationErrorServlet.java#L44 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L31 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L94 </details> </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java:82</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L77-L82 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L34 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L82 </details> </details> <details> <summary>src/main/webapp/uid/serverinfo.jsp:24</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/webapp/uid/serverinfo.jsp#L19-L24 </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java:94</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L89-L94 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/troubles/EndlessWaitingServlet.java#L60 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/troubles/EndlessWaitingServlet.java#L128 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/troubles/EndlessWaitingServlet.java#L132 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/troubles/EndlessWaitingServlet.java#L138 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/troubles/EndlessWaitingServlet.java#L60 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/troubles/EndlessWaitingServlet.java#L70 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L31 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L94 </details> </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java:82</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L77-L82 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L34 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L82 </details> </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java:94</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L89-L94 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L28 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L69 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L73 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L76 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L87 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L69 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L73 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L76 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L87 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L69 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L73 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L76 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L87 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L45 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L53 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L31 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L94 </details> </details> </details> <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20>File Manipulation (CWE-73) : 4</summary> #### Findings <details> <summary>src/main/java/org/t246osslab/easybuggy/core/utils/MultiPartFileUtils.java:38</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/utils/MultiPartFileUtils.java#L33-L38 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/utils/MultiPartFileUtils.java#L37 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/utils/MultiPartFileUtils.java#L38 </details> </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/core/utils/MultiPartFileUtils.java:33</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/utils/MultiPartFileUtils.java#L28-L33 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedExtensionUploadServlet.java#L69 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/utils/MultiPartFileUtils.java#L57 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/utils/MultiPartFileUtils.java#L59 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedExtensionUploadServlet.java#L76 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedExtensionUploadServlet.java#L81 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/utils/MultiPartFileUtils.java#L28 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/utils/MultiPartFileUtils.java#L33 </details> </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/core/utils/MultiPartFileUtils.java:38</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/utils/MultiPartFileUtils.java#L33-L38 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/utils/MultiPartFileUtils.java#L37 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/utils/MultiPartFileUtils.java#L38 </details> </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/vulnerabilities/MailHeaderInjectionServlet.java:142</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/MailHeaderInjectionServlet.java#L137-L142 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/MailHeaderInjectionServlet.java#L141 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/MailHeaderInjectionServlet.java#L142 </details> </details> </details>
1.0
Code Security Report: 16 high severity findings, 109 total findings - # Code Security Report **Latest Scan:** 2022-04-28 05:58am **Total Findings:** 109 **Tested Project Files:** 102 **Detected Programming Languages:** 1 **Scan URL:** https://saas.whitesourcesoftware.com/sast/#/scans/100eea56-94d3-4e1e-acba-ce178c0e189d/details <!-- SAST-MANUAL-SCAN-START --> - [ ] Check this box to manually trigger a scan <!-- SAST-MANUAL-SCAN-END --> ## Language: Java | Severity | CWE | Vulnerability Type | Count | |-|-|-|-| |<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High|[CWE-89](https://cwe.mitre.org/data/definitions/89.html)|SQL Injection|3| |<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High|[CWE-22](https://cwe.mitre.org/data/definitions/22.html)|Path/Directory Traversal|10| |<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High|[CWE-94](https://cwe.mitre.org/data/definitions/84.html)|Code Injection|1| |<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High|[CWE-611](https://cwe.mitre.org/data/definitions/611.html)|XML External Entity (XXE) Injection|1| |<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High|[CWE-918](https://cwe.mitre.org/data/definitions/918.html)|Server Side Request Forgery|1| |<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium|[CWE-79](https://cwe.mitre.org/data/definitions/79.html)|Cross-Site Scripting|28| |<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium|[CWE-73](https://cwe.mitre.org/data/definitions/73.html)|File Manipulation|9| |<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium|[CWE-601](https://cwe.mitre.org/data/definitions/601.html)|Unvalidated/Open Redirect|17| |<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium|[CWE-113](https://cwe.mitre.org/data/definitions/113.html)|HTTP Header Injection|1| |<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium|[CWE-20](https://cwe.mitre.org/data/definitions/20.html)|Session Poisoning|5| |<img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> Low|[CWE-117](https://cwe.mitre.org/data/definitions/117.html)|Log Forging|6| |<img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> Low|[CWE-501](https://cwe.mitre.org/data/definitions/501.html)|Trust Boundary Violation|5| |<img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> Low|[CWE-244](https://cwe.mitre.org/data/definitions/244.html)|Heap Inspection|5| |<img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> Low|[CWE-209](https://cwe.mitre.org/data/definitions/209.html)|Error Messages Information Exposure|15| |<img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> Low|[CWE-338](https://cwe.mitre.org/data/definitions/338.html)|Weak Pseudo-Random|2| ### Details > Partial details (48 findings) are displayed below due to a content size limitation in GitHub. To view information on the remaining findings, navigate to the [WhiteSource SAST Application](https://saas.whitesourcesoftware.com/sast/#/scans/100eea56-94d3-4e1e-acba-ce178c0e189d/details). <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20>SQL Injection (CWE-89) : 3</summary> #### Findings <details> <summary>src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java:69</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L64-L69 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L28 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L45 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L60 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L69 </details> </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java:69</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L64-L69 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L28 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L39 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L45 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L60 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L69 </details> </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java:69</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L64-L69 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L28 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L45 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L60 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L69 </details> </details> </details> <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20>Path/Directory Traversal (CWE-22) : 10</summary> #### Findings <details> <summary>src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedSizeUploadServlet.java:127</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedSizeUploadServlet.java#L122-L127 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedSizeUploadServlet.java#L70 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/utils/MultiPartFileUtils.java#L57 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/utils/MultiPartFileUtils.java#L59 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedSizeUploadServlet.java#L71 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedSizeUploadServlet.java#L84 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedSizeUploadServlet.java#L111 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedSizeUploadServlet.java#L127 </details> </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/vulnerabilities/MailHeaderInjectionServlet.java:133</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/MailHeaderInjectionServlet.java#L128-L133 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/MailHeaderInjectionServlet.java#L125 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/utils/MultiPartFileUtils.java#L57 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/utils/MultiPartFileUtils.java#L59 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/MailHeaderInjectionServlet.java#L127 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/MailHeaderInjectionServlet.java#L133 </details> </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedExtensionUploadServlet.java:110</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedExtensionUploadServlet.java#L105-L110 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedExtensionUploadServlet.java#L69 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/utils/MultiPartFileUtils.java#L57 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/utils/MultiPartFileUtils.java#L59 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedExtensionUploadServlet.java#L76 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedExtensionUploadServlet.java#L84 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedExtensionUploadServlet.java#L106 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedExtensionUploadServlet.java#L110 </details> </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedExtensionUploadServlet.java:84</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedExtensionUploadServlet.java#L79-L84 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedExtensionUploadServlet.java#L69 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/utils/MultiPartFileUtils.java#L57 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/utils/MultiPartFileUtils.java#L59 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedExtensionUploadServlet.java#L76 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedExtensionUploadServlet.java#L84 </details> </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedSizeUploadServlet.java:114</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedSizeUploadServlet.java#L109-L114 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedSizeUploadServlet.java#L70 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/utils/MultiPartFileUtils.java#L57 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/utils/MultiPartFileUtils.java#L59 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedSizeUploadServlet.java#L71 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedSizeUploadServlet.java#L84 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedSizeUploadServlet.java#L111 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedSizeUploadServlet.java#L114 </details> </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/vulnerabilities/NullByteInjectionServlet.java:46</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/NullByteInjectionServlet.java#L41-L46 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/NullByteInjectionServlet.java#L35 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/NullByteInjectionServlet.java#L40 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/NullByteInjectionServlet.java#L46 </details> </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedExtensionUploadServlet.java:135</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedExtensionUploadServlet.java#L130-L135 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedExtensionUploadServlet.java#L69 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/utils/MultiPartFileUtils.java#L57 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/utils/MultiPartFileUtils.java#L59 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedExtensionUploadServlet.java#L76 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedExtensionUploadServlet.java#L84 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedExtensionUploadServlet.java#L106 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedExtensionUploadServlet.java#L135 </details> </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/vulnerabilities/NullByteInjectionServlet.java:53</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/NullByteInjectionServlet.java#L48-L53 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/NullByteInjectionServlet.java#L35 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/NullByteInjectionServlet.java#L40 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/NullByteInjectionServlet.java#L46 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/NullByteInjectionServlet.java#L53 </details> </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/vulnerabilities/XEEandXXEServlet.java:196</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/XEEandXXEServlet.java#L191-L196 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/XEEandXXEServlet.java#L141 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/utils/MultiPartFileUtils.java#L57 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/utils/MultiPartFileUtils.java#L59 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/XEEandXXEServlet.java#L148 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/XEEandXXEServlet.java#L161 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/XEEandXXEServlet.java#L192 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/XEEandXXEServlet.java#L196 </details> </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedSizeUploadServlet.java:84</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedSizeUploadServlet.java#L79-L84 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedSizeUploadServlet.java#L70 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/utils/MultiPartFileUtils.java#L57 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/utils/MultiPartFileUtils.java#L59 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedSizeUploadServlet.java#L71 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedSizeUploadServlet.java#L84 </details> </details> </details> <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20>Code Injection (CWE-94) : 1</summary> #### Findings <details> <summary>src/main/java/org/t246osslab/easybuggy/vulnerabilities/CodeInjectionServlet.java:65</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/CodeInjectionServlet.java#L60-L65 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/CodeInjectionServlet.java#L25 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/CodeInjectionServlet.java#L44 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/CodeInjectionServlet.java#L45 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/CodeInjectionServlet.java#L46 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/CodeInjectionServlet.java#L47 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/CodeInjectionServlet.java#L61 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/CodeInjectionServlet.java#L65 </details> </details> </details> <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20>XML External Entity (XXE) Injection (CWE-611) : 1</summary> #### Findings <details> <summary>src/main/java/org/t246osslab/easybuggy/vulnerabilities/XEEandXXEServlet.java:206</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/XEEandXXEServlet.java#L201-L206 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/XEEandXXEServlet.java#L141 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/utils/MultiPartFileUtils.java#L57 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/utils/MultiPartFileUtils.java#L59 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/XEEandXXEServlet.java#L148 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/XEEandXXEServlet.java#L161 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/XEEandXXEServlet.java#L192 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/XEEandXXEServlet.java#L196 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/XEEandXXEServlet.java#L206 </details> </details> </details> <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20>Server Side Request Forgery (CWE-918) : 1</summary> #### Findings <details> <summary>src/main/java/org/t246osslab/easybuggy/troubles/NetworkSocketLeakServlet.java:31</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/troubles/NetworkSocketLeakServlet.java#L26-L31 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/troubles/NetworkSocketLeakServlet.java#L27 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/troubles/NetworkSocketLeakServlet.java#L31 </details> </details> </details> <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20>Cross-Site Scripting (CWE-79) : 28</summary> #### Findings <details> <summary>src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java:82</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L77-L82 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L34 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L82 </details> </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java:82</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L77-L82 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L34 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L82 </details> </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java:94</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L89-L94 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L28 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L39 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L69 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L73 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L76 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L87 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L69 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L73 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L76 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L87 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L69 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L73 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L76 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L87 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L45 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L53 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L31 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L94 </details> </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java:94</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L89-L94 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedExtensionUploadServlet.java#L69 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/utils/MultiPartFileUtils.java#L57 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/utils/MultiPartFileUtils.java#L59 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedExtensionUploadServlet.java#L76 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedExtensionUploadServlet.java#L91 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedExtensionUploadServlet.java#L98 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L31 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L94 </details> </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java:94</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L89-L94 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedSizeUploadServlet.java#L70 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/utils/MultiPartFileUtils.java#L57 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/utils/MultiPartFileUtils.java#L59 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedSizeUploadServlet.java#L71 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedSizeUploadServlet.java#L91 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedSizeUploadServlet.java#L98 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L31 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L94 </details> </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java:94</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L89-L94 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/DefaultLoginServlet.java#L40 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/DefaultLoginServlet.java#L80 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L31 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L94 </details> </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java:94</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L89-L94 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L69 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L73 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L76 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L45 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L53 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L31 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L94 </details> </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java:94</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L89-L94 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/troubles/DBConnectionLeakServlet.java#L68 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/troubles/DBConnectionLeakServlet.java#L71 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/troubles/DBConnectionLeakServlet.java#L75 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/troubles/DBConnectionLeakServlet.java#L35 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/troubles/DBConnectionLeakServlet.java#L47 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L31 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L94 </details> </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java:94</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L89-L94 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/troubles/NetworkSocketLeakServlet.java#L27 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/troubles/NetworkSocketLeakServlet.java#L42 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/troubles/NetworkSocketLeakServlet.java#L54 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L31 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L94 </details> </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java:94</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L89-L94 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/troubles/RoundOffErrorServlet.java#L22 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/troubles/RoundOffErrorServlet.java#L30 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/troubles/RoundOffErrorServlet.java#L43 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L31 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L94 </details> </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java:82</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L77-L82 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L34 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L82 </details> </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/vulnerabilities/NullByteInjectionServlet.java:63</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/NullByteInjectionServlet.java#L58-L63 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/NullByteInjectionServlet.java#L62 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/NullByteInjectionServlet.java#L63 </details> </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java:94</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L89-L94 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/troubles/IntegerOverflowServlet.java#L24 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/troubles/IntegerOverflowServlet.java#L45 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/troubles/IntegerOverflowServlet.java#L68 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L31 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L94 </details> </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java:82</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L77-L82 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L34 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L82 </details> </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java:82</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L77-L82 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L34 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L82 </details> </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java:94</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L89-L94 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/OGNLExpressionInjectionServlet.java#L31 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/OGNLExpressionInjectionServlet.java#L34 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/OGNLExpressionInjectionServlet.java#L35 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/OGNLExpressionInjectionServlet.java#L59 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/OGNLExpressionInjectionServlet.java#L70 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L31 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L94 </details> </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java:94</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L89-L94 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/troubles/LossOfTrailingDigitsServlet.java#L22 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/troubles/LossOfTrailingDigitsServlet.java#L34 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/troubles/LossOfTrailingDigitsServlet.java#L47 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L31 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L94 </details> </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java:94</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L89-L94 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/troubles/EndlessWaitingServlet.java#L128 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/troubles/EndlessWaitingServlet.java#L132 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/troubles/EndlessWaitingServlet.java#L61 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/troubles/EndlessWaitingServlet.java#L70 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L31 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L94 </details> </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java:94</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L89-L94 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/troubles/EndlessWaitingServlet.java#L128 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/troubles/EndlessWaitingServlet.java#L132 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/troubles/EndlessWaitingServlet.java#L60 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/troubles/EndlessWaitingServlet.java#L70 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L31 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L94 </details> </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java:94</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L89-L94 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/XSSServlet.java#L22 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/XSSServlet.java#L38 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/XSSServlet.java#L39 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/XSSServlet.java#L48 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L31 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L94 </details> </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java:94</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L89-L94 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/performance/CreatingUnnecessaryObjectsServlet.java#L21 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/performance/CreatingUnnecessaryObjectsServlet.java#L28 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/performance/CreatingUnnecessaryObjectsServlet.java#L68 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L31 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L94 </details> </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java:82</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L77-L82 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L34 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L82 </details> </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java:94</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L89-L94 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/troubles/TruncationErrorServlet.java#L21 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/troubles/TruncationErrorServlet.java#L30 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/troubles/TruncationErrorServlet.java#L44 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L31 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L94 </details> </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java:82</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L77-L82 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L34 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L82 </details> </details> <details> <summary>src/main/webapp/uid/serverinfo.jsp:24</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/webapp/uid/serverinfo.jsp#L19-L24 </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java:94</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L89-L94 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/troubles/EndlessWaitingServlet.java#L60 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/troubles/EndlessWaitingServlet.java#L128 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/troubles/EndlessWaitingServlet.java#L132 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/troubles/EndlessWaitingServlet.java#L138 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/troubles/EndlessWaitingServlet.java#L60 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/troubles/EndlessWaitingServlet.java#L70 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L31 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L94 </details> </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java:82</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L77-L82 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L34 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L82 </details> </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java:94</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L89-L94 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L28 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L69 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L73 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L76 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L87 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L69 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L73 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L76 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L87 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L69 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L73 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L76 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L87 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L45 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/SQLInjectionServlet.java#L53 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L31 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/servlets/AbstractServlet.java#L94 </details> </details> </details> <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20>File Manipulation (CWE-73) : 4</summary> #### Findings <details> <summary>src/main/java/org/t246osslab/easybuggy/core/utils/MultiPartFileUtils.java:38</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/utils/MultiPartFileUtils.java#L33-L38 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/utils/MultiPartFileUtils.java#L37 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/utils/MultiPartFileUtils.java#L38 </details> </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/core/utils/MultiPartFileUtils.java:33</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/utils/MultiPartFileUtils.java#L28-L33 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedExtensionUploadServlet.java#L69 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/utils/MultiPartFileUtils.java#L57 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/utils/MultiPartFileUtils.java#L59 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedExtensionUploadServlet.java#L76 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/UnrestrictedExtensionUploadServlet.java#L81 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/utils/MultiPartFileUtils.java#L28 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/utils/MultiPartFileUtils.java#L33 </details> </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/core/utils/MultiPartFileUtils.java:38</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/utils/MultiPartFileUtils.java#L33-L38 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/utils/MultiPartFileUtils.java#L37 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/core/utils/MultiPartFileUtils.java#L38 </details> </details> <details> <summary>src/main/java/org/t246osslab/easybuggy/vulnerabilities/MailHeaderInjectionServlet.java:142</summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/MailHeaderInjectionServlet.java#L137-L142 <details> <summary> Trace </summary> https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/MailHeaderInjectionServlet.java#L141 https://github.com/samq-ghdemo/Java-Demo/blob/7a57885245a9ed9010aa350c184246310435362e/src/main/java/org/t246osslab/easybuggy/vulnerabilities/MailHeaderInjectionServlet.java#L142 </details> </details> </details>
non_infrastructure
code security report high severity findings total findings code security report latest scan total findings tested project files detected programming languages scan url check this box to manually trigger a scan language java severity cwe vulnerability type count high injection high traversal high injection high external entity xxe injection high side request forgery medium scripting medium manipulation medium redirect medium header injection medium poisoning low forging low boundary violation low inspection low messages information exposure low pseudo random details partial details findings are displayed below due to a content size limitation in github to view information on the remaining findings navigate to the sql injection cwe findings src main java org easybuggy vulnerabilities sqlinjectionservlet java trace src main java org easybuggy vulnerabilities sqlinjectionservlet java trace src main java org easybuggy vulnerabilities sqlinjectionservlet java trace path directory traversal cwe findings src main java org easybuggy vulnerabilities unrestrictedsizeuploadservlet java trace src main java org easybuggy vulnerabilities mailheaderinjectionservlet java trace src main java org easybuggy vulnerabilities unrestrictedextensionuploadservlet java trace src main java org easybuggy vulnerabilities unrestrictedextensionuploadservlet java trace src main java org easybuggy vulnerabilities unrestrictedsizeuploadservlet java trace src main java org easybuggy vulnerabilities nullbyteinjectionservlet java trace src main java org easybuggy vulnerabilities unrestrictedextensionuploadservlet java trace src main java org easybuggy vulnerabilities nullbyteinjectionservlet java trace src main java org easybuggy vulnerabilities xeeandxxeservlet java trace src main java org easybuggy vulnerabilities unrestrictedsizeuploadservlet java trace code injection cwe findings src main java org easybuggy vulnerabilities codeinjectionservlet java trace xml external entity xxe injection cwe findings src main java org easybuggy vulnerabilities xeeandxxeservlet java trace server side request forgery cwe findings src main java org easybuggy troubles networksocketleakservlet java trace cross site scripting cwe findings src main java org easybuggy core servlets abstractservlet java trace src main java org easybuggy core servlets abstractservlet java trace src main java org easybuggy core servlets abstractservlet java trace src main java org easybuggy core servlets abstractservlet java trace src main java org easybuggy core servlets abstractservlet java trace src main java org easybuggy core servlets abstractservlet java trace src main java org easybuggy core servlets abstractservlet java trace src main java org easybuggy core servlets abstractservlet java trace src main java org easybuggy core servlets abstractservlet java trace src main java org easybuggy core servlets abstractservlet java trace src main java org easybuggy core servlets abstractservlet java trace src main java org easybuggy vulnerabilities nullbyteinjectionservlet java trace src main java org easybuggy core servlets abstractservlet java trace src main java org easybuggy core servlets abstractservlet java trace src main java org easybuggy core servlets abstractservlet java trace src main java org easybuggy core servlets abstractservlet java trace src main java org easybuggy core servlets abstractservlet java trace src main java org easybuggy core servlets abstractservlet java trace src main java org easybuggy core servlets abstractservlet java trace src main java org easybuggy core servlets abstractservlet java trace src main java org easybuggy core servlets abstractservlet java trace src main java org easybuggy core servlets abstractservlet java trace src main java org easybuggy core servlets abstractservlet java trace src main java org easybuggy core servlets abstractservlet java trace src main webapp uid serverinfo jsp src main java org easybuggy core servlets abstractservlet java trace src main java org easybuggy core servlets abstractservlet java trace src main java org easybuggy core servlets abstractservlet java trace file manipulation cwe findings src main java org easybuggy core utils multipartfileutils java trace src main java org easybuggy core utils multipartfileutils java trace src main java org easybuggy core utils multipartfileutils java trace src main java org easybuggy vulnerabilities mailheaderinjectionservlet java trace
0
22,301
15,090,827,007
IssuesEvent
2021-02-06 12:53:17
celeritas-project/celeritas
https://api.github.com/repos/celeritas-project/celeritas
closed
Add tool to import preprocessed data from Geant4
infrastructure material physics
Given a GDML input definition file and physics list (and possibly other problem input parameters like energy cuts), export a single preprocessed data file with: - [x] Particle data (for particles in use based on the physics lists) - [x] Physics tables (for needed particles and models based on the physics lists, and energy based on cutoffs, and materials in the input file) - [x] Material definitions (for each material) *with names and corresponding index in the G4MaterialTable* (i.e. corresponding index in physics table) - [x] Map of logical volume names to material names See https://github.com/celeritas-project/celeritas-docs/blob/master/graphs/geant-exporter.pdf - Required to populate physics tables (#3) - Required to convert volume IDs from VecGeom to material IDs in physics tables - Required to render materials instead of volumes (#22)
1.0
Add tool to import preprocessed data from Geant4 - Given a GDML input definition file and physics list (and possibly other problem input parameters like energy cuts), export a single preprocessed data file with: - [x] Particle data (for particles in use based on the physics lists) - [x] Physics tables (for needed particles and models based on the physics lists, and energy based on cutoffs, and materials in the input file) - [x] Material definitions (for each material) *with names and corresponding index in the G4MaterialTable* (i.e. corresponding index in physics table) - [x] Map of logical volume names to material names See https://github.com/celeritas-project/celeritas-docs/blob/master/graphs/geant-exporter.pdf - Required to populate physics tables (#3) - Required to convert volume IDs from VecGeom to material IDs in physics tables - Required to render materials instead of volumes (#22)
infrastructure
add tool to import preprocessed data from given a gdml input definition file and physics list and possibly other problem input parameters like energy cuts export a single preprocessed data file with particle data for particles in use based on the physics lists physics tables for needed particles and models based on the physics lists and energy based on cutoffs and materials in the input file material definitions for each material with names and corresponding index in the i e corresponding index in physics table map of logical volume names to material names see required to populate physics tables required to convert volume ids from vecgeom to material ids in physics tables required to render materials instead of volumes
1
105,520
23,065,937,529
IssuesEvent
2022-07-25 13:56:17
teresasee/gaigai-Planner
https://api.github.com/repos/teresasee/gaigai-Planner
closed
filter by distance
type.code
show error message if users filter - before keying in locations - everyone location is in? - no one entered location, hence cannot filter by distance
1.0
filter by distance - show error message if users filter - before keying in locations - everyone location is in? - no one entered location, hence cannot filter by distance
non_infrastructure
filter by distance show error message if users filter before keying in locations everyone location is in no one entered location hence cannot filter by distance
0
20,996
14,273,241,014
IssuesEvent
2020-11-21 20:41:10
SirJosh3917/smiley-face-game
https://api.github.com/repos/SirJosh3917/smiley-face-game
closed
Rename beta-<urls> to dev-<urls>
infrastructure
This also implies renaming the /beta/ endpoint to /dev/ for the api subdomain.
1.0
Rename beta-<urls> to dev-<urls> - This also implies renaming the /beta/ endpoint to /dev/ for the api subdomain.
infrastructure
rename beta to dev this also implies renaming the beta endpoint to dev for the api subdomain
1
14,255
10,727,288,106
IssuesEvent
2019-10-28 11:19:21
nest/nest-simulator
https://api.github.com/repos/nest/nest-simulator
closed
Update gcc version in Travis CI
C: Infrastructure I: No breaking change P: PR Created S: Low T: Maintenance
While finalising my pull request #1069, I ran into a compiler bug in gcc. When specialising a class template in a different file than the generic class definition, an issue with namespace resolution can arise; see https://gcc.gnu.org/bugzilla/show_bug.cgi?id=56480 for more detail. This requires gcc to be updated to version >= 7 (current being 5.4), because that is where the bug was first fixed. We presently already have a Travis CI stage dedicated to gcc 8. Are there any preferences (or objections) to specific versions? gcc 9 is out but still seems to require adding a new PPA. The easiest solution would be to use gcc 8 everywhere. This also cuts the Travis CI runtime down a bit (as gcc 8 will no longer need to be a distinct step).
1.0
Update gcc version in Travis CI - While finalising my pull request #1069, I ran into a compiler bug in gcc. When specialising a class template in a different file than the generic class definition, an issue with namespace resolution can arise; see https://gcc.gnu.org/bugzilla/show_bug.cgi?id=56480 for more detail. This requires gcc to be updated to version >= 7 (current being 5.4), because that is where the bug was first fixed. We presently already have a Travis CI stage dedicated to gcc 8. Are there any preferences (or objections) to specific versions? gcc 9 is out but still seems to require adding a new PPA. The easiest solution would be to use gcc 8 everywhere. This also cuts the Travis CI runtime down a bit (as gcc 8 will no longer need to be a distinct step).
infrastructure
update gcc version in travis ci while finalising my pull request i ran into a compiler bug in gcc when specialising a class template in a different file than the generic class definition an issue with namespace resolution can arise see for more detail this requires gcc to be updated to version current being because that is where the bug was first fixed we presently already have a travis ci stage dedicated to gcc are there any preferences or objections to specific versions gcc is out but still seems to require adding a new ppa the easiest solution would be to use gcc everywhere this also cuts the travis ci runtime down a bit as gcc will no longer need to be a distinct step
1
1,113
3,039,581,475
IssuesEvent
2015-08-07 09:53:50
fifthweek/fifthweek-web
https://api.github.com/repos/fifthweek/fifthweek-web
closed
Investigate failover for API
infrastructure question
We experienced our first hour of outage this morning, which means extra steps need to be taken to increase availability. Hosting `fifthweek-web` on an edge network like AWS CloudFront will solve this problem for the front-end components. However, we still need to consider failover options for `fifthweek-api`.
1.0
Investigate failover for API - We experienced our first hour of outage this morning, which means extra steps need to be taken to increase availability. Hosting `fifthweek-web` on an edge network like AWS CloudFront will solve this problem for the front-end components. However, we still need to consider failover options for `fifthweek-api`.
infrastructure
investigate failover for api we experienced our first hour of outage this morning which means extra steps need to be taken to increase availability hosting fifthweek web on an edge network like aws cloudfront will solve this problem for the front end components however we still need to consider failover options for fifthweek api
1
39,765
5,245,632,590
IssuesEvent
2017-02-01 05:38:42
RIOT-OS/RIOT
https://api.github.com/repos/RIOT-OS/RIOT
opened
tests/lwip target board for python test is hardcoded to native
bug tests
The python driven [test](https://github.com/RIOT-OS/RIOT/blob/master/tests/lwip/tests/01-run.py) does not run for boards other then `native` But since the default `BOARD` for is set to `iotlab-m3` for this test, I guess they should be the primary target. Setting the boards and ttys manually in the 01_test.py [1] ``` python Board("iotlab-m3", None, "/dev/ttyUSBX") ``` forces the script to start with these parameters but it fails when trying to call reset [2] before going on with testing: ``` RIOT/tests/lwip$ make BOARD=iotlab-m3 test ./tests/01-run.py Testing for (<Board 'iotlab-m3',port=None,serial='/dev/ttyUSB0'>, <Board 'iotlab-m3',port=None,serial='/dev/ttyUSB2'>): Traceback (most recent call last): File "./tests/01-run.py", line 270, in <module> [test_ipv6_send, test_udpv6_send, test_dual_send]) File "./tests/01-run.py", line 172, in execute board_group.reset() File "./tests/01-run.py", line 153, in reset board.reset(application, env) File "./tests/01-run.py", line 124, in reset self.reset_strategy.execute(application, env) File "./tests/01-run.py", line 71, in execute super(ResetStrategy, self).__run_make(application, ("reset",), env) AttributeError: 'super' object has no attribute '_ResetStrategy__run_make' ``` [1] https://github.com/RIOT-OS/RIOT/blob/master/tests/lwip/tests/01-run.py#L264 [2] https://github.com/RIOT-OS/RIOT/blob/master/tests/lwip/tests/01-run.py#L168
1.0
tests/lwip target board for python test is hardcoded to native - The python driven [test](https://github.com/RIOT-OS/RIOT/blob/master/tests/lwip/tests/01-run.py) does not run for boards other then `native` But since the default `BOARD` for is set to `iotlab-m3` for this test, I guess they should be the primary target. Setting the boards and ttys manually in the 01_test.py [1] ``` python Board("iotlab-m3", None, "/dev/ttyUSBX") ``` forces the script to start with these parameters but it fails when trying to call reset [2] before going on with testing: ``` RIOT/tests/lwip$ make BOARD=iotlab-m3 test ./tests/01-run.py Testing for (<Board 'iotlab-m3',port=None,serial='/dev/ttyUSB0'>, <Board 'iotlab-m3',port=None,serial='/dev/ttyUSB2'>): Traceback (most recent call last): File "./tests/01-run.py", line 270, in <module> [test_ipv6_send, test_udpv6_send, test_dual_send]) File "./tests/01-run.py", line 172, in execute board_group.reset() File "./tests/01-run.py", line 153, in reset board.reset(application, env) File "./tests/01-run.py", line 124, in reset self.reset_strategy.execute(application, env) File "./tests/01-run.py", line 71, in execute super(ResetStrategy, self).__run_make(application, ("reset",), env) AttributeError: 'super' object has no attribute '_ResetStrategy__run_make' ``` [1] https://github.com/RIOT-OS/RIOT/blob/master/tests/lwip/tests/01-run.py#L264 [2] https://github.com/RIOT-OS/RIOT/blob/master/tests/lwip/tests/01-run.py#L168
non_infrastructure
tests lwip target board for python test is hardcoded to native the python driven does not run for boards other then native but since the default board for is set to iotlab for this test i guess they should be the primary target setting the boards and ttys manually in the test py python board iotlab none dev ttyusbx forces the script to start with these parameters but it fails when trying to call reset before going on with testing riot tests lwip make board iotlab test tests run py testing for traceback most recent call last file tests run py line in file tests run py line in execute board group reset file tests run py line in reset board reset application env file tests run py line in reset self reset strategy execute application env file tests run py line in execute super resetstrategy self run make application reset env attributeerror super object has no attribute resetstrategy run make
0
20,823
14,177,808,413
IssuesEvent
2020-11-13 03:07:31
dotnet/roslyn
https://api.github.com/repos/dotnet/roslyn
closed
Publish Microsoft.CodeAnalysis* 3.8.0 on nuget.org
Area-Infrastructure
Visual Studio 16.8 includes version 3.800.20.51918 of Microsoft.CodeAnalysis*. The latest version on nuget.org is 3.800.20.51507 (3.8.0-5.final), which is a pre-release version. When will 3.8.0 be released on nuget.org?
1.0
Publish Microsoft.CodeAnalysis* 3.8.0 on nuget.org - Visual Studio 16.8 includes version 3.800.20.51918 of Microsoft.CodeAnalysis*. The latest version on nuget.org is 3.800.20.51507 (3.8.0-5.final), which is a pre-release version. When will 3.8.0 be released on nuget.org?
infrastructure
publish microsoft codeanalysis on nuget org visual studio includes version of microsoft codeanalysis the latest version on nuget org is final which is a pre release version when will be released on nuget org
1
65,022
16,090,162,920
IssuesEvent
2021-04-26 15:45:11
spack/spack
https://api.github.com/repos/spack/spack
closed
Installation issue: minizip
build-error
<!-- Thanks for taking the time to report this build failure. To proceed with the report please: 1. Title the issue "Installation issue: <name-of-the-package>". 2. Provide the information required below. We encourage you to try, as much as possible, to reduce your problem to the minimal example that still reproduces the issue. That would help us a lot in fixing it quickly and effectively! --> ### Steps to reproduce the issue <!-- Fill in the exact spec you are trying to build and the relevant part of the error message --> ```console $ spack install minizip@1.2.11 [+] /opt/ohpc/pub/spack/opt/spack/linux-centos7-x86_64/gcc-9.2.0/libsigsegv-2.12-nsbpv73jzdyxtw7qbv6g2sm7tccmwlap [+] /opt/ohpc/pub/spack/opt/spack/linux-centos7-x86_64/gcc-9.2.0/berkeley-db-18.1.40-65ijivepdgglg4vekox7be5wl5kc5xhn [+] /opt/ohpc/pub/spack/opt/spack/linux-centos7-x86_64/gcc-9.2.0/pkgconf-1.7.3-xmb4xn3ydvx6h6msb3o72mdc4pkartim [+] /opt/ohpc/pub/spack/opt/spack/linux-centos7-x86_64/gcc-9.2.0/zlib-1.2.11-j3zdmzqsbyenjda44kvkceohj352n5ga [+] /opt/ohpc/pub/spack/opt/spack/linux-centos7-x86_64/gcc-9.2.0/m4-1.4.18-lkyedte2zhxyu7ymtl4e3tmo366msxv7 [+] /opt/ohpc/pub/spack/opt/spack/linux-centos7-x86_64/gcc-9.2.0/ncurses-6.2-w4lh3wlhlirrtgjnha3a36dmgrmxccsw [+] /opt/ohpc/pub/spack/opt/spack/linux-centos7-x86_64/gcc-9.2.0/libtool-2.4.6-wzr7weu3opudp4nanuqjy6wyge34rkss [+] /opt/ohpc/pub/spack/opt/spack/linux-centos7-x86_64/gcc-9.2.0/readline-8.0-ws5y6v6mlsddv3rpkkxthnldtpcztke6 [+] /opt/ohpc/pub/spack/opt/spack/linux-centos7-x86_64/gcc-9.2.0/gdbm-1.18.1-cfjfdq4w4fyuvw3dvjlapu33aaobphyb [+] /opt/ohpc/pub/spack/opt/spack/linux-centos7-x86_64/gcc-9.2.0/perl-5.32.1-wzlagh6zqjlxtv25yfuolxwb3iamot3d [+] /opt/ohpc/pub/spack/opt/spack/linux-centos7-x86_64/gcc-9.2.0/autoconf-2.69-eouez55w5z6jaeqvhlyulxxt2b4v257h [+] /opt/ohpc/pub/spack/opt/spack/linux-centos7-x86_64/gcc-9.2.0/automake-1.16.3-a7grigcdhtuopsmpehljo3spff5lu24g ==> Installing minizip-1.2.11-hueak5llnqzl4gzwokqvcs2thrbngdaz ==> No binary for minizip-1.2.11-hueak5llnqzl4gzwokqvcs2thrbngdaz found: installing from source ==> Using cached archive: /opt/ohpc/pub/spack/var/spack/cache/_source-cache/archive/c3/c3e5e9fdd5004dcb542feda5ee4f0ff0744628baf8ed2dd5d66f8ca1197cb1a1.tar.gz ==> minizip: Executing phase: 'autoreconf' ==> minizip: Executing phase: 'configure' ==> minizip: Executing phase: 'build' ==> Error: ProcessError: Command exited with status 2: 'make' '-j4' 3 errors found in build log: 216 /bin/ld: ./../../libz.a(deflate.o): relocation R_X86_64_32S against hidden symbol `_length_code' can not be used when making a shared object 217 /bin/ld: ./../../libz.a(inflate.o): relocation R_X86_64_32S against hidden symbol `zcfree' can not be used when making a shared object 218 /bin/ld: ./../../libz.a(inftrees.o): relocation R_X86_64_32S against `.rodata' can not be used when making a shared object; recompile with -fPIC 219 /bin/ld: ./../../libz.a(trees.o): relocation R_X86_64_32S against hidden symbol `_length_code' can not be used when making a shared object 220 /bin/ld: ./../../libz.a(zutil.o): relocation R_X86_64_32 against `.rodata.str1.1' can not be used when making a shared object; recompile with -fPIC 221 /bin/ld: ./../../libz.a(inffast.o): relocation R_X86_64_32S against `.rodata.str1.1' can not be used when making a shared object; recompile with -fPIC >> 222 /bin/ld: final link failed: Nonrepresentable section on output >> 223 collect2: error: ld returned 1 exit status >> 224 make: *** [libminizip.la] Error 1 See build log for details: /tmp/spack/spack-stage/spack-stage-minizip-1.2.11-hueak5llnqzl4gzwokqvcs2thrbngdaz/spack-build-out.txt ... ``` ### Information on your system * **Spack:** 0.16.0-1183-9eb5c8f * **Python:** 3.6.8 * **Platform:** linux-centos7-broadwell * **Concretizer:** original <!-- Please include the output of `spack debug report` --> <!-- If you have any relevant configuration detail (custom `packages.yaml` or `modules.yaml`, etc.) you can add that here as well. --> ### Additional information <!-- Please upload the following files. They should be present in the stage directory of the failing build. Also upload any config.log or similar file if one exists. --> * [spack-build-out.txt](https://github.com/spack/spack/files/6377855/spack-build-out.txt) * [spack-build-env.txt](https://github.com/spack/spack/files/6377857/spack-build-env.txt) modules loaded: ``` Currently Loaded Modules: 1) autotools 2) prun/1.3 3) gnu8/8.3.0 4) openmpi3/3.1.4 5) ohpc 6) gcc-9.2.0-gcc-8.3.0-ebpgkrt 7) zlib-1.2.11-gcc-9.2.0-j3zdmzq ``` <!-- Some packages have maintainers who have volunteered to debug build failures. Run `spack maintainers <name-of-the-package>` and @mention them here if they exist. --> @cessenat ### General information <!-- These boxes can be checked by replacing [ ] with [x] or by clicking them after submitting the issue. --> - [x] I have run `spack debug report` and reported the version of Spack/Python/Platform - [x] I have run `spack maintainers <name-of-the-package>` and @mentioned any maintainers - [x] I have uploaded the build log and environment files - [x] I have searched the issues of this repo and believe this is not a duplicate
1.0
Installation issue: minizip - <!-- Thanks for taking the time to report this build failure. To proceed with the report please: 1. Title the issue "Installation issue: <name-of-the-package>". 2. Provide the information required below. We encourage you to try, as much as possible, to reduce your problem to the minimal example that still reproduces the issue. That would help us a lot in fixing it quickly and effectively! --> ### Steps to reproduce the issue <!-- Fill in the exact spec you are trying to build and the relevant part of the error message --> ```console $ spack install minizip@1.2.11 [+] /opt/ohpc/pub/spack/opt/spack/linux-centos7-x86_64/gcc-9.2.0/libsigsegv-2.12-nsbpv73jzdyxtw7qbv6g2sm7tccmwlap [+] /opt/ohpc/pub/spack/opt/spack/linux-centos7-x86_64/gcc-9.2.0/berkeley-db-18.1.40-65ijivepdgglg4vekox7be5wl5kc5xhn [+] /opt/ohpc/pub/spack/opt/spack/linux-centos7-x86_64/gcc-9.2.0/pkgconf-1.7.3-xmb4xn3ydvx6h6msb3o72mdc4pkartim [+] /opt/ohpc/pub/spack/opt/spack/linux-centos7-x86_64/gcc-9.2.0/zlib-1.2.11-j3zdmzqsbyenjda44kvkceohj352n5ga [+] /opt/ohpc/pub/spack/opt/spack/linux-centos7-x86_64/gcc-9.2.0/m4-1.4.18-lkyedte2zhxyu7ymtl4e3tmo366msxv7 [+] /opt/ohpc/pub/spack/opt/spack/linux-centos7-x86_64/gcc-9.2.0/ncurses-6.2-w4lh3wlhlirrtgjnha3a36dmgrmxccsw [+] /opt/ohpc/pub/spack/opt/spack/linux-centos7-x86_64/gcc-9.2.0/libtool-2.4.6-wzr7weu3opudp4nanuqjy6wyge34rkss [+] /opt/ohpc/pub/spack/opt/spack/linux-centos7-x86_64/gcc-9.2.0/readline-8.0-ws5y6v6mlsddv3rpkkxthnldtpcztke6 [+] /opt/ohpc/pub/spack/opt/spack/linux-centos7-x86_64/gcc-9.2.0/gdbm-1.18.1-cfjfdq4w4fyuvw3dvjlapu33aaobphyb [+] /opt/ohpc/pub/spack/opt/spack/linux-centos7-x86_64/gcc-9.2.0/perl-5.32.1-wzlagh6zqjlxtv25yfuolxwb3iamot3d [+] /opt/ohpc/pub/spack/opt/spack/linux-centos7-x86_64/gcc-9.2.0/autoconf-2.69-eouez55w5z6jaeqvhlyulxxt2b4v257h [+] /opt/ohpc/pub/spack/opt/spack/linux-centos7-x86_64/gcc-9.2.0/automake-1.16.3-a7grigcdhtuopsmpehljo3spff5lu24g ==> Installing minizip-1.2.11-hueak5llnqzl4gzwokqvcs2thrbngdaz ==> No binary for minizip-1.2.11-hueak5llnqzl4gzwokqvcs2thrbngdaz found: installing from source ==> Using cached archive: /opt/ohpc/pub/spack/var/spack/cache/_source-cache/archive/c3/c3e5e9fdd5004dcb542feda5ee4f0ff0744628baf8ed2dd5d66f8ca1197cb1a1.tar.gz ==> minizip: Executing phase: 'autoreconf' ==> minizip: Executing phase: 'configure' ==> minizip: Executing phase: 'build' ==> Error: ProcessError: Command exited with status 2: 'make' '-j4' 3 errors found in build log: 216 /bin/ld: ./../../libz.a(deflate.o): relocation R_X86_64_32S against hidden symbol `_length_code' can not be used when making a shared object 217 /bin/ld: ./../../libz.a(inflate.o): relocation R_X86_64_32S against hidden symbol `zcfree' can not be used when making a shared object 218 /bin/ld: ./../../libz.a(inftrees.o): relocation R_X86_64_32S against `.rodata' can not be used when making a shared object; recompile with -fPIC 219 /bin/ld: ./../../libz.a(trees.o): relocation R_X86_64_32S against hidden symbol `_length_code' can not be used when making a shared object 220 /bin/ld: ./../../libz.a(zutil.o): relocation R_X86_64_32 against `.rodata.str1.1' can not be used when making a shared object; recompile with -fPIC 221 /bin/ld: ./../../libz.a(inffast.o): relocation R_X86_64_32S against `.rodata.str1.1' can not be used when making a shared object; recompile with -fPIC >> 222 /bin/ld: final link failed: Nonrepresentable section on output >> 223 collect2: error: ld returned 1 exit status >> 224 make: *** [libminizip.la] Error 1 See build log for details: /tmp/spack/spack-stage/spack-stage-minizip-1.2.11-hueak5llnqzl4gzwokqvcs2thrbngdaz/spack-build-out.txt ... ``` ### Information on your system * **Spack:** 0.16.0-1183-9eb5c8f * **Python:** 3.6.8 * **Platform:** linux-centos7-broadwell * **Concretizer:** original <!-- Please include the output of `spack debug report` --> <!-- If you have any relevant configuration detail (custom `packages.yaml` or `modules.yaml`, etc.) you can add that here as well. --> ### Additional information <!-- Please upload the following files. They should be present in the stage directory of the failing build. Also upload any config.log or similar file if one exists. --> * [spack-build-out.txt](https://github.com/spack/spack/files/6377855/spack-build-out.txt) * [spack-build-env.txt](https://github.com/spack/spack/files/6377857/spack-build-env.txt) modules loaded: ``` Currently Loaded Modules: 1) autotools 2) prun/1.3 3) gnu8/8.3.0 4) openmpi3/3.1.4 5) ohpc 6) gcc-9.2.0-gcc-8.3.0-ebpgkrt 7) zlib-1.2.11-gcc-9.2.0-j3zdmzq ``` <!-- Some packages have maintainers who have volunteered to debug build failures. Run `spack maintainers <name-of-the-package>` and @mention them here if they exist. --> @cessenat ### General information <!-- These boxes can be checked by replacing [ ] with [x] or by clicking them after submitting the issue. --> - [x] I have run `spack debug report` and reported the version of Spack/Python/Platform - [x] I have run `spack maintainers <name-of-the-package>` and @mentioned any maintainers - [x] I have uploaded the build log and environment files - [x] I have searched the issues of this repo and believe this is not a duplicate
non_infrastructure
installation issue minizip thanks for taking the time to report this build failure to proceed with the report please title the issue installation issue provide the information required below we encourage you to try as much as possible to reduce your problem to the minimal example that still reproduces the issue that would help us a lot in fixing it quickly and effectively steps to reproduce the issue console spack install minizip opt ohpc pub spack opt spack linux gcc libsigsegv opt ohpc pub spack opt spack linux gcc berkeley db opt ohpc pub spack opt spack linux gcc pkgconf opt ohpc pub spack opt spack linux gcc zlib opt ohpc pub spack opt spack linux gcc opt ohpc pub spack opt spack linux gcc ncurses opt ohpc pub spack opt spack linux gcc libtool opt ohpc pub spack opt spack linux gcc readline opt ohpc pub spack opt spack linux gcc gdbm opt ohpc pub spack opt spack linux gcc perl opt ohpc pub spack opt spack linux gcc autoconf opt ohpc pub spack opt spack linux gcc automake installing minizip no binary for minizip found installing from source using cached archive opt ohpc pub spack var spack cache source cache archive tar gz minizip executing phase autoreconf minizip executing phase configure minizip executing phase build error processerror command exited with status make errors found in build log bin ld libz a deflate o relocation r against hidden symbol length code can not be used when making a shared object bin ld libz a inflate o relocation r against hidden symbol zcfree can not be used when making a shared object bin ld libz a inftrees o relocation r against rodata can not be used when making a shared object recompile with fpic bin ld libz a trees o relocation r against hidden symbol length code can not be used when making a shared object bin ld libz a zutil o relocation r against rodata can not be used when making a shared object recompile with fpic bin ld libz a inffast o relocation r against rodata can not be used when making a shared object recompile with fpic bin ld final link failed nonrepresentable section on output error ld returned exit status make error see build log for details tmp spack spack stage spack stage minizip spack build out txt information on your system spack python platform linux broadwell concretizer original additional information modules loaded currently loaded modules autotools prun ohpc gcc gcc ebpgkrt zlib gcc and mention them here if they exist cessenat general information i have run spack debug report and reported the version of spack python platform i have run spack maintainers and mentioned any maintainers i have uploaded the build log and environment files i have searched the issues of this repo and believe this is not a duplicate
0
367,443
10,853,857,605
IssuesEvent
2019-11-13 15:26:34
cheminfo/nmr-displayer
https://api.github.com/repos/cheminfo/nmr-displayer
closed
Implement phase correction
Priority
Implement a phase correction of real / imaginary spectrum ![phase](https://user-images.githubusercontent.com/1484241/62573236-e26ddf00-b895-11e9-9f96-151275091d84.gif)
1.0
Implement phase correction - Implement a phase correction of real / imaginary spectrum ![phase](https://user-images.githubusercontent.com/1484241/62573236-e26ddf00-b895-11e9-9f96-151275091d84.gif)
non_infrastructure
implement phase correction implement a phase correction of real imaginary spectrum
0
5,397
5,635,371,138
IssuesEvent
2017-04-06 00:23:49
zcash/zcash
https://api.github.com/repos/zcash/zcash
opened
Fix Buildbot hanging during performance benchmarks
bug dev infrastructure RPC interface testing
During the merge run-up to 1.0.8, the performance benchmarks on https://ci.z.cash/ started hanging during `solveequihash`. At the time I though this was just related to the various other ongoing Buildbot problems, but now I think it is a separate issue that appears to have been caused by merging #2176 ([before](https://ci.z.cash/builders/zcashperformance/builds/175), [after](https://ci.z.cash/builders/zcashperformance/builds/176)). My current thinking is that it is hanging because it's the first benchmark that amounts to an RPC call taking over half an hour to return (though I don't yet know whether that is a significant number - it could be anything over 10 minutes).
1.0
Fix Buildbot hanging during performance benchmarks - During the merge run-up to 1.0.8, the performance benchmarks on https://ci.z.cash/ started hanging during `solveequihash`. At the time I though this was just related to the various other ongoing Buildbot problems, but now I think it is a separate issue that appears to have been caused by merging #2176 ([before](https://ci.z.cash/builders/zcashperformance/builds/175), [after](https://ci.z.cash/builders/zcashperformance/builds/176)). My current thinking is that it is hanging because it's the first benchmark that amounts to an RPC call taking over half an hour to return (though I don't yet know whether that is a significant number - it could be anything over 10 minutes).
infrastructure
fix buildbot hanging during performance benchmarks during the merge run up to the performance benchmarks on started hanging during solveequihash at the time i though this was just related to the various other ongoing buildbot problems but now i think it is a separate issue that appears to have been caused by merging my current thinking is that it is hanging because it s the first benchmark that amounts to an rpc call taking over half an hour to return though i don t yet know whether that is a significant number it could be anything over minutes
1
11,936
9,529,354,787
IssuesEvent
2019-04-29 11:02:03
elastic/kibana
https://api.github.com/repos/elastic/kibana
closed
[Infra UI] Improve waffle map custom "group by" fields
:Infra UI :infrastructure [zube]: Done v7.1.0
Currently, it is possible to enter a custom value in the "Group by" input field. Depending on what the user enters, it is possible that the documents that are returned don't contain the metrics selected for display in the "Metric" input field. Example: - User enters `service.type` as field to group by - User wants to see a system metric on the waffle map squares (until https://github.com/elastic/kibana/issues/30197 is implemented that's all they can select anyway) - The documents that contain a `service.type` other than "System" do not contain system metrics, so the waffle map is not displayed as expected Proposed solution: - Split the query performed for the waffle map in two steps: - First, group by custom field to get a list of node ids - Second, query by node ids to get metric values to display on the waffle map squares Caveats: - How can we deal gracefully with very large numbers of node ids? (Related: https://github.com/elastic/kibana/issues/27500 ) - Should the two-step query logic happen on the server or on the client? - The first would mean that the waffle map view can stay mostly unchanged and the graphql endpoint serving waffle map data will perform several queries to elastic search - The second would mean that the two-step query logic is reflected in the component / container structure and the graphql endpoints stay (relatively) simple - How will all this affect performance?
1.0
[Infra UI] Improve waffle map custom "group by" fields - Currently, it is possible to enter a custom value in the "Group by" input field. Depending on what the user enters, it is possible that the documents that are returned don't contain the metrics selected for display in the "Metric" input field. Example: - User enters `service.type` as field to group by - User wants to see a system metric on the waffle map squares (until https://github.com/elastic/kibana/issues/30197 is implemented that's all they can select anyway) - The documents that contain a `service.type` other than "System" do not contain system metrics, so the waffle map is not displayed as expected Proposed solution: - Split the query performed for the waffle map in two steps: - First, group by custom field to get a list of node ids - Second, query by node ids to get metric values to display on the waffle map squares Caveats: - How can we deal gracefully with very large numbers of node ids? (Related: https://github.com/elastic/kibana/issues/27500 ) - Should the two-step query logic happen on the server or on the client? - The first would mean that the waffle map view can stay mostly unchanged and the graphql endpoint serving waffle map data will perform several queries to elastic search - The second would mean that the two-step query logic is reflected in the component / container structure and the graphql endpoints stay (relatively) simple - How will all this affect performance?
infrastructure
improve waffle map custom group by fields currently it is possible to enter a custom value in the group by input field depending on what the user enters it is possible that the documents that are returned don t contain the metrics selected for display in the metric input field example user enters service type as field to group by user wants to see a system metric on the waffle map squares until is implemented that s all they can select anyway the documents that contain a service type other than system do not contain system metrics so the waffle map is not displayed as expected proposed solution split the query performed for the waffle map in two steps first group by custom field to get a list of node ids second query by node ids to get metric values to display on the waffle map squares caveats how can we deal gracefully with very large numbers of node ids related should the two step query logic happen on the server or on the client the first would mean that the waffle map view can stay mostly unchanged and the graphql endpoint serving waffle map data will perform several queries to elastic search the second would mean that the two step query logic is reflected in the component container structure and the graphql endpoints stay relatively simple how will all this affect performance
1
1,452
3,218,613,945
IssuesEvent
2015-10-08 03:02:00
WP-API/WP-API
https://api.github.com/repos/WP-API/WP-API
closed
Need to detect if the Infrastructure is being loaded by core in plugin
Infrastructure
Once https://core.trac.wordpress.org/ticket/33982 is merged, we will need to allow the plugin to be installed and use the core infrastructure instead.
1.0
Need to detect if the Infrastructure is being loaded by core in plugin - Once https://core.trac.wordpress.org/ticket/33982 is merged, we will need to allow the plugin to be installed and use the core infrastructure instead.
infrastructure
need to detect if the infrastructure is being loaded by core in plugin once is merged we will need to allow the plugin to be installed and use the core infrastructure instead
1
17,591
12,475,767,125
IssuesEvent
2020-05-29 12:16:07
hotosm/tasking-manager
https://api.github.com/repos/hotosm/tasking-manager
closed
Deployment of parallel instances
Component: Infrastructure Priority: Medium Status: Needs implementation Type: Enhancement
When a developer merges into `develop` and some other is deploying on `master` or `machine-learning` one build fails because of another one already running. It would be good to have builds working independently from the others.
1.0
Deployment of parallel instances - When a developer merges into `develop` and some other is deploying on `master` or `machine-learning` one build fails because of another one already running. It would be good to have builds working independently from the others.
infrastructure
deployment of parallel instances when a developer merges into develop and some other is deploying on master or machine learning one build fails because of another one already running it would be good to have builds working independently from the others
1
30,867
25,127,153,857
IssuesEvent
2022-11-09 12:38:27
GoogleForCreators/web-stories-wp
https://api.github.com/repos/GoogleForCreators/web-stories-wp
closed
Bump `Requires at least` value
Type: Infrastructure Pod: WP
<!-- NOTE: For help requests, support questions, or general feedback, please use the WordPress.org forums instead: https://wordpress.org/support/plugin/web-stories/ --> ## Task Description <!-- A clear and concise description of what this task is about. --> Bump to `Requires at least: 5.9` in `web-stories.php` and `readme.txt` Also bump `WEBSTORIES_MINIMUM_WP_VERSION` in `web-stories.php`
1.0
Bump `Requires at least` value - <!-- NOTE: For help requests, support questions, or general feedback, please use the WordPress.org forums instead: https://wordpress.org/support/plugin/web-stories/ --> ## Task Description <!-- A clear and concise description of what this task is about. --> Bump to `Requires at least: 5.9` in `web-stories.php` and `readme.txt` Also bump `WEBSTORIES_MINIMUM_WP_VERSION` in `web-stories.php`
infrastructure
bump requires at least value task description bump to requires at least in web stories php and readme txt also bump webstories minimum wp version in web stories php
1
16,275
11,890,609,529
IssuesEvent
2020-03-28 19:08:44
bootstrapworld/curriculum
https://api.github.com/repos/bootstrapworld/curriculum
opened
Pathways should specify front-matter and back-matter
Infrastructure
Every pathway's has a workbook. Every workbook has _at least_ a front and back cover, but also typically has an acknowledgements page, a contracts page, blank recipes, etc. We currently abuse the lesson infrastructure to insert these pages, but really they belong at the pathway level. - [ ] add `front-matter` and `back-matter` folders at the pathway top-level, which function the same way `pages` does at the lesson level (all files are 1 page, adocs and pdfs allowed, order specified by `workbook-pages.rkt`) - [ ] Split existing cover page into single-page PDFs - [ ] Move front and back pages from lessons to pathways
1.0
Pathways should specify front-matter and back-matter - Every pathway's has a workbook. Every workbook has _at least_ a front and back cover, but also typically has an acknowledgements page, a contracts page, blank recipes, etc. We currently abuse the lesson infrastructure to insert these pages, but really they belong at the pathway level. - [ ] add `front-matter` and `back-matter` folders at the pathway top-level, which function the same way `pages` does at the lesson level (all files are 1 page, adocs and pdfs allowed, order specified by `workbook-pages.rkt`) - [ ] Split existing cover page into single-page PDFs - [ ] Move front and back pages from lessons to pathways
infrastructure
pathways should specify front matter and back matter every pathway s has a workbook every workbook has at least a front and back cover but also typically has an acknowledgements page a contracts page blank recipes etc we currently abuse the lesson infrastructure to insert these pages but really they belong at the pathway level add front matter and back matter folders at the pathway top level which function the same way pages does at the lesson level all files are page adocs and pdfs allowed order specified by workbook pages rkt split existing cover page into single page pdfs move front and back pages from lessons to pathways
1
211,780
16,458,079,536
IssuesEvent
2021-05-21 15:01:55
gii-is-psg2/PSG2-2021-G5-52
https://api.github.com/repos/gii-is-psg2/PSG2-2021-G5-52
closed
Task A4.4.a
documentation
Describe the Petclinic maintenance service offered to potential clients. It must consider both corrective(incidents) and perfective (requests) with at least three diferentes levels of urgency and impact,
1.0
Task A4.4.a - Describe the Petclinic maintenance service offered to potential clients. It must consider both corrective(incidents) and perfective (requests) with at least three diferentes levels of urgency and impact,
non_infrastructure
task a describe the petclinic maintenance service offered to potential clients it must consider both corrective incidents and perfective requests with at least three diferentes levels of urgency and impact
0
121,621
12,129,927,299
IssuesEvent
2020-04-22 23:58:52
parse-community/parse-server
https://api.github.com/repos/parse-community/parse-server
closed
Questions about Direct Access Feature
documentation
``` Enables direct access to parse-server, when using the JS SDK from the current node runtime. All API calls from the JS-SDK are router through route matching (but /functions/:functionName) Enable that feature by setting PARSE_SERVER_ENABLE_EXPERIMENTAL_DIRECT_ACCESS=1 ``` So if I understand this correctly: ``` client -> request to Cloud Code Function (Server) -> calling object.save() in Cloud Code -> send http request to Server. ``` Enabling this feature ``` client -> request to Cloud Code Function (Server) -> calling object.save() in Cloud Code -> no additional request sent because both JS SDK and Server are on the same node runtime ``` Enabling this feature would make requests faster since there is one less request, should this be mainstreamed? Should there be tests run against this? Add to parse-server [config definitions](https://github.com/parse-community/parse-server/blob/master/src/Options/Definitions.js)? We should add documentation to make more users aware of this feature
1.0
Questions about Direct Access Feature - ``` Enables direct access to parse-server, when using the JS SDK from the current node runtime. All API calls from the JS-SDK are router through route matching (but /functions/:functionName) Enable that feature by setting PARSE_SERVER_ENABLE_EXPERIMENTAL_DIRECT_ACCESS=1 ``` So if I understand this correctly: ``` client -> request to Cloud Code Function (Server) -> calling object.save() in Cloud Code -> send http request to Server. ``` Enabling this feature ``` client -> request to Cloud Code Function (Server) -> calling object.save() in Cloud Code -> no additional request sent because both JS SDK and Server are on the same node runtime ``` Enabling this feature would make requests faster since there is one less request, should this be mainstreamed? Should there be tests run against this? Add to parse-server [config definitions](https://github.com/parse-community/parse-server/blob/master/src/Options/Definitions.js)? We should add documentation to make more users aware of this feature
non_infrastructure
questions about direct access feature enables direct access to parse server when using the js sdk from the current node runtime all api calls from the js sdk are router through route matching but functions functionname enable that feature by setting parse server enable experimental direct access so if i understand this correctly client request to cloud code function server calling object save in cloud code send http request to server enabling this feature client request to cloud code function server calling object save in cloud code no additional request sent because both js sdk and server are on the same node runtime enabling this feature would make requests faster since there is one less request should this be mainstreamed should there be tests run against this add to parse server we should add documentation to make more users aware of this feature
0
5,533
5,732,415,685
IssuesEvent
2017-04-21 14:48:28
wellcometrust/platform-api
https://api.github.com/repos/wellcometrust/platform-api
closed
Speed up docker image creation
infrastructure
Currently our builds take a long time and most of that time is being spent in creating the docker image. We should investigate if we can optimize it so that it takes less time
1.0
Speed up docker image creation - Currently our builds take a long time and most of that time is being spent in creating the docker image. We should investigate if we can optimize it so that it takes less time
infrastructure
speed up docker image creation currently our builds take a long time and most of that time is being spent in creating the docker image we should investigate if we can optimize it so that it takes less time
1
419,375
12,222,711,488
IssuesEvent
2020-05-02 14:27:44
Gamebuster19901/ExciteBot
https://api.github.com/repos/Gamebuster19901/ExciteBot
opened
Ubuntu restarts the service if !stop is executed
Category - Bug Category - Conflict Priority - High ⇑
When ran as a service, ubuntu will restart the service if the bot is `!stopped`
1.0
Ubuntu restarts the service if !stop is executed - When ran as a service, ubuntu will restart the service if the bot is `!stopped`
non_infrastructure
ubuntu restarts the service if stop is executed when ran as a service ubuntu will restart the service if the bot is stopped
0
1,978
3,447,997,179
IssuesEvent
2015-12-16 04:41:10
giridharmurali/EventDetection
https://api.github.com/repos/giridharmurali/EventDetection
opened
Encoding, Encryption and Compression of Recordings
enhancement infrastructure
1. Select the best encoding to use while saving sequences 2. Compress the sequences to be saved 3. Encrypt the compressed recording 4. Decrypt the recording during playback (authenticate using user account)
1.0
Encoding, Encryption and Compression of Recordings - 1. Select the best encoding to use while saving sequences 2. Compress the sequences to be saved 3. Encrypt the compressed recording 4. Decrypt the recording during playback (authenticate using user account)
infrastructure
encoding encryption and compression of recordings select the best encoding to use while saving sequences compress the sequences to be saved encrypt the compressed recording decrypt the recording during playback authenticate using user account
1
24,993
18,020,434,097
IssuesEvent
2021-09-16 18:41:07
ProjectPythia/projectpythia.github.io
https://api.github.com/repos/ProjectPythia/projectpythia.github.io
opened
Direct users to Project Pythia filtered resource gallery from landing page
infrastructure
To be tackled once #156 is merged.
1.0
Direct users to Project Pythia filtered resource gallery from landing page - To be tackled once #156 is merged.
infrastructure
direct users to project pythia filtered resource gallery from landing page to be tackled once is merged
1
469,728
13,524,326,571
IssuesEvent
2020-09-15 11:22:00
input-output-hk/cardano-node
https://api.github.com/repos/input-output-hk/cardano-node
closed
[BUG] - setting "TurnOnLogging" to false gives an incorrect message
bug logging and monitoring priority low
*External* otherwise. **Summary** Setting "TurnOnLogging" to false cause cardano-node to give this message: please turn on the following tracers in the configuration file: TraceBlockFetchDecisions. TraceChainDb TraceForge TraceMempool Even when all the tracers above are set to true. **Steps to reproduce** Steps to reproduce the behavior: 1. Go to config.json 2. set "TurnOnLogging" to false 3. set all above options to true 4. start cardano-node **Expected behavior** should not see the message and node should start **System info (please complete the following information):** - Node version 1.18.0 **Screenshots and attachments** <img width="706" alt="Screen Shot 2020-08-04 at 20 40 11" src="https://user-images.githubusercontent.com/67793497/89333208-f1e45b80-d694-11ea-9936-c578135cf40d.png">
1.0
[BUG] - setting "TurnOnLogging" to false gives an incorrect message - *External* otherwise. **Summary** Setting "TurnOnLogging" to false cause cardano-node to give this message: please turn on the following tracers in the configuration file: TraceBlockFetchDecisions. TraceChainDb TraceForge TraceMempool Even when all the tracers above are set to true. **Steps to reproduce** Steps to reproduce the behavior: 1. Go to config.json 2. set "TurnOnLogging" to false 3. set all above options to true 4. start cardano-node **Expected behavior** should not see the message and node should start **System info (please complete the following information):** - Node version 1.18.0 **Screenshots and attachments** <img width="706" alt="Screen Shot 2020-08-04 at 20 40 11" src="https://user-images.githubusercontent.com/67793497/89333208-f1e45b80-d694-11ea-9936-c578135cf40d.png">
non_infrastructure
setting turnonlogging to false gives an incorrect message external otherwise summary setting turnonlogging to false cause cardano node to give this message please turn on the following tracers in the configuration file traceblockfetchdecisions tracechaindb traceforge tracemempool even when all the tracers above are set to true steps to reproduce steps to reproduce the behavior go to config json set turnonlogging to false set all above options to true start cardano node expected behavior should not see the message and node should start system info please complete the following information node version screenshots and attachments img width alt screen shot at src
0
28,873
23,544,482,377
IssuesEvent
2022-08-20 22:58:48
PetroFit/petrofit
https://api.github.com/repos/PetroFit/petrofit
closed
Frozen Environment Files
Installation Infrastructure
Add Conda and requirement files for older versions of the package with strict versions.
1.0
Frozen Environment Files - Add Conda and requirement files for older versions of the package with strict versions.
infrastructure
frozen environment files add conda and requirement files for older versions of the package with strict versions
1
270,295
28,960,484,739
IssuesEvent
2023-05-10 01:45:59
hshivhare67/kernel_v4.1.15
https://api.github.com/repos/hshivhare67/kernel_v4.1.15
reopened
CVE-2017-7895 (High) detected in linuxlinux-4.6, linuxlinux-4.6
Mend: dependency security vulnerability
## CVE-2017-7895 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>linuxlinux-4.6</b>, <b>linuxlinux-4.6</b></p></summary> <p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> Vulnerability Details</summary> <p> The NFSv2 and NFSv3 server implementations in the Linux kernel through 4.10.13 lack certain checks for the end of a buffer, which allows remote attackers to trigger pointer-arithmetic errors or possibly have unspecified other impact via crafted requests, related to fs/nfsd/nfs3xdr.c and fs/nfsd/nfsxdr.c. <p>Publish Date: 2017-04-28 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2017-7895>CVE-2017-7895</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-7895">http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-7895</a></p> <p>Release Date: 2017-04-28</p> <p>Fix Resolution: v4.11</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2017-7895 (High) detected in linuxlinux-4.6, linuxlinux-4.6 - ## CVE-2017-7895 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>linuxlinux-4.6</b>, <b>linuxlinux-4.6</b></p></summary> <p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> Vulnerability Details</summary> <p> The NFSv2 and NFSv3 server implementations in the Linux kernel through 4.10.13 lack certain checks for the end of a buffer, which allows remote attackers to trigger pointer-arithmetic errors or possibly have unspecified other impact via crafted requests, related to fs/nfsd/nfs3xdr.c and fs/nfsd/nfsxdr.c. <p>Publish Date: 2017-04-28 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2017-7895>CVE-2017-7895</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-7895">http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-7895</a></p> <p>Release Date: 2017-04-28</p> <p>Fix Resolution: v4.11</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_infrastructure
cve high detected in linuxlinux linuxlinux cve high severity vulnerability vulnerable libraries linuxlinux linuxlinux vulnerability details the and server implementations in the linux kernel through lack certain checks for the end of a buffer which allows remote attackers to trigger pointer arithmetic errors or possibly have unspecified other impact via crafted requests related to fs nfsd c and fs nfsd nfsxdr c publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend
0
69,763
30,476,244,396
IssuesEvent
2023-07-17 16:43:25
MicrosoftDocs/azure-docs
https://api.github.com/repos/MicrosoftDocs/azure-docs
closed
It'd be very neat to have another example as well
service-fabric/svc triaged assigned-to-author doc-enhancement Pri2
That's for the scenario where FindType="FindBySubjectName" --- #### Document Details ⚠ *Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.* * ID: b416b884-a4c2-f64b-8646-c272d2f2aa39 * Version Independent ID: 6279b3df-55c3-32e6-bb21-33a4013edd29 * Content: [Configure secure Azure Service Fabric cluster connections - Azure Service Fabric](https://docs.microsoft.com/en-us/azure/service-fabric/service-fabric-visualstudio-configure-secure-connections?source=docs#feedback) * Content Source: [articles/service-fabric/service-fabric-visualstudio-configure-secure-connections.md](https://github.com/Microsoft/azure-docs/blob/master/articles/service-fabric/service-fabric-visualstudio-configure-secure-connections.md) * Service: **service-fabric** * GitHub Login: @CawaMS * Microsoft Alias: **cawa**
1.0
It'd be very neat to have another example as well - That's for the scenario where FindType="FindBySubjectName" --- #### Document Details ⚠ *Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.* * ID: b416b884-a4c2-f64b-8646-c272d2f2aa39 * Version Independent ID: 6279b3df-55c3-32e6-bb21-33a4013edd29 * Content: [Configure secure Azure Service Fabric cluster connections - Azure Service Fabric](https://docs.microsoft.com/en-us/azure/service-fabric/service-fabric-visualstudio-configure-secure-connections?source=docs#feedback) * Content Source: [articles/service-fabric/service-fabric-visualstudio-configure-secure-connections.md](https://github.com/Microsoft/azure-docs/blob/master/articles/service-fabric/service-fabric-visualstudio-configure-secure-connections.md) * Service: **service-fabric** * GitHub Login: @CawaMS * Microsoft Alias: **cawa**
non_infrastructure
it d be very neat to have another example as well that s for the scenario where findtype findbysubjectname document details ⚠ do not edit this section it is required for docs microsoft com ➟ github issue linking id version independent id content content source service service fabric github login cawams microsoft alias cawa
0
219,356
24,474,073,953
IssuesEvent
2022-10-08 01:03:32
Seagate/cortx-rgw
https://api.github.com/repos/Seagate/cortx-rgw
reopened
CVE-2022-34749 (High) detected in mistune-0.8.4-py2.py3-none-any.whl
security vulnerability
## CVE-2022-34749 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>mistune-0.8.4-py2.py3-none-any.whl</b></p></summary> <p>The fastest markdown parser in pure Python</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/09/ec/4b43dae793655b7d8a25f76119624350b4d65eb663459eb9603d7f1f0345/mistune-0.8.4-py2.py3-none-any.whl">https://files.pythonhosted.org/packages/09/ec/4b43dae793655b7d8a25f76119624350b4d65eb663459eb9603d7f1f0345/mistune-0.8.4-py2.py3-none-any.whl</a></p> <p>Path to dependency file: /admin/doc-requirements.txt</p> <p>Path to vulnerable library: /admin/doc-requirements.txt,/admin/doc-requirements.txt,/src/pybind/rados,/src/ceph-volume,/src/pybind/cephfs</p> <p> Dependency Hierarchy: - :x: **mistune-0.8.4-py2.py3-none-any.whl** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Seagate/cortx-rgw/commit/aa78617d024ccd26801e43c6980f939cf8bded5f">aa78617d024ccd26801e43c6980f939cf8bded5f</a></p> <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In mistune through 2.0.2, support of inline markup is implemented by using regular expressions that can involve a high amount of backtracking on certain edge cases. This behavior is commonly named catastrophic backtracking. <p>Publish Date: 2022-07-25 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-34749>CVE-2022-34749</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-fw3v-x4f2-v673">https://github.com/advisories/GHSA-fw3v-x4f2-v673</a></p> <p>Release Date: 2022-07-25</p> <p>Fix Resolution: mistune - 2.0.3</p> </p> </details> <p></p> *** :rescue_worker_helmet: Automatic Remediation is available for this issue
True
CVE-2022-34749 (High) detected in mistune-0.8.4-py2.py3-none-any.whl - ## CVE-2022-34749 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>mistune-0.8.4-py2.py3-none-any.whl</b></p></summary> <p>The fastest markdown parser in pure Python</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/09/ec/4b43dae793655b7d8a25f76119624350b4d65eb663459eb9603d7f1f0345/mistune-0.8.4-py2.py3-none-any.whl">https://files.pythonhosted.org/packages/09/ec/4b43dae793655b7d8a25f76119624350b4d65eb663459eb9603d7f1f0345/mistune-0.8.4-py2.py3-none-any.whl</a></p> <p>Path to dependency file: /admin/doc-requirements.txt</p> <p>Path to vulnerable library: /admin/doc-requirements.txt,/admin/doc-requirements.txt,/src/pybind/rados,/src/ceph-volume,/src/pybind/cephfs</p> <p> Dependency Hierarchy: - :x: **mistune-0.8.4-py2.py3-none-any.whl** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Seagate/cortx-rgw/commit/aa78617d024ccd26801e43c6980f939cf8bded5f">aa78617d024ccd26801e43c6980f939cf8bded5f</a></p> <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In mistune through 2.0.2, support of inline markup is implemented by using regular expressions that can involve a high amount of backtracking on certain edge cases. This behavior is commonly named catastrophic backtracking. <p>Publish Date: 2022-07-25 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-34749>CVE-2022-34749</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-fw3v-x4f2-v673">https://github.com/advisories/GHSA-fw3v-x4f2-v673</a></p> <p>Release Date: 2022-07-25</p> <p>Fix Resolution: mistune - 2.0.3</p> </p> </details> <p></p> *** :rescue_worker_helmet: Automatic Remediation is available for this issue
non_infrastructure
cve high detected in mistune none any whl cve high severity vulnerability vulnerable library mistune none any whl the fastest markdown parser in pure python library home page a href path to dependency file admin doc requirements txt path to vulnerable library admin doc requirements txt admin doc requirements txt src pybind rados src ceph volume src pybind cephfs dependency hierarchy x mistune none any whl vulnerable library found in head commit a href found in base branch main vulnerability details in mistune through support of inline markup is implemented by using regular expressions that can involve a high amount of backtracking on certain edge cases this behavior is commonly named catastrophic backtracking publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution mistune rescue worker helmet automatic remediation is available for this issue
0
459,271
13,189,822,063
IssuesEvent
2020-08-13 09:06:53
StrangeLoopGames/EcoIssues
https://api.github.com/repos/StrangeLoopGames/EcoIssues
closed
0.9 time slept form localization
Category: Localization Priority: Low Status: Fixed
1) i cannot see strings for hours and seconds 2) Time slept: exists on crowdin but not used 3) button should be longer\bigger. ![изображение](https://user-images.githubusercontent.com/4980243/89180605-c2e9bf00-d59a-11ea-99fe-234c8f13010b.png)
1.0
0.9 time slept form localization - 1) i cannot see strings for hours and seconds 2) Time slept: exists on crowdin but not used 3) button should be longer\bigger. ![изображение](https://user-images.githubusercontent.com/4980243/89180605-c2e9bf00-d59a-11ea-99fe-234c8f13010b.png)
non_infrastructure
time slept form localization i cannot see strings for hours and seconds time slept exists on crowdin but not used button should be longer bigger
0
67,334
20,961,606,126
IssuesEvent
2022-03-27 21:48:16
abedmaatalla/sipdroid
https://api.github.com/repos/abedmaatalla/sipdroid
closed
Answer from lock screen fails
Priority-Medium Type-Defect auto-migrated
``` Attempting to answer an incoming SIP call when the phone is on the lock screen fails. This problem did not exist in an earlier version of sipdroid with my earlier version of Android. I'm not sure exactly when the problem started. Details: Running sipdroid 3.4 beta on Stock Android 4.1.2 on Samsung SGH-i747 (AT&T Galaxy S3) Symptoms: Call comes in. Phone rings. Sometimes as you unlock the phone the ringing stops, sometimes it does not. After the screen is unlocked, you are unable to answer the call by sliding the icon up to the top. As you slide it up, it comes back down without answering. If you answer from the menu, the call is established, but you cannot hangup the call by sliding down, you need to use the menu. ``` Original issue reported on code.google.com by `Dale.DeJ...@gmail.com` on 12 Dec 2013 at 12:24
1.0
Answer from lock screen fails - ``` Attempting to answer an incoming SIP call when the phone is on the lock screen fails. This problem did not exist in an earlier version of sipdroid with my earlier version of Android. I'm not sure exactly when the problem started. Details: Running sipdroid 3.4 beta on Stock Android 4.1.2 on Samsung SGH-i747 (AT&T Galaxy S3) Symptoms: Call comes in. Phone rings. Sometimes as you unlock the phone the ringing stops, sometimes it does not. After the screen is unlocked, you are unable to answer the call by sliding the icon up to the top. As you slide it up, it comes back down without answering. If you answer from the menu, the call is established, but you cannot hangup the call by sliding down, you need to use the menu. ``` Original issue reported on code.google.com by `Dale.DeJ...@gmail.com` on 12 Dec 2013 at 12:24
non_infrastructure
answer from lock screen fails attempting to answer an incoming sip call when the phone is on the lock screen fails this problem did not exist in an earlier version of sipdroid with my earlier version of android i m not sure exactly when the problem started details running sipdroid beta on stock android on samsung sgh at t galaxy symptoms call comes in phone rings sometimes as you unlock the phone the ringing stops sometimes it does not after the screen is unlocked you are unable to answer the call by sliding the icon up to the top as you slide it up it comes back down without answering if you answer from the menu the call is established but you cannot hangup the call by sliding down you need to use the menu original issue reported on code google com by dale dej gmail com on dec at
0
18,126
12,798,429,513
IssuesEvent
2020-07-02 13:55:07
IMAGINE-Consortium/imagine
https://api.github.com/repos/IMAGINE-Consortium/imagine
closed
icy decorator - remove it?
infrastructure
The `@icy` decorator prevents new attributes to be added to an object/class. While this may prevent some specific types of error (e.g. typos in attributes name), it makes the code less modular (as it prevents one from adding extra structures to derived classes). Is there any strong argument for keeping the `@icy` anywhere in the code?
1.0
icy decorator - remove it? - The `@icy` decorator prevents new attributes to be added to an object/class. While this may prevent some specific types of error (e.g. typos in attributes name), it makes the code less modular (as it prevents one from adding extra structures to derived classes). Is there any strong argument for keeping the `@icy` anywhere in the code?
infrastructure
icy decorator remove it the icy decorator prevents new attributes to be added to an object class while this may prevent some specific types of error e g typos in attributes name it makes the code less modular as it prevents one from adding extra structures to derived classes is there any strong argument for keeping the icy anywhere in the code
1
45,241
9,696,740,758
IssuesEvent
2019-05-25 10:30:29
AdAway/AdAway
https://api.github.com/repos/AdAway/AdAway
closed
ROM upgrades assumes disabled, does not update
Priority-Medium bug imported-from-googlecode
_Original author: khayt...@gmail.com (November 11, 2012 23:17:49)_ <b>What steps will reproduce the problem?</b> 1. Set app to auto update 2. Remove the hosts file 3. Note that app shows disabled <b>What is the expected output? What do you see instead?</b> I would prefer the app instead decide in some other manner if it should be disabled and instead when updating the ROM (which formats /system) it automatically updates at its normal time. <b>Please enable Debug Logging in preferences of AdAway, install aLogcat and</b> <b>save a logfile while reproducing the problem. The logfile can be attached</b> <b>to this issue.</b> <b>What version of AdAway are you using? What Android version? What custom</b> <b>rom?</b> Latest, 1.37. <b>Please provide any additional information below.</b> _Original issue: http://code.google.com/p/ad-away/issues/detail?id=341_
1.0
ROM upgrades assumes disabled, does not update - _Original author: khayt...@gmail.com (November 11, 2012 23:17:49)_ <b>What steps will reproduce the problem?</b> 1. Set app to auto update 2. Remove the hosts file 3. Note that app shows disabled <b>What is the expected output? What do you see instead?</b> I would prefer the app instead decide in some other manner if it should be disabled and instead when updating the ROM (which formats /system) it automatically updates at its normal time. <b>Please enable Debug Logging in preferences of AdAway, install aLogcat and</b> <b>save a logfile while reproducing the problem. The logfile can be attached</b> <b>to this issue.</b> <b>What version of AdAway are you using? What Android version? What custom</b> <b>rom?</b> Latest, 1.37. <b>Please provide any additional information below.</b> _Original issue: http://code.google.com/p/ad-away/issues/detail?id=341_
non_infrastructure
rom upgrades assumes disabled does not update original author khayt gmail com november what steps will reproduce the problem set app to auto update remove the hosts file note that app shows disabled what is the expected output what do you see instead i would prefer the app instead decide in some other manner if it should be disabled and instead when updating the rom which formats system it automatically updates at its normal time please enable debug logging in preferences of adaway install alogcat and save a logfile while reproducing the problem the logfile can be attached to this issue what version of adaway are you using what android version what custom rom latest please provide any additional information below original issue
0
19,143
13,189,628,244
IssuesEvent
2020-08-13 08:47:02
containous/maesh
https://api.github.com/repos/containous/maesh
opened
Update to Go 1.15
area/infrastructure kind/enhancement
## Feature Request ### Proposal Go 1.15 is officially released: https://blog.golang.org/go1.15 Once the CI has it enabled, we should update: https://docs.semaphoreci.com/ci-cd-environment/ubuntu-18.04-image/#go There are no specific issues at the moment, so it's not a priority.
1.0
Update to Go 1.15 - ## Feature Request ### Proposal Go 1.15 is officially released: https://blog.golang.org/go1.15 Once the CI has it enabled, we should update: https://docs.semaphoreci.com/ci-cd-environment/ubuntu-18.04-image/#go There are no specific issues at the moment, so it's not a priority.
infrastructure
update to go feature request proposal go is officially released once the ci has it enabled we should update there are no specific issues at the moment so it s not a priority
1
17,841
12,373,785,912
IssuesEvent
2020-05-18 23:31:28
jstanden/cerb
https://api.github.com/repos/jstanden/cerb
opened
[Plugins/Twitter] Verify the character count feature in tweets
usability
There appears to be a discrepancy between how Twitter counts characters and the Cerb plugin does.
True
[Plugins/Twitter] Verify the character count feature in tweets - There appears to be a discrepancy between how Twitter counts characters and the Cerb plugin does.
non_infrastructure
verify the character count feature in tweets there appears to be a discrepancy between how twitter counts characters and the cerb plugin does
0
26,719
20,603,436,285
IssuesEvent
2022-03-06 16:19:11
GMLC-TDC/HELICS
https://api.github.com/repos/GMLC-TDC/HELICS
closed
Update Windows versions used for CI builds for upcoming vm image deprecation
infrastructure/ci
As part of [recently announced image deprecation for Azure Pipelines](https://devblogs.microsoft.com/devops/hosted-pipelines-image-deprecation/), the Windows jobs need updating to use a newer image by March 2022. Update the [Windows jobs on Azure Pipelines](https://github.com/GMLC-TDC/HELICS/blob/main/.ci/azure-pipelines.yml#L91) - Change the `VS2017-32bit` and `VS2017-64bit` jobs to run on VS2019 - Change the `VS2019-64bit` job to run on VS2022 - Update the [build requirements for Windows on the installation docs page](https://docs.helics.org/en/latest/user-guide/installation/windows.html) Update the [Windows release build jobs on GitHub Actions](https://github.com/GMLC-TDC/HELICS/blob/main/.github/workflows/release-build.yml) - Change builds using `windows-2016` to `windows-2019` - Change builds using `windows-2019` to `windows-2022`
1.0
Update Windows versions used for CI builds for upcoming vm image deprecation - As part of [recently announced image deprecation for Azure Pipelines](https://devblogs.microsoft.com/devops/hosted-pipelines-image-deprecation/), the Windows jobs need updating to use a newer image by March 2022. Update the [Windows jobs on Azure Pipelines](https://github.com/GMLC-TDC/HELICS/blob/main/.ci/azure-pipelines.yml#L91) - Change the `VS2017-32bit` and `VS2017-64bit` jobs to run on VS2019 - Change the `VS2019-64bit` job to run on VS2022 - Update the [build requirements for Windows on the installation docs page](https://docs.helics.org/en/latest/user-guide/installation/windows.html) Update the [Windows release build jobs on GitHub Actions](https://github.com/GMLC-TDC/HELICS/blob/main/.github/workflows/release-build.yml) - Change builds using `windows-2016` to `windows-2019` - Change builds using `windows-2019` to `windows-2022`
infrastructure
update windows versions used for ci builds for upcoming vm image deprecation as part of the windows jobs need updating to use a newer image by march update the change the and jobs to run on change the job to run on update the update the change builds using windows to windows change builds using windows to windows
1
29,352
23,936,015,444
IssuesEvent
2022-09-11 08:31:01
treeverse/lakeFS
https://api.github.com/repos/treeverse/lakeFS
closed
Docker image should include updated ca-certificates
infrastructure team/cloud-native
- lakeFS and lakeFS should include updated ca-certificates - update-ca-certificates should be available in order to update more certificates by the user without additional packages
1.0
Docker image should include updated ca-certificates - - lakeFS and lakeFS should include updated ca-certificates - update-ca-certificates should be available in order to update more certificates by the user without additional packages
infrastructure
docker image should include updated ca certificates lakefs and lakefs should include updated ca certificates update ca certificates should be available in order to update more certificates by the user without additional packages
1
21,418
14,547,172,993
IssuesEvent
2020-12-15 22:28:48
robotology/QA
https://api.github.com/repos/robotology/QA
closed
New GUI ethLoader
firmware infrastructure
Hi, I wanted to update the robot, and as I've understood from issues #134 and #135, there is a new gui for the `ethLoader`, and all the updated instructions are referred to the new gui. However, even if I updated everything, I still see the old gui; therefore, is there any option or so that I had to activate to see the new gui? (I updated the firmware anyway with the old one, but for future and also students it would be better to have the one that matches with the instructions). Thanks!
1.0
New GUI ethLoader - Hi, I wanted to update the robot, and as I've understood from issues #134 and #135, there is a new gui for the `ethLoader`, and all the updated instructions are referred to the new gui. However, even if I updated everything, I still see the old gui; therefore, is there any option or so that I had to activate to see the new gui? (I updated the firmware anyway with the old one, but for future and also students it would be better to have the one that matches with the instructions). Thanks!
infrastructure
new gui ethloader hi i wanted to update the robot and as i ve understood from issues and there is a new gui for the ethloader and all the updated instructions are referred to the new gui however even if i updated everything i still see the old gui therefore is there any option or so that i had to activate to see the new gui i updated the firmware anyway with the old one but for future and also students it would be better to have the one that matches with the instructions thanks
1
17,595
12,475,863,672
IssuesEvent
2020-05-29 12:27:32
hotosm/tasking-manager
https://api.github.com/repos/hotosm/tasking-manager
closed
Non-dev testing environment
Component: Infrastructure Difficulty: Medium Priority: Medium Status: Needs implementation Type: Enhancement
It would be good non-developers can test Pull Requests of the Tasking Manager. This requires to setup a test setup much easier. First step has been done with the Docker Compose setup (#797 and related improvements on configuration #1419). Recent testing on Windows and Mac showed problems with the legacy Docker versions. But also the workflow has been extremely rough. That we ended up deploying on a VPS. Let's use this issue to find a suitable solution for non-devs.
1.0
Non-dev testing environment - It would be good non-developers can test Pull Requests of the Tasking Manager. This requires to setup a test setup much easier. First step has been done with the Docker Compose setup (#797 and related improvements on configuration #1419). Recent testing on Windows and Mac showed problems with the legacy Docker versions. But also the workflow has been extremely rough. That we ended up deploying on a VPS. Let's use this issue to find a suitable solution for non-devs.
infrastructure
non dev testing environment it would be good non developers can test pull requests of the tasking manager this requires to setup a test setup much easier first step has been done with the docker compose setup and related improvements on configuration recent testing on windows and mac showed problems with the legacy docker versions but also the workflow has been extremely rough that we ended up deploying on a vps let s use this issue to find a suitable solution for non devs
1
1,282
3,120,933,020
IssuesEvent
2015-09-05 05:31:26
AnSq/IRCR_Info_Bot
https://api.github.com/repos/AnSq/IRCR_Info_Bot
closed
Upgrade to new Heroku stack
infrastructure wontfix
Message from `git push heroku`: ! Cedar-10 will reach end-of-life on November 4th, 2015. ! Upgrade to Cedar-14 at your earliest convenience. ! For more information, check out the following Dev Center article: ! https://devcenter.heroku.com/articles/cedar-14-migration https://devcenter.heroku.com/articles/cedar-14-migration
1.0
Upgrade to new Heroku stack - Message from `git push heroku`: ! Cedar-10 will reach end-of-life on November 4th, 2015. ! Upgrade to Cedar-14 at your earliest convenience. ! For more information, check out the following Dev Center article: ! https://devcenter.heroku.com/articles/cedar-14-migration https://devcenter.heroku.com/articles/cedar-14-migration
infrastructure
upgrade to new heroku stack message from git push heroku cedar will reach end of life on november upgrade to cedar at your earliest convenience for more information check out the following dev center article
1
118,202
17,576,963,662
IssuesEvent
2021-08-15 19:58:26
ghc-dev/Michael-Hurley-DDS
https://api.github.com/repos/ghc-dev/Michael-Hurley-DDS
opened
CVE-2020-10744 (Medium) detected in ansible-2.9.9.tar.gz
security vulnerability
## CVE-2020-10744 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>ansible-2.9.9.tar.gz</b></p></summary> <p>Radically simple IT automation</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/00/5d/e10b83e0e6056dbd5b4809b451a191395175a57e3175ce04e35d9c5fc2a0/ansible-2.9.9.tar.gz">https://files.pythonhosted.org/packages/00/5d/e10b83e0e6056dbd5b4809b451a191395175a57e3175ce04e35d9c5fc2a0/ansible-2.9.9.tar.gz</a></p> <p>Path to dependency file: Michael-Hurley-DDS/requirements.txt</p> <p>Path to vulnerable library: /requirements.txt</p> <p> Dependency Hierarchy: - :x: **ansible-2.9.9.tar.gz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/ghc-dev/Michael-Hurley-DDS/commit/8733fcfea66ede3b2aa595def7fabe28c51d0e65">8733fcfea66ede3b2aa595def7fabe28c51d0e65</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> An incomplete fix was found for the fix of the flaw CVE-2020-1733 ansible: insecure temporary directory when running become_user from become directive. The provided fix is insufficient to prevent the race condition on systems using ACLs and FUSE filesystems. Ansible Engine 2.7.18, 2.8.12, and 2.9.9 as well as previous versions are affected and Ansible Tower 3.4.5, 3.5.6 and 3.6.4 as well as previous versions are affected. <p>Publish Date: 2020-05-15 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-10744>CVE-2020-10744</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.0</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: High - Privileges Required: Low - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Python","packageName":"ansible","packageVersion":"2.9.9","packageFilePaths":["/requirements.txt"],"isTransitiveDependency":false,"dependencyTree":"ansible:2.9.9","isMinimumFixVersionAvailable":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-10744","vulnerabilityDetails":"An incomplete fix was found for the fix of the flaw CVE-2020-1733 ansible: insecure temporary directory when running become_user from become directive. The provided fix is insufficient to prevent the race condition on systems using ACLs and FUSE filesystems. Ansible Engine 2.7.18, 2.8.12, and 2.9.9 as well as previous versions are affected and Ansible Tower 3.4.5, 3.5.6 and 3.6.4 as well as previous versions are affected.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-10744","cvss3Severity":"medium","cvss3Score":"5.0","cvss3Metrics":{"A":"Low","AC":"High","PR":"Low","S":"Changed","C":"Low","UI":"Required","AV":"Local","I":"Low"},"extraData":{}}</REMEDIATE> -->
True
CVE-2020-10744 (Medium) detected in ansible-2.9.9.tar.gz - ## CVE-2020-10744 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>ansible-2.9.9.tar.gz</b></p></summary> <p>Radically simple IT automation</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/00/5d/e10b83e0e6056dbd5b4809b451a191395175a57e3175ce04e35d9c5fc2a0/ansible-2.9.9.tar.gz">https://files.pythonhosted.org/packages/00/5d/e10b83e0e6056dbd5b4809b451a191395175a57e3175ce04e35d9c5fc2a0/ansible-2.9.9.tar.gz</a></p> <p>Path to dependency file: Michael-Hurley-DDS/requirements.txt</p> <p>Path to vulnerable library: /requirements.txt</p> <p> Dependency Hierarchy: - :x: **ansible-2.9.9.tar.gz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/ghc-dev/Michael-Hurley-DDS/commit/8733fcfea66ede3b2aa595def7fabe28c51d0e65">8733fcfea66ede3b2aa595def7fabe28c51d0e65</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> An incomplete fix was found for the fix of the flaw CVE-2020-1733 ansible: insecure temporary directory when running become_user from become directive. The provided fix is insufficient to prevent the race condition on systems using ACLs and FUSE filesystems. Ansible Engine 2.7.18, 2.8.12, and 2.9.9 as well as previous versions are affected and Ansible Tower 3.4.5, 3.5.6 and 3.6.4 as well as previous versions are affected. <p>Publish Date: 2020-05-15 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-10744>CVE-2020-10744</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.0</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: High - Privileges Required: Low - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Python","packageName":"ansible","packageVersion":"2.9.9","packageFilePaths":["/requirements.txt"],"isTransitiveDependency":false,"dependencyTree":"ansible:2.9.9","isMinimumFixVersionAvailable":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-10744","vulnerabilityDetails":"An incomplete fix was found for the fix of the flaw CVE-2020-1733 ansible: insecure temporary directory when running become_user from become directive. The provided fix is insufficient to prevent the race condition on systems using ACLs and FUSE filesystems. Ansible Engine 2.7.18, 2.8.12, and 2.9.9 as well as previous versions are affected and Ansible Tower 3.4.5, 3.5.6 and 3.6.4 as well as previous versions are affected.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-10744","cvss3Severity":"medium","cvss3Score":"5.0","cvss3Metrics":{"A":"Low","AC":"High","PR":"Low","S":"Changed","C":"Low","UI":"Required","AV":"Local","I":"Low"},"extraData":{}}</REMEDIATE> -->
non_infrastructure
cve medium detected in ansible tar gz cve medium severity vulnerability vulnerable library ansible tar gz radically simple it automation library home page a href path to dependency file michael hurley dds requirements txt path to vulnerable library requirements txt dependency hierarchy x ansible tar gz vulnerable library found in head commit a href found in base branch master vulnerability details an incomplete fix was found for the fix of the flaw cve ansible insecure temporary directory when running become user from become directive the provided fix is insufficient to prevent the race condition on systems using acls and fuse filesystems ansible engine and as well as previous versions are affected and ansible tower and as well as previous versions are affected publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity high privileges required low user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact low for more information on scores click a href isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency false dependencytree ansible isminimumfixversionavailable false basebranches vulnerabilityidentifier cve vulnerabilitydetails an incomplete fix was found for the fix of the flaw cve ansible insecure temporary directory when running become user from become directive the provided fix is insufficient to prevent the race condition on systems using acls and fuse filesystems ansible engine and as well as previous versions are affected and ansible tower and as well as previous versions are affected vulnerabilityurl
0
15,878
11,739,706,721
IssuesEvent
2020-03-11 18:11:46
dotnet/runtime
https://api.github.com/repos/dotnet/runtime
closed
Make work item payload smaller for crossgen-comparison job
area-Infrastructure-coreclr
We currently put up the whole artifacts directory as the work item for our crossgen comparison jobs. This results in a massive work item which the ARM machines sometimes have trouble downloading according to https://github.com/dotnet/runtime/issues/33404#issuecomment-597180362. We should instead create a separate folder that has only the necessary files and send that as the work item directory to save space over the wire and speed up the download. cc: @jashook
1.0
Make work item payload smaller for crossgen-comparison job - We currently put up the whole artifacts directory as the work item for our crossgen comparison jobs. This results in a massive work item which the ARM machines sometimes have trouble downloading according to https://github.com/dotnet/runtime/issues/33404#issuecomment-597180362. We should instead create a separate folder that has only the necessary files and send that as the work item directory to save space over the wire and speed up the download. cc: @jashook
infrastructure
make work item payload smaller for crossgen comparison job we currently put up the whole artifacts directory as the work item for our crossgen comparison jobs this results in a massive work item which the arm machines sometimes have trouble downloading according to we should instead create a separate folder that has only the necessary files and send that as the work item directory to save space over the wire and speed up the download cc jashook
1
12,947
10,028,730,772
IssuesEvent
2019-07-17 12:25:42
snowleopard/hadrian
https://api.github.com/repos/snowleopard/hadrian
closed
Add support for fast rebuild of a single package (ignoring all other dependencies)
enhancement infrastructure performance
As discussed in #464, we need a way to tell Hadrian to rebuild a single GHC package ignoring any external dependencies, just like we did when implementing the `--freeze1` feature #250. See this comment: https://github.com/snowleopard/hadrian/issues/464#issuecomment-345016179.
1.0
Add support for fast rebuild of a single package (ignoring all other dependencies) - As discussed in #464, we need a way to tell Hadrian to rebuild a single GHC package ignoring any external dependencies, just like we did when implementing the `--freeze1` feature #250. See this comment: https://github.com/snowleopard/hadrian/issues/464#issuecomment-345016179.
infrastructure
add support for fast rebuild of a single package ignoring all other dependencies as discussed in we need a way to tell hadrian to rebuild a single ghc package ignoring any external dependencies just like we did when implementing the feature see this comment
1
23,847
16,621,014,242
IssuesEvent
2021-06-03 01:00:39
microsoft/react-native-windows
https://api.github.com/repos/microsoft/react-native-windows
closed
E2E tests cannot find element by testID if it's not focusable
Area: Test Infrastructure enhancement
The webdriverio $ selector operator relies on the native control being focusable. This requirement is an obstacle for any scenario where the component isn't supposed to be focusable, but we want an automated test to find the element. For example see discussion in: https://github.com/microsoft/react-native-windows/pull/6344#issuecomment-718041077 This issue is tracking making it possible to find any element with a testID, regardless of whether or not it was set focusable.
1.0
E2E tests cannot find element by testID if it's not focusable - The webdriverio $ selector operator relies on the native control being focusable. This requirement is an obstacle for any scenario where the component isn't supposed to be focusable, but we want an automated test to find the element. For example see discussion in: https://github.com/microsoft/react-native-windows/pull/6344#issuecomment-718041077 This issue is tracking making it possible to find any element with a testID, regardless of whether or not it was set focusable.
infrastructure
tests cannot find element by testid if it s not focusable the webdriverio selector operator relies on the native control being focusable this requirement is an obstacle for any scenario where the component isn t supposed to be focusable but we want an automated test to find the element for example see discussion in this issue is tracking making it possible to find any element with a testid regardless of whether or not it was set focusable
1
372,578
11,017,118,709
IssuesEvent
2019-12-05 07:35:06
openshift/odo
https://api.github.com/repos/openshift/odo
closed
Nodejs images are not showing as supported on 4.3 cluster
points/3 priority/High
[kind/bug] <!-- Welcome! - We kindly ask you to: 1. Fill out the issue template below 2. Use the Google group if you have a question rather than a bug or feature request. The group is at: https://groups.google.com/forum/#!forum/odo-users Thanks for understanding, and for contributing to the project! --> ## What versions of software are you using? - Operating System: - Output of `odo version`: odo master ## How did you run odo exactly? odo create nodejs ## Actual behavior warning shows up ## Expected behavior No warning ## Any logs, error output, etc? ``` [odo] Warning: nodejs is not fully supported by odo, and it is not guaranteed to work. ```
1.0
Nodejs images are not showing as supported on 4.3 cluster - [kind/bug] <!-- Welcome! - We kindly ask you to: 1. Fill out the issue template below 2. Use the Google group if you have a question rather than a bug or feature request. The group is at: https://groups.google.com/forum/#!forum/odo-users Thanks for understanding, and for contributing to the project! --> ## What versions of software are you using? - Operating System: - Output of `odo version`: odo master ## How did you run odo exactly? odo create nodejs ## Actual behavior warning shows up ## Expected behavior No warning ## Any logs, error output, etc? ``` [odo] Warning: nodejs is not fully supported by odo, and it is not guaranteed to work. ```
non_infrastructure
nodejs images are not showing as supported on cluster welcome we kindly ask you to fill out the issue template below use the google group if you have a question rather than a bug or feature request the group is at thanks for understanding and for contributing to the project what versions of software are you using operating system output of odo version odo master how did you run odo exactly odo create nodejs actual behavior warning shows up expected behavior no warning any logs error output etc warning nodejs is not fully supported by odo and it is not guaranteed to work
0
13,967
10,563,130,789
IssuesEvent
2019-10-04 20:08:06
SNLComputation/Albany
https://api.github.com/repos/SNLComputation/Albany
reopened
Remove stale branches
infrastructure
breakaway from #58, so far `epetra` and `issue-34` are known to be branches we should keep.
1.0
Remove stale branches - breakaway from #58, so far `epetra` and `issue-34` are known to be branches we should keep.
infrastructure
remove stale branches breakaway from so far epetra and issue are known to be branches we should keep
1
4,392
5,031,519,406
IssuesEvent
2016-12-16 07:28:50
Starcounter/Starcounter
https://api.github.com/repos/Starcounter/Starcounter
closed
Introduce application ID ("namespace") in addition to name?
enhancement Infrastructure Low prio Product owner
We are having discussions about how to handle application names and their uniqueness, and we need a decision. The #1742 issue suggest different approaches, and here's another one - allow the application name not to be unique (i.e. have it the name of the file, or the custom name if such is given) and introduce a second property, "id" (or "namespace"), that is governed by Starcounter and is guaranteed to be unique. Preferably, this id should be as close to the name as possible. When we reach a decision, we'll agree on it here and have the work needed to be done being branched by this issue.
1.0
Introduce application ID ("namespace") in addition to name? - We are having discussions about how to handle application names and their uniqueness, and we need a decision. The #1742 issue suggest different approaches, and here's another one - allow the application name not to be unique (i.e. have it the name of the file, or the custom name if such is given) and introduce a second property, "id" (or "namespace"), that is governed by Starcounter and is guaranteed to be unique. Preferably, this id should be as close to the name as possible. When we reach a decision, we'll agree on it here and have the work needed to be done being branched by this issue.
infrastructure
introduce application id namespace in addition to name we are having discussions about how to handle application names and their uniqueness and we need a decision the issue suggest different approaches and here s another one allow the application name not to be unique i e have it the name of the file or the custom name if such is given and introduce a second property id or namespace that is governed by starcounter and is guaranteed to be unique preferably this id should be as close to the name as possible when we reach a decision we ll agree on it here and have the work needed to be done being branched by this issue
1
89,145
3,790,087,895
IssuesEvent
2016-03-21 20:13:28
fgpv-vpgf/fgpv-vpgf
https://api.github.com/repos/fgpv-vpgf/fgpv-vpgf
opened
Add Custom text/html Mime Type for WMS Support
improvements: enhancement priority: medium
Add a custom MIME type field to indicate that `text/html` should be formatted as an HTML fragment that is safe to drop into the a click event panel. Will be useful beyond just the WMS use case.
1.0
Add Custom text/html Mime Type for WMS Support - Add a custom MIME type field to indicate that `text/html` should be formatted as an HTML fragment that is safe to drop into the a click event panel. Will be useful beyond just the WMS use case.
non_infrastructure
add custom text html mime type for wms support add a custom mime type field to indicate that text html should be formatted as an html fragment that is safe to drop into the a click event panel will be useful beyond just the wms use case
0
27,121
21,187,853,748
IssuesEvent
2022-04-08 14:25:23
cal-itp/data-infra
https://api.github.com/repos/cal-itp/data-infra
closed
Airflow: Limit `sandbox` DAG to a pool of 1
infrastructure
To limit `sandbox` tasks' impacts on the rest of the Airflow ecosystem, we want to create a [pool](https://airflow.apache.org/docs/apache-airflow/stable/concepts/pools.html) for `sandbox` and limit them to one task executing at a time. Example PR doing this for the GTFS RT pipeline: https://github.com/cal-itp/data-infra/pull/1307 -- we also need to configure the pool itself in the Airflow UI. AC: - [ ] `sandbox` DAG has a pool created
1.0
Airflow: Limit `sandbox` DAG to a pool of 1 - To limit `sandbox` tasks' impacts on the rest of the Airflow ecosystem, we want to create a [pool](https://airflow.apache.org/docs/apache-airflow/stable/concepts/pools.html) for `sandbox` and limit them to one task executing at a time. Example PR doing this for the GTFS RT pipeline: https://github.com/cal-itp/data-infra/pull/1307 -- we also need to configure the pool itself in the Airflow UI. AC: - [ ] `sandbox` DAG has a pool created
infrastructure
airflow limit sandbox dag to a pool of to limit sandbox tasks impacts on the rest of the airflow ecosystem we want to create a for sandbox and limit them to one task executing at a time example pr doing this for the gtfs rt pipeline we also need to configure the pool itself in the airflow ui ac sandbox dag has a pool created
1
336,319
10,180,299,385
IssuesEvent
2019-08-09 09:56:27
webcompat/web-bugs
https://api.github.com/repos/webcompat/web-bugs
closed
www.google.com - User agent detection error - detects to non supported browser
browser-firefox-mobile engine-gecko priority-critical
<!-- @browser: Firefox Mobile 58.0 --> <!-- @ua_header: Mozilla/5.0 (Android 7.1.2; Mobile; rv:58.0) Gecko/58.0 Firefox/58.0 --> <!-- @reported_with: mobile-reporter --> **URL**: https://www.google.com/locationhistory/preview/fallback?hl=ko **Browser / Version**: Firefox Mobile 58.0 **Operating System**: Android 7.1.2 **Tested Another Browser**: Yes **Problem type**: Something else **Description**: User agent detection error - detects to non supported browser **Steps to Reproduce**: Direct url [![Screenshot Description](https://webcompat.com/uploads/2017/9/52eabc7c-33fa-4fba-ad52-f59e4aa71ab6-thumb.jpg)](https://webcompat.com/uploads/2017/9/52eabc7c-33fa-4fba-ad52-f59e4aa71ab6.jpg) _From [webcompat.com](https://webcompat.com/) with ❤️_
1.0
www.google.com - User agent detection error - detects to non supported browser - <!-- @browser: Firefox Mobile 58.0 --> <!-- @ua_header: Mozilla/5.0 (Android 7.1.2; Mobile; rv:58.0) Gecko/58.0 Firefox/58.0 --> <!-- @reported_with: mobile-reporter --> **URL**: https://www.google.com/locationhistory/preview/fallback?hl=ko **Browser / Version**: Firefox Mobile 58.0 **Operating System**: Android 7.1.2 **Tested Another Browser**: Yes **Problem type**: Something else **Description**: User agent detection error - detects to non supported browser **Steps to Reproduce**: Direct url [![Screenshot Description](https://webcompat.com/uploads/2017/9/52eabc7c-33fa-4fba-ad52-f59e4aa71ab6-thumb.jpg)](https://webcompat.com/uploads/2017/9/52eabc7c-33fa-4fba-ad52-f59e4aa71ab6.jpg) _From [webcompat.com](https://webcompat.com/) with ❤️_
non_infrastructure
user agent detection error detects to non supported browser url browser version firefox mobile operating system android tested another browser yes problem type something else description user agent detection error detects to non supported browser steps to reproduce direct url from with ❤️
0
6,588
6,525,412,117
IssuesEvent
2017-08-29 15:48:19
codingteam/emulsion
https://api.github.com/repos/codingteam/emulsion
closed
Update SharpXmpp
kind:feature kind:infrastructure
After https://github.com/vitalyster/SharpXMPP/issues/15 has been fixed, I need to publish and reference the new library version.
1.0
Update SharpXmpp - After https://github.com/vitalyster/SharpXMPP/issues/15 has been fixed, I need to publish and reference the new library version.
infrastructure
update sharpxmpp after has been fixed i need to publish and reference the new library version
1
29,844
24,327,835,229
IssuesEvent
2022-09-30 16:20:41
unitaryfund/mitiq
https://api.github.com/repos/unitaryfund/mitiq
closed
Test Mitiq with more recent versions of Python
bug infrastructure priority/p0 dependencies
Mitiq is currently tested with Python 3.7 and Python 3.8. It would be good, if possible, to upgrade versions by one or two steps. I.e., testing Mitiq with: - Python 3.8 and 3.9 or - Python 3.8, 3.9 and 3.10 This issue is not just about _testing_ but also about _fixing_ possible issues that will emerge when testing recent Python versions. For example, dependency conflicts may happen as reported in #1285
1.0
Test Mitiq with more recent versions of Python - Mitiq is currently tested with Python 3.7 and Python 3.8. It would be good, if possible, to upgrade versions by one or two steps. I.e., testing Mitiq with: - Python 3.8 and 3.9 or - Python 3.8, 3.9 and 3.10 This issue is not just about _testing_ but also about _fixing_ possible issues that will emerge when testing recent Python versions. For example, dependency conflicts may happen as reported in #1285
infrastructure
test mitiq with more recent versions of python mitiq is currently tested with python and python it would be good if possible to upgrade versions by one or two steps i e testing mitiq with python and or python and this issue is not just about testing but also about fixing possible issues that will emerge when testing recent python versions for example dependency conflicts may happen as reported in
1
221
2,580,979,591
IssuesEvent
2015-02-13 21:23:35
dotnet/corefx
https://api.github.com/repos/dotnet/corefx
closed
NativeServiceTest fails to build with /p:OS=Unix
Infrastructure System.ServiceProcess.ServiceController
When running the following command from the root of my corefx repo: build /t:rebuild /p:SkipTests=true /p:OS=Unix I consistently get the following error towards the end of the build: C:\Program Files (x86)\MSBuild\Microsoft.Cpp\v4.0\V140\Microsoft.Cpp.Platform.targets(57,5): error MSB8020: The build tools for v120 (Platform Toolset = 'v120') cannot be found. To build using the v120 build tools, please install v120 build tools. Alternatively, you may upgrade to the current Visual Studio tools by selecting the Project menu or right-click the solution, and then selecting "Retarget solution". [\src\System.ServiceProcess.ServiceController\tests\NativeTestService\NativeTestService.vcxproj] I have VS2015 CTP 5 installed. I don't have VS2013 installed. (We don't actually need this Windows-only test project to build when building with OS=Unix, if that's the source of the problem.)
1.0
NativeServiceTest fails to build with /p:OS=Unix - When running the following command from the root of my corefx repo: build /t:rebuild /p:SkipTests=true /p:OS=Unix I consistently get the following error towards the end of the build: C:\Program Files (x86)\MSBuild\Microsoft.Cpp\v4.0\V140\Microsoft.Cpp.Platform.targets(57,5): error MSB8020: The build tools for v120 (Platform Toolset = 'v120') cannot be found. To build using the v120 build tools, please install v120 build tools. Alternatively, you may upgrade to the current Visual Studio tools by selecting the Project menu or right-click the solution, and then selecting "Retarget solution". [\src\System.ServiceProcess.ServiceController\tests\NativeTestService\NativeTestService.vcxproj] I have VS2015 CTP 5 installed. I don't have VS2013 installed. (We don't actually need this Windows-only test project to build when building with OS=Unix, if that's the source of the problem.)
infrastructure
nativeservicetest fails to build with p os unix when running the following command from the root of my corefx repo build t rebuild p skiptests true p os unix i consistently get the following error towards the end of the build c program files msbuild microsoft cpp microsoft cpp platform targets error the build tools for platform toolset cannot be found to build using the build tools please install build tools alternatively you may upgrade to the current visual studio tools by selecting the project menu or right click the solution and then selecting retarget solution i have ctp installed i don t have installed we don t actually need this windows only test project to build when building with os unix if that s the source of the problem
1
607,432
18,782,337,235
IssuesEvent
2021-11-08 08:29:33
code-ready/crc
https://api.github.com/repos/code-ready/crc
closed
[BUG] Login fails with system:anonymous cannot get resource configmaps
kind/bug priority/minor os/linux status/stale
### General information * OS: Linux * Hypervisor: KVM * Did you run `crc setup` before starting it (Yes/No)? Yes * Running CRC on: Laptop ## CRC version ```bash CodeReady Containers version: 1.26.0+31f06c09 OpenShift version: 4.7.8 (embedded in executable) ``` ## CRC status ```bash $ crc status --log-level debug DEBU CodeReady Containers version: 1.26.0+31f06c09 DEBU OpenShift version: 4.7.8 (embedded in executable) DEBU Running 'crc status' DEBU Checking file: /home/stavros/.crc/machines/crc/.crc-exist DEBU Checking file: /home/stavros/.crc/machines/crc/.crc-exist DEBU Found binary path at /home/stavros/.crc/bin/crc-driver-libvirt DEBU Launching plugin server for driver libvirt DEBU Plugin server listening at address 127.0.0.1:46297 DEBU () Calling .GetVersion DEBU Using API Version 1 DEBU () Calling .SetConfigRaw DEBU () Calling .GetMachineName DEBU (crc) Calling .GetState DEBU (crc) DBG | time="2021-05-17T12:08:06+03:00" level=debug msg="Getting current state..." DEBU (crc) DBG | time="2021-05-17T12:08:06+03:00" level=debug msg="Fetching VM..." DEBU (crc) Calling .GetBundleName DEBU (crc) Calling .GetIP DEBU (crc) DBG | time="2021-05-17T12:08:06+03:00" level=debug msg="GetIP called for crc" DEBU (crc) DBG | time="2021-05-17T12:08:06+03:00" level=debug msg="Getting current state..." DEBU (crc) DBG | time="2021-05-17T12:08:06+03:00" level=debug msg="IP address: 192.168.130.11" DEBU Running SSH command: df -B1 --output=size,used,target /sysroot | tail -1 DEBU Using ssh private keys: [/home/stavros/.crc/machines/crc/id_ecdsa /home/stavros/.crc/cache/crc_libvirt_4.7.8/id_ecdsa_crc] DEBU SSH command results: err: <nil>, output: 32737570816 15711195136 /sysroot DEBU Running SSH command: <hidden> DEBU SSH command succeeded DEBU Unexpected operator status for network: ManagementStateDegraded DEBU Making call to close driver server DEBU (crc) Calling .Close DEBU Successfully made call to close driver server DEBU Making call to close connection to plugin binary CRC VM: Running OpenShift: Running (v4.7.8) Disk Usage: 15.71GB of 32.74GB (Inside the CRC VM) Cache Usage: 13.18GB Cache Directory: /home/stavros/.crc/cache ``` ## CRC config ```bash - consent-telemetry : no - cpus : 8 - memory : 40960 ``` ## Host Operating System ```bash NAME=Fedora VERSION="33 (Workstation Edition)" ID=fedora VERSION_ID=33 VERSION_CODENAME="" PLATFORM_ID="platform:f33" PRETTY_NAME="Fedora 33 (Workstation Edition)" ANSI_COLOR="0;38;2;60;110;180" LOGO=fedora-logo-icon CPE_NAME="cpe:/o:fedoraproject:fedora:33" HOME_URL="https://fedoraproject.org/" DOCUMENTATION_URL="https://docs.fedoraproject.org/en-US/fedora/f33/system-administrators-guide/" SUPPORT_URL="https://fedoraproject.org/wiki/Communicating_and_getting_help" BUG_REPORT_URL="https://bugzilla.redhat.com/" REDHAT_BUGZILLA_PRODUCT="Fedora" REDHAT_BUGZILLA_PRODUCT_VERSION=33 REDHAT_SUPPORT_PRODUCT="Fedora" REDHAT_SUPPORT_PRODUCT_VERSION=33 PRIVACY_POLICY_URL="https://fedoraproject.org/wiki/Legal:PrivacyPolicy" VARIANT="Workstation Edition" VARIANT_ID=workstation ``` ### Steps to reproduce 1. crc delete -f 2. crc start pull-secret-4.7.8.txt 2>&1 3. oc login -u ... -p .... <- sucessful 4. Try again later `oc login ...` fails with: ``` I0517 12:11:27.688221 64013 request.go:1107] Response Body: {"kind":"Status","apiVersion":"v1","metadata":{},"status":"Failure","message":"configmaps \"motd\" is forbidden: User \"system:anonymous\" cannot get resource \"configmaps\" in API group \"\" in the namespace \"openshift\"","reason":"Forbidden","details":{"name":"motd","kind":"configmaps"},"code":403} I0517 12:11:27.688778 64013 helpers.go:216] server response object: [{ ``` Authorization pods look ok: ``` $ oc get pods -n openshift-authentication NAME READY STATUS RESTARTS AGE oauth-openshift-5ccbddfc68-cr888 1/1 Running 0 27m oauth-openshift-5ccbddfc68-drt6q 1/1 Running 0 27m ``` This might be related to https://github.com/code-ready/crc/issues/1807, however failure is permanent at my side. Trying to login on console also fails: ![image](https://user-images.githubusercontent.com/7945591/118465091-39127900-b70a-11eb-8953-8892a9aa4a95.png) ### Expected Login to be fine. ### Actual Login fails ### Logs https://gist.github.com/skonto/0b3256bdf5979fb91ef520690df8b034 Before gather the logs try following if that fix your issue ```bash $ crc delete -f $ crc cleanup $ crc setup $ crc start --log-level debug ``` Please consider posting the output of `crc start --log-level debug` on http://gist.github.com/ and post the link in the issue.
1.0
[BUG] Login fails with system:anonymous cannot get resource configmaps - ### General information * OS: Linux * Hypervisor: KVM * Did you run `crc setup` before starting it (Yes/No)? Yes * Running CRC on: Laptop ## CRC version ```bash CodeReady Containers version: 1.26.0+31f06c09 OpenShift version: 4.7.8 (embedded in executable) ``` ## CRC status ```bash $ crc status --log-level debug DEBU CodeReady Containers version: 1.26.0+31f06c09 DEBU OpenShift version: 4.7.8 (embedded in executable) DEBU Running 'crc status' DEBU Checking file: /home/stavros/.crc/machines/crc/.crc-exist DEBU Checking file: /home/stavros/.crc/machines/crc/.crc-exist DEBU Found binary path at /home/stavros/.crc/bin/crc-driver-libvirt DEBU Launching plugin server for driver libvirt DEBU Plugin server listening at address 127.0.0.1:46297 DEBU () Calling .GetVersion DEBU Using API Version 1 DEBU () Calling .SetConfigRaw DEBU () Calling .GetMachineName DEBU (crc) Calling .GetState DEBU (crc) DBG | time="2021-05-17T12:08:06+03:00" level=debug msg="Getting current state..." DEBU (crc) DBG | time="2021-05-17T12:08:06+03:00" level=debug msg="Fetching VM..." DEBU (crc) Calling .GetBundleName DEBU (crc) Calling .GetIP DEBU (crc) DBG | time="2021-05-17T12:08:06+03:00" level=debug msg="GetIP called for crc" DEBU (crc) DBG | time="2021-05-17T12:08:06+03:00" level=debug msg="Getting current state..." DEBU (crc) DBG | time="2021-05-17T12:08:06+03:00" level=debug msg="IP address: 192.168.130.11" DEBU Running SSH command: df -B1 --output=size,used,target /sysroot | tail -1 DEBU Using ssh private keys: [/home/stavros/.crc/machines/crc/id_ecdsa /home/stavros/.crc/cache/crc_libvirt_4.7.8/id_ecdsa_crc] DEBU SSH command results: err: <nil>, output: 32737570816 15711195136 /sysroot DEBU Running SSH command: <hidden> DEBU SSH command succeeded DEBU Unexpected operator status for network: ManagementStateDegraded DEBU Making call to close driver server DEBU (crc) Calling .Close DEBU Successfully made call to close driver server DEBU Making call to close connection to plugin binary CRC VM: Running OpenShift: Running (v4.7.8) Disk Usage: 15.71GB of 32.74GB (Inside the CRC VM) Cache Usage: 13.18GB Cache Directory: /home/stavros/.crc/cache ``` ## CRC config ```bash - consent-telemetry : no - cpus : 8 - memory : 40960 ``` ## Host Operating System ```bash NAME=Fedora VERSION="33 (Workstation Edition)" ID=fedora VERSION_ID=33 VERSION_CODENAME="" PLATFORM_ID="platform:f33" PRETTY_NAME="Fedora 33 (Workstation Edition)" ANSI_COLOR="0;38;2;60;110;180" LOGO=fedora-logo-icon CPE_NAME="cpe:/o:fedoraproject:fedora:33" HOME_URL="https://fedoraproject.org/" DOCUMENTATION_URL="https://docs.fedoraproject.org/en-US/fedora/f33/system-administrators-guide/" SUPPORT_URL="https://fedoraproject.org/wiki/Communicating_and_getting_help" BUG_REPORT_URL="https://bugzilla.redhat.com/" REDHAT_BUGZILLA_PRODUCT="Fedora" REDHAT_BUGZILLA_PRODUCT_VERSION=33 REDHAT_SUPPORT_PRODUCT="Fedora" REDHAT_SUPPORT_PRODUCT_VERSION=33 PRIVACY_POLICY_URL="https://fedoraproject.org/wiki/Legal:PrivacyPolicy" VARIANT="Workstation Edition" VARIANT_ID=workstation ``` ### Steps to reproduce 1. crc delete -f 2. crc start pull-secret-4.7.8.txt 2>&1 3. oc login -u ... -p .... <- sucessful 4. Try again later `oc login ...` fails with: ``` I0517 12:11:27.688221 64013 request.go:1107] Response Body: {"kind":"Status","apiVersion":"v1","metadata":{},"status":"Failure","message":"configmaps \"motd\" is forbidden: User \"system:anonymous\" cannot get resource \"configmaps\" in API group \"\" in the namespace \"openshift\"","reason":"Forbidden","details":{"name":"motd","kind":"configmaps"},"code":403} I0517 12:11:27.688778 64013 helpers.go:216] server response object: [{ ``` Authorization pods look ok: ``` $ oc get pods -n openshift-authentication NAME READY STATUS RESTARTS AGE oauth-openshift-5ccbddfc68-cr888 1/1 Running 0 27m oauth-openshift-5ccbddfc68-drt6q 1/1 Running 0 27m ``` This might be related to https://github.com/code-ready/crc/issues/1807, however failure is permanent at my side. Trying to login on console also fails: ![image](https://user-images.githubusercontent.com/7945591/118465091-39127900-b70a-11eb-8953-8892a9aa4a95.png) ### Expected Login to be fine. ### Actual Login fails ### Logs https://gist.github.com/skonto/0b3256bdf5979fb91ef520690df8b034 Before gather the logs try following if that fix your issue ```bash $ crc delete -f $ crc cleanup $ crc setup $ crc start --log-level debug ``` Please consider posting the output of `crc start --log-level debug` on http://gist.github.com/ and post the link in the issue.
non_infrastructure
login fails with system anonymous cannot get resource configmaps general information os linux hypervisor kvm did you run crc setup before starting it yes no yes running crc on laptop crc version bash codeready containers version openshift version embedded in executable crc status bash crc status log level debug debu codeready containers version debu openshift version embedded in executable debu running crc status debu checking file home stavros crc machines crc crc exist debu checking file home stavros crc machines crc crc exist debu found binary path at home stavros crc bin crc driver libvirt debu launching plugin server for driver libvirt debu plugin server listening at address debu calling getversion debu using api version debu calling setconfigraw debu calling getmachinename debu crc calling getstate debu crc dbg time level debug msg getting current state debu crc dbg time level debug msg fetching vm debu crc calling getbundlename debu crc calling getip debu crc dbg time level debug msg getip called for crc debu crc dbg time level debug msg getting current state debu crc dbg time level debug msg ip address debu running ssh command df output size used target sysroot tail debu using ssh private keys debu ssh command results err output sysroot debu running ssh command debu ssh command succeeded debu unexpected operator status for network managementstatedegraded debu making call to close driver server debu crc calling close debu successfully made call to close driver server debu making call to close connection to plugin binary crc vm running openshift running disk usage of inside the crc vm cache usage cache directory home stavros crc cache crc config bash consent telemetry no cpus memory host operating system bash name fedora version workstation edition id fedora version id version codename platform id platform pretty name fedora workstation edition ansi color logo fedora logo icon cpe name cpe o fedoraproject fedora home url documentation url support url bug report url redhat bugzilla product fedora redhat bugzilla product version redhat support product fedora redhat support product version privacy policy url variant workstation edition variant id workstation steps to reproduce crc delete f crc start pull secret txt oc login u p sucessful try again later oc login fails with request go response body kind status apiversion metadata status failure message configmaps motd is forbidden user system anonymous cannot get resource configmaps in api group in the namespace openshift reason forbidden details name motd kind configmaps code helpers go server response object authorization pods look ok oc get pods n openshift authentication name ready status restarts age oauth openshift running oauth openshift running this might be related to however failure is permanent at my side trying to login on console also fails expected login to be fine actual login fails logs before gather the logs try following if that fix your issue bash crc delete f crc cleanup crc setup crc start log level debug please consider posting the output of crc start log level debug on and post the link in the issue
0
196,326
6,926,837,864
IssuesEvent
2017-11-30 20:36:03
redox-os/ion
https://api.github.com/repos/redox-os/ion
reopened
Parser panic on expansions with double parens
bug C-Class good first issue high-priority low-hanging fruit
**Reproduction**: ``` let a = @((b)) ``` **Actual behavior**: A panic with this message: `thread 'main' panicked at 'attempt to subtract with overflow', src/parser/arguments.rs:87:25` [Backtrace](https://gist.github.com/xTibor/635e560c6fc25f9e5c1ba6aa75da18cf) **Build information**: `rustc -V`: `rustc 1.23.0-nightly (d6b06c63a 2017-11-09)` `git rev-parse HEAD`: 2f176ebe1010b4ebd9e2a9031ad354e598cdee9c System: KDE neon 5.11 (Ubuntu 16.04 LTS)
1.0
Parser panic on expansions with double parens - **Reproduction**: ``` let a = @((b)) ``` **Actual behavior**: A panic with this message: `thread 'main' panicked at 'attempt to subtract with overflow', src/parser/arguments.rs:87:25` [Backtrace](https://gist.github.com/xTibor/635e560c6fc25f9e5c1ba6aa75da18cf) **Build information**: `rustc -V`: `rustc 1.23.0-nightly (d6b06c63a 2017-11-09)` `git rev-parse HEAD`: 2f176ebe1010b4ebd9e2a9031ad354e598cdee9c System: KDE neon 5.11 (Ubuntu 16.04 LTS)
non_infrastructure
parser panic on expansions with double parens reproduction let a b actual behavior a panic with this message thread main panicked at attempt to subtract with overflow src parser arguments rs build information rustc v rustc nightly git rev parse head system kde neon ubuntu lts
0
53,149
13,127,528,489
IssuesEvent
2020-08-06 10:31:45
tensorflow/tensorflow
https://api.github.com/repos/tensorflow/tensorflow
closed
ImportError: DLL load failed: The specified module could not be found.
TF 2.3 stat:awaiting response subtype:windows type:build/install
I am getting the following error when trying to import tensorflow. I have tried many solutions and non seem to work. I have seen Issue #22794, but it does not seem to help. Versions -- > python 3.7.4 -- > tensorflow 2.3.0 > > runfile('C:/Users/pshad/.spyder-py3/temp.py', wdir='C:/Users/pshad/.spyder-py3') > Traceback (most recent call last): > > File "<ipython-input-30-bc8fb4f78acd>", line 1, in <module> > runfile('C:/Users/pshad/.spyder-py3/temp.py', wdir='C:/Users/pshad/.spyder-py3') > > File "C:\Users\pshad\Anaconda3\lib\site-packages\spyder_kernels\customize\spydercustomize.py", line 827, in runfile > execfile(filename, namespace) > > File "C:\Users\pshad\Anaconda3\lib\site-packages\spyder_kernels\customize\spydercustomize.py", line 110, in execfile > exec(compile(f.read(), filename, 'exec'), namespace) > > File "C:/Users/pshad/.spyder-py3/temp.py", line 9, in <module> > import tensorflow as tf > > File "C:\Users\pshad\Anaconda3\lib\site-packages\tensorflow\__init__.py", line 41, in <module> > from tensorflow.python.tools import module_util as _module_util > > File "C:\Users\pshad\Anaconda3\lib\site-packages\tensorflow\python\__init__.py", line 40, in <module> > from tensorflow.python.eager import context > > File "C:\Users\pshad\Anaconda3\lib\site-packages\tensorflow\python\eager\context.py", line 35, in <module> > from tensorflow.python import pywrap_tfe > > File "C:\Users\pshad\Anaconda3\lib\site-packages\tensorflow\python\pywrap_tfe.py", line 28, in <module> > from tensorflow.python import pywrap_tensorflow > > File "C:\Users\pshad\Anaconda3\lib\site-packages\tensorflow\python\pywrap_tensorflow.py", line 83, in <module> > raise ImportError(msg) > > ImportError: Traceback (most recent call last): > File "C:\Users\pshad\Anaconda3\lib\site-packages\tensorflow\python\pywrap_tensorflow.py", line 64, in <module> > from tensorflow.python._pywrap_tensorflow_internal import * > ImportError: DLL load failed: The specified module could not be found. > > > Failed to load the native TensorFlow runtime. > > See https://www.tensorflow.org/install/errors I tried to reinstall the tensorflow, downgrade, and upgrade as well. Nothing seem to work, unfortunately.
1.0
ImportError: DLL load failed: The specified module could not be found. - I am getting the following error when trying to import tensorflow. I have tried many solutions and non seem to work. I have seen Issue #22794, but it does not seem to help. Versions -- > python 3.7.4 -- > tensorflow 2.3.0 > > runfile('C:/Users/pshad/.spyder-py3/temp.py', wdir='C:/Users/pshad/.spyder-py3') > Traceback (most recent call last): > > File "<ipython-input-30-bc8fb4f78acd>", line 1, in <module> > runfile('C:/Users/pshad/.spyder-py3/temp.py', wdir='C:/Users/pshad/.spyder-py3') > > File "C:\Users\pshad\Anaconda3\lib\site-packages\spyder_kernels\customize\spydercustomize.py", line 827, in runfile > execfile(filename, namespace) > > File "C:\Users\pshad\Anaconda3\lib\site-packages\spyder_kernels\customize\spydercustomize.py", line 110, in execfile > exec(compile(f.read(), filename, 'exec'), namespace) > > File "C:/Users/pshad/.spyder-py3/temp.py", line 9, in <module> > import tensorflow as tf > > File "C:\Users\pshad\Anaconda3\lib\site-packages\tensorflow\__init__.py", line 41, in <module> > from tensorflow.python.tools import module_util as _module_util > > File "C:\Users\pshad\Anaconda3\lib\site-packages\tensorflow\python\__init__.py", line 40, in <module> > from tensorflow.python.eager import context > > File "C:\Users\pshad\Anaconda3\lib\site-packages\tensorflow\python\eager\context.py", line 35, in <module> > from tensorflow.python import pywrap_tfe > > File "C:\Users\pshad\Anaconda3\lib\site-packages\tensorflow\python\pywrap_tfe.py", line 28, in <module> > from tensorflow.python import pywrap_tensorflow > > File "C:\Users\pshad\Anaconda3\lib\site-packages\tensorflow\python\pywrap_tensorflow.py", line 83, in <module> > raise ImportError(msg) > > ImportError: Traceback (most recent call last): > File "C:\Users\pshad\Anaconda3\lib\site-packages\tensorflow\python\pywrap_tensorflow.py", line 64, in <module> > from tensorflow.python._pywrap_tensorflow_internal import * > ImportError: DLL load failed: The specified module could not be found. > > > Failed to load the native TensorFlow runtime. > > See https://www.tensorflow.org/install/errors I tried to reinstall the tensorflow, downgrade, and upgrade as well. Nothing seem to work, unfortunately.
non_infrastructure
importerror dll load failed the specified module could not be found i am getting the following error when trying to import tensorflow i have tried many solutions and non seem to work i have seen issue but it does not seem to help versions python tensorflow runfile c users pshad spyder temp py wdir c users pshad spyder traceback most recent call last file line in runfile c users pshad spyder temp py wdir c users pshad spyder file c users pshad lib site packages spyder kernels customize spydercustomize py line in runfile execfile filename namespace file c users pshad lib site packages spyder kernels customize spydercustomize py line in execfile exec compile f read filename exec namespace file c users pshad spyder temp py line in import tensorflow as tf file c users pshad lib site packages tensorflow init py line in from tensorflow python tools import module util as module util file c users pshad lib site packages tensorflow python init py line in from tensorflow python eager import context file c users pshad lib site packages tensorflow python eager context py line in from tensorflow python import pywrap tfe file c users pshad lib site packages tensorflow python pywrap tfe py line in from tensorflow python import pywrap tensorflow file c users pshad lib site packages tensorflow python pywrap tensorflow py line in raise importerror msg importerror traceback most recent call last file c users pshad lib site packages tensorflow python pywrap tensorflow py line in from tensorflow python pywrap tensorflow internal import importerror dll load failed the specified module could not be found failed to load the native tensorflow runtime see i tried to reinstall the tensorflow downgrade and upgrade as well nothing seem to work unfortunately
0
75,480
25,866,911,546
IssuesEvent
2022-12-13 21:46:29
vector-im/element-web
https://api.github.com/repos/vector-im/element-web
closed
"People" metaspace shows favourite rooms
T-Defect S-Major A-Room-List A-Spaces O-Uncommon
### Steps to reproduce 1. Click on "People" metaspace ### Outcome #### What did you expect? See only people listed in the left panel #### What happened instead? See rooms under "Favourites" listed in the left panel ![Screenshot from 2022-11-28 09-56-04](https://user-images.githubusercontent.com/51663/204248792-e37e68cf-e377-416e-95f0-ecf72f460505.png) ### Operating system _No response_ ### Browser information Chromium 107.0.5304.121 (Official Build) Arch Linux (64-bit) ### URL for webapp develop.element.io ### Application version Element version: cbf5c43ae79d-react-569a36493378-js-b318a77ecef1 Olm version: 3.2.12 ### Homeserver matrix.org ### Will you send logs? No
1.0
"People" metaspace shows favourite rooms - ### Steps to reproduce 1. Click on "People" metaspace ### Outcome #### What did you expect? See only people listed in the left panel #### What happened instead? See rooms under "Favourites" listed in the left panel ![Screenshot from 2022-11-28 09-56-04](https://user-images.githubusercontent.com/51663/204248792-e37e68cf-e377-416e-95f0-ecf72f460505.png) ### Operating system _No response_ ### Browser information Chromium 107.0.5304.121 (Official Build) Arch Linux (64-bit) ### URL for webapp develop.element.io ### Application version Element version: cbf5c43ae79d-react-569a36493378-js-b318a77ecef1 Olm version: 3.2.12 ### Homeserver matrix.org ### Will you send logs? No
non_infrastructure
people metaspace shows favourite rooms steps to reproduce click on people metaspace outcome what did you expect see only people listed in the left panel what happened instead see rooms under favourites listed in the left panel operating system no response browser information chromium official build arch linux bit url for webapp develop element io application version element version react js olm version homeserver matrix org will you send logs no
0
28,465
23,273,344,750
IssuesEvent
2022-08-05 03:14:54
real-life-levels/web
https://api.github.com/repos/real-life-levels/web
closed
Security rules are not set
infrastructure
Set proper security rules in Firebase to limit what users can read/write/delete
1.0
Security rules are not set - Set proper security rules in Firebase to limit what users can read/write/delete
infrastructure
security rules are not set set proper security rules in firebase to limit what users can read write delete
1
25,271
18,391,918,667
IssuesEvent
2021-10-12 07:00:08
openclimatefix/nowcasting_dataset
https://api.github.com/repos/openclimatefix/nowcasting_dataset
closed
Download additional UK Met Office UKV NWPs
enhancement data infrastructure/on-premises hardware
## Detailed Description We already have several years of UKV NWPs. But we should grab the most recent data, so it covers the same timespan as the ESO PV forecasts. ## Possible Implementation Use FileZilla to FTP from CEDA to `leonardo`. (I won't install `FileZilla` on `leonardo` because that will also install xorg etc. Instead I'll run FileZilla on my NUC, and mount `leonardo` on the NUC. If this doesn't work, consider using [`LFTP`](http://lftp.yar.ru/features.html) running on `leonardo`)
1.0
Download additional UK Met Office UKV NWPs - ## Detailed Description We already have several years of UKV NWPs. But we should grab the most recent data, so it covers the same timespan as the ESO PV forecasts. ## Possible Implementation Use FileZilla to FTP from CEDA to `leonardo`. (I won't install `FileZilla` on `leonardo` because that will also install xorg etc. Instead I'll run FileZilla on my NUC, and mount `leonardo` on the NUC. If this doesn't work, consider using [`LFTP`](http://lftp.yar.ru/features.html) running on `leonardo`)
infrastructure
download additional uk met office ukv nwps detailed description we already have several years of ukv nwps but we should grab the most recent data so it covers the same timespan as the eso pv forecasts possible implementation use filezilla to ftp from ceda to leonardo i won t install filezilla on leonardo because that will also install xorg etc instead i ll run filezilla on my nuc and mount leonardo on the nuc if this doesn t work consider using running on leonardo
1
60,095
3,120,764,743
IssuesEvent
2015-09-05 01:40:20
framingeinstein/issues-test
https://api.github.com/repos/framingeinstein/issues-test
closed
SPK-76: Homepage: Slim & Transparent nav should be on the homepage
priority:normal resolution:fixed type:enhancement
Hi Andrew, This is just a reminder that we should have a transparent nav for the homepage. Thanks, Jessica
1.0
SPK-76: Homepage: Slim & Transparent nav should be on the homepage - Hi Andrew, This is just a reminder that we should have a transparent nav for the homepage. Thanks, Jessica
non_infrastructure
spk homepage slim transparent nav should be on the homepage hi andrew this is just a reminder that we should have a transparent nav for the homepage thanks jessica
0
295,246
22,203,860,414
IssuesEvent
2022-06-07 13:28:09
composer/composer
https://api.github.com/repos/composer/composer
closed
Docs on files autoloading should document the order files are included
Documentation Good First Issue
Looking at the code, it looks like autoload files are loaded in the order of packages given by PackageSorter::sortPackages(). This should be documented in https://getcomposer.org/doc/04-schema.md#files. (Also, I have no idea what the sorting done by PackageSorter::sortPackages() actually is. It says 'dependency weight' but what does that mean?)
1.0
Docs on files autoloading should document the order files are included - Looking at the code, it looks like autoload files are loaded in the order of packages given by PackageSorter::sortPackages(). This should be documented in https://getcomposer.org/doc/04-schema.md#files. (Also, I have no idea what the sorting done by PackageSorter::sortPackages() actually is. It says 'dependency weight' but what does that mean?)
non_infrastructure
docs on files autoloading should document the order files are included looking at the code it looks like autoload files are loaded in the order of packages given by packagesorter sortpackages this should be documented in also i have no idea what the sorting done by packagesorter sortpackages actually is it says dependency weight but what does that mean
0
321,258
9,795,964,095
IssuesEvent
2019-06-11 06:11:50
webcompat/web-bugs
https://api.github.com/repos/webcompat/web-bugs
closed
www.lowes.com - site is not usable
browser-focus-geckoview engine-gecko priority-important
<!-- @browser: Firefox Mobile 68.0 --> <!-- @ua_header: Mozilla/5.0 (Android 9; Mobile; rv:68.0) Gecko/68.0 Firefox/68.0 --> <!-- @reported_with: --> <!-- @extra_labels: browser-focus-geckoview --> **URL**: https://www.lowes.com/pl/Save-Now/4294594589?int_cmp=Home:A:NoDivision:Other:FW18_Fathers_Day_Sale **Browser / Version**: Firefox Mobile 68.0 **Operating System**: Android **Tested Another Browser**: No **Problem type**: Site is not usable **Description**: unable to navigate **Steps to Reproduce**: Tried to enter location information to find pricing. <details> <summary>Browser Configuration</summary> <ul> <li>None</li> </ul> </details> _From [webcompat.com](https://webcompat.com/) with ❤️_
1.0
www.lowes.com - site is not usable - <!-- @browser: Firefox Mobile 68.0 --> <!-- @ua_header: Mozilla/5.0 (Android 9; Mobile; rv:68.0) Gecko/68.0 Firefox/68.0 --> <!-- @reported_with: --> <!-- @extra_labels: browser-focus-geckoview --> **URL**: https://www.lowes.com/pl/Save-Now/4294594589?int_cmp=Home:A:NoDivision:Other:FW18_Fathers_Day_Sale **Browser / Version**: Firefox Mobile 68.0 **Operating System**: Android **Tested Another Browser**: No **Problem type**: Site is not usable **Description**: unable to navigate **Steps to Reproduce**: Tried to enter location information to find pricing. <details> <summary>Browser Configuration</summary> <ul> <li>None</li> </ul> </details> _From [webcompat.com](https://webcompat.com/) with ❤️_
non_infrastructure
site is not usable url browser version firefox mobile operating system android tested another browser no problem type site is not usable description unable to navigate steps to reproduce tried to enter location information to find pricing browser configuration none from with ❤️
0
828,061
31,809,894,386
IssuesEvent
2023-09-13 16:06:00
thesaurus-linguae-aegyptiae/tla-web
https://api.github.com/repos/thesaurus-linguae-aegyptiae/tla-web
opened
Thymeleaf Funktionen für Datenanzeige
low priority
Bislang werden alle Daten "händisch" angezeigt. Insbeondere die Anzeige einzelner Key:Value Angaben könnte mittels einer Funktion gelöst werden. Bspw. Datierung: lorem oder Datieurngskommentar: Lorem ipsum function(String message_property, obj.data, Boolean \n)
1.0
Thymeleaf Funktionen für Datenanzeige - Bislang werden alle Daten "händisch" angezeigt. Insbeondere die Anzeige einzelner Key:Value Angaben könnte mittels einer Funktion gelöst werden. Bspw. Datierung: lorem oder Datieurngskommentar: Lorem ipsum function(String message_property, obj.data, Boolean \n)
non_infrastructure
thymeleaf funktionen für datenanzeige bislang werden alle daten händisch angezeigt insbeondere die anzeige einzelner key value angaben könnte mittels einer funktion gelöst werden bspw datierung lorem oder datieurngskommentar lorem ipsum function string message property obj data boolean n
0
30,308
24,748,383,502
IssuesEvent
2022-10-21 11:44:01
scalableminds/webknossos
https://api.github.com/repos/scalableminds/webknossos
closed
improve health monitoring for demo instance
infrastructure
not all datastores / datasets are properly monitored
1.0
improve health monitoring for demo instance - not all datastores / datasets are properly monitored
infrastructure
improve health monitoring for demo instance not all datastores datasets are properly monitored
1
30,887
25,142,048,001
IssuesEvent
2022-11-10 00:19:43
fornax-navo/fornax-demo-notebooks
https://api.github.com/repos/fornax-navo/fornax-demo-notebooks
closed
Reorganize and cleanup `code` directory
refactor infrastructure
Some suggestions: - [ ] group related functions together in the same file - [ ] make all function arguments keyword-only, except maybe ra & dec. > I feel it would be beneficial to enforce the arguments for all these functions in `code` to be keyword only, or at least the ones after ra/dec; overall that would make the notebook code more explanatory and less error-prone. _Originally posted by @bsipocz in https://github.com/fornax-navo/fornax-demo-notebooks/pull/49#discussion_r960915848_
1.0
Reorganize and cleanup `code` directory - Some suggestions: - [ ] group related functions together in the same file - [ ] make all function arguments keyword-only, except maybe ra & dec. > I feel it would be beneficial to enforce the arguments for all these functions in `code` to be keyword only, or at least the ones after ra/dec; overall that would make the notebook code more explanatory and less error-prone. _Originally posted by @bsipocz in https://github.com/fornax-navo/fornax-demo-notebooks/pull/49#discussion_r960915848_
infrastructure
reorganize and cleanup code directory some suggestions group related functions together in the same file make all function arguments keyword only except maybe ra dec i feel it would be beneficial to enforce the arguments for all these functions in code to be keyword only or at least the ones after ra dec overall that would make the notebook code more explanatory and less error prone originally posted by bsipocz in
1
128,283
17,470,026,949
IssuesEvent
2021-08-07 01:08:37
RecordReplay/devtools
https://api.github.com/repos/RecordReplay/devtools
closed
July Onboarding Refresh
design-complete
Here's a link to the Figma file: https://www.figma.com/file/SSr1ljyzF0lCXTL7BX1Whh/Replay-Design-Doc?node-id=5210%3A12083 **Here are the steps people will walk through, in order:** 1. Big bold welcome screen 2. Download links 3. Nicer Google signin 4. Create your first Replay screen 5. Glitch demo with circles? 6. Console.logs in dev From a priority standpoint, let's do it like this: - [x] [New onboarding demo with great console logs](https://github.com/RecordReplay/devtools/issues/3109) - [x] [New welcome and download screens (for people just invited)](https://github.com/RecordReplay/devtools/issues/3046) - [x] [Nicer Google login](https://github.com/RecordReplay/devtools/issues/3111)
1.0
July Onboarding Refresh - Here's a link to the Figma file: https://www.figma.com/file/SSr1ljyzF0lCXTL7BX1Whh/Replay-Design-Doc?node-id=5210%3A12083 **Here are the steps people will walk through, in order:** 1. Big bold welcome screen 2. Download links 3. Nicer Google signin 4. Create your first Replay screen 5. Glitch demo with circles? 6. Console.logs in dev From a priority standpoint, let's do it like this: - [x] [New onboarding demo with great console logs](https://github.com/RecordReplay/devtools/issues/3109) - [x] [New welcome and download screens (for people just invited)](https://github.com/RecordReplay/devtools/issues/3046) - [x] [Nicer Google login](https://github.com/RecordReplay/devtools/issues/3111)
non_infrastructure
july onboarding refresh here s a link to the figma file here are the steps people will walk through in order big bold welcome screen download links nicer google signin create your first replay screen glitch demo with circles console logs in dev from a priority standpoint let s do it like this
0
17,647
9,850,497,954
IssuesEvent
2019-06-19 08:19:44
Dart-Code/Dart-Code
https://api.github.com/repos/Dart-Code/Dart-Code
closed
Improve performance of completions
important is performance
~~As well as probably being the cause of #1721~~, the performance of completions with unimported symbols is generally poor. Testing on Windows PC with the following test (inside `test\flutter_only\providers\completion_item_provider.test.ts`): ``` describe("with SuggestionSet support", () => { beforeEach("ensure SuggestionSets are supported", function () { if (!extApi.analyzerCapabilities.supportsAvailableSuggestions) this.skip(); }); it.only("includes unimported symbols", async () => { await setTestContent(` main() { ProcessInf } `); const count = 50; const start = Date.now(); for (let i = 0; i < 50; i++) { const completions = await getCompletionsAt("ProcessInf^"); ensureCompletion(completions, vs.CompletionItemKind.Class, "ProcessInfo", "ProcessInfo"); } const end = Date.now(); console.log(`Took ${end - start}ms to do ${count} completion requests`); }); }); ``` Output from a few runs: ``` Took 56426ms to do 50 completion requests Took 57034ms to do 50 completion requests Took 57607ms to do 50 completion requests ```
True
Improve performance of completions - ~~As well as probably being the cause of #1721~~, the performance of completions with unimported symbols is generally poor. Testing on Windows PC with the following test (inside `test\flutter_only\providers\completion_item_provider.test.ts`): ``` describe("with SuggestionSet support", () => { beforeEach("ensure SuggestionSets are supported", function () { if (!extApi.analyzerCapabilities.supportsAvailableSuggestions) this.skip(); }); it.only("includes unimported symbols", async () => { await setTestContent(` main() { ProcessInf } `); const count = 50; const start = Date.now(); for (let i = 0; i < 50; i++) { const completions = await getCompletionsAt("ProcessInf^"); ensureCompletion(completions, vs.CompletionItemKind.Class, "ProcessInfo", "ProcessInfo"); } const end = Date.now(); console.log(`Took ${end - start}ms to do ${count} completion requests`); }); }); ``` Output from a few runs: ``` Took 56426ms to do 50 completion requests Took 57034ms to do 50 completion requests Took 57607ms to do 50 completion requests ```
non_infrastructure
improve performance of completions as well as probably being the cause of the performance of completions with unimported symbols is generally poor testing on windows pc with the following test inside test flutter only providers completion item provider test ts describe with suggestionset support beforeeach ensure suggestionsets are supported function if extapi analyzercapabilities supportsavailablesuggestions this skip it only includes unimported symbols async await settestcontent main processinf const count const start date now for let i i i const completions await getcompletionsat processinf ensurecompletion completions vs completionitemkind class processinfo processinfo const end date now console log took end start ms to do count completion requests output from a few runs took to do completion requests took to do completion requests took to do completion requests
0
260,749
27,784,709,666
IssuesEvent
2023-03-17 01:30:41
n-devs/NodeJSControUI
https://api.github.com/repos/n-devs/NodeJSControUI
closed
WS-2020-0042 (High) detected in acorn-5.5.0.tgz - autoclosed
Mend: dependency security vulnerability
## WS-2020-0042 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>acorn-5.5.0.tgz</b></p></summary> <p>ECMAScript parser</p> <p>Library home page: <a href="https://registry.npmjs.org/acorn/-/acorn-5.5.0.tgz">https://registry.npmjs.org/acorn/-/acorn-5.5.0.tgz</a></p> <p>Path to dependency file: /NodeJSControUI/package.json</p> <p>Path to vulnerable library: /node_modules/acorn/package.json</p> <p> Dependency Hierarchy: - jsdom-11.6.2.tgz (Root Library) - :x: **acorn-5.5.0.tgz** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> acorn is vulnerable to REGEX DoS. A regex of the form /[x-\ud800]/u causes the parser to enter an infinite loop. attackers may leverage the vulnerability leading to a Denial of Service since the string is not valid UTF16 and it results in it being sanitized before reaching the parser. <p>Publish Date: 2020-03-01 <p>URL: <a href=https://github.com/acornjs/acorn/commit/b5c17877ac0511e31579ea31e7650ba1a5871e51>WS-2020-0042</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-6chw-6frg-f759">https://github.com/advisories/GHSA-6chw-6frg-f759</a></p> <p>Release Date: 2020-03-01</p> <p>Fix Resolution (acorn): 5.7.4</p> <p>Direct dependency fix Resolution (jsdom): 11.7.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
WS-2020-0042 (High) detected in acorn-5.5.0.tgz - autoclosed - ## WS-2020-0042 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>acorn-5.5.0.tgz</b></p></summary> <p>ECMAScript parser</p> <p>Library home page: <a href="https://registry.npmjs.org/acorn/-/acorn-5.5.0.tgz">https://registry.npmjs.org/acorn/-/acorn-5.5.0.tgz</a></p> <p>Path to dependency file: /NodeJSControUI/package.json</p> <p>Path to vulnerable library: /node_modules/acorn/package.json</p> <p> Dependency Hierarchy: - jsdom-11.6.2.tgz (Root Library) - :x: **acorn-5.5.0.tgz** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> acorn is vulnerable to REGEX DoS. A regex of the form /[x-\ud800]/u causes the parser to enter an infinite loop. attackers may leverage the vulnerability leading to a Denial of Service since the string is not valid UTF16 and it results in it being sanitized before reaching the parser. <p>Publish Date: 2020-03-01 <p>URL: <a href=https://github.com/acornjs/acorn/commit/b5c17877ac0511e31579ea31e7650ba1a5871e51>WS-2020-0042</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-6chw-6frg-f759">https://github.com/advisories/GHSA-6chw-6frg-f759</a></p> <p>Release Date: 2020-03-01</p> <p>Fix Resolution (acorn): 5.7.4</p> <p>Direct dependency fix Resolution (jsdom): 11.7.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_infrastructure
ws high detected in acorn tgz autoclosed ws high severity vulnerability vulnerable library acorn tgz ecmascript parser library home page a href path to dependency file nodejscontroui package json path to vulnerable library node modules acorn package json dependency hierarchy jsdom tgz root library x acorn tgz vulnerable library vulnerability details acorn is vulnerable to regex dos a regex of the form u causes the parser to enter an infinite loop attackers may leverage the vulnerability leading to a denial of service since the string is not valid and it results in it being sanitized before reaching the parser publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution acorn direct dependency fix resolution jsdom step up your open source security game with mend
0
181,825
14,889,836,110
IssuesEvent
2021-01-20 22:02:16
JoshClose/CsvHelper
https://api.github.com/repos/JoshClose/CsvHelper
closed
Changing Delimiter Documentation
documentation
I'm unable to find an example of how to change the delimiter when reading a file. The following code no longer works since 20.0.0 since the Delimiter parameter is read-only: `csvReader.Configuration.Delimiter = "|";` If you look around the internet (Stack Overflow, etc.) this is always the way that it seems to be done. I can't seem to find an example or pattern on how to now accomplish this.
1.0
Changing Delimiter Documentation - I'm unable to find an example of how to change the delimiter when reading a file. The following code no longer works since 20.0.0 since the Delimiter parameter is read-only: `csvReader.Configuration.Delimiter = "|";` If you look around the internet (Stack Overflow, etc.) this is always the way that it seems to be done. I can't seem to find an example or pattern on how to now accomplish this.
non_infrastructure
changing delimiter documentation i m unable to find an example of how to change the delimiter when reading a file the following code no longer works since since the delimiter parameter is read only csvreader configuration delimiter if you look around the internet stack overflow etc this is always the way that it seems to be done i can t seem to find an example or pattern on how to now accomplish this
0
26,664
20,405,591,992
IssuesEvent
2022-02-23 04:44:54
google/pytype
https://api.github.com/repos/google/pytype
closed
Consistently getting [import-error] when using PYTHONPATH
bug cat: infrastructure
directory structure: ``` /app/src /app/src/bridge.py /app/src/writers/bridge_metrics.py ``` running like ``` PYTHONPATH=./src pytype ./src ``` and bridge_writer.py ``` import bridge ``` getting the error ``` FAILED: /app/src/.pytype/pyi/src/writers/bridge_metrics.pyi /usr/local/bin/python -m pytype.single --imports_info /app/src/.pytype/imports/src.writers.bridge_metrics.imports --module-name src.writers.bridge_metrics -V 3.9 -o /app/src/.pytype/pyi/src/writers/bridge_metrics.pyi --analyze-annotated --nofail --quick /app/src/writers/bridge_metrics.py ```
1.0
Consistently getting [import-error] when using PYTHONPATH - directory structure: ``` /app/src /app/src/bridge.py /app/src/writers/bridge_metrics.py ``` running like ``` PYTHONPATH=./src pytype ./src ``` and bridge_writer.py ``` import bridge ``` getting the error ``` FAILED: /app/src/.pytype/pyi/src/writers/bridge_metrics.pyi /usr/local/bin/python -m pytype.single --imports_info /app/src/.pytype/imports/src.writers.bridge_metrics.imports --module-name src.writers.bridge_metrics -V 3.9 -o /app/src/.pytype/pyi/src/writers/bridge_metrics.pyi --analyze-annotated --nofail --quick /app/src/writers/bridge_metrics.py ```
infrastructure
consistently getting when using pythonpath directory structure app src app src bridge py app src writers bridge metrics py running like pythonpath src pytype src and bridge writer py import bridge getting the error failed app src pytype pyi src writers bridge metrics pyi usr local bin python m pytype single imports info app src pytype imports src writers bridge metrics imports module name src writers bridge metrics v o app src pytype pyi src writers bridge metrics pyi analyze annotated nofail quick app src writers bridge metrics py
1
16,561
11,082,780,248
IssuesEvent
2019-12-13 13:00:18
godotengine/godot
https://api.github.com/repos/godotengine/godot
closed
iPhone x - home button / indicator is overlaying my ui
bug platform:ios topic:porting usability
**Godot version:** 3.1.2 **OS/device including version:** iOS 11 / iPhone X **Issue description:** One of my testers told me that the home indicator / home bar (this white / black line at the bottom of the screen on iPhones without a home button) is overlaying my UI . https://cdn.vox-cdn.com/thumbor/INnrzpqGKqRD7dfJ43nUU19yTDw=/800x0/filters:no_upscale()/cdn.vox-cdn.com/uploads/chorus_asset/file/9244305/fGEC9TJ.png (Not my game, just an illustration I found online) He also said that other games hide the home bar until the user swiped upward from the button of the screen to show it again for a few seconds. I wasn't sure to add this as a missing feature or bug, but I dediced it's a bug because in my opinion that's something that prevents pushing godot apps to the appstore. Sure I couldmove my UI, but that wouldn't solve the issue, as I want my game to behave like the others and hide the home bar as my tester said it's disturbing the experience. Is there a workaround? Can this be done in the exported xcode project somehow: https://stackoverflow.com/a/48066439 ? **Steps to reproduce:** Run your Godot app on an iPhone without physical home button
True
iPhone x - home button / indicator is overlaying my ui - **Godot version:** 3.1.2 **OS/device including version:** iOS 11 / iPhone X **Issue description:** One of my testers told me that the home indicator / home bar (this white / black line at the bottom of the screen on iPhones without a home button) is overlaying my UI . https://cdn.vox-cdn.com/thumbor/INnrzpqGKqRD7dfJ43nUU19yTDw=/800x0/filters:no_upscale()/cdn.vox-cdn.com/uploads/chorus_asset/file/9244305/fGEC9TJ.png (Not my game, just an illustration I found online) He also said that other games hide the home bar until the user swiped upward from the button of the screen to show it again for a few seconds. I wasn't sure to add this as a missing feature or bug, but I dediced it's a bug because in my opinion that's something that prevents pushing godot apps to the appstore. Sure I couldmove my UI, but that wouldn't solve the issue, as I want my game to behave like the others and hide the home bar as my tester said it's disturbing the experience. Is there a workaround? Can this be done in the exported xcode project somehow: https://stackoverflow.com/a/48066439 ? **Steps to reproduce:** Run your Godot app on an iPhone without physical home button
non_infrastructure
iphone x home button indicator is overlaying my ui godot version os device including version ios iphone x issue description one of my testers told me that the home indicator home bar this white black line at the bottom of the screen on iphones without a home button is overlaying my ui not my game just an illustration i found online he also said that other games hide the home bar until the user swiped upward from the button of the screen to show it again for a few seconds i wasn t sure to add this as a missing feature or bug but i dediced it s a bug because in my opinion that s something that prevents pushing godot apps to the appstore sure i couldmove my ui but that wouldn t solve the issue as i want my game to behave like the others and hide the home bar as my tester said it s disturbing the experience is there a workaround can this be done in the exported xcode project somehow steps to reproduce run your godot app on an iphone without physical home button
0
345,610
24,867,127,016
IssuesEvent
2022-10-27 12:48:57
open-telemetry/opentelemetry-python-contrib
https://api.github.com/repos/open-telemetry/opentelemetry-python-contrib
closed
Fix ConfluentKafkaInstrumentor usage
documentation help wanted
**Describe your environment** Docker image running `python:3.10.7-slim-bullseye` as base **Steps to reproduce** ```python3 from opentelemetry.instrumentation.confluentkafka import ConfluentKafkaInstrumentor # Instrument kafka ConfluentKafkaInstrumentor().instrument() ``` **What is the expected behavior?** Instrumentation to work just by adding the lines above. **What is the actual behavior?** > ModuleNotFoundError: No module named 'opentelemetry.instrumentation.confluentkafka' **Additional context** The solution is to actually make the import like this: ```python3 from opentelemetry.instrumentation.confluent_kafka import ConfluentKafkaInstrumentor ```
1.0
Fix ConfluentKafkaInstrumentor usage - **Describe your environment** Docker image running `python:3.10.7-slim-bullseye` as base **Steps to reproduce** ```python3 from opentelemetry.instrumentation.confluentkafka import ConfluentKafkaInstrumentor # Instrument kafka ConfluentKafkaInstrumentor().instrument() ``` **What is the expected behavior?** Instrumentation to work just by adding the lines above. **What is the actual behavior?** > ModuleNotFoundError: No module named 'opentelemetry.instrumentation.confluentkafka' **Additional context** The solution is to actually make the import like this: ```python3 from opentelemetry.instrumentation.confluent_kafka import ConfluentKafkaInstrumentor ```
non_infrastructure
fix confluentkafkainstrumentor usage describe your environment docker image running python slim bullseye as base steps to reproduce from opentelemetry instrumentation confluentkafka import confluentkafkainstrumentor instrument kafka confluentkafkainstrumentor instrument what is the expected behavior instrumentation to work just by adding the lines above what is the actual behavior modulenotfounderror no module named opentelemetry instrumentation confluentkafka additional context the solution is to actually make the import like this from opentelemetry instrumentation confluent kafka import confluentkafkainstrumentor
0
7,813
5,223,466,585
IssuesEvent
2017-01-27 12:20:59
interactive-instruments/etf-webapp
https://api.github.com/repos/interactive-instruments/etf-webapp
opened
Show used TestObject / ETSs and test result in test report view
usability Web UI
- [ ] Test Object - [ ] ETSs - [ ] test result
True
Show used TestObject / ETSs and test result in test report view - - [ ] Test Object - [ ] ETSs - [ ] test result
non_infrastructure
show used testobject etss and test result in test report view test object etss test result
0
34,516
30,036,753,808
IssuesEvent
2023-06-27 13:13:28
Qiskit-Extensions/quantum-serverless
https://api.github.com/repos/Qiskit-Extensions/quantum-serverless
closed
Infrastructure: improve default cluster configuration
enhancement priority: medium project: infrastructure
<!-- ⚠️ If you do not respect this template, your issue will be closed --> <!-- ⚠️ Make sure to browse the opened and closed issues to confirm this idea does not exist. --> ### What is the expected enhancement? Infrastructure: improve default cluster configuration Currently default cluster that is created has 1 head node with 2 cpu 2 Gb mem + 1 worker with 1 cpu 1 Gb mem. This configuration is faulty as it is causing memory overflow once you start more than 1 parallel task. Todos: - create cluster template with node types with at least 2 cpu 2 gb mem - maybe work out couple of popular configuration keeping in mind workloads we have
1.0
Infrastructure: improve default cluster configuration - <!-- ⚠️ If you do not respect this template, your issue will be closed --> <!-- ⚠️ Make sure to browse the opened and closed issues to confirm this idea does not exist. --> ### What is the expected enhancement? Infrastructure: improve default cluster configuration Currently default cluster that is created has 1 head node with 2 cpu 2 Gb mem + 1 worker with 1 cpu 1 Gb mem. This configuration is faulty as it is causing memory overflow once you start more than 1 parallel task. Todos: - create cluster template with node types with at least 2 cpu 2 gb mem - maybe work out couple of popular configuration keeping in mind workloads we have
infrastructure
infrastructure improve default cluster configuration what is the expected enhancement infrastructure improve default cluster configuration currently default cluster that is created has head node with cpu gb mem worker with cpu gb mem this configuration is faulty as it is causing memory overflow once you start more than parallel task todos create cluster template with node types with at least cpu gb mem maybe work out couple of popular configuration keeping in mind workloads we have
1
23,228
15,951,045,623
IssuesEvent
2021-04-15 09:22:31
airyhq/airy
https://api.github.com/repos/airyhq/airy
closed
API and media-resolver configuration sections not working
cli infrastructure
The sections for `api` and `media-resolver` in the `components configuration` of the docs https://airy.co/docs/core/getting-started/installation/configuration#components are currently not working, because at the moment we don't consider them with the `airy config apply` command.
1.0
API and media-resolver configuration sections not working - The sections for `api` and `media-resolver` in the `components configuration` of the docs https://airy.co/docs/core/getting-started/installation/configuration#components are currently not working, because at the moment we don't consider them with the `airy config apply` command.
infrastructure
api and media resolver configuration sections not working the sections for api and media resolver in the components configuration of the docs are currently not working because at the moment we don t consider them with the airy config apply command
1
33,635
27,638,834,584
IssuesEvent
2023-03-10 16:23:33
celestiaorg/test-infra
https://api.github.com/repos/celestiaorg/test-infra
closed
docker: Slack notification in case of CVEs
good first issue help wanted infrastructure docker
Hello team, The following ticket is created in order to add security during our supply chain for our Docker images. ℹ️ Low priority As you may know I've been working on the CI part, adding some new features, one of the was [Trivy](https://www.aquasec.com/products/trivy/) which is a tool that help us for scanning our Docker images and provide us a summary. The idea behind this ticket is to connect our Slack (we'll have to create a channel for it), to Github and send a notification to it in case that during the CI, Trivy detects any CVE or potential bug. After this, we'll have to go and fix it. A CVE example: ![Image](https://user-images.githubusercontent.com/32740567/215786916-f18f6664-c79f-477e-bf4a-9986a509f86b.png) --- Why is this important? If we have a CVE(Common Vulnerabilities and Exposures), that means that our code is vulnerable and our services are exposed to be hacked/hijacked. From my prospective, it's better to be "a little paranoid" in some way and be proactive in the security field. --- Some interesting articles: [what is a CVE](https://www.redhat.com/en/topics/security/what-is-cve) --- - [ ] Create Slack channel for this/discuss with the team which one will be find to use. - [ ] Test it. --- Next steps: - [ ] Update the Github Action to block the build, currently is just informative. --- ## This has to be done for the two services. - [ ] [celestia-node](https://github.com/celestiaorg/celestia-node) - [ ] [celestia-app](https://github.com/celestiaorg/celestia-app) --- Best 🚀 Jose Ramon Mañes
1.0
docker: Slack notification in case of CVEs - Hello team, The following ticket is created in order to add security during our supply chain for our Docker images. ℹ️ Low priority As you may know I've been working on the CI part, adding some new features, one of the was [Trivy](https://www.aquasec.com/products/trivy/) which is a tool that help us for scanning our Docker images and provide us a summary. The idea behind this ticket is to connect our Slack (we'll have to create a channel for it), to Github and send a notification to it in case that during the CI, Trivy detects any CVE or potential bug. After this, we'll have to go and fix it. A CVE example: ![Image](https://user-images.githubusercontent.com/32740567/215786916-f18f6664-c79f-477e-bf4a-9986a509f86b.png) --- Why is this important? If we have a CVE(Common Vulnerabilities and Exposures), that means that our code is vulnerable and our services are exposed to be hacked/hijacked. From my prospective, it's better to be "a little paranoid" in some way and be proactive in the security field. --- Some interesting articles: [what is a CVE](https://www.redhat.com/en/topics/security/what-is-cve) --- - [ ] Create Slack channel for this/discuss with the team which one will be find to use. - [ ] Test it. --- Next steps: - [ ] Update the Github Action to block the build, currently is just informative. --- ## This has to be done for the two services. - [ ] [celestia-node](https://github.com/celestiaorg/celestia-node) - [ ] [celestia-app](https://github.com/celestiaorg/celestia-app) --- Best 🚀 Jose Ramon Mañes
infrastructure
docker slack notification in case of cves hello team the following ticket is created in order to add security during our supply chain for our docker images ℹ️ low priority as you may know i ve been working on the ci part adding some new features one of the was which is a tool that help us for scanning our docker images and provide us a summary the idea behind this ticket is to connect our slack we ll have to create a channel for it to github and send a notification to it in case that during the ci trivy detects any cve or potential bug after this we ll have to go and fix it a cve example why is this important if we have a cve common vulnerabilities and exposures that means that our code is vulnerable and our services are exposed to be hacked hijacked from my prospective it s better to be a little paranoid in some way and be proactive in the security field some interesting articles create slack channel for this discuss with the team which one will be find to use test it next steps update the github action to block the build currently is just informative this has to be done for the two services best 🚀 jose ramon mañes
1
97,785
11,032,502,608
IssuesEvent
2019-12-06 20:20:33
angr/nixpkgs
https://api.github.com/repos/angr/nixpkgs
opened
Add examples on How To Use
documentation
Title is kinda self-explanatory. The following `shell.nix` examples should be provided: * How to use this to get `angr` working; - Via NUR; - "Standalone" (with a local version of this repo; * How to create a development environment for `angr` (and its components).
1.0
Add examples on How To Use - Title is kinda self-explanatory. The following `shell.nix` examples should be provided: * How to use this to get `angr` working; - Via NUR; - "Standalone" (with a local version of this repo; * How to create a development environment for `angr` (and its components).
non_infrastructure
add examples on how to use title is kinda self explanatory the following shell nix examples should be provided how to use this to get angr working via nur standalone with a local version of this repo how to create a development environment for angr and its components
0
49,716
6,038,025,446
IssuesEvent
2017-06-09 20:16:37
schtunt/simbol
https://api.github.com/repos/schtunt/simbol
opened
Make `ldap', `ng', and `vault' module and tests conform to the new standard (v1.0-rc2)
clean-up help-wanted testing
Progress: - [ ] vault - [ ] ldap - [ ] ng See `share/lint/*` for a starting point.
1.0
Make `ldap', `ng', and `vault' module and tests conform to the new standard (v1.0-rc2) - Progress: - [ ] vault - [ ] ldap - [ ] ng See `share/lint/*` for a starting point.
non_infrastructure
make ldap ng and vault module and tests conform to the new standard progress vault ldap ng see share lint for a starting point
0
220,057
24,553,610,522
IssuesEvent
2022-10-12 14:19:47
dmyers87/code-scanning-javascript-demo
https://api.github.com/repos/dmyers87/code-scanning-javascript-demo
opened
CVE-2022-37609 (Medium) detected in js-beautify-1.14.0.tgz
security vulnerability
## CVE-2022-37609 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>js-beautify-1.14.0.tgz</b></p></summary> <p>beautifier.io for node</p> <p>Library home page: <a href="https://registry.npmjs.org/js-beautify/-/js-beautify-1.14.0.tgz">https://registry.npmjs.org/js-beautify/-/js-beautify-1.14.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/js-beautify/package.json</p> <p> Dependency Hierarchy: - standard-4.5.4.tgz (Root Library) - standard-format-1.6.10.tgz - esformatter-jsx-2.3.11.tgz - :x: **js-beautify-1.14.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/dmyers87/code-scanning-javascript-demo/commit/71720cbc5b3eec7a28c9894bed1eec1294590b96">71720cbc5b3eec7a28c9894bed1eec1294590b96</a></p> <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Prototype pollution vulnerability in beautify-web js-beautify 1.13.7 via the name variable in options.js. <p>Publish Date: 2022-10-11 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-37609>CVE-2022-37609</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p>
True
CVE-2022-37609 (Medium) detected in js-beautify-1.14.0.tgz - ## CVE-2022-37609 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>js-beautify-1.14.0.tgz</b></p></summary> <p>beautifier.io for node</p> <p>Library home page: <a href="https://registry.npmjs.org/js-beautify/-/js-beautify-1.14.0.tgz">https://registry.npmjs.org/js-beautify/-/js-beautify-1.14.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/js-beautify/package.json</p> <p> Dependency Hierarchy: - standard-4.5.4.tgz (Root Library) - standard-format-1.6.10.tgz - esformatter-jsx-2.3.11.tgz - :x: **js-beautify-1.14.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/dmyers87/code-scanning-javascript-demo/commit/71720cbc5b3eec7a28c9894bed1eec1294590b96">71720cbc5b3eec7a28c9894bed1eec1294590b96</a></p> <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Prototype pollution vulnerability in beautify-web js-beautify 1.13.7 via the name variable in options.js. <p>Publish Date: 2022-10-11 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-37609>CVE-2022-37609</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p>
non_infrastructure
cve medium detected in js beautify tgz cve medium severity vulnerability vulnerable library js beautify tgz beautifier io for node library home page a href path to dependency file package json path to vulnerable library node modules js beautify package json dependency hierarchy standard tgz root library standard format tgz esformatter jsx tgz x js beautify tgz vulnerable library found in head commit a href found in base branch main vulnerability details prototype pollution vulnerability in beautify web js beautify via the name variable in options js publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href
0
16,427
11,959,426,298
IssuesEvent
2020-04-04 21:55:59
JoshuaBelden/pandemic-memorial
https://api.github.com/repos/JoshuaBelden/pandemic-memorial
closed
Auth secret needs to be configurable in prod.
infrastructure
We need to create an actual secret for the production app and handled in a way that it is not in source.
1.0
Auth secret needs to be configurable in prod. - We need to create an actual secret for the production app and handled in a way that it is not in source.
infrastructure
auth secret needs to be configurable in prod we need to create an actual secret for the production app and handled in a way that it is not in source
1
34,056
28,140,211,518
IssuesEvent
2023-04-01 21:26:15
t3kt/raytk
https://api.github.com/repos/t3kt/raytk
closed
function graph thumbnails for Fn ops
enhancement end user tools infrastructure
It would be great to be able to easily see the shape of function ops when picking them.
1.0
function graph thumbnails for Fn ops - It would be great to be able to easily see the shape of function ops when picking them.
infrastructure
function graph thumbnails for fn ops it would be great to be able to easily see the shape of function ops when picking them
1
339,422
10,253,912,011
IssuesEvent
2019-08-21 12:27:51
webcompat/web-bugs
https://api.github.com/repos/webcompat/web-bugs
closed
www.cbsnews.com - Video player image appears behind video
browser-fenix priority-important severity-important status-first-contact
<!-- @browser: Fenix --> <!-- @ua_header: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:68.0) Gecko/20100101 Firefox/68.0 --> <!-- @reported_with: addon-reporter-firefox --> **URL**: https://www.cbsnews.com/amp/news/barr-in-contempt-of-congress-hearing-judiciary-committee-vote-attorney-general-barr-mueller-report-today-2019-05-08/ **Browser / Version**: Fenix **Operating System**: Android **Tested Another Browser**: No **Problem type**: Design is broken **Description**: [Bug] Video player image appears behind video **Steps to Reproduce**: Created from [#2364](https://github.com/mozilla-mobile/fenix/issues/2364) ## Steps to reproduce Navigate to https://www.cbsnews.com/amp/news/barr-in-contempt-of-congress-hearing-judiciary-committee-vote-attorney-general-barr-mueller-report-today-2019-05-08/ Doesn't matter if TP is on or off. ### Expected behavior No play icon appearing behind video. ### Actual behavior Large play icon appearing behind video. ![signal-attachment-2019-05-08-230454](https://user-images.githubusercontent.com/152493/57427563-6ca09b80-71f2-11e9-8b01-3dd87b85ce49.png) Does not appear in Fennec, Focus, or Reference Browser. ### Device information * Android device: Pixel 2 * Fenix version: latest from play store <details> <summary>Browser Configuration</summary> <ul> <li>None</li> </ul> </details> _From [webcompat.com](https://webcompat.com/) with ❤️_
1.0
www.cbsnews.com - Video player image appears behind video - <!-- @browser: Fenix --> <!-- @ua_header: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:68.0) Gecko/20100101 Firefox/68.0 --> <!-- @reported_with: addon-reporter-firefox --> **URL**: https://www.cbsnews.com/amp/news/barr-in-contempt-of-congress-hearing-judiciary-committee-vote-attorney-general-barr-mueller-report-today-2019-05-08/ **Browser / Version**: Fenix **Operating System**: Android **Tested Another Browser**: No **Problem type**: Design is broken **Description**: [Bug] Video player image appears behind video **Steps to Reproduce**: Created from [#2364](https://github.com/mozilla-mobile/fenix/issues/2364) ## Steps to reproduce Navigate to https://www.cbsnews.com/amp/news/barr-in-contempt-of-congress-hearing-judiciary-committee-vote-attorney-general-barr-mueller-report-today-2019-05-08/ Doesn't matter if TP is on or off. ### Expected behavior No play icon appearing behind video. ### Actual behavior Large play icon appearing behind video. ![signal-attachment-2019-05-08-230454](https://user-images.githubusercontent.com/152493/57427563-6ca09b80-71f2-11e9-8b01-3dd87b85ce49.png) Does not appear in Fennec, Focus, or Reference Browser. ### Device information * Android device: Pixel 2 * Fenix version: latest from play store <details> <summary>Browser Configuration</summary> <ul> <li>None</li> </ul> </details> _From [webcompat.com](https://webcompat.com/) with ❤️_
non_infrastructure
video player image appears behind video url browser version fenix operating system android tested another browser no problem type design is broken description video player image appears behind video steps to reproduce created from steps to reproduce navigate to doesn t matter if tp is on or off expected behavior no play icon appearing behind video actual behavior large play icon appearing behind video does not appear in fennec focus or reference browser device information android device pixel fenix version latest from play store browser configuration none from with ❤️
0
27,607
12,676,134,266
IssuesEvent
2020-06-19 04:06:46
Azure/azure-sdk-for-go
https://api.github.com/repos/Azure/azure-sdk-for-go
closed
Failed to delete resource Shared Image when the delete API of Shared Image Gallery returns 404
Compute - Images Mgmt Service Attention
### Bug Report <!-- Thank you for opening a bug report. For faster processing, please include: --> - Import path of package in question: https://github.com/Azure/azure-sdk-for-go/blob/master/services/compute/mgmt/2019-07-01/compute/galleryimages.go - SDK version: v41.2.0 - Output of `go version`: go version go1.12.9 windows/amd64 <!-- and please describe: --> - **What happened?** The resource Shared Image depends on the resource Shared Image Gallery. Although the delete API returns 404 which means the Shared Image resource has been deleted. Then it tries to immediately delete Shared Image Gallery but it still throws error `Can not delete resource before nested resources are deleted.`, which means the resource Shared Image still hasn't been deleted. So it failed to delete top resource Shared Image Gallery. - **What did you expect or want to happen?** It should delete both resources Shared Image and Shared Image Gallery successfully. - **How can we reproduce it?** 1. Create a resource group 2. Create Shared Image Gallery 3. Create Shared Image 4. Delete Shared Image, which returns "202" 5. Immediately call "Get" rest api to get resource Shared Image, which returns "404" 6. Immediately delete Shared Image Gallery, which returns error code "409" 7. Then it throws error `Can not delete resource before nested resources are deleted.` <!-- Thanks! -->
1.0
Failed to delete resource Shared Image when the delete API of Shared Image Gallery returns 404 - ### Bug Report <!-- Thank you for opening a bug report. For faster processing, please include: --> - Import path of package in question: https://github.com/Azure/azure-sdk-for-go/blob/master/services/compute/mgmt/2019-07-01/compute/galleryimages.go - SDK version: v41.2.0 - Output of `go version`: go version go1.12.9 windows/amd64 <!-- and please describe: --> - **What happened?** The resource Shared Image depends on the resource Shared Image Gallery. Although the delete API returns 404 which means the Shared Image resource has been deleted. Then it tries to immediately delete Shared Image Gallery but it still throws error `Can not delete resource before nested resources are deleted.`, which means the resource Shared Image still hasn't been deleted. So it failed to delete top resource Shared Image Gallery. - **What did you expect or want to happen?** It should delete both resources Shared Image and Shared Image Gallery successfully. - **How can we reproduce it?** 1. Create a resource group 2. Create Shared Image Gallery 3. Create Shared Image 4. Delete Shared Image, which returns "202" 5. Immediately call "Get" rest api to get resource Shared Image, which returns "404" 6. Immediately delete Shared Image Gallery, which returns error code "409" 7. Then it throws error `Can not delete resource before nested resources are deleted.` <!-- Thanks! -->
non_infrastructure
failed to delete resource shared image when the delete api of shared image gallery returns bug report thank you for opening a bug report for faster processing please include import path of package in question sdk version output of go version go version windows and please describe what happened the resource shared image depends on the resource shared image gallery although the delete api returns which means the shared image resource has been deleted then it tries to immediately delete shared image gallery but it still throws error can not delete resource before nested resources are deleted which means the resource shared image still hasn t been deleted so it failed to delete top resource shared image gallery what did you expect or want to happen it should delete both resources shared image and shared image gallery successfully how can we reproduce it create a resource group create shared image gallery create shared image delete shared image which returns immediately call get rest api to get resource shared image which returns immediately delete shared image gallery which returns error code then it throws error can not delete resource before nested resources are deleted thanks
0
121,352
12,123,769,089
IssuesEvent
2020-04-22 13:14:50
microsoft/AttackSurfaceAnalyzer
https://api.github.com/repos/microsoft/AttackSurfaceAnalyzer
closed
Document how to validate the signature on the hashes file
documentation
Follows up from #108. We need documentation for how end users could validate the pgp signature on the hashes file if they desired to do so.
1.0
Document how to validate the signature on the hashes file - Follows up from #108. We need documentation for how end users could validate the pgp signature on the hashes file if they desired to do so.
non_infrastructure
document how to validate the signature on the hashes file follows up from we need documentation for how end users could validate the pgp signature on the hashes file if they desired to do so
0
23,502
16,343,447,081
IssuesEvent
2021-05-13 02:48:00
nilearn/nilearn
https://api.github.com/repos/nilearn/nilearn
closed
doc not building with sphinx 4.0.1
Bug Important Infrastructure Maintenance impact: high priority: high testing
`make html-noplot` fails since the latest release of sphinx on monday see for example [this build](https://app.circleci.com/pipelines/github/nilearn/nilearn/2034/workflows/2bd1d45d-b513-41d2-a941-c17feab7e8e2/jobs/7212)
1.0
doc not building with sphinx 4.0.1 - `make html-noplot` fails since the latest release of sphinx on monday see for example [this build](https://app.circleci.com/pipelines/github/nilearn/nilearn/2034/workflows/2bd1d45d-b513-41d2-a941-c17feab7e8e2/jobs/7212)
infrastructure
doc not building with sphinx make html noplot fails since the latest release of sphinx on monday see for example
1
96,610
16,137,310,848
IssuesEvent
2021-04-29 13:26:13
jgeraigery/creative-assets
https://api.github.com/repos/jgeraigery/creative-assets
opened
CVE-2020-8203 (High) detected in lodash-4.17.10.tgz
security vulnerability
## CVE-2020-8203 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>lodash-4.17.10.tgz</b></p></summary> <p>Lodash modular utilities.</p> <p>Library home page: <a href="https://registry.npmjs.org/lodash/-/lodash-4.17.10.tgz">https://registry.npmjs.org/lodash/-/lodash-4.17.10.tgz</a></p> <p>Path to dependency file: creative-assets/package.json</p> <p>Path to vulnerable library: creative-assets/node_modules/lodash/package.json</p> <p> Dependency Hierarchy: - airtable-0.5.7.tgz (Root Library) - :x: **lodash-4.17.10.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/jgeraigery/creative-assets/commit/4e1f39edcdc762290e5970db636924edc553703b">4e1f39edcdc762290e5970db636924edc553703b</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Prototype pollution attack when using _.zipObjectDeep in lodash before 4.17.20. <p>Publish Date: 2020-07-15 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-8203>CVE-2020-8203</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.4</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.npmjs.com/advisories/1523">https://www.npmjs.com/advisories/1523</a></p> <p>Release Date: 2020-07-23</p> <p>Fix Resolution: lodash - 4.17.19</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"lodash","packageVersion":"4.17.10","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"airtable:0.5.7;lodash:4.17.10","isMinimumFixVersionAvailable":true,"minimumFixVersion":"lodash - 4.17.19"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-8203","vulnerabilityDetails":"Prototype pollution attack when using _.zipObjectDeep in lodash before 4.17.20.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-8203","cvss3Severity":"high","cvss3Score":"7.4","cvss3Metrics":{"A":"High","AC":"High","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> -->
True
CVE-2020-8203 (High) detected in lodash-4.17.10.tgz - ## CVE-2020-8203 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>lodash-4.17.10.tgz</b></p></summary> <p>Lodash modular utilities.</p> <p>Library home page: <a href="https://registry.npmjs.org/lodash/-/lodash-4.17.10.tgz">https://registry.npmjs.org/lodash/-/lodash-4.17.10.tgz</a></p> <p>Path to dependency file: creative-assets/package.json</p> <p>Path to vulnerable library: creative-assets/node_modules/lodash/package.json</p> <p> Dependency Hierarchy: - airtable-0.5.7.tgz (Root Library) - :x: **lodash-4.17.10.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/jgeraigery/creative-assets/commit/4e1f39edcdc762290e5970db636924edc553703b">4e1f39edcdc762290e5970db636924edc553703b</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Prototype pollution attack when using _.zipObjectDeep in lodash before 4.17.20. <p>Publish Date: 2020-07-15 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-8203>CVE-2020-8203</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.4</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.npmjs.com/advisories/1523">https://www.npmjs.com/advisories/1523</a></p> <p>Release Date: 2020-07-23</p> <p>Fix Resolution: lodash - 4.17.19</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"lodash","packageVersion":"4.17.10","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"airtable:0.5.7;lodash:4.17.10","isMinimumFixVersionAvailable":true,"minimumFixVersion":"lodash - 4.17.19"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-8203","vulnerabilityDetails":"Prototype pollution attack when using _.zipObjectDeep in lodash before 4.17.20.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-8203","cvss3Severity":"high","cvss3Score":"7.4","cvss3Metrics":{"A":"High","AC":"High","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> -->
non_infrastructure
cve high detected in lodash tgz cve high severity vulnerability vulnerable library lodash tgz lodash modular utilities library home page a href path to dependency file creative assets package json path to vulnerable library creative assets node modules lodash package json dependency hierarchy airtable tgz root library x lodash tgz vulnerable library found in head commit a href found in base branch master vulnerability details prototype pollution attack when using zipobjectdeep in lodash before publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution lodash isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree airtable lodash isminimumfixversionavailable true minimumfixversion lodash basebranches vulnerabilityidentifier cve vulnerabilitydetails prototype pollution attack when using zipobjectdeep in lodash before vulnerabilityurl
0
35,077
30,743,311,022
IssuesEvent
2023-07-28 13:14:15
carbon-design-system/carbon
https://api.github.com/repos/carbon-design-system/carbon
closed
Remove the sketch plugin from the codebase
role: dev 🤖 package: sketch type: infrastructure :robot:
Now that we've [gone all in on Figma](https://github.com/carbon-design-system/carbon/discussions/13862), we will no longer be maintaining the sketch plugin and it can be removed from our codebase. ```[tasklist] - [ ] Remove `packages/sketch` from the codebase - [ ] Remove references to `@carbon/sketch` throughout the codebase (workflow files, eslintconfig, prettierconfig, build, `.md` documentation, etc). Do a find all for "sketch" and you'll find them all. ```
1.0
Remove the sketch plugin from the codebase - Now that we've [gone all in on Figma](https://github.com/carbon-design-system/carbon/discussions/13862), we will no longer be maintaining the sketch plugin and it can be removed from our codebase. ```[tasklist] - [ ] Remove `packages/sketch` from the codebase - [ ] Remove references to `@carbon/sketch` throughout the codebase (workflow files, eslintconfig, prettierconfig, build, `.md` documentation, etc). Do a find all for "sketch" and you'll find them all. ```
infrastructure
remove the sketch plugin from the codebase now that we ve we will no longer be maintaining the sketch plugin and it can be removed from our codebase remove packages sketch from the codebase remove references to carbon sketch throughout the codebase workflow files eslintconfig prettierconfig build md documentation etc do a find all for sketch and you ll find them all
1
18,298
12,886,251,334
IssuesEvent
2020-07-13 09:11:58
PrincetonUniversity/VST
https://api.github.com/repos/PrincetonUniversity/VST
opened
Create new opam packages for VST
infrastructure
This issue is intended as a discussion platform for the desired structure of opam packages for VST (and also CompCert). What I am currently thinking about is how to handle different platforms (say 32 and 64 bit or x86 and ARM). Obviously only one of them can be available as VST at a time. There are essentially four options: 1. Make compcert / VST for different architectures mutually exclusive in opam 2. Have different root names for different platforms, say VST_X86_32, VST_X84_64, VST_ARM_32, VST_ARM_64 - the same for CompCert 3. Use the same root name for different platforms (VST) and do some -Q / symlink tricks to link "the" VST to the desired folders 4. Have one variant readily accessible as VST and require -Q options for all others. Since one might want to verify the same code for different platforms, I would think that option 1 and 2 are not very practical. 1.) would require to constantly reinstall VST and CompCert - something opam is not very efficient in - and 2.) would require to adjust the package names in the Coq sources. 4.) is the status quo for CompCert and the opam packages I suggested to @andrew-appel (attached as zip to this issues) and agreeable but raises the question which one should be "the" VST - Xavier recently said that if there is the "CompCert" in opam, it should be x86 64, not 32 as is. If we agree on option 3.), I would propose the following mechanism(s): - have specific opam packages, say VST_X86_32, VST_X86_64, VST_ARM_64 and put these into special locations (as is done already for coq-vst-64) where Coq usually does not find them. All of these packages can be installed in parallel. The folder structure is <special_package_root>/VST_<arch>_<bitsize>/VST so that when <special_package_root>/VST_<arch>_<bitsize> is linked in with (just one) -Q option, VST is still known as VST. Which VST it is, depends on the -Q option. - have selection opam packages, which depend on the specific packages and symlink one of them to the default location and root path VST. The selection packages are mutually exclusive, but can be uninstalled / installed very fast since they just create a folder symlink (a few more for CompCert). This should hardly take a second. This gives the VST user the following choices: - install just one selection package (which automatically installs the specific package) and use VST without -Q. Possibly switch between selection packages when switching between platforms. - Install several specific packages and use VST with -Q options to point to the specific packages. - point with -Q options to the root of the special package folder and use long qualified names (something like Require Import VST_X86_64.VST.xyz). This would allow to create single proofs which involve several platforms, but it would take some thinking to make sure the respective VSTs find the respective CompCerts. The current status of CompCert and the currently proposed VST opam packages is that VST X86 32 installs as "VST" in the default location and everything else installs in special locations. So one can use VST X86 32 without -Q but needs -Q for all other platforms.
1.0
Create new opam packages for VST - This issue is intended as a discussion platform for the desired structure of opam packages for VST (and also CompCert). What I am currently thinking about is how to handle different platforms (say 32 and 64 bit or x86 and ARM). Obviously only one of them can be available as VST at a time. There are essentially four options: 1. Make compcert / VST for different architectures mutually exclusive in opam 2. Have different root names for different platforms, say VST_X86_32, VST_X84_64, VST_ARM_32, VST_ARM_64 - the same for CompCert 3. Use the same root name for different platforms (VST) and do some -Q / symlink tricks to link "the" VST to the desired folders 4. Have one variant readily accessible as VST and require -Q options for all others. Since one might want to verify the same code for different platforms, I would think that option 1 and 2 are not very practical. 1.) would require to constantly reinstall VST and CompCert - something opam is not very efficient in - and 2.) would require to adjust the package names in the Coq sources. 4.) is the status quo for CompCert and the opam packages I suggested to @andrew-appel (attached as zip to this issues) and agreeable but raises the question which one should be "the" VST - Xavier recently said that if there is the "CompCert" in opam, it should be x86 64, not 32 as is. If we agree on option 3.), I would propose the following mechanism(s): - have specific opam packages, say VST_X86_32, VST_X86_64, VST_ARM_64 and put these into special locations (as is done already for coq-vst-64) where Coq usually does not find them. All of these packages can be installed in parallel. The folder structure is <special_package_root>/VST_<arch>_<bitsize>/VST so that when <special_package_root>/VST_<arch>_<bitsize> is linked in with (just one) -Q option, VST is still known as VST. Which VST it is, depends on the -Q option. - have selection opam packages, which depend on the specific packages and symlink one of them to the default location and root path VST. The selection packages are mutually exclusive, but can be uninstalled / installed very fast since they just create a folder symlink (a few more for CompCert). This should hardly take a second. This gives the VST user the following choices: - install just one selection package (which automatically installs the specific package) and use VST without -Q. Possibly switch between selection packages when switching between platforms. - Install several specific packages and use VST with -Q options to point to the specific packages. - point with -Q options to the root of the special package folder and use long qualified names (something like Require Import VST_X86_64.VST.xyz). This would allow to create single proofs which involve several platforms, but it would take some thinking to make sure the respective VSTs find the respective CompCerts. The current status of CompCert and the currently proposed VST opam packages is that VST X86 32 installs as "VST" in the default location and everything else installs in special locations. So one can use VST X86 32 without -Q but needs -Q for all other platforms.
infrastructure
create new opam packages for vst this issue is intended as a discussion platform for the desired structure of opam packages for vst and also compcert what i am currently thinking about is how to handle different platforms say and bit or and arm obviously only one of them can be available as vst at a time there are essentially four options make compcert vst for different architectures mutually exclusive in opam have different root names for different platforms say vst vst vst arm vst arm the same for compcert use the same root name for different platforms vst and do some q symlink tricks to link the vst to the desired folders have one variant readily accessible as vst and require q options for all others since one might want to verify the same code for different platforms i would think that option and are not very practical would require to constantly reinstall vst and compcert something opam is not very efficient in and would require to adjust the package names in the coq sources is the status quo for compcert and the opam packages i suggested to andrew appel attached as zip to this issues and agreeable but raises the question which one should be the vst xavier recently said that if there is the compcert in opam it should be not as is if we agree on option i would propose the following mechanism s have specific opam packages say vst vst vst arm and put these into special locations as is done already for coq vst where coq usually does not find them all of these packages can be installed in parallel the folder structure is vst vst so that when vst is linked in with just one q option vst is still known as vst which vst it is depends on the q option have selection opam packages which depend on the specific packages and symlink one of them to the default location and root path vst the selection packages are mutually exclusive but can be uninstalled installed very fast since they just create a folder symlink a few more for compcert this should hardly take a second this gives the vst user the following choices install just one selection package which automatically installs the specific package and use vst without q possibly switch between selection packages when switching between platforms install several specific packages and use vst with q options to point to the specific packages point with q options to the root of the special package folder and use long qualified names something like require import vst vst xyz this would allow to create single proofs which involve several platforms but it would take some thinking to make sure the respective vsts find the respective compcerts the current status of compcert and the currently proposed vst opam packages is that vst installs as vst in the default location and everything else installs in special locations so one can use vst without q but needs q for all other platforms
1
24,069
16,818,924,701
IssuesEvent
2021-06-17 10:42:49
hzi-braunschweig/SORMAS-Project
https://api.github.com/repos/hzi-braunschweig/SORMAS-Project
closed
country.name does not consider all deposited formats deposited in country infrastructure data
backend bug critical important infrastructure refine
<!-- If you've never submitted an issue to the SORMAS repository before or this is your first time using this template, please read the Contributing guidelines (https://github.com/hzi-braunschweig/SORMAS-Project/blob/development/docs/CONTRIBUTING.md) for an explanation of the information we need you to provide. You don't have to remove this comment or any other comment from this issue as they will automatically be hidden. --> ### Bug Description <!-- Mandatory --> when defining a country.name in the properties, only specific formats can be read. This is a problem when countries are missing in the standard import (cf. https://github.com/hzi-braunschweig/SORMAS-Project/issues/4782#issuecomment-801263814) or were generally added to the list. These countries, to count as the server country, need to be set according to the deposited value. However, the properties file does not allow spaces, quotations marks, apostrophes or special characters. This leads to country names having to be adjusted in undesired ways in order to allow importing of districts. ### Steps to Reproduce <!-- Optional; please add more steps if necessary --> 1. Add "Côte d'Ivoire" as a country in configurations 2. Set country.name="Côte d'Ivoire" 2. Import regions and districts. (Only the district import should through an error saying that the region is not in server country.) 3. Change the country name to "Cote_dIvoire" in configurations 4. Set country.name=Cote_dIvoire 5. Import districts again ### Expected Behavior <!-- Optional --> Any deposited country should be able to be set as country.name and still maintain its proper caption ### Screenshots <!-- Optional --> <img width="599" alt="IvoryCoastProperties" src="https://user-images.githubusercontent.com/70317594/120790990-e7545600-c533-11eb-951f-e250a0954f49.PNG"> ### System Details <!-- Mandatory; you only have to specify the Server URL if the error appeared on a publicly available test server --> * Device: * SORMAS version: 1.58.3/1.60 * Android version/Browser: firefox * Server URL: https://test-inhp-ci.sormas.netzlink.com/ * User Role: admin, national user ### Additional Information <!-- Optional --> tested country.name options |country.name|result| |:--------------|:------| "Côte d'Ivoire"|fail Côte d'Ivoire|fail Ivory Coast|fail Ivory_Coast|success Côte_d'Ivoire|fail Côte_dIvoire|fail Cote_dIvoire|success "Ivory Coast"|fail error report: [sormas_import_error_ivorycoast(1).txt](https://github.com/hzi-braunschweig/SORMAS-Project/files/6597996/sormas_import_error_ivorycoast.1.txt) district import template: [sormas_import_district_template_ivoryCoast(1).txt](https://github.com/hzi-braunschweig/SORMAS-Project/files/6598051/sormas_import_district_template_ivoryCoast.1.txt) ### Possible solutions [These should merely be suggestions with the limited knowledge I have about the technical details] - Allow text in between "" to be read in the properties file - Add country references to lower hierarchy infrastructure (might also have the advantages that these hierarchies can be imported at all for other countries then set in country.name) - restructure infrastructure so that each line has its own value independent of the name which then will be used as a caption. E.g. when creating an entry for Côte d'Ivoire, the entry produces a value that conforms to the needed format COTE_DIVOIRE and would then be referenced in the properties file.
1.0
country.name does not consider all deposited formats deposited in country infrastructure data - <!-- If you've never submitted an issue to the SORMAS repository before or this is your first time using this template, please read the Contributing guidelines (https://github.com/hzi-braunschweig/SORMAS-Project/blob/development/docs/CONTRIBUTING.md) for an explanation of the information we need you to provide. You don't have to remove this comment or any other comment from this issue as they will automatically be hidden. --> ### Bug Description <!-- Mandatory --> when defining a country.name in the properties, only specific formats can be read. This is a problem when countries are missing in the standard import (cf. https://github.com/hzi-braunschweig/SORMAS-Project/issues/4782#issuecomment-801263814) or were generally added to the list. These countries, to count as the server country, need to be set according to the deposited value. However, the properties file does not allow spaces, quotations marks, apostrophes or special characters. This leads to country names having to be adjusted in undesired ways in order to allow importing of districts. ### Steps to Reproduce <!-- Optional; please add more steps if necessary --> 1. Add "Côte d'Ivoire" as a country in configurations 2. Set country.name="Côte d'Ivoire" 2. Import regions and districts. (Only the district import should through an error saying that the region is not in server country.) 3. Change the country name to "Cote_dIvoire" in configurations 4. Set country.name=Cote_dIvoire 5. Import districts again ### Expected Behavior <!-- Optional --> Any deposited country should be able to be set as country.name and still maintain its proper caption ### Screenshots <!-- Optional --> <img width="599" alt="IvoryCoastProperties" src="https://user-images.githubusercontent.com/70317594/120790990-e7545600-c533-11eb-951f-e250a0954f49.PNG"> ### System Details <!-- Mandatory; you only have to specify the Server URL if the error appeared on a publicly available test server --> * Device: * SORMAS version: 1.58.3/1.60 * Android version/Browser: firefox * Server URL: https://test-inhp-ci.sormas.netzlink.com/ * User Role: admin, national user ### Additional Information <!-- Optional --> tested country.name options |country.name|result| |:--------------|:------| "Côte d'Ivoire"|fail Côte d'Ivoire|fail Ivory Coast|fail Ivory_Coast|success Côte_d'Ivoire|fail Côte_dIvoire|fail Cote_dIvoire|success "Ivory Coast"|fail error report: [sormas_import_error_ivorycoast(1).txt](https://github.com/hzi-braunschweig/SORMAS-Project/files/6597996/sormas_import_error_ivorycoast.1.txt) district import template: [sormas_import_district_template_ivoryCoast(1).txt](https://github.com/hzi-braunschweig/SORMAS-Project/files/6598051/sormas_import_district_template_ivoryCoast.1.txt) ### Possible solutions [These should merely be suggestions with the limited knowledge I have about the technical details] - Allow text in between "" to be read in the properties file - Add country references to lower hierarchy infrastructure (might also have the advantages that these hierarchies can be imported at all for other countries then set in country.name) - restructure infrastructure so that each line has its own value independent of the name which then will be used as a caption. E.g. when creating an entry for Côte d'Ivoire, the entry produces a value that conforms to the needed format COTE_DIVOIRE and would then be referenced in the properties file.
infrastructure
country name does not consider all deposited formats deposited in country infrastructure data if you ve never submitted an issue to the sormas repository before or this is your first time using this template please read the contributing guidelines for an explanation of the information we need you to provide you don t have to remove this comment or any other comment from this issue as they will automatically be hidden bug description when defining a country name in the properties only specific formats can be read this is a problem when countries are missing in the standard import cf or were generally added to the list these countries to count as the server country need to be set according to the deposited value however the properties file does not allow spaces quotations marks apostrophes or special characters this leads to country names having to be adjusted in undesired ways in order to allow importing of districts steps to reproduce add côte d ivoire as a country in configurations set country name côte d ivoire import regions and districts only the district import should through an error saying that the region is not in server country change the country name to cote divoire in configurations set country name cote divoire import districts again expected behavior any deposited country should be able to be set as country name and still maintain its proper caption screenshots img width alt ivorycoastproperties src system details device sormas version android version browser firefox server url user role admin national user additional information tested country name options country name result côte d ivoire fail côte d ivoire fail ivory coast fail ivory coast success côte d ivoire fail côte divoire fail cote divoire success ivory coast fail error report district import template possible solutions allow text in between to be read in the properties file add country references to lower hierarchy infrastructure might also have the advantages that these hierarchies can be imported at all for other countries then set in country name restructure infrastructure so that each line has its own value independent of the name which then will be used as a caption e g when creating an entry for côte d ivoire the entry produces a value that conforms to the needed format cote divoire and would then be referenced in the properties file
1
5,835
6,008,382,426
IssuesEvent
2017-06-06 07:40:29
vmware/docker-volume-vsphere
https://api.github.com/repos/vmware/docker-volume-vsphere
opened
Turn off unnecessary logs from cleanup routines
component/test-infrastructure P1
`make clean-all` spits out following lines which is at no use and can be discarded. ``` dpkg-query: no packages found matching docker-volume-vsphere Error response from daemon: plugin "vsphere:latest" not found ``` Identify which lines are leftout and added redirection `> /dev/null`
1.0
Turn off unnecessary logs from cleanup routines - `make clean-all` spits out following lines which is at no use and can be discarded. ``` dpkg-query: no packages found matching docker-volume-vsphere Error response from daemon: plugin "vsphere:latest" not found ``` Identify which lines are leftout and added redirection `> /dev/null`
infrastructure
turn off unnecessary logs from cleanup routines make clean all spits out following lines which is at no use and can be discarded dpkg query no packages found matching docker volume vsphere error response from daemon plugin vsphere latest not found identify which lines are leftout and added redirection dev null
1
113,121
17,116,003,324
IssuesEvent
2021-07-11 11:14:14
theHinneh/ridge-condos-
https://api.github.com/repos/theHinneh/ridge-condos-
closed
CVE-2020-11023 (Medium) detected in jquery-1.7.1.min.js, jquery-3.4.1.slim.min.js
security vulnerability
## CVE-2020-11023 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>jquery-1.7.1.min.js</b>, <b>jquery-3.4.1.slim.min.js</b></p></summary> <p> <details><summary><b>jquery-1.7.1.min.js</b></p></summary> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.7.1/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/1.7.1/jquery.min.js</a></p> <p>Path to dependency file: ridge-condos-/node_modules/sockjs/examples/multiplex/index.html</p> <p>Path to vulnerable library: ridge-condos-/node_modules/sockjs/examples/multiplex/index.html,ridge-condos-/node_modules/sockjs/examples/express-3.x/index.html,ridge-condos-/node_modules/sockjs/examples/express/index.html,ridge-condos-/node_modules/sockjs/examples/hapi/html/index.html,ridge-condos-/node_modules/sockjs/examples/echo/index.html</p> <p> Dependency Hierarchy: - :x: **jquery-1.7.1.min.js** (Vulnerable Library) </details> <details><summary><b>jquery-3.4.1.slim.min.js</b></p></summary> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/3.4.1/jquery.slim.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/3.4.1/jquery.slim.min.js</a></p> <p>Path to dependency file: ridge-condos-/src/index.html</p> <p>Path to vulnerable library: ridge-condos-/src/index.html</p> <p> Dependency Hierarchy: - :x: **jquery-3.4.1.slim.min.js** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/theHinneh/ridge-condos-/commit/7c1e7fe6dd1bbeac6fe80f7baf08a8f793d23222">7c1e7fe6dd1bbeac6fe80f7baf08a8f793d23222</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0. <p>Publish Date: 2020-04-29 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11023>CVE-2020-11023</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11023">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11023</a></p> <p>Release Date: 2020-04-29</p> <p>Fix Resolution: jquery - 3.5.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2020-11023 (Medium) detected in jquery-1.7.1.min.js, jquery-3.4.1.slim.min.js - ## CVE-2020-11023 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>jquery-1.7.1.min.js</b>, <b>jquery-3.4.1.slim.min.js</b></p></summary> <p> <details><summary><b>jquery-1.7.1.min.js</b></p></summary> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.7.1/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/1.7.1/jquery.min.js</a></p> <p>Path to dependency file: ridge-condos-/node_modules/sockjs/examples/multiplex/index.html</p> <p>Path to vulnerable library: ridge-condos-/node_modules/sockjs/examples/multiplex/index.html,ridge-condos-/node_modules/sockjs/examples/express-3.x/index.html,ridge-condos-/node_modules/sockjs/examples/express/index.html,ridge-condos-/node_modules/sockjs/examples/hapi/html/index.html,ridge-condos-/node_modules/sockjs/examples/echo/index.html</p> <p> Dependency Hierarchy: - :x: **jquery-1.7.1.min.js** (Vulnerable Library) </details> <details><summary><b>jquery-3.4.1.slim.min.js</b></p></summary> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/3.4.1/jquery.slim.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/3.4.1/jquery.slim.min.js</a></p> <p>Path to dependency file: ridge-condos-/src/index.html</p> <p>Path to vulnerable library: ridge-condos-/src/index.html</p> <p> Dependency Hierarchy: - :x: **jquery-3.4.1.slim.min.js** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/theHinneh/ridge-condos-/commit/7c1e7fe6dd1bbeac6fe80f7baf08a8f793d23222">7c1e7fe6dd1bbeac6fe80f7baf08a8f793d23222</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0. <p>Publish Date: 2020-04-29 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11023>CVE-2020-11023</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11023">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11023</a></p> <p>Release Date: 2020-04-29</p> <p>Fix Resolution: jquery - 3.5.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_infrastructure
cve medium detected in jquery min js jquery slim min js cve medium severity vulnerability vulnerable libraries jquery min js jquery slim min js jquery min js javascript library for dom operations library home page a href path to dependency file ridge condos node modules sockjs examples multiplex index html path to vulnerable library ridge condos node modules sockjs examples multiplex index html ridge condos node modules sockjs examples express x index html ridge condos node modules sockjs examples express index html ridge condos node modules sockjs examples hapi html index html ridge condos node modules sockjs examples echo index html dependency hierarchy x jquery min js vulnerable library jquery slim min js javascript library for dom operations library home page a href path to dependency file ridge condos src index html path to vulnerable library ridge condos src index html dependency hierarchy x jquery slim min js vulnerable library found in head commit a href found in base branch master vulnerability details in jquery versions greater than or equal to and before passing html containing elements from untrusted sources even after sanitizing it to one of jquery s dom manipulation methods i e html append and others may execute untrusted code this problem is patched in jquery publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution jquery step up your open source security game with whitesource
0
8,154
7,253,944,915
IssuesEvent
2018-02-16 08:56:12
dzhw/metadatamanagement
https://api.github.com/repos/dzhw/metadatamanagement
closed
Edit / Create Page for Surveys
category:surveymanagement points:20 prio:1 scope:project infrastructure status:testing type:backlog item
We will implement a edit / create surveys page without attachment.
1.0
Edit / Create Page for Surveys - We will implement a edit / create surveys page without attachment.
infrastructure
edit create page for surveys we will implement a edit create surveys page without attachment
1
462,620
13,250,259,703
IssuesEvent
2020-08-19 22:33:12
CredentialEngine/CredentialRegistry
https://api.github.com/repos/CredentialEngine/CredentialRegistry
reopened
Attempt to update a registry document is flagged as not changed when content has changed.
High Priority
The credential: "CyberSAFE (Securing Assets for End-Users) Exam CBS-210" has been set the status of deprecated. The current envelope/graph is: https://credentialengineregistry.org/ce-registry/envelopes/bd6c0223-311d-4bd2-9adb-9ef558950b1f https://credentialengineregistry.org/graph/ce-d80e6f22-1cbb-4b8f-97ab-25b255274b92 The json from the following gist has several differences, including the new status and owner: https://gist.github.com/mparsons-ce/bca7225457c075a06eddee0968cab0ba When trying to publish the latter JSON document I get the not changed condition. The latter is only supposed to occur if the payload being uploaded is the same as that in the current envelope. First, I would like to know why this is occurring. Second, regardless of the answer to the latter, it may be useful to have an option to bypass the process that compares the update with the current content and force an update.
1.0
Attempt to update a registry document is flagged as not changed when content has changed. - The credential: "CyberSAFE (Securing Assets for End-Users) Exam CBS-210" has been set the status of deprecated. The current envelope/graph is: https://credentialengineregistry.org/ce-registry/envelopes/bd6c0223-311d-4bd2-9adb-9ef558950b1f https://credentialengineregistry.org/graph/ce-d80e6f22-1cbb-4b8f-97ab-25b255274b92 The json from the following gist has several differences, including the new status and owner: https://gist.github.com/mparsons-ce/bca7225457c075a06eddee0968cab0ba When trying to publish the latter JSON document I get the not changed condition. The latter is only supposed to occur if the payload being uploaded is the same as that in the current envelope. First, I would like to know why this is occurring. Second, regardless of the answer to the latter, it may be useful to have an option to bypass the process that compares the update with the current content and force an update.
non_infrastructure
attempt to update a registry document is flagged as not changed when content has changed the credential cybersafe securing assets for end users exam cbs has been set the status of deprecated the current envelope graph is the json from the following gist has several differences including the new status and owner when trying to publish the latter json document i get the not changed condition the latter is only supposed to occur if the payload being uploaded is the same as that in the current envelope first i would like to know why this is occurring second regardless of the answer to the latter it may be useful to have an option to bypass the process that compares the update with the current content and force an update
0
34,394
29,797,598,547
IssuesEvent
2023-06-16 04:50:23
BCACTF/arcs-issues
https://api.github.com/repos/BCACTF/arcs-issues
opened
Webhook notifications for first bloods on challenges
Infrastructure Feature Suggestion
Having web hook send out more notifications to Discord mid-ctf would be nice and would give it more of a purpose.
1.0
Webhook notifications for first bloods on challenges - Having web hook send out more notifications to Discord mid-ctf would be nice and would give it more of a purpose.
infrastructure
webhook notifications for first bloods on challenges having web hook send out more notifications to discord mid ctf would be nice and would give it more of a purpose
1
288,711
21,718,418,849
IssuesEvent
2022-05-10 20:28:40
cagov/odi-engineering
https://api.github.com/repos/cagov/odi-engineering
closed
Create documentation for ODI Publishing system.
Documentation p1
Where does our documentation live? What is the cadence of updates? Suggestions from Jared: - "First aid" documentation (wiki) (contact information) - (if any of our third party services - Internal documentation (who to contact in ODI)
1.0
Create documentation for ODI Publishing system. - Where does our documentation live? What is the cadence of updates? Suggestions from Jared: - "First aid" documentation (wiki) (contact information) - (if any of our third party services - Internal documentation (who to contact in ODI)
non_infrastructure
create documentation for odi publishing system where does our documentation live what is the cadence of updates suggestions from jared first aid documentation wiki contact information if any of our third party services internal documentation who to contact in odi
0
18,767
13,097,362,647
IssuesEvent
2020-08-03 17:19:19
dotnet/runtime
https://api.github.com/repos/dotnet/runtime
closed
Switch to label.N form for pre-release label
area-Infrastructure-coreclr
In order to facilitate better preview sorting, switch to label.N form for the pre-release label. Requires a recent version of arcade, so filing an issue rather than opening a PR. See https://github.com/dotnet/windowsdesktop/pull/104 for an example of how this is done.
1.0
Switch to label.N form for pre-release label - In order to facilitate better preview sorting, switch to label.N form for the pre-release label. Requires a recent version of arcade, so filing an issue rather than opening a PR. See https://github.com/dotnet/windowsdesktop/pull/104 for an example of how this is done.
infrastructure
switch to label n form for pre release label in order to facilitate better preview sorting switch to label n form for the pre release label requires a recent version of arcade so filing an issue rather than opening a pr see for an example of how this is done
1
13,309
10,197,709,358
IssuesEvent
2019-08-13 01:42:47
askmench/mench-web-app
https://api.github.com/repos/askmench/mench-web-app
closed
Stop/Terminate Intention V1
DB/Server/Infrastructure Mined Intelligence
As part of #2526 this would allow the Action Plan intent to be terminated if any stop intent has been marked as complete.
1.0
Stop/Terminate Intention V1 - As part of #2526 this would allow the Action Plan intent to be terminated if any stop intent has been marked as complete.
infrastructure
stop terminate intention as part of this would allow the action plan intent to be terminated if any stop intent has been marked as complete
1
18,659
13,063,465,768
IssuesEvent
2020-07-30 16:34:30
bradyrx/climpred
https://api.github.com/repos/bradyrx/climpred
reopened
get rid of the sources of warnings in tests
infrastructure
You are encouraged to add information about all relevant sections, but not required to submit an issue. #### Code Sample, a copy-pastable example if possible - just fix them - see https://github.com/pydata/xarray/issues/3266 they have a few good suggestions #### Problem description This should explain **why** the current behaviour is a problem and why the expected output is a better solution. #### Expected Output #### Output of `climpred.show_versions()` <details> # Paste the output here xr.show_versions() here </details>
1.0
get rid of the sources of warnings in tests - You are encouraged to add information about all relevant sections, but not required to submit an issue. #### Code Sample, a copy-pastable example if possible - just fix them - see https://github.com/pydata/xarray/issues/3266 they have a few good suggestions #### Problem description This should explain **why** the current behaviour is a problem and why the expected output is a better solution. #### Expected Output #### Output of `climpred.show_versions()` <details> # Paste the output here xr.show_versions() here </details>
infrastructure
get rid of the sources of warnings in tests you are encouraged to add information about all relevant sections but not required to submit an issue code sample a copy pastable example if possible just fix them see they have a few good suggestions problem description this should explain why the current behaviour is a problem and why the expected output is a better solution expected output output of climpred show versions paste the output here xr show versions here
1
19,102
13,187,580,313
IssuesEvent
2020-08-13 03:52:58
icecube-trac/tix3
https://api.github.com/repos/icecube-trac/tix3
closed
HitSpool interface: report running component (Trac #944)
Migrated from Trac enhancement infrastructure
The cronjob installed on expcont for doing an hourly: fab hs_status that reports running or not running comonents to i3live is still not working properly. <details> <summary><em>Migrated from https://code.icecube.wisc.edu/ticket/944 , reported by dheereman and owned by dheereman</em></summary> <p> ```json { "status": "closed", "changetime": "2015-08-10T22:35:05", "description": "The cronjob installed on expcont for doing an hourly:\n\nfab hs_status\n\nthat reports running or not running comonents to i3live is still not working properly. ", "reporter": "dheereman", "cc": "dheereman", "resolution": "wontfix", "_ts": "1439246105293024", "component": "infrastructure", "summary": "HitSpool interface: report running component", "priority": "normal", "keywords": "hitspool", "time": "2015-04-21T09:52:00", "milestone": "", "owner": "dheereman", "type": "enhancement" } ``` </p> </details>
1.0
HitSpool interface: report running component (Trac #944) - The cronjob installed on expcont for doing an hourly: fab hs_status that reports running or not running comonents to i3live is still not working properly. <details> <summary><em>Migrated from https://code.icecube.wisc.edu/ticket/944 , reported by dheereman and owned by dheereman</em></summary> <p> ```json { "status": "closed", "changetime": "2015-08-10T22:35:05", "description": "The cronjob installed on expcont for doing an hourly:\n\nfab hs_status\n\nthat reports running or not running comonents to i3live is still not working properly. ", "reporter": "dheereman", "cc": "dheereman", "resolution": "wontfix", "_ts": "1439246105293024", "component": "infrastructure", "summary": "HitSpool interface: report running component", "priority": "normal", "keywords": "hitspool", "time": "2015-04-21T09:52:00", "milestone": "", "owner": "dheereman", "type": "enhancement" } ``` </p> </details>
infrastructure
hitspool interface report running component trac the cronjob installed on expcont for doing an hourly fab hs status that reports running or not running comonents to is still not working properly migrated from reported by dheereman and owned by dheereman json status closed changetime description the cronjob installed on expcont for doing an hourly n nfab hs status n nthat reports running or not running comonents to is still not working properly reporter dheereman cc dheereman resolution wontfix ts component infrastructure summary hitspool interface report running component priority normal keywords hitspool time milestone owner dheereman type enhancement
1