Unnamed: 0 int64 0 832k | id float64 2.49B 32.1B | type stringclasses 1 value | created_at stringlengths 19 19 | repo stringlengths 5 112 | repo_url stringlengths 34 141 | action stringclasses 3 values | title stringlengths 1 844 | labels stringlengths 4 721 | body stringlengths 1 261k | index stringclasses 12 values | text_combine stringlengths 96 261k | label stringclasses 2 values | text stringlengths 96 248k | binary_label int64 0 1 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
54,372 | 11,220,751,752 | IssuesEvent | 2020-01-07 16:24:20 | dotnet/runtime | https://api.github.com/repos/dotnet/runtime | closed | Recreating struct containing System.Numerics vectors in loop and setting array element causes data loss | area-CodeGen | ## Description
I'm experiencing some behavior in "release" mode that I can't make sense of.
I have a method which contains the following loop
```csharp
for (var i = 0; i < Vertices.Length; i++)
{
var vert = Vertices[i];
Vertices[i] = new Vertex(vert.Position, vert.TexCoords);
}
```
`Vertices` here is a property on the method's class that is an array of struct `Vertex`. The struct has two properties, a `Vector3` and `Vector2`.
After the above loop runs, each `Vertex` item in the `Vertices` array does not have the data it should, it's all zeroes. However, if the new struct instance is stored in a local variable first, then assigned to the array's element, the data is as expected:
```csharp
for (var i = 0; i < Vertices.Length; i++)
{
var vert = Vertices[i];
var newVert = new Vertex(vert.Position, vert.TexCoords);
Vertices[i] = newVert;
}
```
### Caveat:
- If the fields on the struct are, for example, `float` instead of `Vector3/2`, the issue does not present itself
I've created a minimal reproduction of the issue here: https://github.com/ronbrogan/JitBug/blob/master/JitBug/Program.cs
When run in debug mode, the data is correct, but in release mode, it's zero:


## Disassembly
I've tried my hand at grabbing the disassembly for the loops:
Here's the scenario where the data is lost, the elements have zeros for data:
```asm
for (var i = 0; i < Vertices.Length; i++)
00007FFE82E488F2 in al,dx
00007FFE82E488F3 pop rax
00007FFE82E488F4 vzeroupper
00007FFE82E488F7 xor eax,eax
00007FFE82E488F9 mov qword ptr [rsp+40h],rax
00007FFE82E488FE mov qword ptr [rsp+48h],rax
00007FFE82E48903 mov qword ptr [rsp+50h],rax
00007FFE82E48908 xor eax,eax
00007FFE82E4890A mov rdx,qword ptr [rcx+8]
00007FFE82E4890E cmp dword ptr [rdx+8],0
00007FFE82E48912 jle 00007FFE82E489C3
00007FFE82E48918 mov rdx,qword ptr [rcx+8]
00007FFE82E4891C cmp eax,dword ptr [rdx+8]
00007FFE82E4891F jae 00007FFE82E489C8
00007FFE82E48925 movsxd r8,eax
00007FFE82E48928 lea r8,[r8+r8*4]
00007FFE82E4892C lea rdx,[rdx+r8*4+10h]
00007FFE82E48931 vmovdqu xmm0,xmmword ptr [rdx]
00007FFE82E48935 vmovdqu xmmword ptr [rsp+40h],xmm0
00007FFE82E4893B mov r8d,dword ptr [rdx+10h]
00007FFE82E4893F mov dword ptr [rsp+50h],r8d
00007FFE82E48944 xor r8d,r8d
00007FFE82E48947 lea r9,[rsp+28h]
00007FFE82E4894C vxorps xmm0,xmm0,xmm0
00007FFE82E48950 vmovdqu xmmword ptr [r9],xmm0
00007FFE82E48955 mov dword ptr [r9+10h],r8d
00007FFE82E48959 lea r8,[rsp+40h]
00007FFE82E4895E vmovss xmm0,dword ptr [r8]
00007FFE82E48963 vmovss xmm1,dword ptr [r8+4]
00007FFE82E48969 vmovss xmm2,dword ptr [r8+8]
00007FFE82E4896F lea r8,[rsp+4Ch]
00007FFE82E48974 vmovss xmm3,dword ptr [r8]
00007FFE82E48979 vmovss xmm4,dword ptr [r8+4]
00007FFE82E4897F lea r8,[rsp+28h]
00007FFE82E48984 vmovss dword ptr [r8],xmm0
00007FFE82E48989 vmovss dword ptr [r8+4],xmm1
00007FFE82E4898F vmovss dword ptr [r8+8],xmm2
00007FFE82E48995 lea r8,[rsp+34h]
00007FFE82E4899A vmovss dword ptr [r8],xmm3
00007FFE82E4899F vmovss dword ptr [r8+4],xmm4
Vertices[i] = new Vertex(vert.Position, vert.TexCoords);
00007FFE82E489A5 xor r8d,r8d
00007FFE82E489A8 vxorps xmm0,xmm0,xmm0
00007FFE82E489AC vmovdqu xmmword ptr [rdx],xmm0
00007FFE82E489B0 mov dword ptr [rdx+10h],r8d
for (var i = 0; i < Vertices.Length; i++)
00007FFE82E489B4 inc eax
00007FFE82E489B6 mov rdx,qword ptr [rcx+8]
00007FFE82E489BA cmp dword ptr [rdx+8],eax
00007FFE82E489BD jg 00007FFE82E48918
00007FFE82E489C3 add rsp,58h
00007FFE82E489C7 ret
```
And here's the asm from when the method works as expected:
```asm
for (var i = 0; i < Vertices.Length; i++)
00007FFE82E49B80 push rdi
00007FFE82E49B81 push rsi
00007FFE82E49B82 sub rsp,58h
00007FFE82E49B86 vzeroupper
00007FFE82E49B89 mov rsi,rcx
00007FFE82E49B8C lea rdi,[rsp+28h]
00007FFE82E49B91 mov ecx,0Ch
00007FFE82E49B96 xor eax,eax
00007FFE82E49B98 rep stos dword ptr [rdi]
00007FFE82E49B9A mov rcx,rsi
00007FFE82E49B9D xor eax,eax
00007FFE82E49B9F mov rdx,qword ptr [rcx+8]
00007FFE82E49BA3 cmp dword ptr [rdx+8],0
00007FFE82E49BA7 jle 00007FFE82E49C4B
00007FFE82E49BAD mov rdx,qword ptr [rcx+8]
00007FFE82E49BB1 cmp eax,dword ptr [rdx+8]
00007FFE82E49BB4 jae 00007FFE82E49C52
00007FFE82E49BBA movsxd r8,eax
00007FFE82E49BBD lea r8,[r8+r8*4]
00007FFE82E49BC1 lea rdx,[rdx+r8*4+10h]
00007FFE82E49BC6 vmovdqu xmm0,xmmword ptr [rdx]
00007FFE82E49BCA vmovdqu xmmword ptr [rsp+40h],xmm0
00007FFE82E49BD0 mov r9d,dword ptr [rdx+10h]
00007FFE82E49BD4 mov dword ptr [rsp+50h],r9d
var newVert = new Vertex(vert.Position, vert.TexCoords);
00007FFE82E49BD9 lea rdx,[rsp+40h]
00007FFE82E49BDE vmovss xmm0,dword ptr [rdx]
00007FFE82E49BE2 vmovss xmm1,dword ptr [rdx+4]
00007FFE82E49BE7 vmovss xmm2,dword ptr [rdx+8]
00007FFE82E49BEC lea rdx,[rsp+4Ch]
00007FFE82E49BF1 vmovss xmm3,dword ptr [rdx]
00007FFE82E49BF5 vmovss xmm4,dword ptr [rdx+4]
00007FFE82E49BFA lea rdx,[rsp+28h]
00007FFE82E49BFF vmovss dword ptr [rdx],xmm0
00007FFE82E49C03 vmovss dword ptr [rdx+4],xmm1
00007FFE82E49C08 vmovss dword ptr [rdx+8],xmm2
00007FFE82E49C0D lea rdx,[rsp+34h]
00007FFE82E49C12 vmovss dword ptr [rdx],xmm3
00007FFE82E49C16 vmovss dword ptr [rdx+4],xmm4
00007FFE82E49C1B mov rdx,qword ptr [rcx+8]
00007FFE82E49C1F cmp eax,dword ptr [rdx+8]
00007FFE82E49C22 jae 00007FFE82E49C52
00007FFE82E49C24 lea rdx,[rdx+r8*4+10h]
00007FFE82E49C29 vmovdqu xmm0,xmmword ptr [rsp+28h]
00007FFE82E49C2F vmovdqu xmmword ptr [rdx],xmm0
00007FFE82E49C33 mov r8d,dword ptr [rsp+38h]
00007FFE82E49C38 mov dword ptr [rdx+10h],r8d
for (var i = 0; i < Vertices.Length; i++)
00007FFE82E49C3C inc eax
00007FFE82E49C3E mov rdx,qword ptr [rcx+8]
00007FFE82E49C42 cmp dword ptr [rdx+8],eax
00007FFE82E49C45 jg 00007FFE82E49BAD
00007FFE82E49C4B add rsp,58h
00007FFE82E49C4F pop rsi
00007FFE82E49C50 pop rdi
00007FFE82E49C51 ret
```
I'm not *great* at reading asm, but it looks like something is going awry when it sets the array element in the failure scenario. I can only assume this presents itself for the Vector types and not floats due to the SIMD instructions for VectorX, but that's just a guess. | 1.0 | Recreating struct containing System.Numerics vectors in loop and setting array element causes data loss - ## Description
I'm experiencing some behavior in "release" mode that I can't make sense of.
I have a method which contains the following loop
```csharp
for (var i = 0; i < Vertices.Length; i++)
{
var vert = Vertices[i];
Vertices[i] = new Vertex(vert.Position, vert.TexCoords);
}
```
`Vertices` here is a property on the method's class that is an array of struct `Vertex`. The struct has two properties, a `Vector3` and `Vector2`.
After the above loop runs, each `Vertex` item in the `Vertices` array does not have the data it should, it's all zeroes. However, if the new struct instance is stored in a local variable first, then assigned to the array's element, the data is as expected:
```csharp
for (var i = 0; i < Vertices.Length; i++)
{
var vert = Vertices[i];
var newVert = new Vertex(vert.Position, vert.TexCoords);
Vertices[i] = newVert;
}
```
### Caveat:
- If the fields on the struct are, for example, `float` instead of `Vector3/2`, the issue does not present itself
I've created a minimal reproduction of the issue here: https://github.com/ronbrogan/JitBug/blob/master/JitBug/Program.cs
When run in debug mode, the data is correct, but in release mode, it's zero:


## Disassembly
I've tried my hand at grabbing the disassembly for the loops:
Here's the scenario where the data is lost, the elements have zeros for data:
```asm
for (var i = 0; i < Vertices.Length; i++)
00007FFE82E488F2 in al,dx
00007FFE82E488F3 pop rax
00007FFE82E488F4 vzeroupper
00007FFE82E488F7 xor eax,eax
00007FFE82E488F9 mov qword ptr [rsp+40h],rax
00007FFE82E488FE mov qword ptr [rsp+48h],rax
00007FFE82E48903 mov qword ptr [rsp+50h],rax
00007FFE82E48908 xor eax,eax
00007FFE82E4890A mov rdx,qword ptr [rcx+8]
00007FFE82E4890E cmp dword ptr [rdx+8],0
00007FFE82E48912 jle 00007FFE82E489C3
00007FFE82E48918 mov rdx,qword ptr [rcx+8]
00007FFE82E4891C cmp eax,dword ptr [rdx+8]
00007FFE82E4891F jae 00007FFE82E489C8
00007FFE82E48925 movsxd r8,eax
00007FFE82E48928 lea r8,[r8+r8*4]
00007FFE82E4892C lea rdx,[rdx+r8*4+10h]
00007FFE82E48931 vmovdqu xmm0,xmmword ptr [rdx]
00007FFE82E48935 vmovdqu xmmword ptr [rsp+40h],xmm0
00007FFE82E4893B mov r8d,dword ptr [rdx+10h]
00007FFE82E4893F mov dword ptr [rsp+50h],r8d
00007FFE82E48944 xor r8d,r8d
00007FFE82E48947 lea r9,[rsp+28h]
00007FFE82E4894C vxorps xmm0,xmm0,xmm0
00007FFE82E48950 vmovdqu xmmword ptr [r9],xmm0
00007FFE82E48955 mov dword ptr [r9+10h],r8d
00007FFE82E48959 lea r8,[rsp+40h]
00007FFE82E4895E vmovss xmm0,dword ptr [r8]
00007FFE82E48963 vmovss xmm1,dword ptr [r8+4]
00007FFE82E48969 vmovss xmm2,dword ptr [r8+8]
00007FFE82E4896F lea r8,[rsp+4Ch]
00007FFE82E48974 vmovss xmm3,dword ptr [r8]
00007FFE82E48979 vmovss xmm4,dword ptr [r8+4]
00007FFE82E4897F lea r8,[rsp+28h]
00007FFE82E48984 vmovss dword ptr [r8],xmm0
00007FFE82E48989 vmovss dword ptr [r8+4],xmm1
00007FFE82E4898F vmovss dword ptr [r8+8],xmm2
00007FFE82E48995 lea r8,[rsp+34h]
00007FFE82E4899A vmovss dword ptr [r8],xmm3
00007FFE82E4899F vmovss dword ptr [r8+4],xmm4
Vertices[i] = new Vertex(vert.Position, vert.TexCoords);
00007FFE82E489A5 xor r8d,r8d
00007FFE82E489A8 vxorps xmm0,xmm0,xmm0
00007FFE82E489AC vmovdqu xmmword ptr [rdx],xmm0
00007FFE82E489B0 mov dword ptr [rdx+10h],r8d
for (var i = 0; i < Vertices.Length; i++)
00007FFE82E489B4 inc eax
00007FFE82E489B6 mov rdx,qword ptr [rcx+8]
00007FFE82E489BA cmp dword ptr [rdx+8],eax
00007FFE82E489BD jg 00007FFE82E48918
00007FFE82E489C3 add rsp,58h
00007FFE82E489C7 ret
```
And here's the asm from when the method works as expected:
```asm
for (var i = 0; i < Vertices.Length; i++)
00007FFE82E49B80 push rdi
00007FFE82E49B81 push rsi
00007FFE82E49B82 sub rsp,58h
00007FFE82E49B86 vzeroupper
00007FFE82E49B89 mov rsi,rcx
00007FFE82E49B8C lea rdi,[rsp+28h]
00007FFE82E49B91 mov ecx,0Ch
00007FFE82E49B96 xor eax,eax
00007FFE82E49B98 rep stos dword ptr [rdi]
00007FFE82E49B9A mov rcx,rsi
00007FFE82E49B9D xor eax,eax
00007FFE82E49B9F mov rdx,qword ptr [rcx+8]
00007FFE82E49BA3 cmp dword ptr [rdx+8],0
00007FFE82E49BA7 jle 00007FFE82E49C4B
00007FFE82E49BAD mov rdx,qword ptr [rcx+8]
00007FFE82E49BB1 cmp eax,dword ptr [rdx+8]
00007FFE82E49BB4 jae 00007FFE82E49C52
00007FFE82E49BBA movsxd r8,eax
00007FFE82E49BBD lea r8,[r8+r8*4]
00007FFE82E49BC1 lea rdx,[rdx+r8*4+10h]
00007FFE82E49BC6 vmovdqu xmm0,xmmword ptr [rdx]
00007FFE82E49BCA vmovdqu xmmword ptr [rsp+40h],xmm0
00007FFE82E49BD0 mov r9d,dword ptr [rdx+10h]
00007FFE82E49BD4 mov dword ptr [rsp+50h],r9d
var newVert = new Vertex(vert.Position, vert.TexCoords);
00007FFE82E49BD9 lea rdx,[rsp+40h]
00007FFE82E49BDE vmovss xmm0,dword ptr [rdx]
00007FFE82E49BE2 vmovss xmm1,dword ptr [rdx+4]
00007FFE82E49BE7 vmovss xmm2,dword ptr [rdx+8]
00007FFE82E49BEC lea rdx,[rsp+4Ch]
00007FFE82E49BF1 vmovss xmm3,dword ptr [rdx]
00007FFE82E49BF5 vmovss xmm4,dword ptr [rdx+4]
00007FFE82E49BFA lea rdx,[rsp+28h]
00007FFE82E49BFF vmovss dword ptr [rdx],xmm0
00007FFE82E49C03 vmovss dword ptr [rdx+4],xmm1
00007FFE82E49C08 vmovss dword ptr [rdx+8],xmm2
00007FFE82E49C0D lea rdx,[rsp+34h]
00007FFE82E49C12 vmovss dword ptr [rdx],xmm3
00007FFE82E49C16 vmovss dword ptr [rdx+4],xmm4
00007FFE82E49C1B mov rdx,qword ptr [rcx+8]
00007FFE82E49C1F cmp eax,dword ptr [rdx+8]
00007FFE82E49C22 jae 00007FFE82E49C52
00007FFE82E49C24 lea rdx,[rdx+r8*4+10h]
00007FFE82E49C29 vmovdqu xmm0,xmmword ptr [rsp+28h]
00007FFE82E49C2F vmovdqu xmmword ptr [rdx],xmm0
00007FFE82E49C33 mov r8d,dword ptr [rsp+38h]
00007FFE82E49C38 mov dword ptr [rdx+10h],r8d
for (var i = 0; i < Vertices.Length; i++)
00007FFE82E49C3C inc eax
00007FFE82E49C3E mov rdx,qword ptr [rcx+8]
00007FFE82E49C42 cmp dword ptr [rdx+8],eax
00007FFE82E49C45 jg 00007FFE82E49BAD
00007FFE82E49C4B add rsp,58h
00007FFE82E49C4F pop rsi
00007FFE82E49C50 pop rdi
00007FFE82E49C51 ret
```
I'm not *great* at reading asm, but it looks like something is going awry when it sets the array element in the failure scenario. I can only assume this presents itself for the Vector types and not floats due to the SIMD instructions for VectorX, but that's just a guess. | non_priority | recreating struct containing system numerics vectors in loop and setting array element causes data loss description i m experiencing some behavior in release mode that i can t make sense of i have a method which contains the following loop csharp for var i i vertices length i var vert vertices vertices new vertex vert position vert texcoords vertices here is a property on the method s class that is an array of struct vertex the struct has two properties a and after the above loop runs each vertex item in the vertices array does not have the data it should it s all zeroes however if the new struct instance is stored in a local variable first then assigned to the array s element the data is as expected csharp for var i i vertices length i var vert vertices var newvert new vertex vert position vert texcoords vertices newvert caveat if the fields on the struct are for example float instead of the issue does not present itself i ve created a minimal reproduction of the issue here when run in debug mode the data is correct but in release mode it s zero disassembly i ve tried my hand at grabbing the disassembly for the loops here s the scenario where the data is lost the elements have zeros for data asm for var i i vertices length i in al dx pop rax vzeroupper xor eax eax mov qword ptr rax mov qword ptr rax mov qword ptr rax xor eax eax mov rdx qword ptr cmp dword ptr jle mov rdx qword ptr cmp eax dword ptr jae movsxd eax lea lea rdx vmovdqu xmmword ptr vmovdqu xmmword ptr mov dword ptr mov dword ptr xor lea vxorps vmovdqu xmmword ptr mov dword ptr lea vmovss dword ptr vmovss dword ptr vmovss dword ptr lea vmovss dword ptr vmovss dword ptr lea vmovss dword ptr vmovss dword ptr vmovss dword ptr lea vmovss dword ptr vmovss dword ptr vertices new vertex vert position vert texcoords xor vxorps vmovdqu xmmword ptr mov dword ptr for var i i vertices length i inc eax mov rdx qword ptr cmp dword ptr eax jg add rsp ret and here s the asm from when the method works as expected asm for var i i vertices length i push rdi push rsi sub rsp vzeroupper mov rsi rcx lea rdi mov ecx xor eax eax rep stos dword ptr mov rcx rsi xor eax eax mov rdx qword ptr cmp dword ptr jle mov rdx qword ptr cmp eax dword ptr jae movsxd eax lea lea rdx vmovdqu xmmword ptr vmovdqu xmmword ptr mov dword ptr mov dword ptr var newvert new vertex vert position vert texcoords lea rdx vmovss dword ptr vmovss dword ptr vmovss dword ptr lea rdx vmovss dword ptr vmovss dword ptr lea rdx vmovss dword ptr vmovss dword ptr vmovss dword ptr lea rdx vmovss dword ptr vmovss dword ptr mov rdx qword ptr cmp eax dword ptr jae lea rdx vmovdqu xmmword ptr vmovdqu xmmword ptr mov dword ptr mov dword ptr for var i i vertices length i inc eax mov rdx qword ptr cmp dword ptr eax jg add rsp pop rsi pop rdi ret i m not great at reading asm but it looks like something is going awry when it sets the array element in the failure scenario i can only assume this presents itself for the vector types and not floats due to the simd instructions for vectorx but that s just a guess | 0 |
5,169 | 18,792,986,062 | IssuesEvent | 2021-11-08 18:46:56 | Azure/missionlz | https://api.github.com/repos/Azure/missionlz | closed | Nightly deployments of /main to AzureCloud and AzureUsGovernment | dev-automation | **Description**
A nightly deployment that validates that the Bicep and Terraform templates work in the public and government clouds.
**Acceptance Criteria**
- A set of actions exists that will deploy the solution to the commercial and government clouds.
- Secrets are not stored in GitHub
- Functional tests are out of scope
- run `az deployment create` of Bicep on main (will be done in AzDevOps)
- run `terraform apply` of Terraform on main (will be done in AzDevOps)
- Notifications are available when the deployment breaks
- A pipeline success/fail badge on the root README
| 1.0 | Nightly deployments of /main to AzureCloud and AzureUsGovernment - **Description**
A nightly deployment that validates that the Bicep and Terraform templates work in the public and government clouds.
**Acceptance Criteria**
- A set of actions exists that will deploy the solution to the commercial and government clouds.
- Secrets are not stored in GitHub
- Functional tests are out of scope
- run `az deployment create` of Bicep on main (will be done in AzDevOps)
- run `terraform apply` of Terraform on main (will be done in AzDevOps)
- Notifications are available when the deployment breaks
- A pipeline success/fail badge on the root README
| non_priority | nightly deployments of main to azurecloud and azureusgovernment description a nightly deployment that validates that the bicep and terraform templates work in the public and government clouds acceptance criteria a set of actions exists that will deploy the solution to the commercial and government clouds secrets are not stored in github functional tests are out of scope run az deployment create of bicep on main will be done in azdevops run terraform apply of terraform on main will be done in azdevops notifications are available when the deployment breaks a pipeline success fail badge on the root readme | 0 |
90,954 | 26,227,174,673 | IssuesEvent | 2023-01-04 19:52:25 | Servoh/TheTower | https://api.github.com/repos/Servoh/TheTower | closed | Tron lines have collision | bug Building Waiting-for-release upstream private | We need to disable collision on the tron outlines, as it is also screwing with the navmesh
Closes #16 | 1.0 | Tron lines have collision - We need to disable collision on the tron outlines, as it is also screwing with the navmesh
Closes #16 | non_priority | tron lines have collision we need to disable collision on the tron outlines as it is also screwing with the navmesh closes | 0 |
213,109 | 23,966,101,359 | IssuesEvent | 2022-09-13 01:11:40 | panasalap/linux-4.1.15 | https://api.github.com/repos/panasalap/linux-4.1.15 | closed | CVE-2017-18261 (Medium) detected in linux-stable-rtv4.1.33 - autoclosed | security vulnerability | ## CVE-2017-18261 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-stable-rtv4.1.33</b></p></summary>
<p>
<p>Julia Cartwright's fork of linux-stable-rt.git</p>
<p>Library home page: <a href=https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git>https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git</a></p>
<p>Found in HEAD commit: <a href="https://github.com/panasalap/linux-4.1.15/commit/aae4c2fa46027fd4c477372871df090c6b94f3f1">aae4c2fa46027fd4c477372871df090c6b94f3f1</a></p>
<p>Found in base branch: <b>master</b></p></p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (2)</summary>
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/arch/arm64/include/asm/arch_timer.h</b>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/arch/arm64/include/asm/arch_timer.h</b>
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The arch_timer_reg_read_stable macro in arch/arm64/include/asm/arch_timer.h in the Linux kernel before 4.13 allows local users to cause a denial of service (infinite recursion) by writing to a file under /sys/kernel/debug in certain circumstances, as demonstrated by a scenario involving debugfs, ftrace, PREEMPT_TRACER, and FUNCTION_GRAPH_TRACER.
<p>Publish Date: 2018-04-19
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-18261>CVE-2017-18261</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2017-18261">https://nvd.nist.gov/vuln/detail/CVE-2017-18261</a></p>
<p>Release Date: 2018-04-19</p>
<p>Fix Resolution: 4.13</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2017-18261 (Medium) detected in linux-stable-rtv4.1.33 - autoclosed - ## CVE-2017-18261 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-stable-rtv4.1.33</b></p></summary>
<p>
<p>Julia Cartwright's fork of linux-stable-rt.git</p>
<p>Library home page: <a href=https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git>https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git</a></p>
<p>Found in HEAD commit: <a href="https://github.com/panasalap/linux-4.1.15/commit/aae4c2fa46027fd4c477372871df090c6b94f3f1">aae4c2fa46027fd4c477372871df090c6b94f3f1</a></p>
<p>Found in base branch: <b>master</b></p></p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (2)</summary>
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/arch/arm64/include/asm/arch_timer.h</b>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/arch/arm64/include/asm/arch_timer.h</b>
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The arch_timer_reg_read_stable macro in arch/arm64/include/asm/arch_timer.h in the Linux kernel before 4.13 allows local users to cause a denial of service (infinite recursion) by writing to a file under /sys/kernel/debug in certain circumstances, as demonstrated by a scenario involving debugfs, ftrace, PREEMPT_TRACER, and FUNCTION_GRAPH_TRACER.
<p>Publish Date: 2018-04-19
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-18261>CVE-2017-18261</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2017-18261">https://nvd.nist.gov/vuln/detail/CVE-2017-18261</a></p>
<p>Release Date: 2018-04-19</p>
<p>Fix Resolution: 4.13</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve medium detected in linux stable autoclosed cve medium severity vulnerability vulnerable library linux stable julia cartwright s fork of linux stable rt git library home page a href found in head commit a href found in base branch master vulnerable source files arch include asm arch timer h arch include asm arch timer h vulnerability details the arch timer reg read stable macro in arch include asm arch timer h in the linux kernel before allows local users to cause a denial of service infinite recursion by writing to a file under sys kernel debug in certain circumstances as demonstrated by a scenario involving debugfs ftrace preempt tracer and function graph tracer publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend | 0 |
354,481 | 25,167,962,206 | IssuesEvent | 2022-11-10 22:56:02 | pytorch/data | https://api.github.com/repos/pytorch/data | closed | DataLoader2 with reading service | documentation | For user dev and onboarding experience of the data component, we will provide examples, tutorials, up-to-date documentations as well as the operational support. We added a simple train loop example. This is to further track adding the uscase and example of DataLoader2 with different reading services. | 1.0 | DataLoader2 with reading service - For user dev and onboarding experience of the data component, we will provide examples, tutorials, up-to-date documentations as well as the operational support. We added a simple train loop example. This is to further track adding the uscase and example of DataLoader2 with different reading services. | non_priority | with reading service for user dev and onboarding experience of the data component we will provide examples tutorials up to date documentations as well as the operational support we added a simple train loop example this is to further track adding the uscase and example of with different reading services | 0 |
27,791 | 6,901,943,364 | IssuesEvent | 2017-11-25 14:35:38 | PapirusDevelopmentTeam/papirus-icon-theme | https://api.github.com/repos/PapirusDevelopmentTeam/papirus-icon-theme | closed | [Icon Request] Nsight Eclipse Edition and NVIDIA Visual Profiler | completed hardcoded icon request | I'd appreciate it if you added the following two icons:
### Nsight Eclipse Edition
.desktop file:
[Desktop Entry]
Type=Application
Name=Nsight Eclipse Edition
GenericName=Nsight Eclipse Edition
Icon=/usr/local/cuda-9.0/libnsight/icon.xpm
Exec=/usr/local/cuda-9.0/bin/nsight
TryExec=/usr/local/cuda-9.0/bin/nsight
Keywords=cuda;gpu;nvidia;debugger;
X-AppInstall-Keywords=cuda;gpu;nvidia;debugger;
X-GNOME-Keywords=cuda;gpu;nvidia;debugger;
Terminal=No
Categories=Development;IDE;Debugger;ParallelComputing

### NVIDIA Visual Profiler
.desktop file:
[Desktop Entry]
Type=Application
Name=NVIDIA Visual Profiler
GenericName=NVIDIA Visual Profiler
Icon=/usr/local/cuda-9.0/libnvvp/icon.xpm
Exec=/usr/local/cuda-9.0/bin/nvvp
TryExec=/usr/local/cuda-9.0/bin/nvvp
Keywords=nvvp;cuda;gpu;nsight;
X-AppInstall-Keywords=nvvp;cuda;gpu;nsight;
X-GNOME-Keywords=nvvp;cuda;gpu;nsight;
Terminal=No
Categories=Development;Profiling;ParallelComputing

| 1.0 | [Icon Request] Nsight Eclipse Edition and NVIDIA Visual Profiler - I'd appreciate it if you added the following two icons:
### Nsight Eclipse Edition
.desktop file:
[Desktop Entry]
Type=Application
Name=Nsight Eclipse Edition
GenericName=Nsight Eclipse Edition
Icon=/usr/local/cuda-9.0/libnsight/icon.xpm
Exec=/usr/local/cuda-9.0/bin/nsight
TryExec=/usr/local/cuda-9.0/bin/nsight
Keywords=cuda;gpu;nvidia;debugger;
X-AppInstall-Keywords=cuda;gpu;nvidia;debugger;
X-GNOME-Keywords=cuda;gpu;nvidia;debugger;
Terminal=No
Categories=Development;IDE;Debugger;ParallelComputing

### NVIDIA Visual Profiler
.desktop file:
[Desktop Entry]
Type=Application
Name=NVIDIA Visual Profiler
GenericName=NVIDIA Visual Profiler
Icon=/usr/local/cuda-9.0/libnvvp/icon.xpm
Exec=/usr/local/cuda-9.0/bin/nvvp
TryExec=/usr/local/cuda-9.0/bin/nvvp
Keywords=nvvp;cuda;gpu;nsight;
X-AppInstall-Keywords=nvvp;cuda;gpu;nsight;
X-GNOME-Keywords=nvvp;cuda;gpu;nsight;
Terminal=No
Categories=Development;Profiling;ParallelComputing

| non_priority | nsight eclipse edition and nvidia visual profiler i d appreciate it if you added the following two icons nsight eclipse edition desktop file type application name nsight eclipse edition genericname nsight eclipse edition icon usr local cuda libnsight icon xpm exec usr local cuda bin nsight tryexec usr local cuda bin nsight keywords cuda gpu nvidia debugger x appinstall keywords cuda gpu nvidia debugger x gnome keywords cuda gpu nvidia debugger terminal no categories development ide debugger parallelcomputing nvidia visual profiler desktop file type application name nvidia visual profiler genericname nvidia visual profiler icon usr local cuda libnvvp icon xpm exec usr local cuda bin nvvp tryexec usr local cuda bin nvvp keywords nvvp cuda gpu nsight x appinstall keywords nvvp cuda gpu nsight x gnome keywords nvvp cuda gpu nsight terminal no categories development profiling parallelcomputing | 0 |
31,421 | 11,936,745,491 | IssuesEvent | 2020-04-02 10:52:39 | Baneeishaque/SnapChat | https://api.github.com/repos/Baneeishaque/SnapChat | opened | CVE-2019-10744 (High) detected in lodash-3.10.1.tgz | security vulnerability | ## CVE-2019-10744 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>lodash-3.10.1.tgz</b></p></summary>
<p>The modern build of lodash modular utilities.</p>
<p>Library home page: <a href="https://registry.npmjs.org/lodash/-/lodash-3.10.1.tgz">https://registry.npmjs.org/lodash/-/lodash-3.10.1.tgz</a></p>
<p>Path to dependency file: /tmp/ws-scm/SnapChat/package.json</p>
<p>Path to vulnerable library: /tmp/ws-scm/SnapChat/node_modules/lodash/package.json</p>
<p>
Dependency Hierarchy:
- react-native-0.30.0.tgz (Root Library)
- :x: **lodash-3.10.1.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/Baneeishaque/SnapChat/commit/11d61cd3cfb69b77e892e6f0cc547fc9fad5d27c">11d61cd3cfb69b77e892e6f0cc547fc9fad5d27c</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Versions of lodash lower than 4.17.12 are vulnerable to Prototype Pollution. The function defaultsDeep could be tricked into adding or modifying properties of Object.prototype using a constructor payload.
<p>Publish Date: 2019-07-26
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-10744>CVE-2019-10744</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/lodash/lodash/pull/4336/commits/a01e4fa727e7294cb7b2845570ba96b206926790">https://github.com/lodash/lodash/pull/4336/commits/a01e4fa727e7294cb7b2845570ba96b206926790</a></p>
<p>Release Date: 2019-07-08</p>
<p>Fix Resolution: 4.17.12</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2019-10744 (High) detected in lodash-3.10.1.tgz - ## CVE-2019-10744 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>lodash-3.10.1.tgz</b></p></summary>
<p>The modern build of lodash modular utilities.</p>
<p>Library home page: <a href="https://registry.npmjs.org/lodash/-/lodash-3.10.1.tgz">https://registry.npmjs.org/lodash/-/lodash-3.10.1.tgz</a></p>
<p>Path to dependency file: /tmp/ws-scm/SnapChat/package.json</p>
<p>Path to vulnerable library: /tmp/ws-scm/SnapChat/node_modules/lodash/package.json</p>
<p>
Dependency Hierarchy:
- react-native-0.30.0.tgz (Root Library)
- :x: **lodash-3.10.1.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/Baneeishaque/SnapChat/commit/11d61cd3cfb69b77e892e6f0cc547fc9fad5d27c">11d61cd3cfb69b77e892e6f0cc547fc9fad5d27c</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Versions of lodash lower than 4.17.12 are vulnerable to Prototype Pollution. The function defaultsDeep could be tricked into adding or modifying properties of Object.prototype using a constructor payload.
<p>Publish Date: 2019-07-26
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-10744>CVE-2019-10744</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/lodash/lodash/pull/4336/commits/a01e4fa727e7294cb7b2845570ba96b206926790">https://github.com/lodash/lodash/pull/4336/commits/a01e4fa727e7294cb7b2845570ba96b206926790</a></p>
<p>Release Date: 2019-07-08</p>
<p>Fix Resolution: 4.17.12</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve high detected in lodash tgz cve high severity vulnerability vulnerable library lodash tgz the modern build of lodash modular utilities library home page a href path to dependency file tmp ws scm snapchat package json path to vulnerable library tmp ws scm snapchat node modules lodash package json dependency hierarchy react native tgz root library x lodash tgz vulnerable library found in head commit a href vulnerability details versions of lodash lower than are vulnerable to prototype pollution the function defaultsdeep could be tricked into adding or modifying properties of object prototype using a constructor payload publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource | 0 |
503 | 8,681,713,563 | IssuesEvent | 2018-12-01 22:59:37 | Automattic/wp-calypso | https://api.github.com/repos/Automattic/wp-calypso | closed | People: What should a subscriber role be able to do in the WordPress.com dashboard? | People Management [Status] Stale [Type] Question | Currently we can invite users with a subscriber role on Jetpack sites, but logging into wp.com we see as the subscriber a non-helpful view like:
<img width="1232" alt="screen shot 2018-02-27 at 2 04 15 pm" src="https://user-images.githubusercontent.com/1270189/36757747-3abd7264-1bc7-11e8-8424-4d0506c1b8bb.png">
What did we intend to happen here? Should the site not display in the sites list like we do for viewers on private sites? Should we allow subscribers to remove themselves?
cc @mattsherman @drw158 @megsfulton | 1.0 | People: What should a subscriber role be able to do in the WordPress.com dashboard? - Currently we can invite users with a subscriber role on Jetpack sites, but logging into wp.com we see as the subscriber a non-helpful view like:
<img width="1232" alt="screen shot 2018-02-27 at 2 04 15 pm" src="https://user-images.githubusercontent.com/1270189/36757747-3abd7264-1bc7-11e8-8424-4d0506c1b8bb.png">
What did we intend to happen here? Should the site not display in the sites list like we do for viewers on private sites? Should we allow subscribers to remove themselves?
cc @mattsherman @drw158 @megsfulton | non_priority | people what should a subscriber role be able to do in the wordpress com dashboard currently we can invite users with a subscriber role on jetpack sites but logging into wp com we see as the subscriber a non helpful view like img width alt screen shot at pm src what did we intend to happen here should the site not display in the sites list like we do for viewers on private sites should we allow subscribers to remove themselves cc mattsherman megsfulton | 0 |
382,427 | 26,498,688,817 | IssuesEvent | 2023-01-18 08:35:11 | unibz-core/Scior | https://api.github.com/repos/unibz-core/Scior | closed | Project name changed to Scior | documentation enhancement | The project's name was changed from **OntCatOWL** to **Scior**.
We need to substitute every occurrence of the term **OntCatOWL** to **Scior** in code, resources, and documentations. | 1.0 | Project name changed to Scior - The project's name was changed from **OntCatOWL** to **Scior**.
We need to substitute every occurrence of the term **OntCatOWL** to **Scior** in code, resources, and documentations. | non_priority | project name changed to scior the project s name was changed from ontcatowl to scior we need to substitute every occurrence of the term ontcatowl to scior in code resources and documentations | 0 |
101,471 | 16,512,279,635 | IssuesEvent | 2021-05-26 06:27:18 | valtech-ch/microservice-kubernetes-cluster | https://api.github.com/repos/valtech-ch/microservice-kubernetes-cluster | opened | CVE-2017-1000208 (High) detected in swagger-parser-1.0.13.jar | security vulnerability | ## CVE-2017-1000208 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>swagger-parser-1.0.13.jar</b></p></summary>
<p>Sonatype helps open source projects to set up Maven repositories on https://oss.sonatype.org/</p>
<p>Library home page: <a href="http://nexus.sonatype.org/oss-repository-hosting.html/swagger-parser-project/modules/swagger-parser">http://nexus.sonatype.org/oss-repository-hosting.html/swagger-parser-project/modules/swagger-parser</a></p>
<p>Path to dependency file: microservice-kubernetes-cluster/persistence/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/io.swagger/swagger-parser/1.0.13/1de172858472bd00f529904f2dea07df2a795b31/swagger-parser-1.0.13.jar</p>
<p>
Dependency Hierarchy:
- springfox-staticdocs-2.6.1.jar (Root Library)
- swagger2markup-0.9.2.jar
- swagger-compat-spec-parser-1.0.13.jar
- :x: **swagger-parser-1.0.13.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/valtech-ch/microservice-kubernetes-cluster/commit/eb274179a823f7d17154880d5a503973bae259a0">eb274179a823f7d17154880d5a503973bae259a0</a></p>
<p>Found in base branch: <b>develop</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
A vulnerability in Swagger-Parser's (version <= 1.0.30) yaml parsing functionality results in arbitrary code being executed when a maliciously crafted yaml Open-API specification is parsed. This in particular, affects the 'generate' and 'validate' command in swagger-codegen (<= 2.2.2) and can lead to arbitrary code being executed when these commands are used on a well-crafted yaml specification.
<p>Publish Date: 2017-11-17
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-1000208>CVE-2017-1000208</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-1000208">http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-1000208</a></p>
<p>Release Date: 2017-11-17</p>
<p>Fix Resolution: io.swagger:swagger-parser:1.0.31</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2017-1000208 (High) detected in swagger-parser-1.0.13.jar - ## CVE-2017-1000208 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>swagger-parser-1.0.13.jar</b></p></summary>
<p>Sonatype helps open source projects to set up Maven repositories on https://oss.sonatype.org/</p>
<p>Library home page: <a href="http://nexus.sonatype.org/oss-repository-hosting.html/swagger-parser-project/modules/swagger-parser">http://nexus.sonatype.org/oss-repository-hosting.html/swagger-parser-project/modules/swagger-parser</a></p>
<p>Path to dependency file: microservice-kubernetes-cluster/persistence/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/io.swagger/swagger-parser/1.0.13/1de172858472bd00f529904f2dea07df2a795b31/swagger-parser-1.0.13.jar</p>
<p>
Dependency Hierarchy:
- springfox-staticdocs-2.6.1.jar (Root Library)
- swagger2markup-0.9.2.jar
- swagger-compat-spec-parser-1.0.13.jar
- :x: **swagger-parser-1.0.13.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/valtech-ch/microservice-kubernetes-cluster/commit/eb274179a823f7d17154880d5a503973bae259a0">eb274179a823f7d17154880d5a503973bae259a0</a></p>
<p>Found in base branch: <b>develop</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
A vulnerability in Swagger-Parser's (version <= 1.0.30) yaml parsing functionality results in arbitrary code being executed when a maliciously crafted yaml Open-API specification is parsed. This in particular, affects the 'generate' and 'validate' command in swagger-codegen (<= 2.2.2) and can lead to arbitrary code being executed when these commands are used on a well-crafted yaml specification.
<p>Publish Date: 2017-11-17
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-1000208>CVE-2017-1000208</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-1000208">http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-1000208</a></p>
<p>Release Date: 2017-11-17</p>
<p>Fix Resolution: io.swagger:swagger-parser:1.0.31</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve high detected in swagger parser jar cve high severity vulnerability vulnerable library swagger parser jar sonatype helps open source projects to set up maven repositories on library home page a href path to dependency file microservice kubernetes cluster persistence build gradle path to vulnerable library home wss scanner gradle caches modules files io swagger swagger parser swagger parser jar dependency hierarchy springfox staticdocs jar root library jar swagger compat spec parser jar x swagger parser jar vulnerable library found in head commit a href found in base branch develop vulnerability details a vulnerability in swagger parser s version yaml parsing functionality results in arbitrary code being executed when a maliciously crafted yaml open api specification is parsed this in particular affects the generate and validate command in swagger codegen and can lead to arbitrary code being executed when these commands are used on a well crafted yaml specification publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution io swagger swagger parser step up your open source security game with whitesource | 0 |
29,081 | 13,043,263,825 | IssuesEvent | 2020-07-29 01:00:37 | MicrosoftDocs/powerbi-docs | https://api.github.com/repos/MicrosoftDocs/powerbi-docs | closed | Real-time refresh- not working / more clarity needed on troubleshooting | Pri2 assigned-to-author doc-bug powerbi-service/subsvc powerbi/svc |
From the doc:
> Once a report is created using the push dataset, any of its visuals can be pinned to a dashboard. **On that dashboard, visuals update in real-time whenever the data is updated. Within the service, the dashboard is triggering a tile refresh every time new data is received.**
and later ...
> Once a visual is pinned to a dashboard, you can use Q&A to ask questions of the push dataset in natural language. **Once you make a Q&A query, you can pin the resulting visual back to the dashboard, and that dashboard will also update in real-time.**
Can someone verify if this scenario is true for PowerBI Pro users?
I've created a push dataset using the API, created and pinned simple report visuals, created and pinned Q&A visuals - when I manually refresh I can see the new data I'm pushing in, but the dashboard never automatically refreshes - you can see there's no underlying activity at all from the browser.
It looks like it makes a call to powerbi/metadata/refresh/subscribe, which fails most of the time after a 60 second timeout (status "cancelled") ..

But even on the rare instances where this successfully returns something (some JSON about a transactionID, a changeSourceID, a changeType - so looks like this is the change watcher for a push dataset ..?), nothing ever actually refreshes.
Really hard to debug since absolutely no front end guidance is given around which tiles will refresh automatically, etc.
---
#### Document Details
⚠ *Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.*
* ID: a46e4476-1fc8-de9c-dc49-ffb8358d22b0
* Version Independent ID: 7af1eac8-5069-8beb-cee4-29c413f7b957
* Content: [Real-time streaming in Power BI - Power BI](https://docs.microsoft.com/en-us/power-bi/connect-data/service-real-time-streaming)
* Content Source: [powerbi-docs/connect-data/service-real-time-streaming.md](https://github.com/MicrosoftDocs/powerbi-docs/blob/live/powerbi-docs/connect-data/service-real-time-streaming.md)
* Service: **powerbi**
* Sub-service: **powerbi-service**
* GitHub Login: @davidiseminger
* Microsoft Alias: **davidi** | 1.0 | Real-time refresh- not working / more clarity needed on troubleshooting -
From the doc:
> Once a report is created using the push dataset, any of its visuals can be pinned to a dashboard. **On that dashboard, visuals update in real-time whenever the data is updated. Within the service, the dashboard is triggering a tile refresh every time new data is received.**
and later ...
> Once a visual is pinned to a dashboard, you can use Q&A to ask questions of the push dataset in natural language. **Once you make a Q&A query, you can pin the resulting visual back to the dashboard, and that dashboard will also update in real-time.**
Can someone verify if this scenario is true for PowerBI Pro users?
I've created a push dataset using the API, created and pinned simple report visuals, created and pinned Q&A visuals - when I manually refresh I can see the new data I'm pushing in, but the dashboard never automatically refreshes - you can see there's no underlying activity at all from the browser.
It looks like it makes a call to powerbi/metadata/refresh/subscribe, which fails most of the time after a 60 second timeout (status "cancelled") ..

But even on the rare instances where this successfully returns something (some JSON about a transactionID, a changeSourceID, a changeType - so looks like this is the change watcher for a push dataset ..?), nothing ever actually refreshes.
Really hard to debug since absolutely no front end guidance is given around which tiles will refresh automatically, etc.
---
#### Document Details
⚠ *Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.*
* ID: a46e4476-1fc8-de9c-dc49-ffb8358d22b0
* Version Independent ID: 7af1eac8-5069-8beb-cee4-29c413f7b957
* Content: [Real-time streaming in Power BI - Power BI](https://docs.microsoft.com/en-us/power-bi/connect-data/service-real-time-streaming)
* Content Source: [powerbi-docs/connect-data/service-real-time-streaming.md](https://github.com/MicrosoftDocs/powerbi-docs/blob/live/powerbi-docs/connect-data/service-real-time-streaming.md)
* Service: **powerbi**
* Sub-service: **powerbi-service**
* GitHub Login: @davidiseminger
* Microsoft Alias: **davidi** | non_priority | real time refresh not working more clarity needed on troubleshooting from the doc once a report is created using the push dataset any of its visuals can be pinned to a dashboard on that dashboard visuals update in real time whenever the data is updated within the service the dashboard is triggering a tile refresh every time new data is received and later once a visual is pinned to a dashboard you can use q a to ask questions of the push dataset in natural language once you make a q a query you can pin the resulting visual back to the dashboard and that dashboard will also update in real time can someone verify if this scenario is true for powerbi pro users i ve created a push dataset using the api created and pinned simple report visuals created and pinned q a visuals when i manually refresh i can see the new data i m pushing in but the dashboard never automatically refreshes you can see there s no underlying activity at all from the browser it looks like it makes a call to powerbi metadata refresh subscribe which fails most of the time after a second timeout status cancelled but even on the rare instances where this successfully returns something some json about a transactionid a changesourceid a changetype so looks like this is the change watcher for a push dataset nothing ever actually refreshes really hard to debug since absolutely no front end guidance is given around which tiles will refresh automatically etc document details ⚠ do not edit this section it is required for docs microsoft com ➟ github issue linking id version independent id content content source service powerbi sub service powerbi service github login davidiseminger microsoft alias davidi | 0 |
155,050 | 19,765,656,603 | IssuesEvent | 2022-01-17 01:40:15 | tuanducdesign/view-book | https://api.github.com/repos/tuanducdesign/view-book | opened | CVE-2021-26707 (High) detected in merge-deep-3.0.2.tgz | security vulnerability | ## CVE-2021-26707 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>merge-deep-3.0.2.tgz</b></p></summary>
<p>Recursively merge values in a javascript object.</p>
<p>Library home page: <a href="https://registry.npmjs.org/merge-deep/-/merge-deep-3.0.2.tgz">https://registry.npmjs.org/merge-deep/-/merge-deep-3.0.2.tgz</a></p>
<p>Path to dependency file: /client/package.json</p>
<p>Path to vulnerable library: /client/node_modules/merge-deep/package.json</p>
<p>
Dependency Hierarchy:
- react-scripts-3.4.3.tgz (Root Library)
- webpack-4.3.3.tgz
- plugin-svgo-4.3.1.tgz
- :x: **merge-deep-3.0.2.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/tuanducdesign/view-book/commit/84b844202860d72f80dc47c5d61e43987127fb2f">84b844202860d72f80dc47c5d61e43987127fb2f</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The merge-deep library before 3.0.3 for Node.js can be tricked into overwriting properties of Object.prototype or adding new properties to it. These properties are then inherited by every object in the program, thus facilitating prototype-pollution attacks against applications using this library.
<p>Publish Date: 2021-06-02
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-26707>CVE-2021-26707</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://bugzilla.redhat.com/show_bug.cgi?id=1922259">https://bugzilla.redhat.com/show_bug.cgi?id=1922259</a></p>
<p>Release Date: 2021-06-02</p>
<p>Fix Resolution: 3.0.3</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2021-26707 (High) detected in merge-deep-3.0.2.tgz - ## CVE-2021-26707 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>merge-deep-3.0.2.tgz</b></p></summary>
<p>Recursively merge values in a javascript object.</p>
<p>Library home page: <a href="https://registry.npmjs.org/merge-deep/-/merge-deep-3.0.2.tgz">https://registry.npmjs.org/merge-deep/-/merge-deep-3.0.2.tgz</a></p>
<p>Path to dependency file: /client/package.json</p>
<p>Path to vulnerable library: /client/node_modules/merge-deep/package.json</p>
<p>
Dependency Hierarchy:
- react-scripts-3.4.3.tgz (Root Library)
- webpack-4.3.3.tgz
- plugin-svgo-4.3.1.tgz
- :x: **merge-deep-3.0.2.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/tuanducdesign/view-book/commit/84b844202860d72f80dc47c5d61e43987127fb2f">84b844202860d72f80dc47c5d61e43987127fb2f</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The merge-deep library before 3.0.3 for Node.js can be tricked into overwriting properties of Object.prototype or adding new properties to it. These properties are then inherited by every object in the program, thus facilitating prototype-pollution attacks against applications using this library.
<p>Publish Date: 2021-06-02
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-26707>CVE-2021-26707</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://bugzilla.redhat.com/show_bug.cgi?id=1922259">https://bugzilla.redhat.com/show_bug.cgi?id=1922259</a></p>
<p>Release Date: 2021-06-02</p>
<p>Fix Resolution: 3.0.3</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve high detected in merge deep tgz cve high severity vulnerability vulnerable library merge deep tgz recursively merge values in a javascript object library home page a href path to dependency file client package json path to vulnerable library client node modules merge deep package json dependency hierarchy react scripts tgz root library webpack tgz plugin svgo tgz x merge deep tgz vulnerable library found in head commit a href found in base branch master vulnerability details the merge deep library before for node js can be tricked into overwriting properties of object prototype or adding new properties to it these properties are then inherited by every object in the program thus facilitating prototype pollution attacks against applications using this library publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource | 0 |
5,479 | 2,940,822,118 | IssuesEvent | 2015-07-02 01:02:54 | drphilmarshall/OM10 | https://api.github.com/repos/drphilmarshall/OM10 | opened | PS1QLS Forecast | documentation | OM10.select_random() gives a number of lenses that we have any prayer of seeing in PS1 (=N).
Our painting and positioning scripts that produce our training set have a selection function that limits the number of lenses we're going to be able to find. (A = % accepted into training set)
Finally, our algorithms will only be able to actually find some subset of our training set at reasonable purity (B = % recovered).
These three factors can be multiplied together to determine an estimate of the number of lenses we should be able to discover with our PS1 search. | 1.0 | PS1QLS Forecast - OM10.select_random() gives a number of lenses that we have any prayer of seeing in PS1 (=N).
Our painting and positioning scripts that produce our training set have a selection function that limits the number of lenses we're going to be able to find. (A = % accepted into training set)
Finally, our algorithms will only be able to actually find some subset of our training set at reasonable purity (B = % recovered).
These three factors can be multiplied together to determine an estimate of the number of lenses we should be able to discover with our PS1 search. | non_priority | forecast select random gives a number of lenses that we have any prayer of seeing in n our painting and positioning scripts that produce our training set have a selection function that limits the number of lenses we re going to be able to find a accepted into training set finally our algorithms will only be able to actually find some subset of our training set at reasonable purity b recovered these three factors can be multiplied together to determine an estimate of the number of lenses we should be able to discover with our search | 0 |
15,442 | 5,116,415,118 | IssuesEvent | 2017-01-07 03:11:21 | foodoasisla/site | https://api.github.com/repos/foodoasisla/site | closed | Make a favicon | beginner friendly code design | This logo file may help…
https://github.com/foodoasisla/site/blob/master/assets/images/fola.svg
This is a handy app for making favicons…
https://itunes.apple.com/us/app/icon-slate/id439697913?mt=12
(There are lots of online tools as well.)
Here’s a page template where links to the icons can be placed…
https://github.com/foodoasisla/site/blob/master/_layouts/default.html
For example:
```<link rel="icon" type="image/png" href="/assets/images/favicon.png" />```
If we provide a range of sizes, browsers can use the small one in the URL bar and the large one for bookmarks…

Here’s some more information about formats…
https://css-tricks.com/favicon-quiz/ | 1.0 | Make a favicon - This logo file may help…
https://github.com/foodoasisla/site/blob/master/assets/images/fola.svg
This is a handy app for making favicons…
https://itunes.apple.com/us/app/icon-slate/id439697913?mt=12
(There are lots of online tools as well.)
Here’s a page template where links to the icons can be placed…
https://github.com/foodoasisla/site/blob/master/_layouts/default.html
For example:
```<link rel="icon" type="image/png" href="/assets/images/favicon.png" />```
If we provide a range of sizes, browsers can use the small one in the URL bar and the large one for bookmarks…

Here’s some more information about formats…
https://css-tricks.com/favicon-quiz/ | non_priority | make a favicon this logo file may help… this is a handy app for making favicons… there are lots of online tools as well here’s a page template where links to the icons can be placed… for example if we provide a range of sizes browsers can use the small one in the url bar and the large one for bookmarks… here’s some more information about formats… | 0 |
5,448 | 5,717,767,647 | IssuesEvent | 2017-04-19 18:00:06 | kytos/kytos | https://api.github.com/repos/kytos/kytos | opened | Consider a problematic KytosNApp.setup() | security | TODO: If the setup method is blocking, then the execute method will never be called. Should we execute it inside a new thread? -- from [this line](https://github.com/kytos/kytos/blob/379421a12d883554c02e8279397aa8fad41e4786/kytos/core/napps/base.py#L208).
For example, if a NApp has an infinite loop in setup method, the controller will be blocked. | True | Consider a problematic KytosNApp.setup() - TODO: If the setup method is blocking, then the execute method will never be called. Should we execute it inside a new thread? -- from [this line](https://github.com/kytos/kytos/blob/379421a12d883554c02e8279397aa8fad41e4786/kytos/core/napps/base.py#L208).
For example, if a NApp has an infinite loop in setup method, the controller will be blocked. | non_priority | consider a problematic kytosnapp setup todo if the setup method is blocking then the execute method will never be called should we execute it inside a new thread from for example if a napp has an infinite loop in setup method the controller will be blocked | 0 |
157,403 | 13,688,168,844 | IssuesEvent | 2020-09-30 11:16:49 | vib-singlecell-nf/vsn-pipelines | https://api.github.com/repos/vib-singlecell-nf/vsn-pipelines | closed | [SUGGESTION] Allow to user to run a workflow on a subset of cells from the data | documentation enhancement | **Is your feature request related to a problem? Please describe.**
Run any pipeline on a subset of cells from the data.
**Describe the solution you'd like**
Allow the user to specify through the config a txt with the subset of cells you want to run the pipeline with.
**Describe alternatives you've considered**
/
**Additional context**
/
| 1.0 | [SUGGESTION] Allow to user to run a workflow on a subset of cells from the data - **Is your feature request related to a problem? Please describe.**
Run any pipeline on a subset of cells from the data.
**Describe the solution you'd like**
Allow the user to specify through the config a txt with the subset of cells you want to run the pipeline with.
**Describe alternatives you've considered**
/
**Additional context**
/
| non_priority | allow to user to run a workflow on a subset of cells from the data is your feature request related to a problem please describe run any pipeline on a subset of cells from the data describe the solution you d like allow the user to specify through the config a txt with the subset of cells you want to run the pipeline with describe alternatives you ve considered additional context | 0 |
129,230 | 12,402,589,176 | IssuesEvent | 2020-05-21 12:19:08 | corona-warn-app/cwa-documentation | https://api.github.com/repos/corona-warn-app/cwa-documentation | closed | Hotline creating teleTan missing in figure 4 | bug documentation | ## Where to find the issue
Solution architecture figure 4
## Describe the issue
Hotline is missing creating a teleTan
## Suggested change
Add „Hotline“ below employee Health Authority oder draw an individual rectangle for the hotline with neccessary data flow
| 1.0 | Hotline creating teleTan missing in figure 4 - ## Where to find the issue
Solution architecture figure 4
## Describe the issue
Hotline is missing creating a teleTan
## Suggested change
Add „Hotline“ below employee Health Authority oder draw an individual rectangle for the hotline with neccessary data flow
| non_priority | hotline creating teletan missing in figure where to find the issue solution architecture figure describe the issue hotline is missing creating a teletan suggested change add „hotline“ below employee health authority oder draw an individual rectangle for the hotline with neccessary data flow | 0 |
261,568 | 27,809,804,015 | IssuesEvent | 2023-03-18 01:47:07 | madhans23/linux-4.1.15 | https://api.github.com/repos/madhans23/linux-4.1.15 | closed | CVE-2019-20794 (Medium) detected in linux-stable-rtv4.1.33 - autoclosed | Mend: dependency security vulnerability | ## CVE-2019-20794 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-stable-rtv4.1.33</b></p></summary>
<p>
<p>Julia Cartwright's fork of linux-stable-rt.git</p>
<p>Library home page: <a href=https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git>https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git</a></p>
<p>Found in HEAD commit: <a href="https://github.com/madhans23/linux-4.1.15/commit/f9d19044b0eef1965f9bc412d7d9e579b74ec968">f9d19044b0eef1965f9bc412d7d9e579b74ec968</a></p>
<p>Found in base branch: <b>master</b></p></p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (2)</summary>
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/kernel/pid_namespace.c</b>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/kernel/pid_namespace.c</b>
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
An issue was discovered in the Linux kernel 4.18 through 5.6.11 when unprivileged user namespaces are allowed. A user can create their own PID namespace, and mount a FUSE filesystem. Upon interaction with this FUSE filesystem, if the userspace component is terminated via a kill of the PID namespace's pid 1, it will result in a hung task, and resources being permanently locked up until system reboot. This can result in resource exhaustion.
<p>Publish Date: 2020-05-09
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-20794>CVE-2019-20794</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>4.7</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: High
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20794">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20794</a></p>
<p>Release Date: 2020-05-09</p>
<p>Fix Resolution: v5.3-rc1</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2019-20794 (Medium) detected in linux-stable-rtv4.1.33 - autoclosed - ## CVE-2019-20794 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-stable-rtv4.1.33</b></p></summary>
<p>
<p>Julia Cartwright's fork of linux-stable-rt.git</p>
<p>Library home page: <a href=https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git>https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git</a></p>
<p>Found in HEAD commit: <a href="https://github.com/madhans23/linux-4.1.15/commit/f9d19044b0eef1965f9bc412d7d9e579b74ec968">f9d19044b0eef1965f9bc412d7d9e579b74ec968</a></p>
<p>Found in base branch: <b>master</b></p></p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (2)</summary>
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/kernel/pid_namespace.c</b>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/kernel/pid_namespace.c</b>
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
An issue was discovered in the Linux kernel 4.18 through 5.6.11 when unprivileged user namespaces are allowed. A user can create their own PID namespace, and mount a FUSE filesystem. Upon interaction with this FUSE filesystem, if the userspace component is terminated via a kill of the PID namespace's pid 1, it will result in a hung task, and resources being permanently locked up until system reboot. This can result in resource exhaustion.
<p>Publish Date: 2020-05-09
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-20794>CVE-2019-20794</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>4.7</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: High
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20794">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20794</a></p>
<p>Release Date: 2020-05-09</p>
<p>Fix Resolution: v5.3-rc1</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve medium detected in linux stable autoclosed cve medium severity vulnerability vulnerable library linux stable julia cartwright s fork of linux stable rt git library home page a href found in head commit a href found in base branch master vulnerable source files kernel pid namespace c kernel pid namespace c vulnerability details an issue was discovered in the linux kernel through when unprivileged user namespaces are allowed a user can create their own pid namespace and mount a fuse filesystem upon interaction with this fuse filesystem if the userspace component is terminated via a kill of the pid namespace s pid it will result in a hung task and resources being permanently locked up until system reboot this can result in resource exhaustion publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity high privileges required low user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend | 0 |
107,641 | 13,493,047,254 | IssuesEvent | 2020-09-11 19:00:43 | carbon-design-system/ibm-dotcom-library-website | https://api.github.com/repos/carbon-design-system/ibm-dotcom-library-website | closed | Update Sketch MVP content publishing template | Airtable Done Website content design sprint demo | #### Objective:
We went through a few runs of the MVP content publishing template while worked on the Layout Patterns and Components section content publishing. We need to take the feedback and update the template to make sure we capture all the updates.
#### Tasks:
- [x] Update the Sketch template to be true to the discission outcome on publishing the Slack channel.
- [ ] Review template with Wonil to make sure he is aligned on the updates.
- [ ] Upload the new template to the BOX folder.
- [ ] Let DDS team members know where to find it and what has been updated.
### Acceptance criteria
- [ ] The Sketch MVP content template is updated and ready for the DDS team members to use. | 1.0 | Update Sketch MVP content publishing template - #### Objective:
We went through a few runs of the MVP content publishing template while worked on the Layout Patterns and Components section content publishing. We need to take the feedback and update the template to make sure we capture all the updates.
#### Tasks:
- [x] Update the Sketch template to be true to the discission outcome on publishing the Slack channel.
- [ ] Review template with Wonil to make sure he is aligned on the updates.
- [ ] Upload the new template to the BOX folder.
- [ ] Let DDS team members know where to find it and what has been updated.
### Acceptance criteria
- [ ] The Sketch MVP content template is updated and ready for the DDS team members to use. | non_priority | update sketch mvp content publishing template objective we went through a few runs of the mvp content publishing template while worked on the layout patterns and components section content publishing we need to take the feedback and update the template to make sure we capture all the updates tasks update the sketch template to be true to the discission outcome on publishing the slack channel review template with wonil to make sure he is aligned on the updates upload the new template to the box folder let dds team members know where to find it and what has been updated acceptance criteria the sketch mvp content template is updated and ready for the dds team members to use | 0 |
11,415 | 8,387,829,982 | IssuesEvent | 2018-10-09 02:47:05 | AOSC-Dev/aosc-os-abbs | https://api.github.com/repos/AOSC-Dev/aosc-os-abbs | closed | imagemagick: security update to 6.9.10-12 | security to-stable upgrade | <!-- Please remove items do not apply. -->
**CVE IDs:** TBD
**Other security advisory IDs:** USN-3785-1, openSUSE-SU-2018:3014-1
**Descriptions:**
```
It was discovered that several memory leaks existed when handling
certain images in ImageMagick. An attacker could use this to cause a
denial of service. (CVE-2018-14434, CVE-2018-14435, CVE-2018-14436,
CVE-2018-14437, CVE-2018-16640, CVE-2018-16750)
It was discovered that ImageMagick did not properly initialize a
variable before using it when processing MAT images. An attacker could
use this to cause a denial of service or possibly execute arbitrary
code. This issue only affected Ubuntu 18.04 LTS. (CVE-2018-14551)
It was discovered that an information disclosure vulnerability existed
in ImageMagick when processing XBM images. An attacker could use this
to expose sensitive information. (CVE-2018-16323)
It was discovered that an out-of-bounds write vulnerability existed
in ImageMagick when handling certain images. An attacker could use
this to cause a denial of service or possibly execute arbitrary code.
(CVE-2018-16642)
It was discovered that ImageMagick did not properly check for errors
in some situations. An attacker could use this to cause a denial of
service. (CVE-2018-16643)
It was discovered that ImageMagick did not properly validate image
meta data in some situations. An attacker could use this to cause a
denial of service. (CVE-2018-16644)
It was discovered that ImageMagick did not prevent excessive memory
allocation when handling certain image types. An attacker could use
this to cause a denial of service. (CVE-2018-16645)
Sergej Schumilo and Cornelius Aschermann discovered that ImageMagick
did not properly check for NULL in some situations when processing
PNG images. An attacker could use this to cause a denial of service.
(CVE-2018-16749)
```
**Architectural progress:**
<!-- Please remove any architecture to which the security vulnerabilities do not apply. -->
- [x] AMD64 `amd64`
- [x] AArch64 `arm64`
- [x] ARMv7 `armel`
- [x] PowerPC 64-bit BE `ppc64`
- [x] PowerPC 32-bit BE `powerpc`
- [x] RISC-V 64-bit `riscv64`
| True | imagemagick: security update to 6.9.10-12 - <!-- Please remove items do not apply. -->
**CVE IDs:** TBD
**Other security advisory IDs:** USN-3785-1, openSUSE-SU-2018:3014-1
**Descriptions:**
```
It was discovered that several memory leaks existed when handling
certain images in ImageMagick. An attacker could use this to cause a
denial of service. (CVE-2018-14434, CVE-2018-14435, CVE-2018-14436,
CVE-2018-14437, CVE-2018-16640, CVE-2018-16750)
It was discovered that ImageMagick did not properly initialize a
variable before using it when processing MAT images. An attacker could
use this to cause a denial of service or possibly execute arbitrary
code. This issue only affected Ubuntu 18.04 LTS. (CVE-2018-14551)
It was discovered that an information disclosure vulnerability existed
in ImageMagick when processing XBM images. An attacker could use this
to expose sensitive information. (CVE-2018-16323)
It was discovered that an out-of-bounds write vulnerability existed
in ImageMagick when handling certain images. An attacker could use
this to cause a denial of service or possibly execute arbitrary code.
(CVE-2018-16642)
It was discovered that ImageMagick did not properly check for errors
in some situations. An attacker could use this to cause a denial of
service. (CVE-2018-16643)
It was discovered that ImageMagick did not properly validate image
meta data in some situations. An attacker could use this to cause a
denial of service. (CVE-2018-16644)
It was discovered that ImageMagick did not prevent excessive memory
allocation when handling certain image types. An attacker could use
this to cause a denial of service. (CVE-2018-16645)
Sergej Schumilo and Cornelius Aschermann discovered that ImageMagick
did not properly check for NULL in some situations when processing
PNG images. An attacker could use this to cause a denial of service.
(CVE-2018-16749)
```
**Architectural progress:**
<!-- Please remove any architecture to which the security vulnerabilities do not apply. -->
- [x] AMD64 `amd64`
- [x] AArch64 `arm64`
- [x] ARMv7 `armel`
- [x] PowerPC 64-bit BE `ppc64`
- [x] PowerPC 32-bit BE `powerpc`
- [x] RISC-V 64-bit `riscv64`
| non_priority | imagemagick security update to cve ids tbd other security advisory ids usn opensuse su descriptions it was discovered that several memory leaks existed when handling certain images in imagemagick an attacker could use this to cause a denial of service cve cve cve cve cve cve it was discovered that imagemagick did not properly initialize a variable before using it when processing mat images an attacker could use this to cause a denial of service or possibly execute arbitrary code this issue only affected ubuntu lts cve it was discovered that an information disclosure vulnerability existed in imagemagick when processing xbm images an attacker could use this to expose sensitive information cve it was discovered that an out of bounds write vulnerability existed in imagemagick when handling certain images an attacker could use this to cause a denial of service or possibly execute arbitrary code cve it was discovered that imagemagick did not properly check for errors in some situations an attacker could use this to cause a denial of service cve it was discovered that imagemagick did not properly validate image meta data in some situations an attacker could use this to cause a denial of service cve it was discovered that imagemagick did not prevent excessive memory allocation when handling certain image types an attacker could use this to cause a denial of service cve sergej schumilo and cornelius aschermann discovered that imagemagick did not properly check for null in some situations when processing png images an attacker could use this to cause a denial of service cve architectural progress armel powerpc bit be powerpc bit be powerpc risc v bit | 0 |
1,499 | 6,488,377,257 | IssuesEvent | 2017-08-20 16:29:32 | ocaml/opam-repository | https://api.github.com/repos/ocaml/opam-repository | closed | ocamlfind fails to compile with jocaml switch | bug needs admin action needs maintainer action | When installing oasis with the jocaml switch, I get the following error message:
~~~~
[pkl@phi ocamlec]$ opam switch 4.01.0+jocaml
[pkl@phi ocamlec]$ opam install oasis
The following actions will be performed:
∗ install ocamlfind 1.7.1 [required by oasis]
∗ install ocamlmod 0.0.8 [required by oasis]
∗ install ocamlify 0.0.1 [required by oasis]
∗ install oasis 0.4.8
===== ∗ 4 =====
Do you want to continue ? [Y/n] y
=-=- Gathering sources =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
[oasis] Archive in cache
[ocamlfind] Archive in cache
[ocamlify] Archive in cache
[ocamlmod] Archive in cache
=-=- Processing actions -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
[ERROR] The compilation of ocamlfind failed at "make install".
Processing 1/4: [ocamlfind: make uninstall]
#=== ERROR while installing ocamlfind.1.7.1 ===================================#
# opam-version 1.2.2
# os linux
# command make install
# path /home/pkl/.opam/4.01.0+jocaml/build/ocamlfind.1.7.1
# compiler 4.01.0+jocaml
# exit-code 2
# env-file /home/pkl/.opam/4.01.0+jocaml/build/ocamlfind.1.7.1/ocamlfind-13726-a00279.env
# stdout-file /home/pkl/.opam/4.01.0+jocaml/build/ocamlfind.1.7.1/ocamlfind-13726-a00279.out
# stderr-file /home/pkl/.opam/4.01.0+jocaml/build/ocamlfind.1.7.1/ocamlfind-13726-a00279.err
### stdout ###
# [...]
# make[1]: Leaving directory '/home/pkl/.opam/4.01.0+jocaml/build/ocamlfind.1.7.1'
# for p in findlib; do ( cd src/$p; make install ); done
# make[1]: Entering directory '/home/pkl/.opam/4.01.0+jocaml/build/ocamlfind.1.7.1/src/findlib'
# ocamldep *.ml *.mli >depend
# mkdir -p "/home/pkl/.opam/4.01.0+jocaml/lib/findlib"
# mkdir -p "/home/pkl/.opam/4.01.0+jocaml/bin"
# test 1 -eq 0 || cp topfind "/usr/lib/ocaml"
# Makefile:122: recipe for target 'install' failed
# make[1]: Leaving directory '/home/pkl/.opam/4.01.0+jocaml/build/ocamlfind.1.7.1/src/findlib'
# Makefile:20: recipe for target 'install' failed
### stderr ###
# cp: cannot create regular file '/usr/lib/ocaml/topfind': Permission denied
# make[1]: *** [install] Error 1
# make: *** [install] Error 2
=-=- Error report -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
The following actions were aborted
∗ install oasis 0.4.8
∗ install ocamlify 0.0.1
∗ install ocamlmod 0.0.8
The following actions failed
∗ install ocamlfind 1.7.1
No changes have been performed
~~~~ | True | ocamlfind fails to compile with jocaml switch - When installing oasis with the jocaml switch, I get the following error message:
~~~~
[pkl@phi ocamlec]$ opam switch 4.01.0+jocaml
[pkl@phi ocamlec]$ opam install oasis
The following actions will be performed:
∗ install ocamlfind 1.7.1 [required by oasis]
∗ install ocamlmod 0.0.8 [required by oasis]
∗ install ocamlify 0.0.1 [required by oasis]
∗ install oasis 0.4.8
===== ∗ 4 =====
Do you want to continue ? [Y/n] y
=-=- Gathering sources =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
[oasis] Archive in cache
[ocamlfind] Archive in cache
[ocamlify] Archive in cache
[ocamlmod] Archive in cache
=-=- Processing actions -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
[ERROR] The compilation of ocamlfind failed at "make install".
Processing 1/4: [ocamlfind: make uninstall]
#=== ERROR while installing ocamlfind.1.7.1 ===================================#
# opam-version 1.2.2
# os linux
# command make install
# path /home/pkl/.opam/4.01.0+jocaml/build/ocamlfind.1.7.1
# compiler 4.01.0+jocaml
# exit-code 2
# env-file /home/pkl/.opam/4.01.0+jocaml/build/ocamlfind.1.7.1/ocamlfind-13726-a00279.env
# stdout-file /home/pkl/.opam/4.01.0+jocaml/build/ocamlfind.1.7.1/ocamlfind-13726-a00279.out
# stderr-file /home/pkl/.opam/4.01.0+jocaml/build/ocamlfind.1.7.1/ocamlfind-13726-a00279.err
### stdout ###
# [...]
# make[1]: Leaving directory '/home/pkl/.opam/4.01.0+jocaml/build/ocamlfind.1.7.1'
# for p in findlib; do ( cd src/$p; make install ); done
# make[1]: Entering directory '/home/pkl/.opam/4.01.0+jocaml/build/ocamlfind.1.7.1/src/findlib'
# ocamldep *.ml *.mli >depend
# mkdir -p "/home/pkl/.opam/4.01.0+jocaml/lib/findlib"
# mkdir -p "/home/pkl/.opam/4.01.0+jocaml/bin"
# test 1 -eq 0 || cp topfind "/usr/lib/ocaml"
# Makefile:122: recipe for target 'install' failed
# make[1]: Leaving directory '/home/pkl/.opam/4.01.0+jocaml/build/ocamlfind.1.7.1/src/findlib'
# Makefile:20: recipe for target 'install' failed
### stderr ###
# cp: cannot create regular file '/usr/lib/ocaml/topfind': Permission denied
# make[1]: *** [install] Error 1
# make: *** [install] Error 2
=-=- Error report -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
The following actions were aborted
∗ install oasis 0.4.8
∗ install ocamlify 0.0.1
∗ install ocamlmod 0.0.8
The following actions failed
∗ install ocamlfind 1.7.1
No changes have been performed
~~~~ | non_priority | ocamlfind fails to compile with jocaml switch when installing oasis with the jocaml switch i get the following error message opam switch jocaml opam install oasis the following actions will be performed ∗ install ocamlfind ∗ install ocamlmod ∗ install ocamlify ∗ install oasis ∗ do you want to continue y gathering sources archive in cache archive in cache archive in cache archive in cache processing actions the compilation of ocamlfind failed at make install processing error while installing ocamlfind opam version os linux command make install path home pkl opam jocaml build ocamlfind compiler jocaml exit code env file home pkl opam jocaml build ocamlfind ocamlfind env stdout file home pkl opam jocaml build ocamlfind ocamlfind out stderr file home pkl opam jocaml build ocamlfind ocamlfind err stdout make leaving directory home pkl opam jocaml build ocamlfind for p in findlib do cd src p make install done make entering directory home pkl opam jocaml build ocamlfind src findlib ocamldep ml mli depend mkdir p home pkl opam jocaml lib findlib mkdir p home pkl opam jocaml bin test eq cp topfind usr lib ocaml makefile recipe for target install failed make leaving directory home pkl opam jocaml build ocamlfind src findlib makefile recipe for target install failed stderr cp cannot create regular file usr lib ocaml topfind permission denied make error make error error report the following actions were aborted ∗ install oasis ∗ install ocamlify ∗ install ocamlmod the following actions failed ∗ install ocamlfind no changes have been performed | 0 |
105,171 | 11,434,413,477 | IssuesEvent | 2020-02-04 17:20:04 | hpi-swa-lab/BP2019RH1 | https://api.github.com/repos/hpi-swa-lab/BP2019RH1 | closed | Create interactive data visualization | documentation research | AC:
1. a Table with real data and can be seen
2. visualization can be plotted out of data
3. when clicking on a data in the chart, the cell responsible for the data point will be highlighted
4. when clicking on table cell corresponding visualization data point is highlighted | 1.0 | Create interactive data visualization - AC:
1. a Table with real data and can be seen
2. visualization can be plotted out of data
3. when clicking on a data in the chart, the cell responsible for the data point will be highlighted
4. when clicking on table cell corresponding visualization data point is highlighted | non_priority | create interactive data visualization ac a table with real data and can be seen visualization can be plotted out of data when clicking on a data in the chart the cell responsible for the data point will be highlighted when clicking on table cell corresponding visualization data point is highlighted | 0 |
145,942 | 22,835,635,502 | IssuesEvent | 2022-07-12 16:22:50 | cagov/design-system | https://api.github.com/repos/cagov/design-system | closed | State template component data and usage tracking | Content Design Research State Web Template BETA | How can we better understand what components are being used in the state template currently?
Would like to track the following if possible:
- Component Usage patterns
- Component searches
Is this a way to track this type of data? | 1.0 | State template component data and usage tracking - How can we better understand what components are being used in the state template currently?
Would like to track the following if possible:
- Component Usage patterns
- Component searches
Is this a way to track this type of data? | non_priority | state template component data and usage tracking how can we better understand what components are being used in the state template currently would like to track the following if possible component usage patterns component searches is this a way to track this type of data | 0 |
69,978 | 22,773,931,195 | IssuesEvent | 2022-07-08 12:46:59 | vector-im/element-android | https://api.github.com/repos/vector-im/element-android | closed | Some messages show punctuation in Unicode | T-Defect | ### Steps to reproduce
Open up a chat, write a message with punctuation, hit send.
### Outcome
#### What did you expect?
The message to look normal.
#### What happened instead?
Punctuation is shown in Unicode.



### Your phone model
Google Pixel 6
### Operating system version
GrapheneOS SQ3A.220605.009.B1.2022062200
### Application version and app store
1.4.26-dev [211782102] (F-b9268) develop
### Homeserver
thomcat.rocks
### Will you send logs?
Yes
### Are you willing to provide a PR?
No | 1.0 | Some messages show punctuation in Unicode - ### Steps to reproduce
Open up a chat, write a message with punctuation, hit send.
### Outcome
#### What did you expect?
The message to look normal.
#### What happened instead?
Punctuation is shown in Unicode.



### Your phone model
Google Pixel 6
### Operating system version
GrapheneOS SQ3A.220605.009.B1.2022062200
### Application version and app store
1.4.26-dev [211782102] (F-b9268) develop
### Homeserver
thomcat.rocks
### Will you send logs?
Yes
### Are you willing to provide a PR?
No | non_priority | some messages show punctuation in unicode steps to reproduce open up a chat write a message with punctuation hit send outcome what did you expect the message to look normal what happened instead punctuation is shown in unicode your phone model google pixel operating system version grapheneos application version and app store dev f develop homeserver thomcat rocks will you send logs yes are you willing to provide a pr no | 0 |
142,210 | 19,074,165,447 | IssuesEvent | 2021-11-27 13:06:31 | atlsecsrv-net-atlsecsrv-com/code.visualstudio | https://api.github.com/repos/atlsecsrv-net-atlsecsrv-com/code.visualstudio | closed | WS-2018-0589 (Medium) detected in nwmatcher-1.4.3.tgz | security vulnerability | ## WS-2018-0589 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>nwmatcher-1.4.3.tgz</b></p></summary>
<p>A CSS3-compliant JavaScript selector engine.</p>
<p>Library home page: <a href="https://registry.npmjs.org/nwmatcher/-/nwmatcher-1.4.3.tgz">https://registry.npmjs.org/nwmatcher/-/nwmatcher-1.4.3.tgz</a></p>
<p>Path to dependency file: /tmp/ws-scm/atlsecsrv-net-a-atlsecsrv.com/package.json</p>
<p>Path to vulnerable library: /tmp/ws-scm/atlsecsrv-net-a-atlsecsrv.com/node_modules/nwmatcher</p>
<p>
Dependency Hierarchy:
- jsdom-no-contextify-3.1.0.tgz (Root Library)
- :x: **nwmatcher-1.4.3.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/atlsecsrv-net-atlsecsrv-com/atlsecsrv-net-a-atlsecsrv.com/commit/a1479f17f72992a58ef6c45317028a2b0f60a97a">a1479f17f72992a58ef6c45317028a2b0f60a97a</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
A Regular Expression vulnerability was found in nwmatcher before 1.4.4. The fix replacing multiple repeated instances of the "\s*" pattern.
<p>Publish Date: 2018-03-05
<p>URL: <a href=https://github.com/dperini/nwmatcher/commit/9dcc2b039beeabd18327a5ebaa537625872e16f0>WS-2018-0589</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>4.0</b>)</summary>
<p>
Base Score Metrics not available</p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/dperini/nwmatcher/commit/9dcc2b039beeabd18327a5ebaa537625872e16f0">https://github.com/dperini/nwmatcher/commit/9dcc2b039beeabd18327a5ebaa537625872e16f0</a></p>
<p>Release Date: 2019-06-04</p>
<p>Fix Resolution: 1.4.4</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | WS-2018-0589 (Medium) detected in nwmatcher-1.4.3.tgz - ## WS-2018-0589 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>nwmatcher-1.4.3.tgz</b></p></summary>
<p>A CSS3-compliant JavaScript selector engine.</p>
<p>Library home page: <a href="https://registry.npmjs.org/nwmatcher/-/nwmatcher-1.4.3.tgz">https://registry.npmjs.org/nwmatcher/-/nwmatcher-1.4.3.tgz</a></p>
<p>Path to dependency file: /tmp/ws-scm/atlsecsrv-net-a-atlsecsrv.com/package.json</p>
<p>Path to vulnerable library: /tmp/ws-scm/atlsecsrv-net-a-atlsecsrv.com/node_modules/nwmatcher</p>
<p>
Dependency Hierarchy:
- jsdom-no-contextify-3.1.0.tgz (Root Library)
- :x: **nwmatcher-1.4.3.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/atlsecsrv-net-atlsecsrv-com/atlsecsrv-net-a-atlsecsrv.com/commit/a1479f17f72992a58ef6c45317028a2b0f60a97a">a1479f17f72992a58ef6c45317028a2b0f60a97a</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
A Regular Expression vulnerability was found in nwmatcher before 1.4.4. The fix replacing multiple repeated instances of the "\s*" pattern.
<p>Publish Date: 2018-03-05
<p>URL: <a href=https://github.com/dperini/nwmatcher/commit/9dcc2b039beeabd18327a5ebaa537625872e16f0>WS-2018-0589</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>4.0</b>)</summary>
<p>
Base Score Metrics not available</p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/dperini/nwmatcher/commit/9dcc2b039beeabd18327a5ebaa537625872e16f0">https://github.com/dperini/nwmatcher/commit/9dcc2b039beeabd18327a5ebaa537625872e16f0</a></p>
<p>Release Date: 2019-06-04</p>
<p>Fix Resolution: 1.4.4</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | ws medium detected in nwmatcher tgz ws medium severity vulnerability vulnerable library nwmatcher tgz a compliant javascript selector engine library home page a href path to dependency file tmp ws scm atlsecsrv net a atlsecsrv com package json path to vulnerable library tmp ws scm atlsecsrv net a atlsecsrv com node modules nwmatcher dependency hierarchy jsdom no contextify tgz root library x nwmatcher tgz vulnerable library found in head commit a href found in base branch master vulnerability details a regular expression vulnerability was found in nwmatcher before the fix replacing multiple repeated instances of the s pattern publish date url a href cvss score details base score metrics not available suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource | 0 |
101,367 | 21,662,565,767 | IssuesEvent | 2022-05-06 21:11:11 | microsoft/jacdac | https://api.github.com/repos/microsoft/jacdac | closed | self server loopback issue on hardware | makecode clients | When fully disconnected, the test program in this repo does not respond to the microphone. Somehow it seems that the sound level server packets are not making it.
microphone -> sound level client -> sound level server -> test
https://github.com/pelikhan/yahboom-microbit-led-jacdac/ | 1.0 | self server loopback issue on hardware - When fully disconnected, the test program in this repo does not respond to the microphone. Somehow it seems that the sound level server packets are not making it.
microphone -> sound level client -> sound level server -> test
https://github.com/pelikhan/yahboom-microbit-led-jacdac/ | non_priority | self server loopback issue on hardware when fully disconnected the test program in this repo does not respond to the microphone somehow it seems that the sound level server packets are not making it microphone sound level client sound level server test | 0 |
55,303 | 13,595,077,813 | IssuesEvent | 2020-09-22 01:56:42 | libuv/libuv | https://api.github.com/repos/libuv/libuv | closed | pkg-config returning wrong data for static linking | build | The cmake build creates a static library with the name libuv_a.a, but running with `pkg-config --static --libs libuv` returns -luv which then is not found by linker. | 1.0 | pkg-config returning wrong data for static linking - The cmake build creates a static library with the name libuv_a.a, but running with `pkg-config --static --libs libuv` returns -luv which then is not found by linker. | non_priority | pkg config returning wrong data for static linking the cmake build creates a static library with the name libuv a a but running with pkg config static libs libuv returns luv which then is not found by linker | 0 |
294,150 | 25,349,915,596 | IssuesEvent | 2022-11-19 16:46:07 | brave/brave-browser | https://api.github.com/repos/brave/brave-browser | opened | Crash when re-opening Brave News Customize 2.0 UI after following sources | crash OS/Desktop feature/brave-news QA/Test-All-Platforms | Follow some sources then re-open Brave News Customize 2.0 UI. Crash.
Reproduced on 1.46.110 and 1.47.85. Reproduced on Linux and Windows
## Steps to Reproduce
<!--Please add a series of steps to reproduce the issue-->
Note: Make sure Brave News Customize 2.0 UI is enabled
1. Clean profile
1. Launch Brave in en_us locale
1. Open a new-tab page
1. Click `Customize`
1. Click `Brave News` in the `Customize Dashboard`
1. Click `Turn on `Brave News`
1. Click `Follow` on `The New York Times` in the `Popular` category
1. Click `X` to close the modal
1. Click `Brave News` in the `Customize Dashboard` aagain
## Actual result:
<!--Please add screenshots if needed-->
Crash
## Expected result:
No crash
## Reproduces how often:
<!--[Easily reproduced/Intermittent issue/No steps to reproduce]-->
100% repro rate
## Brave version (brave://version info)
<!--For installed build, please copy Brave, Revision and OS from brave://version and paste here. If building from source please mention it along with brave://version details-->
Brave | 1.46.110 Chromium: 107.0.5304.110 (Official Build) beta (64-bit)
-- | --
Revision | 2a558545ab7e6fb8177002bf44d4fc1717cb2998-refs/branch-heads/5304@{#1202}
OS | Windows 10 Version 21H2 (Build 19044.2251)
Brave | 1.46.117 Chromium: 107.0.5304.110 (Official Build) beta (64-bit)
-- | --
Revision | 2a558545ab7e6fb8177002bf44d4fc1717cb2998-refs/branch-heads/5304@{#1202}
OS | Linux
Brave | 1.47.85 Chromium: 108.0.5359.48 (Official Build) nightly (64-bit)
-- | --
Revision | 18ceeca0d99318e70c00d2e04d88aa55488b5c63-refs/branch-heads/5359@{#854}
OS | Windows 10 Version 21H2 (Build 19044.2251)
## Version/Channel Information:
<!--Does this issue happen on any other channels? Or is it specific to a certain channel?-->
- Can you reproduce this issue with the current release? no
- Can you reproduce this issue with the beta channel? yes
- Can you reproduce this issue with the nightly channel? yes
cc @fallaciousreasoning @petemill @mattmcalister @brave/qa-team | 1.0 | Crash when re-opening Brave News Customize 2.0 UI after following sources - Follow some sources then re-open Brave News Customize 2.0 UI. Crash.
Reproduced on 1.46.110 and 1.47.85. Reproduced on Linux and Windows
## Steps to Reproduce
<!--Please add a series of steps to reproduce the issue-->
Note: Make sure Brave News Customize 2.0 UI is enabled
1. Clean profile
1. Launch Brave in en_us locale
1. Open a new-tab page
1. Click `Customize`
1. Click `Brave News` in the `Customize Dashboard`
1. Click `Turn on `Brave News`
1. Click `Follow` on `The New York Times` in the `Popular` category
1. Click `X` to close the modal
1. Click `Brave News` in the `Customize Dashboard` aagain
## Actual result:
<!--Please add screenshots if needed-->
Crash
## Expected result:
No crash
## Reproduces how often:
<!--[Easily reproduced/Intermittent issue/No steps to reproduce]-->
100% repro rate
## Brave version (brave://version info)
<!--For installed build, please copy Brave, Revision and OS from brave://version and paste here. If building from source please mention it along with brave://version details-->
Brave | 1.46.110 Chromium: 107.0.5304.110 (Official Build) beta (64-bit)
-- | --
Revision | 2a558545ab7e6fb8177002bf44d4fc1717cb2998-refs/branch-heads/5304@{#1202}
OS | Windows 10 Version 21H2 (Build 19044.2251)
Brave | 1.46.117 Chromium: 107.0.5304.110 (Official Build) beta (64-bit)
-- | --
Revision | 2a558545ab7e6fb8177002bf44d4fc1717cb2998-refs/branch-heads/5304@{#1202}
OS | Linux
Brave | 1.47.85 Chromium: 108.0.5359.48 (Official Build) nightly (64-bit)
-- | --
Revision | 18ceeca0d99318e70c00d2e04d88aa55488b5c63-refs/branch-heads/5359@{#854}
OS | Windows 10 Version 21H2 (Build 19044.2251)
## Version/Channel Information:
<!--Does this issue happen on any other channels? Or is it specific to a certain channel?-->
- Can you reproduce this issue with the current release? no
- Can you reproduce this issue with the beta channel? yes
- Can you reproduce this issue with the nightly channel? yes
cc @fallaciousreasoning @petemill @mattmcalister @brave/qa-team | non_priority | crash when re opening brave news customize ui after following sources follow some sources then re open brave news customize ui crash reproduced on and reproduced on linux and windows steps to reproduce note make sure brave news customize ui is enabled clean profile launch brave in en us locale open a new tab page click customize click brave news in the customize dashboard click turn on brave news click follow on the new york times in the popular category click x to close the modal click brave news in the customize dashboard aagain actual result crash expected result no crash reproduces how often repro rate brave version brave version info brave chromium official build beta bit revision refs branch heads os windows version build brave chromium official build beta bit revision refs branch heads os linux brave chromium official build nightly bit revision refs branch heads os windows version build version channel information can you reproduce this issue with the current release no can you reproduce this issue with the beta channel yes can you reproduce this issue with the nightly channel yes cc fallaciousreasoning petemill mattmcalister brave qa team | 0 |
196,937 | 15,614,566,569 | IssuesEvent | 2021-03-19 17:57:08 | startyourlab/.github | https://api.github.com/repos/startyourlab/.github | opened | Add lab-specific issue templates | documentation enhancement | # Lab-specific issue templates
## Problem
Most issue templates are for software development teams, and few, if any, exist to help scientists with their specific set of workflows within a project.
## Solution
A set of issue templates for scientific labs to use out-of-the-box within the community health files for their organization.
| 1.0 | Add lab-specific issue templates - # Lab-specific issue templates
## Problem
Most issue templates are for software development teams, and few, if any, exist to help scientists with their specific set of workflows within a project.
## Solution
A set of issue templates for scientific labs to use out-of-the-box within the community health files for their organization.
| non_priority | add lab specific issue templates lab specific issue templates problem most issue templates are for software development teams and few if any exist to help scientists with their specific set of workflows within a project solution a set of issue templates for scientific labs to use out of the box within the community health files for their organization | 0 |
366,567 | 25,591,450,599 | IssuesEvent | 2022-12-01 13:17:24 | spring-projects/spring-boot | https://api.github.com/repos/spring-projects/spring-boot | opened | Remove @EnableBatchProcessing mentions in reference documentation | type: documentation | As of #32330, usage of `@EnableBatchProcessing` is now discouraged since this turns off the Spring Boot auto-configuration for Spring Batch. This annotation is [still featured frequently in our own reference documentation](https://docs.spring.io/spring-boot/docs/3.0.0/reference/htmlsingle/#features.testing.spring-boot-applications.user-configuration-and-slicing) and we should align it with the new best practices.
| 1.0 | Remove @EnableBatchProcessing mentions in reference documentation - As of #32330, usage of `@EnableBatchProcessing` is now discouraged since this turns off the Spring Boot auto-configuration for Spring Batch. This annotation is [still featured frequently in our own reference documentation](https://docs.spring.io/spring-boot/docs/3.0.0/reference/htmlsingle/#features.testing.spring-boot-applications.user-configuration-and-slicing) and we should align it with the new best practices.
| non_priority | remove enablebatchprocessing mentions in reference documentation as of usage of enablebatchprocessing is now discouraged since this turns off the spring boot auto configuration for spring batch this annotation is and we should align it with the new best practices | 0 |
55,986 | 6,497,646,708 | IssuesEvent | 2017-08-22 14:40:13 | hazelcast/hazelcast | https://api.github.com/repos/hazelcast/hazelcast | closed | ThreadLocalLeakTest failures | Team: Core Type: Test-Failure | https://hazelcast-l337.ci.cloudbees.com/view/Hazelcast/job/Hazelcast-3.x-IbmJDK1.7/1237/
classloading.ThreadLocalLeakTest.testLeakingApplication_withThreadLocalCleanup[classLoaderType:OWN]
```
java.lang.AssertionError: Application created a ThreadLocal with key of type [java.lang.ThreadLocal] (value [java.lang.ThreadLocal@dd622dfd]) and a value of type [java.lang.Class] (value [class com.hazelcast.cache.impl.JCacheDetectorTest) but failed to remove it when the application was stopped.
at org.junit.Assert.fail(Assert.java:88)
at classloading.ThreadLocalLeakTestUtils.checkThreadLocalMapForLeaks(ThreadLocalLeakTestUtils.java:170)
at classloading.ThreadLocalLeakTestUtils.checkThreadLocalsForLeaks(ThreadLocalLeakTestUtils.java:68)
at classloading.ThreadLocalLeakTest.testLeakingApplication_withThreadLocalCleanup(ThreadLocalLeakTest.java:80)
```
classloading.ThreadLocalLeakTest.testHazelcast[classLoaderType:OWN]
```
java.lang.AssertionError: Application created a ThreadLocal with key of type [java.lang.ThreadLocal] (value [java.lang.ThreadLocal@dd622dfd]) and a value of type [java.lang.Class] (value [class com.hazelcast.cache.impl.JCacheDetectorTest) but failed to remove it when the application was stopped.
at org.junit.Assert.fail(Assert.java:88)
at classloading.ThreadLocalLeakTestUtils.checkThreadLocalMapForLeaks(ThreadLocalLeakTestUtils.java:170)
at classloading.ThreadLocalLeakTestUtils.checkThreadLocalsForLeaks(ThreadLocalLeakTestUtils.java:68)
at classloading.ThreadLocalLeakTest.testHazelcast(ThreadLocalLeakTest.java:106)
```
Possibly related : https://github.com/hazelcast/hazelcast/pull/10218 | 1.0 | ThreadLocalLeakTest failures - https://hazelcast-l337.ci.cloudbees.com/view/Hazelcast/job/Hazelcast-3.x-IbmJDK1.7/1237/
classloading.ThreadLocalLeakTest.testLeakingApplication_withThreadLocalCleanup[classLoaderType:OWN]
```
java.lang.AssertionError: Application created a ThreadLocal with key of type [java.lang.ThreadLocal] (value [java.lang.ThreadLocal@dd622dfd]) and a value of type [java.lang.Class] (value [class com.hazelcast.cache.impl.JCacheDetectorTest) but failed to remove it when the application was stopped.
at org.junit.Assert.fail(Assert.java:88)
at classloading.ThreadLocalLeakTestUtils.checkThreadLocalMapForLeaks(ThreadLocalLeakTestUtils.java:170)
at classloading.ThreadLocalLeakTestUtils.checkThreadLocalsForLeaks(ThreadLocalLeakTestUtils.java:68)
at classloading.ThreadLocalLeakTest.testLeakingApplication_withThreadLocalCleanup(ThreadLocalLeakTest.java:80)
```
classloading.ThreadLocalLeakTest.testHazelcast[classLoaderType:OWN]
```
java.lang.AssertionError: Application created a ThreadLocal with key of type [java.lang.ThreadLocal] (value [java.lang.ThreadLocal@dd622dfd]) and a value of type [java.lang.Class] (value [class com.hazelcast.cache.impl.JCacheDetectorTest) but failed to remove it when the application was stopped.
at org.junit.Assert.fail(Assert.java:88)
at classloading.ThreadLocalLeakTestUtils.checkThreadLocalMapForLeaks(ThreadLocalLeakTestUtils.java:170)
at classloading.ThreadLocalLeakTestUtils.checkThreadLocalsForLeaks(ThreadLocalLeakTestUtils.java:68)
at classloading.ThreadLocalLeakTest.testHazelcast(ThreadLocalLeakTest.java:106)
```
Possibly related : https://github.com/hazelcast/hazelcast/pull/10218 | non_priority | threadlocalleaktest failures classloading threadlocalleaktest testleakingapplication withthreadlocalcleanup java lang assertionerror application created a threadlocal with key of type value and a value of type value class com hazelcast cache impl jcachedetectortest but failed to remove it when the application was stopped at org junit assert fail assert java at classloading threadlocalleaktestutils checkthreadlocalmapforleaks threadlocalleaktestutils java at classloading threadlocalleaktestutils checkthreadlocalsforleaks threadlocalleaktestutils java at classloading threadlocalleaktest testleakingapplication withthreadlocalcleanup threadlocalleaktest java classloading threadlocalleaktest testhazelcast java lang assertionerror application created a threadlocal with key of type value and a value of type value class com hazelcast cache impl jcachedetectortest but failed to remove it when the application was stopped at org junit assert fail assert java at classloading threadlocalleaktestutils checkthreadlocalmapforleaks threadlocalleaktestutils java at classloading threadlocalleaktestutils checkthreadlocalsforleaks threadlocalleaktestutils java at classloading threadlocalleaktest testhazelcast threadlocalleaktest java possibly related | 0 |
372,019 | 25,978,969,368 | IssuesEvent | 2022-12-19 17:04:16 | the-djmaze/snappymail | https://api.github.com/repos/the-djmaze/snappymail | closed | Add informations for developers | documentation | From a beginner perspective it would be great to have some documentation on how the development of SnappyMail, the SnappyMail Plugins and Integration has to be done. I've looked around but could not find many information how the SnappyMail Plugin System works / has to be used. There does not seem to exist some documentation where a new developer could get an idea how SnappyMail works internally - or maybe I only couldn't find it (?).
Having a documentation could help others to get started on the development of plugins, bugfixes or features in SnappyMail and would therefore bring the project to a more "stable base". I'm seeing that @the-djmaze is doing a very great job but is also looking for others to help - what is clearly a comprehensible wish and at the end would be good for everyone using SnappyMail.
| 1.0 | Add informations for developers - From a beginner perspective it would be great to have some documentation on how the development of SnappyMail, the SnappyMail Plugins and Integration has to be done. I've looked around but could not find many information how the SnappyMail Plugin System works / has to be used. There does not seem to exist some documentation where a new developer could get an idea how SnappyMail works internally - or maybe I only couldn't find it (?).
Having a documentation could help others to get started on the development of plugins, bugfixes or features in SnappyMail and would therefore bring the project to a more "stable base". I'm seeing that @the-djmaze is doing a very great job but is also looking for others to help - what is clearly a comprehensible wish and at the end would be good for everyone using SnappyMail.
| non_priority | add informations for developers from a beginner perspective it would be great to have some documentation on how the development of snappymail the snappymail plugins and integration has to be done i ve looked around but could not find many information how the snappymail plugin system works has to be used there does not seem to exist some documentation where a new developer could get an idea how snappymail works internally or maybe i only couldn t find it having a documentation could help others to get started on the development of plugins bugfixes or features in snappymail and would therefore bring the project to a more stable base i m seeing that the djmaze is doing a very great job but is also looking for others to help what is clearly a comprehensible wish and at the end would be good for everyone using snappymail | 0 |
322,030 | 27,574,420,518 | IssuesEvent | 2023-03-08 11:53:26 | pytorch/vision | https://api.github.com/repos/pytorch/vision | closed | torchhub tests are not run in CI | module: tests module: hub | For example https://app.circleci.com/pipelines/github/pytorch/vision/23876/workflows/d96da5f3-9ca0-4615-9c08-0373c00233a0/jobs/1849866?invite=true#step-105-10
The problem is that we skip in case
https://github.com/pytorch/vision/blob/5850f370c03d941f97c7bd53f99a83abb0b9dd01/test/test_hub.py#L20
but we do that on multiple occasions during collection. The newest examples are
https://github.com/pytorch/vision/blob/5850f370c03d941f97c7bd53f99a83abb0b9dd01/test/conftest.py#L6-L9
and implicitly in
https://github.com/pytorch/vision/blob/5850f370c03d941f97c7bd53f99a83abb0b9dd01/test/conftest.py#L11
for example
https://github.com/pytorch/vision/blob/5850f370c03d941f97c7bd53f99a83abb0b9dd01/test/common_utils.py#L25-L28
This is not new after the v2 port though. It goes all the way back to the combination of #4025 and #4280. The former introduced the import of `common_utils` in `conftest` while the latter introduced a `torchvision` import in `common_utils`. Meaning, we haven't been running our torchhub tests for roughly 1.5 years now:
https://app.circleci.com/pipelines/github/pytorch/vision/9847/workflows/813b8bbf-7aa4-4a84-b3ab-2b453035c206/jobs/735233?invite=true#step-102-64
We should really not just skip in such cases.
| 1.0 | torchhub tests are not run in CI - For example https://app.circleci.com/pipelines/github/pytorch/vision/23876/workflows/d96da5f3-9ca0-4615-9c08-0373c00233a0/jobs/1849866?invite=true#step-105-10
The problem is that we skip in case
https://github.com/pytorch/vision/blob/5850f370c03d941f97c7bd53f99a83abb0b9dd01/test/test_hub.py#L20
but we do that on multiple occasions during collection. The newest examples are
https://github.com/pytorch/vision/blob/5850f370c03d941f97c7bd53f99a83abb0b9dd01/test/conftest.py#L6-L9
and implicitly in
https://github.com/pytorch/vision/blob/5850f370c03d941f97c7bd53f99a83abb0b9dd01/test/conftest.py#L11
for example
https://github.com/pytorch/vision/blob/5850f370c03d941f97c7bd53f99a83abb0b9dd01/test/common_utils.py#L25-L28
This is not new after the v2 port though. It goes all the way back to the combination of #4025 and #4280. The former introduced the import of `common_utils` in `conftest` while the latter introduced a `torchvision` import in `common_utils`. Meaning, we haven't been running our torchhub tests for roughly 1.5 years now:
https://app.circleci.com/pipelines/github/pytorch/vision/9847/workflows/813b8bbf-7aa4-4a84-b3ab-2b453035c206/jobs/735233?invite=true#step-102-64
We should really not just skip in such cases.
| non_priority | torchhub tests are not run in ci for example the problem is that we skip in case but we do that on multiple occasions during collection the newest examples are and implicitly in for example this is not new after the port though it goes all the way back to the combination of and the former introduced the import of common utils in conftest while the latter introduced a torchvision import in common utils meaning we haven t been running our torchhub tests for roughly years now we should really not just skip in such cases | 0 |
154,350 | 19,714,484,249 | IssuesEvent | 2022-01-13 09:39:24 | EliyaC/NodeGoat | https://api.github.com/repos/EliyaC/NodeGoat | opened | CVE-2020-28500 (Medium) detected in multiple libraries | security vulnerability | ## CVE-2020-28500 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>lodash-4.17.20.tgz</b>, <b>lodash-4.17.11.tgz</b>, <b>lodash-4.13.1.tgz</b></p></summary>
<p>
<details><summary><b>lodash-4.17.20.tgz</b></p></summary>
<p>Lodash modular utilities.</p>
<p>Library home page: <a href="https://registry.npmjs.org/lodash/-/lodash-4.17.20.tgz">https://registry.npmjs.org/lodash/-/lodash-4.17.20.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/grunt-env/node_modules/lodash/package.json</p>
<p>
Dependency Hierarchy:
- grunt-env-1.0.1.tgz (Root Library)
- :x: **lodash-4.17.20.tgz** (Vulnerable Library)
</details>
<details><summary><b>lodash-4.17.11.tgz</b></p></summary>
<p>Lodash modular utilities.</p>
<p>Library home page: <a href="https://registry.npmjs.org/lodash/-/lodash-4.17.11.tgz">https://registry.npmjs.org/lodash/-/lodash-4.17.11.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/lodash/package.json</p>
<p>
Dependency Hierarchy:
- async-2.6.1.tgz (Root Library)
- :x: **lodash-4.17.11.tgz** (Vulnerable Library)
</details>
<details><summary><b>lodash-4.13.1.tgz</b></p></summary>
<p>Lodash modular utilities.</p>
<p>Library home page: <a href="https://registry.npmjs.org/lodash/-/lodash-4.13.1.tgz">https://registry.npmjs.org/lodash/-/lodash-4.13.1.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/nyc/node_modules/lodash/package.json</p>
<p>
Dependency Hierarchy:
- grunt-if-0.2.0.tgz (Root Library)
- grunt-contrib-nodeunit-1.0.0.tgz
- nodeunit-0.9.5.tgz
- tap-7.1.2.tgz
- nyc-7.1.0.tgz
- istanbul-lib-instrument-1.1.0-alpha.4.tgz
- babel-types-6.11.1.tgz
- :x: **lodash-4.13.1.tgz** (Vulnerable Library)
</details>
<p>Found in HEAD commit: <a href="https://github.com/EliyaC/NodeGoat/commit/2f9ac315d9e05728b7ce26ce7cf1b4e684e54fde">2f9ac315d9e05728b7ce26ce7cf1b4e684e54fde</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Lodash versions prior to 4.17.21 are vulnerable to Regular Expression Denial of Service (ReDoS) via the toNumber, trim and trimEnd functions.
<p>Publish Date: 2021-02-15
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-28500>CVE-2020-28500</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: Low
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28500">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28500</a></p>
<p>Release Date: 2021-02-15</p>
<p>Fix Resolution: lodash-4.17.21</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"lodash","packageVersion":"4.17.20","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"grunt-env:1.0.1;lodash:4.17.20","isMinimumFixVersionAvailable":true,"minimumFixVersion":"lodash-4.17.21","isBinary":false},{"packageType":"javascript/Node.js","packageName":"lodash","packageVersion":"4.17.11","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"async:2.6.1;lodash:4.17.11","isMinimumFixVersionAvailable":true,"minimumFixVersion":"lodash-4.17.21","isBinary":false},{"packageType":"javascript/Node.js","packageName":"lodash","packageVersion":"4.13.1","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"grunt-if:0.2.0;grunt-contrib-nodeunit:1.0.0;nodeunit:0.9.5;tap:7.1.2;nyc:7.1.0;istanbul-lib-instrument:1.1.0-alpha.4;babel-types:6.11.1;lodash:4.13.1","isMinimumFixVersionAvailable":true,"minimumFixVersion":"lodash-4.17.21","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-28500","vulnerabilityDetails":"Lodash versions prior to 4.17.21 are vulnerable to Regular Expression Denial of Service (ReDoS) via the toNumber, trim and trimEnd functions.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-28500","cvss3Severity":"medium","cvss3Score":"5.3","cvss3Metrics":{"A":"Low","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> --> | True | CVE-2020-28500 (Medium) detected in multiple libraries - ## CVE-2020-28500 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>lodash-4.17.20.tgz</b>, <b>lodash-4.17.11.tgz</b>, <b>lodash-4.13.1.tgz</b></p></summary>
<p>
<details><summary><b>lodash-4.17.20.tgz</b></p></summary>
<p>Lodash modular utilities.</p>
<p>Library home page: <a href="https://registry.npmjs.org/lodash/-/lodash-4.17.20.tgz">https://registry.npmjs.org/lodash/-/lodash-4.17.20.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/grunt-env/node_modules/lodash/package.json</p>
<p>
Dependency Hierarchy:
- grunt-env-1.0.1.tgz (Root Library)
- :x: **lodash-4.17.20.tgz** (Vulnerable Library)
</details>
<details><summary><b>lodash-4.17.11.tgz</b></p></summary>
<p>Lodash modular utilities.</p>
<p>Library home page: <a href="https://registry.npmjs.org/lodash/-/lodash-4.17.11.tgz">https://registry.npmjs.org/lodash/-/lodash-4.17.11.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/lodash/package.json</p>
<p>
Dependency Hierarchy:
- async-2.6.1.tgz (Root Library)
- :x: **lodash-4.17.11.tgz** (Vulnerable Library)
</details>
<details><summary><b>lodash-4.13.1.tgz</b></p></summary>
<p>Lodash modular utilities.</p>
<p>Library home page: <a href="https://registry.npmjs.org/lodash/-/lodash-4.13.1.tgz">https://registry.npmjs.org/lodash/-/lodash-4.13.1.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/nyc/node_modules/lodash/package.json</p>
<p>
Dependency Hierarchy:
- grunt-if-0.2.0.tgz (Root Library)
- grunt-contrib-nodeunit-1.0.0.tgz
- nodeunit-0.9.5.tgz
- tap-7.1.2.tgz
- nyc-7.1.0.tgz
- istanbul-lib-instrument-1.1.0-alpha.4.tgz
- babel-types-6.11.1.tgz
- :x: **lodash-4.13.1.tgz** (Vulnerable Library)
</details>
<p>Found in HEAD commit: <a href="https://github.com/EliyaC/NodeGoat/commit/2f9ac315d9e05728b7ce26ce7cf1b4e684e54fde">2f9ac315d9e05728b7ce26ce7cf1b4e684e54fde</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Lodash versions prior to 4.17.21 are vulnerable to Regular Expression Denial of Service (ReDoS) via the toNumber, trim and trimEnd functions.
<p>Publish Date: 2021-02-15
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-28500>CVE-2020-28500</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: Low
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28500">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28500</a></p>
<p>Release Date: 2021-02-15</p>
<p>Fix Resolution: lodash-4.17.21</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"lodash","packageVersion":"4.17.20","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"grunt-env:1.0.1;lodash:4.17.20","isMinimumFixVersionAvailable":true,"minimumFixVersion":"lodash-4.17.21","isBinary":false},{"packageType":"javascript/Node.js","packageName":"lodash","packageVersion":"4.17.11","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"async:2.6.1;lodash:4.17.11","isMinimumFixVersionAvailable":true,"minimumFixVersion":"lodash-4.17.21","isBinary":false},{"packageType":"javascript/Node.js","packageName":"lodash","packageVersion":"4.13.1","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"grunt-if:0.2.0;grunt-contrib-nodeunit:1.0.0;nodeunit:0.9.5;tap:7.1.2;nyc:7.1.0;istanbul-lib-instrument:1.1.0-alpha.4;babel-types:6.11.1;lodash:4.13.1","isMinimumFixVersionAvailable":true,"minimumFixVersion":"lodash-4.17.21","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-28500","vulnerabilityDetails":"Lodash versions prior to 4.17.21 are vulnerable to Regular Expression Denial of Service (ReDoS) via the toNumber, trim and trimEnd functions.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-28500","cvss3Severity":"medium","cvss3Score":"5.3","cvss3Metrics":{"A":"Low","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> --> | non_priority | cve medium detected in multiple libraries cve medium severity vulnerability vulnerable libraries lodash tgz lodash tgz lodash tgz lodash tgz lodash modular utilities library home page a href path to dependency file package json path to vulnerable library node modules grunt env node modules lodash package json dependency hierarchy grunt env tgz root library x lodash tgz vulnerable library lodash tgz lodash modular utilities library home page a href path to dependency file package json path to vulnerable library node modules lodash package json dependency hierarchy async tgz root library x lodash tgz vulnerable library lodash tgz lodash modular utilities library home page a href path to dependency file package json path to vulnerable library node modules nyc node modules lodash package json dependency hierarchy grunt if tgz root library grunt contrib nodeunit tgz nodeunit tgz tap tgz nyc tgz istanbul lib instrument alpha tgz babel types tgz x lodash tgz vulnerable library found in head commit a href found in base branch master vulnerability details lodash versions prior to are vulnerable to regular expression denial of service redos via the tonumber trim and trimend functions publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution lodash isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree grunt env lodash isminimumfixversionavailable true minimumfixversion lodash isbinary false packagetype javascript node js packagename lodash packageversion packagefilepaths istransitivedependency true dependencytree async lodash isminimumfixversionavailable true minimumfixversion lodash isbinary false packagetype javascript node js packagename lodash packageversion packagefilepaths istransitivedependency true dependencytree grunt if grunt contrib nodeunit nodeunit tap nyc istanbul lib instrument alpha babel types lodash isminimumfixversionavailable true minimumfixversion lodash isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails lodash versions prior to are vulnerable to regular expression denial of service redos via the tonumber trim and trimend functions vulnerabilityurl | 0 |
275,509 | 20,924,028,985 | IssuesEvent | 2022-03-24 20:26:46 | Agoric/agoric-sdk | https://api.github.com/repos/Agoric/agoric-sdk | opened | Add LICENSE file to agoric-sdk/packages directories that do not have one (and golang, too) | documentation | Our Apache 2.0 license file is missing from the following agoric-sdk/packages directories:
- assert
- deployment
- eslint-config
- governance
- import-manager
- notifier
- pegasus
- run-protocol
- sharing-service
- solo
- sparse-ints
- swingset-runner
- telemetry
- ui-components
- vats
- wallet
- wallet-connection
- xsnap
It is also missing from golang/cosmos | 1.0 | Add LICENSE file to agoric-sdk/packages directories that do not have one (and golang, too) - Our Apache 2.0 license file is missing from the following agoric-sdk/packages directories:
- assert
- deployment
- eslint-config
- governance
- import-manager
- notifier
- pegasus
- run-protocol
- sharing-service
- solo
- sparse-ints
- swingset-runner
- telemetry
- ui-components
- vats
- wallet
- wallet-connection
- xsnap
It is also missing from golang/cosmos | non_priority | add license file to agoric sdk packages directories that do not have one and golang too our apache license file is missing from the following agoric sdk packages directories assert deployment eslint config governance import manager notifier pegasus run protocol sharing service solo sparse ints swingset runner telemetry ui components vats wallet wallet connection xsnap it is also missing from golang cosmos | 0 |
138,625 | 18,793,976,748 | IssuesEvent | 2021-11-08 19:56:51 | Dima2022/hygieia-workflow-github-collector | https://api.github.com/repos/Dima2022/hygieia-workflow-github-collector | opened | CVE-2015-5346 (High) detected in tomcat-embed-core-8.0.28.jar | security vulnerability | ## CVE-2015-5346 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>tomcat-embed-core-8.0.28.jar</b></p></summary>
<p>Core Tomcat implementation</p>
<p>Library home page: <a href="http://tomcat.apache.org/">http://tomcat.apache.org/</a></p>
<p>Path to dependency file: hygieia-workflow-github-collector/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/tomcat/embed/tomcat-embed-core/8.0.28/tomcat-embed-core-8.0.28.jar</p>
<p>
Dependency Hierarchy:
- core-3.9.7.jar (Root Library)
- :x: **tomcat-embed-core-8.0.28.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/Dima2022/hygieia-workflow-github-collector/commit/236baaa856b74774f7b43ecb1eeade5a8d1d0496">236baaa856b74774f7b43ecb1eeade5a8d1d0496</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Session fixation vulnerability in Apache Tomcat 7.x before 7.0.66, 8.x before 8.0.30, and 9.x before 9.0.0.M2, when different session settings are used for deployments of multiple versions of the same web application, might allow remote attackers to hijack web sessions by leveraging use of a requestedSessionSSL field for an unintended request, related to CoyoteAdapter.java and Request.java.
<p>Publish Date: 2016-02-25
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2015-5346>CVE-2015-5346</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5346">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5346</a></p>
<p>Release Date: 2016-02-25</p>
<p>Fix Resolution: org.apache.tomcat.embed:tomcat-embed-core:9.0.0.M21,8.0.30,7.0.66,org.apache.tomcat:tomcat-catalina:9.0.0.M21,8.0.30,7.0.66</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"org.apache.tomcat.embed","packageName":"tomcat-embed-core","packageVersion":"8.0.28","packageFilePaths":["/pom.xml"],"isTransitiveDependency":true,"dependencyTree":"com.capitalone.dashboard:core:3.9.7;org.apache.tomcat.embed:tomcat-embed-core:8.0.28","isMinimumFixVersionAvailable":true,"minimumFixVersion":"org.apache.tomcat.embed:tomcat-embed-core:9.0.0.M21,8.0.30,7.0.66,org.apache.tomcat:tomcat-catalina:9.0.0.M21,8.0.30,7.0.66"}],"baseBranches":["main"],"vulnerabilityIdentifier":"CVE-2015-5346","vulnerabilityDetails":"Session fixation vulnerability in Apache Tomcat 7.x before 7.0.66, 8.x before 8.0.30, and 9.x before 9.0.0.M2, when different session settings are used for deployments of multiple versions of the same web application, might allow remote attackers to hijack web sessions by leveraging use of a requestedSessionSSL field for an unintended request, related to CoyoteAdapter.java and Request.java.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2015-5346","cvss3Severity":"high","cvss3Score":"8.1","cvss3Metrics":{"A":"High","AC":"High","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> --> | True | CVE-2015-5346 (High) detected in tomcat-embed-core-8.0.28.jar - ## CVE-2015-5346 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>tomcat-embed-core-8.0.28.jar</b></p></summary>
<p>Core Tomcat implementation</p>
<p>Library home page: <a href="http://tomcat.apache.org/">http://tomcat.apache.org/</a></p>
<p>Path to dependency file: hygieia-workflow-github-collector/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/tomcat/embed/tomcat-embed-core/8.0.28/tomcat-embed-core-8.0.28.jar</p>
<p>
Dependency Hierarchy:
- core-3.9.7.jar (Root Library)
- :x: **tomcat-embed-core-8.0.28.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/Dima2022/hygieia-workflow-github-collector/commit/236baaa856b74774f7b43ecb1eeade5a8d1d0496">236baaa856b74774f7b43ecb1eeade5a8d1d0496</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Session fixation vulnerability in Apache Tomcat 7.x before 7.0.66, 8.x before 8.0.30, and 9.x before 9.0.0.M2, when different session settings are used for deployments of multiple versions of the same web application, might allow remote attackers to hijack web sessions by leveraging use of a requestedSessionSSL field for an unintended request, related to CoyoteAdapter.java and Request.java.
<p>Publish Date: 2016-02-25
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2015-5346>CVE-2015-5346</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5346">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5346</a></p>
<p>Release Date: 2016-02-25</p>
<p>Fix Resolution: org.apache.tomcat.embed:tomcat-embed-core:9.0.0.M21,8.0.30,7.0.66,org.apache.tomcat:tomcat-catalina:9.0.0.M21,8.0.30,7.0.66</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"org.apache.tomcat.embed","packageName":"tomcat-embed-core","packageVersion":"8.0.28","packageFilePaths":["/pom.xml"],"isTransitiveDependency":true,"dependencyTree":"com.capitalone.dashboard:core:3.9.7;org.apache.tomcat.embed:tomcat-embed-core:8.0.28","isMinimumFixVersionAvailable":true,"minimumFixVersion":"org.apache.tomcat.embed:tomcat-embed-core:9.0.0.M21,8.0.30,7.0.66,org.apache.tomcat:tomcat-catalina:9.0.0.M21,8.0.30,7.0.66"}],"baseBranches":["main"],"vulnerabilityIdentifier":"CVE-2015-5346","vulnerabilityDetails":"Session fixation vulnerability in Apache Tomcat 7.x before 7.0.66, 8.x before 8.0.30, and 9.x before 9.0.0.M2, when different session settings are used for deployments of multiple versions of the same web application, might allow remote attackers to hijack web sessions by leveraging use of a requestedSessionSSL field for an unintended request, related to CoyoteAdapter.java and Request.java.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2015-5346","cvss3Severity":"high","cvss3Score":"8.1","cvss3Metrics":{"A":"High","AC":"High","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> --> | non_priority | cve high detected in tomcat embed core jar cve high severity vulnerability vulnerable library tomcat embed core jar core tomcat implementation library home page a href path to dependency file hygieia workflow github collector pom xml path to vulnerable library home wss scanner repository org apache tomcat embed tomcat embed core tomcat embed core jar dependency hierarchy core jar root library x tomcat embed core jar vulnerable library found in head commit a href found in base branch main vulnerability details session fixation vulnerability in apache tomcat x before x before and x before when different session settings are used for deployments of multiple versions of the same web application might allow remote attackers to hijack web sessions by leveraging use of a requestedsessionssl field for an unintended request related to coyoteadapter java and request java publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org apache tomcat embed tomcat embed core org apache tomcat tomcat catalina isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree com capitalone dashboard core org apache tomcat embed tomcat embed core isminimumfixversionavailable true minimumfixversion org apache tomcat embed tomcat embed core org apache tomcat tomcat catalina basebranches vulnerabilityidentifier cve vulnerabilitydetails session fixation vulnerability in apache tomcat x before x before and x before when different session settings are used for deployments of multiple versions of the same web application might allow remote attackers to hijack web sessions by leveraging use of a requestedsessionssl field for an unintended request related to coyoteadapter java and request java vulnerabilityurl | 0 |
8,254 | 7,208,928,300 | IssuesEvent | 2018-02-07 06:14:35 | r888888888/danbooru | https://api.github.com/repos/r888888888/danbooru | opened | Open redirect vulnerabilities | Bug Security | 1) https://danbooru.donmai.us/posts?search[name]=&host=youtu.be/6H1rPYkRyjE%23
This redirects the user to an external (possibly malicious) website. The issue is in `ApplicationController#normalize_search`: the URL params aren't sanitized before passing them to `redirect_to url_for(params)`. `url_for` interprets the params as options, which can be abused to redirect to an arbitrary URL (see the docs for [url_for](http://api.rubyonrails.org/classes/ActionDispatch/Routing/UrlFor.html#method-i-url_for)).
2. https://danbooru.donmai.us/posts?host=youtu.be/6H1rPYkRyjE%23
This causes the paginator to generate links to an external website. Here the issue is in `PaginationHelper#numbered_paginator`: it doesn't sanitize the params before calling `link_to(..., params.merge(page: page))`. `link_to` passes the URL params down to `url_for`, which leads to the same problem as above. | True | Open redirect vulnerabilities - 1) https://danbooru.donmai.us/posts?search[name]=&host=youtu.be/6H1rPYkRyjE%23
This redirects the user to an external (possibly malicious) website. The issue is in `ApplicationController#normalize_search`: the URL params aren't sanitized before passing them to `redirect_to url_for(params)`. `url_for` interprets the params as options, which can be abused to redirect to an arbitrary URL (see the docs for [url_for](http://api.rubyonrails.org/classes/ActionDispatch/Routing/UrlFor.html#method-i-url_for)).
2. https://danbooru.donmai.us/posts?host=youtu.be/6H1rPYkRyjE%23
This causes the paginator to generate links to an external website. Here the issue is in `PaginationHelper#numbered_paginator`: it doesn't sanitize the params before calling `link_to(..., params.merge(page: page))`. `link_to` passes the URL params down to `url_for`, which leads to the same problem as above. | non_priority | open redirect vulnerabilities host youtu be this redirects the user to an external possibly malicious website the issue is in applicationcontroller normalize search the url params aren t sanitized before passing them to redirect to url for params url for interprets the params as options which can be abused to redirect to an arbitrary url see the docs for this causes the paginator to generate links to an external website here the issue is in paginationhelper numbered paginator it doesn t sanitize the params before calling link to params merge page page link to passes the url params down to url for which leads to the same problem as above | 0 |
81,221 | 7,775,996,440 | IssuesEvent | 2018-06-05 06:19:55 | adobe/brackets | https://api.github.com/repos/adobe/brackets | closed | [Brackets auto-update Windows/Mac] The buttons in update bar should have border radius of 3px as per specs. | Testing | ### Description
[Brackets auto-update Windows/Mac] The buttons in update bar should have border radius of 3px as per specs.
### Steps to Reproduce
1. Launch brackets 1.13.
2. Open another brackets window.
3. Click on Update Notification Button.
4. Click on Get it Now.
5. Update bar will be displayed along with buttons.
6. The buttons in update bar should have border radius of 3px as per specs.
<img width="240" alt="screen shot 2018-04-12 at 1 54 31 am" src="https://user-images.githubusercontent.com/25339865/38734691-258a0538-3f44-11e8-912a-10c90505233c.png">
**Expected behavior:** The buttons in update bar should have border radius of 3px as per specs.
**Actual behavior:** The buttons does not have any border radius.
### Versions
Windows 10 64 Bit
Mac 10.13
Release 1.13 build 1.13.0-17665 | 1.0 | [Brackets auto-update Windows/Mac] The buttons in update bar should have border radius of 3px as per specs. - ### Description
[Brackets auto-update Windows/Mac] The buttons in update bar should have border radius of 3px as per specs.
### Steps to Reproduce
1. Launch brackets 1.13.
2. Open another brackets window.
3. Click on Update Notification Button.
4. Click on Get it Now.
5. Update bar will be displayed along with buttons.
6. The buttons in update bar should have border radius of 3px as per specs.
<img width="240" alt="screen shot 2018-04-12 at 1 54 31 am" src="https://user-images.githubusercontent.com/25339865/38734691-258a0538-3f44-11e8-912a-10c90505233c.png">
**Expected behavior:** The buttons in update bar should have border radius of 3px as per specs.
**Actual behavior:** The buttons does not have any border radius.
### Versions
Windows 10 64 Bit
Mac 10.13
Release 1.13 build 1.13.0-17665 | non_priority | the buttons in update bar should have border radius of as per specs description the buttons in update bar should have border radius of as per specs steps to reproduce launch brackets open another brackets window click on update notification button click on get it now update bar will be displayed along with buttons the buttons in update bar should have border radius of as per specs img width alt screen shot at am src expected behavior the buttons in update bar should have border radius of as per specs actual behavior the buttons does not have any border radius versions windows bit mac release build | 0 |
90,874 | 18,269,567,458 | IssuesEvent | 2021-10-04 12:29:11 | blockstack/stacks-wallet-web | https://api.github.com/repos/blockstack/stacks-wallet-web | closed | Refactor drawer to be modal in full page view | 💊 Code health 🧼 Visual bug | Right now we use a drawer element, that should only really be used in the popup, not full screen.
We should refactor this so that it's a modal when in full screen.
@aulneau would be awesome if you could do this 🙏🏼 | 1.0 | Refactor drawer to be modal in full page view - Right now we use a drawer element, that should only really be used in the popup, not full screen.
We should refactor this so that it's a modal when in full screen.
@aulneau would be awesome if you could do this 🙏🏼 | non_priority | refactor drawer to be modal in full page view right now we use a drawer element that should only really be used in the popup not full screen we should refactor this so that it s a modal when in full screen aulneau would be awesome if you could do this 🙏🏼 | 0 |
256,030 | 27,552,531,865 | IssuesEvent | 2023-03-07 15:48:33 | billmcchesney1/liquibase-cosmosdb | https://api.github.com/repos/billmcchesney1/liquibase-cosmosdb | closed | CVE-2022-41915 (Medium) detected in netty-codec-http-4.1.51.Final.jar - autoclosed | Mend: dependency security vulnerability | ## CVE-2022-41915 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>netty-codec-http-4.1.51.Final.jar</b></p></summary>
<p>Netty is an asynchronous event-driven network application framework for
rapid development of maintainable high performance protocol servers and
clients.</p>
<p>Library home page: <a href="https://netty.io/">https://netty.io/</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/io/netty/netty-codec-http/4.1.51.Final/netty-codec-http-4.1.51.Final.jar</p>
<p>
Dependency Hierarchy:
- azure-cosmos-4.4.0.jar (Root Library)
- :x: **netty-codec-http-4.1.51.Final.jar** (Vulnerable Library)
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Netty project is an event-driven asynchronous network application framework. Starting in version 4.1.83.Final and prior to 4.1.86.Final, when calling `DefaultHttpHeadesr.set` with an _iterator_ of values, header value validation was not performed, allowing malicious header values in the iterator to perform HTTP Response Splitting. This issue has been patched in version 4.1.86.Final. Integrators can work around the issue by changing the `DefaultHttpHeaders.set(CharSequence, Iterator<?>)` call, into a `remove()` call, and call `add()` in a loop over the iterator of values.
<p>Publish Date: 2022-12-13
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-41915>CVE-2022-41915</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2022-12-13</p>
<p>Fix Resolution (io.netty:netty-codec-http): 4.1.86.Final</p>
<p>Direct dependency fix Resolution (com.azure:azure-cosmos): 4.18.1</p>
</p>
</details>
<p></p>
***
<!-- REMEDIATE-OPEN-PR-START -->
- [ ] Check this box to open an automated fix PR
<!-- REMEDIATE-OPEN-PR-END -->
| True | CVE-2022-41915 (Medium) detected in netty-codec-http-4.1.51.Final.jar - autoclosed - ## CVE-2022-41915 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>netty-codec-http-4.1.51.Final.jar</b></p></summary>
<p>Netty is an asynchronous event-driven network application framework for
rapid development of maintainable high performance protocol servers and
clients.</p>
<p>Library home page: <a href="https://netty.io/">https://netty.io/</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/io/netty/netty-codec-http/4.1.51.Final/netty-codec-http-4.1.51.Final.jar</p>
<p>
Dependency Hierarchy:
- azure-cosmos-4.4.0.jar (Root Library)
- :x: **netty-codec-http-4.1.51.Final.jar** (Vulnerable Library)
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Netty project is an event-driven asynchronous network application framework. Starting in version 4.1.83.Final and prior to 4.1.86.Final, when calling `DefaultHttpHeadesr.set` with an _iterator_ of values, header value validation was not performed, allowing malicious header values in the iterator to perform HTTP Response Splitting. This issue has been patched in version 4.1.86.Final. Integrators can work around the issue by changing the `DefaultHttpHeaders.set(CharSequence, Iterator<?>)` call, into a `remove()` call, and call `add()` in a loop over the iterator of values.
<p>Publish Date: 2022-12-13
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-41915>CVE-2022-41915</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2022-12-13</p>
<p>Fix Resolution (io.netty:netty-codec-http): 4.1.86.Final</p>
<p>Direct dependency fix Resolution (com.azure:azure-cosmos): 4.18.1</p>
</p>
</details>
<p></p>
***
<!-- REMEDIATE-OPEN-PR-START -->
- [ ] Check this box to open an automated fix PR
<!-- REMEDIATE-OPEN-PR-END -->
| non_priority | cve medium detected in netty codec http final jar autoclosed cve medium severity vulnerability vulnerable library netty codec http final jar netty is an asynchronous event driven network application framework for rapid development of maintainable high performance protocol servers and clients library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository io netty netty codec http final netty codec http final jar dependency hierarchy azure cosmos jar root library x netty codec http final jar vulnerable library found in base branch master vulnerability details netty project is an event driven asynchronous network application framework starting in version final and prior to final when calling defaulthttpheadesr set with an iterator of values header value validation was not performed allowing malicious header values in the iterator to perform http response splitting this issue has been patched in version final integrators can work around the issue by changing the defaulthttpheaders set charsequence iterator call into a remove call and call add in a loop over the iterator of values publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version release date fix resolution io netty netty codec http final direct dependency fix resolution com azure azure cosmos check this box to open an automated fix pr | 0 |
29,703 | 8,392,769,029 | IssuesEvent | 2018-10-09 18:34:30 | syndesisio/syndesis | https://api.github.com/repos/syndesisio/syndesis | closed | License check is not working for (some?) XML files | cat/bug cat/build prio/p2 status/stale | ## This is a...
<!-- Check ONLY one of the following options with "x" -->
<pre><code>
[ ] Feature request
[ ] Regression (a behavior that used to work and stopped working in a new release)
[x] Bug report <!-- Please search GitHub for a similar issue or PR before submitting -->
[ ] Documentation issue or request
</code></pre>
## The problem
<!--
Briefly describe the issue you are experiencing (or the feature you want to see implemented on Syndesis).
+ For BUGS, tell us what you were trying to do and what happened instead.
+ For NEW FEATURES, describe the _User Persona_ demanding it and its use case.
-->
Seems that we have several `logback-test.xml` files that have different license headers in them and the license check is not catching those.
## Expected behavior
<!-- Describe what the desired behavior would be, enlistin gthe acceptance criteria. -->
Have uniformed license headers
| 1.0 | License check is not working for (some?) XML files - ## This is a...
<!-- Check ONLY one of the following options with "x" -->
<pre><code>
[ ] Feature request
[ ] Regression (a behavior that used to work and stopped working in a new release)
[x] Bug report <!-- Please search GitHub for a similar issue or PR before submitting -->
[ ] Documentation issue or request
</code></pre>
## The problem
<!--
Briefly describe the issue you are experiencing (or the feature you want to see implemented on Syndesis).
+ For BUGS, tell us what you were trying to do and what happened instead.
+ For NEW FEATURES, describe the _User Persona_ demanding it and its use case.
-->
Seems that we have several `logback-test.xml` files that have different license headers in them and the license check is not catching those.
## Expected behavior
<!-- Describe what the desired behavior would be, enlistin gthe acceptance criteria. -->
Have uniformed license headers
| non_priority | license check is not working for some xml files this is a feature request regression a behavior that used to work and stopped working in a new release bug report documentation issue or request the problem briefly describe the issue you are experiencing or the feature you want to see implemented on syndesis for bugs tell us what you were trying to do and what happened instead for new features describe the user persona demanding it and its use case seems that we have several logback test xml files that have different license headers in them and the license check is not catching those expected behavior have uniformed license headers | 0 |
51,723 | 6,194,666,399 | IssuesEvent | 2017-07-05 10:28:09 | Manishearth/rust-clippy | https://api.github.com/repos/Manishearth/rust-clippy | closed | Fail to build with rustc 1.20.0-nightly (2fbba5bdb 2017-07-04) | A-tests E-easy | Here's the [detail log](https://gist.github.com/uHOOCCOOHu/dd0deb6de4d164939ee41fac5311201b).
Seems caused by rust-lang/rust#43012.
| 1.0 | Fail to build with rustc 1.20.0-nightly (2fbba5bdb 2017-07-04) - Here's the [detail log](https://gist.github.com/uHOOCCOOHu/dd0deb6de4d164939ee41fac5311201b).
Seems caused by rust-lang/rust#43012.
| non_priority | fail to build with rustc nightly here s the seems caused by rust lang rust | 0 |
231,553 | 18,778,121,862 | IssuesEvent | 2021-11-08 00:24:48 | ethereum/solidity | https://api.github.com/repos/ethereum/solidity | closed | Extract test cases (from SoldityEndToEndTest) | testing :hammer: | Often a big source of annoyance is that recompiling the gigantic test source files we have takes quite a bit of time. Most of the tests, though, have a very similar structure:
In the EndToEnd-tests, a contract is given, it is compiled, deployed and then multiple functions are called on the contract with multiple arguments, yielding certain expected outputs.
In the NameAndType tests, a contract is given, is compiled until the type checking phase and then an expected list of warnings and errors (or none) is checked.
Both types do not really need to be .cpp files with their own logic. Most of the tests can be specified by just a list of strings. If this list is an external file, no recompilation is needed if just the test expectations are adjusted.
We can even go further than that: We might have an interactive test runner, that just asks the user to automatically correct test expectations if they fail, on a test-by-test basis: It displays the source, the inptus (for the case of EndToEnd tests), the actual values and the expected values and waits for a y/n response to adjust the values.
The only problem here might be the encoding of the inputs and outputs of the EndToEnd tests. For readability reasons, we do not want them to be fully hex encoded, so the file format has to be able to support some kind of flexibility there. We might start with an easy version, just supporting decimals and hex numbers (if auto-generated, we might want to check if the hex version ends with many zeros or `f`s and only then choose hex) and extract all test cases that have such simple inputs and outputs.
I would propose to use a simple separator-based expectation file format (not yaml or json because it could create problems with escaping and also indentation is always weird):
```
TestName
contract {
// source until separator
}
=====
f(uint,bytes32): 0x123000, 456 -> 123, true
g(string): "abc" -> X
=====
NextTest
// ...
```
The `X` signifies that a `revert` is expected. | 1.0 | Extract test cases (from SoldityEndToEndTest) - Often a big source of annoyance is that recompiling the gigantic test source files we have takes quite a bit of time. Most of the tests, though, have a very similar structure:
In the EndToEnd-tests, a contract is given, it is compiled, deployed and then multiple functions are called on the contract with multiple arguments, yielding certain expected outputs.
In the NameAndType tests, a contract is given, is compiled until the type checking phase and then an expected list of warnings and errors (or none) is checked.
Both types do not really need to be .cpp files with their own logic. Most of the tests can be specified by just a list of strings. If this list is an external file, no recompilation is needed if just the test expectations are adjusted.
We can even go further than that: We might have an interactive test runner, that just asks the user to automatically correct test expectations if they fail, on a test-by-test basis: It displays the source, the inptus (for the case of EndToEnd tests), the actual values and the expected values and waits for a y/n response to adjust the values.
The only problem here might be the encoding of the inputs and outputs of the EndToEnd tests. For readability reasons, we do not want them to be fully hex encoded, so the file format has to be able to support some kind of flexibility there. We might start with an easy version, just supporting decimals and hex numbers (if auto-generated, we might want to check if the hex version ends with many zeros or `f`s and only then choose hex) and extract all test cases that have such simple inputs and outputs.
I would propose to use a simple separator-based expectation file format (not yaml or json because it could create problems with escaping and also indentation is always weird):
```
TestName
contract {
// source until separator
}
=====
f(uint,bytes32): 0x123000, 456 -> 123, true
g(string): "abc" -> X
=====
NextTest
// ...
```
The `X` signifies that a `revert` is expected. | non_priority | extract test cases from soldityendtoendtest often a big source of annoyance is that recompiling the gigantic test source files we have takes quite a bit of time most of the tests though have a very similar structure in the endtoend tests a contract is given it is compiled deployed and then multiple functions are called on the contract with multiple arguments yielding certain expected outputs in the nameandtype tests a contract is given is compiled until the type checking phase and then an expected list of warnings and errors or none is checked both types do not really need to be cpp files with their own logic most of the tests can be specified by just a list of strings if this list is an external file no recompilation is needed if just the test expectations are adjusted we can even go further than that we might have an interactive test runner that just asks the user to automatically correct test expectations if they fail on a test by test basis it displays the source the inptus for the case of endtoend tests the actual values and the expected values and waits for a y n response to adjust the values the only problem here might be the encoding of the inputs and outputs of the endtoend tests for readability reasons we do not want them to be fully hex encoded so the file format has to be able to support some kind of flexibility there we might start with an easy version just supporting decimals and hex numbers if auto generated we might want to check if the hex version ends with many zeros or f s and only then choose hex and extract all test cases that have such simple inputs and outputs i would propose to use a simple separator based expectation file format not yaml or json because it could create problems with escaping and also indentation is always weird testname contract source until separator f uint true g string abc x nexttest the x signifies that a revert is expected | 0 |
115,492 | 9,797,336,912 | IssuesEvent | 2019-06-11 09:43:31 | elifesciences/elife-xpub | https://api.github.com/repos/elifesciences/elife-xpub | closed | Deadlocks sometime happening on unit tests | Bug Testing | **Describe the bug**
The unit tests sometimes fail on ci
From the ci postgres logs:
```
ERROR: deadlock detected at character 45
2019-06-07 16:36:01.117 UTC [101] DETAIL: Process 101 waits for AccessShareLock on relation 16497 of database 16384; blocked by process 103.
Process 103 waits for AccessExclusiveLock on relation 16446 of database 16384; blocked by process 101.
Process 101: select "team"."object_id", "team"."id" from "team" where "team"."object_id" in ($1)
Process 103: START TRANSACTION;
TRUNCATE "team" CASCADE;TRUNCATE "entities" CASCADE;TRUNCATE "audit_log" CASCADE;TRUNCATE "ejp_name" CASCADE;TRUNCATE "review" CASCADE;TRUNCATE "file" CASCADE;TRUNCATE "identity" CASCADE;TRUNCATE "semantic_extraction" CASCADE;TRUNCATE "user" CASCADE;TRUNCATE "organization" CASCADE;TRUNCATE "journal" CASCADE;TRUNCATE "manuscript" CASCADE;TRUNCATE "migrations" CASCADE;
COMMIT
```
**Steps To Reproduce**
Running the ci pipeline until the error comes up
**Expected behavior**
it shouldn't deadlock
| 1.0 | Deadlocks sometime happening on unit tests - **Describe the bug**
The unit tests sometimes fail on ci
From the ci postgres logs:
```
ERROR: deadlock detected at character 45
2019-06-07 16:36:01.117 UTC [101] DETAIL: Process 101 waits for AccessShareLock on relation 16497 of database 16384; blocked by process 103.
Process 103 waits for AccessExclusiveLock on relation 16446 of database 16384; blocked by process 101.
Process 101: select "team"."object_id", "team"."id" from "team" where "team"."object_id" in ($1)
Process 103: START TRANSACTION;
TRUNCATE "team" CASCADE;TRUNCATE "entities" CASCADE;TRUNCATE "audit_log" CASCADE;TRUNCATE "ejp_name" CASCADE;TRUNCATE "review" CASCADE;TRUNCATE "file" CASCADE;TRUNCATE "identity" CASCADE;TRUNCATE "semantic_extraction" CASCADE;TRUNCATE "user" CASCADE;TRUNCATE "organization" CASCADE;TRUNCATE "journal" CASCADE;TRUNCATE "manuscript" CASCADE;TRUNCATE "migrations" CASCADE;
COMMIT
```
**Steps To Reproduce**
Running the ci pipeline until the error comes up
**Expected behavior**
it shouldn't deadlock
| non_priority | deadlocks sometime happening on unit tests describe the bug the unit tests sometimes fail on ci from the ci postgres logs error deadlock detected at character utc detail process waits for accesssharelock on relation of database blocked by process process waits for accessexclusivelock on relation of database blocked by process process select team object id team id from team where team object id in process start transaction truncate team cascade truncate entities cascade truncate audit log cascade truncate ejp name cascade truncate review cascade truncate file cascade truncate identity cascade truncate semantic extraction cascade truncate user cascade truncate organization cascade truncate journal cascade truncate manuscript cascade truncate migrations cascade commit steps to reproduce running the ci pipeline until the error comes up expected behavior it shouldn t deadlock | 0 |
120,676 | 15,790,700,901 | IssuesEvent | 2021-04-02 02:16:06 | KenEucker/biketag-vue | https://api.github.com/repos/KenEucker/biketag-vue | opened | Style the venomgram starter with the new App Brand | design | @ItsOkayItsOfficial here's an issue for the work we just discussed that keeps in mind the wireframes and discussion in #1 as well as the assets and screenshots provided in #7.
This issue can be placed on the Kanban board found in the project: https://github.com/KenEucker/biketag-vue/projects/1 | 1.0 | Style the venomgram starter with the new App Brand - @ItsOkayItsOfficial here's an issue for the work we just discussed that keeps in mind the wireframes and discussion in #1 as well as the assets and screenshots provided in #7.
This issue can be placed on the Kanban board found in the project: https://github.com/KenEucker/biketag-vue/projects/1 | non_priority | style the venomgram starter with the new app brand itsokayitsofficial here s an issue for the work we just discussed that keeps in mind the wireframes and discussion in as well as the assets and screenshots provided in this issue can be placed on the kanban board found in the project | 0 |
354,772 | 25,174,882,509 | IssuesEvent | 2022-11-11 08:20:09 | jjtoh/pe | https://api.github.com/repos/jjtoh/pe | opened | Wrong command to start run application in UG | severity.Low type.DocumentationBug | 
This command does not run the program, the file is not named duke.
<!--session: 1668153903898-1a0903eb-211c-4594-9edf-37ac5f7dbc99-->
<!--Version: Web v3.4.4--> | 1.0 | Wrong command to start run application in UG - 
This command does not run the program, the file is not named duke.
<!--session: 1668153903898-1a0903eb-211c-4594-9edf-37ac5f7dbc99-->
<!--Version: Web v3.4.4--> | non_priority | wrong command to start run application in ug this command does not run the program the file is not named duke | 0 |
212,532 | 16,458,045,258 | IssuesEvent | 2021-05-21 14:59:42 | microcks/microcks | https://api.github.com/repos/microcks/microcks | closed | JsonPath assertions from SOAPUI are not working | component/tests kind/bug | I imported the HelloAPI sample SOAPUI project and modified it so the mock (in microcks) always returns the 'Gavin' response.
The SOAPUI testcase has some assertions, 1 of them is on the greeting message. When running the test from microcks using SOAP_UI Runner, both tests pass. Checking the full results I verified that the response to the 'David request' does indeed return:
```
{
'name':'Gavin',
'greeting':'Hello Gavin !'
}
```
so the assertion should fail. | 1.0 | JsonPath assertions from SOAPUI are not working - I imported the HelloAPI sample SOAPUI project and modified it so the mock (in microcks) always returns the 'Gavin' response.
The SOAPUI testcase has some assertions, 1 of them is on the greeting message. When running the test from microcks using SOAP_UI Runner, both tests pass. Checking the full results I verified that the response to the 'David request' does indeed return:
```
{
'name':'Gavin',
'greeting':'Hello Gavin !'
}
```
so the assertion should fail. | non_priority | jsonpath assertions from soapui are not working i imported the helloapi sample soapui project and modified it so the mock in microcks always returns the gavin response the soapui testcase has some assertions of them is on the greeting message when running the test from microcks using soap ui runner both tests pass checking the full results i verified that the response to the david request does indeed return name gavin greeting hello gavin so the assertion should fail | 0 |
154 | 2,714,678,298 | IssuesEvent | 2015-04-10 06:56:48 | Jasig/cas | https://api.github.com/repos/Jasig/cas | closed | [CAS-753] Add Second-Level CAS Support | Architecture Future Major New Feature | Add second level CAS support
Reported by: Scott Battaglia, id: battags
Created: Wed, 28 Jan 2009 14:59:34 -0700
Updated: Tue, 10 Feb 2009 14:09:45 -0700
JIRA: https://issues.jasig.org/browse/CAS-753
http://www.ja-sig.org/wiki/display/CASUM/Second-Level+CAS+Server | 1.0 | [CAS-753] Add Second-Level CAS Support - Add second level CAS support
Reported by: Scott Battaglia, id: battags
Created: Wed, 28 Jan 2009 14:59:34 -0700
Updated: Tue, 10 Feb 2009 14:09:45 -0700
JIRA: https://issues.jasig.org/browse/CAS-753
http://www.ja-sig.org/wiki/display/CASUM/Second-Level+CAS+Server | non_priority | add second level cas support add second level cas support reported by scott battaglia id battags created wed jan updated tue feb jira | 0 |
114,098 | 11,837,578,101 | IssuesEvent | 2020-03-23 14:24:47 | DamionGans/MegaMaxCorpInc | https://api.github.com/repos/DamionGans/MegaMaxCorpInc | closed | Intranet: ('/hackerman') gets sayings and does conversations based on state of image | Back-end Documentation Front-end Important Intranet | The page '/hackerman' of the intranet app and service displays Mr. Hackerman. He says a lot to the user, but needs to say the right things.
Hackerman will have two kinds of expressions:
1. Explanations. At every new step, these expressions are given away freely. So when the user gets to the level, Mr. Hackerman will start the explanation.
2. Hints. Every 5 minutes after the explanation, Mr. Hackerman will give new hints after clicking a button, to help the user with the challenge (step).
My idea is to let him do that like this:
1. The front-end requests new explanations and hints
2. The back-end retrieves the current state of the image (that is the current challenge + the current step)
3. Based on the current state of the image, the back-end retrieves the right explanations + hints
4. The back-end passes gives the explanations+hints to the front-end. | 1.0 | Intranet: ('/hackerman') gets sayings and does conversations based on state of image - The page '/hackerman' of the intranet app and service displays Mr. Hackerman. He says a lot to the user, but needs to say the right things.
Hackerman will have two kinds of expressions:
1. Explanations. At every new step, these expressions are given away freely. So when the user gets to the level, Mr. Hackerman will start the explanation.
2. Hints. Every 5 minutes after the explanation, Mr. Hackerman will give new hints after clicking a button, to help the user with the challenge (step).
My idea is to let him do that like this:
1. The front-end requests new explanations and hints
2. The back-end retrieves the current state of the image (that is the current challenge + the current step)
3. Based on the current state of the image, the back-end retrieves the right explanations + hints
4. The back-end passes gives the explanations+hints to the front-end. | non_priority | intranet hackerman gets sayings and does conversations based on state of image the page hackerman of the intranet app and service displays mr hackerman he says a lot to the user but needs to say the right things hackerman will have two kinds of expressions explanations at every new step these expressions are given away freely so when the user gets to the level mr hackerman will start the explanation hints every minutes after the explanation mr hackerman will give new hints after clicking a button to help the user with the challenge step my idea is to let him do that like this the front end requests new explanations and hints the back end retrieves the current state of the image that is the current challenge the current step based on the current state of the image the back end retrieves the right explanations hints the back end passes gives the explanations hints to the front end | 0 |
112,721 | 9,597,788,278 | IssuesEvent | 2019-05-09 22:28:46 | brave/brave-ios | https://api.github.com/repos/brave/brave-ios | closed | Manual test run for 1.9.2 on iPad Pro/5th Gen running iOS12 | iPad release-notes/exclude tests | ## Per release speciality tests
- [x] Unable to navigate inside of a bookmark folder or open a bookmark ([#1076](https://github.com/brave/brave-ios/issues/1076))
- [x] Maximizing video, minimizing brave causes number pad to show with video. ([#979](https://github.com/brave/brave-ios/issues/979))
- [x] UI Unresponsive ([#636](https://github.com/brave/brave-ios/issues/636))
## Installer
- [x] Check that installer is close to the size of last release
- [x] Check the Brave version in About and make sure it is EXACTLY as expected
## Data
- [x] Make sure that data from the last version appears in the new version OK
- [x] Test that the previous version's cookies are preserved in the next version
- [x] Test that saved passwords are retained upon upgrade
- [x] Verify stats are retained when upgrading from previous version
- [x] Verify per site settings are retained when upgrading from previous version
- [x] Verify sync chain created in previous version is still retained on upgrade
## Bookmarks
- [x] Test that creating a bookmark in the left well works
- [x] Test that clicking a bookmark in the left well loads the bookmark
- [x] Test that deleting a bookmark in the left well works
- [x] Test that creating a bookmark folder works
- [x] Test that creating a bookmark inside the created folder works
- [x] Test that you are able to add a bookmark directly inside a bookmark folder
- [x] Test that you are able to delete a bookmark in edit mode
- [x] Test that you are able to delete a bookmark folder with bookmarks inside
- [x] Test adding a bookmark domain subpaths is retained and you are successfully able to visit the domain subpath in a new tab
## Favourites
- [x] Test editing favourite and chaning URL updates the favicons accordingly
- [x] Test that you are able to remove favourites
- [x] Test that you are able to add new favourites from share menu
## Context menus
- [x] Make sure context menu items in the URL bar work
- [x] Make sure context menu items on content work with no selected text
- [x] Make sure context menu items on content work with selected text
- [x] Make sure context menu items on content work inside an editable control (input, textarea, or contenteditable)
- [x] Context menu: verify you can Open in Background Tab, and Open in Private Tab
## Find on page
- [x] Verify search box is shown when selected via the share menu
- [x] Test successful find
- [x] Test forward and backward find navigation
- [x] Test failed find shows 0 results
## Private Mode
- [x] Create private tab, go to http://google.com, search for 'yumyums', exit private mode, go to http://google.com search box and begin typing 'yumyums' and verify that word is not in the autocomplete list
## Reader Mode
- [x] Visit http://theverge.com, open any article, verify the reader mode icon is shown in the URL bar
- [x] Verify tapping on the reader mode icon opens the article in reader mode
- [x] Edit reader mode settings and open different pages in reader mode and verify if the setting is retained across each article
## History
- [x] On youtube.com, thestar.com (or any other site using push state nav), navigate the site and verify history is added. Also note if the progress bar activates and shows progress
- [x] Settings > Clear Private Data, and clear all. Check history is cleared and none of the favourites are cleared
## Shields Settings
- [x] Enable all switches in settings and visit a site and disable block scripts. Kill and relaunch app and verify if the site shield settings are retained
## Site hacks
- [x] Test https://www.twitch.tv/adobe sub-page loads a video and you can play it
## Downloads
- [x] Test that you can save an image from a site
- [x] Test that you are able to save a gif image
## Fullscreen
- [x] Test that entering HTML5 full screen works. And pressing restore to go back exits full screen. (youtube.com)
## Gestures
- [x] Verify zoom in / out gestures works
- [x] Verify that navigating to a different origin resets the zoom
- [x] Swipe back and forward to navigate, verify this works as expected
## Password Managers
- [x] Test tapping on 1Password on the slide out keyboard launches 1Password App and able to select the stored credentials
- [x] Test tapping on bitwarden password manager in the autofill field launches the app and autofills the stored data
## Browser Lock
- [x] Test enabling browser pin settings asks for pin confirmation followed by reconfirm
- [x] Test swipe up/swip down with browser in focus doesn't ask for pin confirmation
- [x] Test clicking on set pin asks for pin to unlock before setting a new pin
- [x] Remove app from memory and relaunch, enter wrong pin, browser should not be unlocked
- [x] Test cancel fingerprint confirmation shows enter pin window when fingerprint unlock is setup on device
## Sync
- [x] Verify you are able to join sync chain by scanning the QR code
- [x] Verify you are able to join sync chain using code words
- [x] Verify you are able to create a sycn chain on the device and add other devices to the chain via QR code/Code words
- [x] Verify that bookmarks from other devices on the chain show up on the mobile device after sync completes
- [x] Verify newly created bookmarks get sync'd to all devices on the sync chain
- [x] Verify existing bookmarks before joining sync chain also gets sync'd to all devices on the sync chain
- [x] Verify sync works on a upgrade profile and new bookmarks added post upgrade sync's across devices on the chain
- [x] Verify you are able to create a standalone sync chain with one device
## Bravery settings
- [x] Check that HTTPS Everywhere works by loading http://https-everywhere.badssl.com/
- [x] Turning HTTPS Everywhere off or shields off both disable the redirect to https://https-everywhere.badssl.com/
- [x] Check that block ad and unblock ad works on http://slashdot.org
- [x] Check that toggling to blocking and allow ads works as expected
- [x] Test that clicking through a cert error in https://badssl.com/ works
- [x] Test that Safe Browsing works (https://www.raisegame.com/)
- [x] Turning Safe Browsing off and shields off both disable safe browsing for https://www.raisegame.com/
- [x] Enable block script globally from settings, Visit https://brianbondy.com/, nothing should load. Tap on Shields and disable block script, page should load properly
- [x] Test that preferences default Bravery settings take effect on pages with no site settings
- [x] Test that 3rd party storage results are blank at https://jsfiddle.net/7ke9r14a/7/ when 3rd party cookies are blocked
### Fingerprint Tests
- [x] Test that turning on fingerprinting protection in preferences shows 1 fingerprints blocked at https://browserleaks.com/canvas . Test that turning it off in the Bravery menu shows 0 fingerprints blocked
- [x] Test that audio fingerprint is blocked at https://audiofingerprint.openwpm.com/ when fingerprinting protection is on
- [x] Test that https://diafygi.github.io/webrtc-ips/ doesn't leak IP address when `Block all fingerprinting protection` is on
## Content tests
- [x] Go to https://brianbondy.com/ and click on the twitter icon on the top right. Test that context menus work in the new twitter tab
- [x] Load twitter and click on a tweet so the popup div shows. Click to dismiss and repeat with another div. Make sure it shows
- [x] Go to https://trac.torproject.org/projects/tor/login and make sure that the password can be saved. Make sure the saved password is auto-populated when you visit the site again
- [x] Open an email on http://mail.google.com/ or inbox.google.com and click on a link. Make sure it works
- [x] Test that PDF is loaded over https at https://basicattentiontoken.org/BasicAttentionTokenWhitePaper-4.pdf
- [x] Test that PDF is loaded over http at http://www.pdf995.com/samples/pdf.pdf
- [x] Test that https://mixed-script.badssl.com/ shows up as grey not red (no mixed content scripts are run)
- [x] Test that search results from https://startpage.com/ opens in a new tab (due to target being _blank)
## App linker
- [x] Long press on a link in the Twitter app to get the share picker, choose Brave. Verify Brave doesn't crash after opening the link
## Background
- [x] Start loading a page, background the app, wait >5 sec, then bring to front, Verify splash screen is not shown
## Session storage
- [ ] Test that tabs restore when closed, including active tab
| 1.0 | Manual test run for 1.9.2 on iPad Pro/5th Gen running iOS12 - ## Per release speciality tests
- [x] Unable to navigate inside of a bookmark folder or open a bookmark ([#1076](https://github.com/brave/brave-ios/issues/1076))
- [x] Maximizing video, minimizing brave causes number pad to show with video. ([#979](https://github.com/brave/brave-ios/issues/979))
- [x] UI Unresponsive ([#636](https://github.com/brave/brave-ios/issues/636))
## Installer
- [x] Check that installer is close to the size of last release
- [x] Check the Brave version in About and make sure it is EXACTLY as expected
## Data
- [x] Make sure that data from the last version appears in the new version OK
- [x] Test that the previous version's cookies are preserved in the next version
- [x] Test that saved passwords are retained upon upgrade
- [x] Verify stats are retained when upgrading from previous version
- [x] Verify per site settings are retained when upgrading from previous version
- [x] Verify sync chain created in previous version is still retained on upgrade
## Bookmarks
- [x] Test that creating a bookmark in the left well works
- [x] Test that clicking a bookmark in the left well loads the bookmark
- [x] Test that deleting a bookmark in the left well works
- [x] Test that creating a bookmark folder works
- [x] Test that creating a bookmark inside the created folder works
- [x] Test that you are able to add a bookmark directly inside a bookmark folder
- [x] Test that you are able to delete a bookmark in edit mode
- [x] Test that you are able to delete a bookmark folder with bookmarks inside
- [x] Test adding a bookmark domain subpaths is retained and you are successfully able to visit the domain subpath in a new tab
## Favourites
- [x] Test editing favourite and chaning URL updates the favicons accordingly
- [x] Test that you are able to remove favourites
- [x] Test that you are able to add new favourites from share menu
## Context menus
- [x] Make sure context menu items in the URL bar work
- [x] Make sure context menu items on content work with no selected text
- [x] Make sure context menu items on content work with selected text
- [x] Make sure context menu items on content work inside an editable control (input, textarea, or contenteditable)
- [x] Context menu: verify you can Open in Background Tab, and Open in Private Tab
## Find on page
- [x] Verify search box is shown when selected via the share menu
- [x] Test successful find
- [x] Test forward and backward find navigation
- [x] Test failed find shows 0 results
## Private Mode
- [x] Create private tab, go to http://google.com, search for 'yumyums', exit private mode, go to http://google.com search box and begin typing 'yumyums' and verify that word is not in the autocomplete list
## Reader Mode
- [x] Visit http://theverge.com, open any article, verify the reader mode icon is shown in the URL bar
- [x] Verify tapping on the reader mode icon opens the article in reader mode
- [x] Edit reader mode settings and open different pages in reader mode and verify if the setting is retained across each article
## History
- [x] On youtube.com, thestar.com (or any other site using push state nav), navigate the site and verify history is added. Also note if the progress bar activates and shows progress
- [x] Settings > Clear Private Data, and clear all. Check history is cleared and none of the favourites are cleared
## Shields Settings
- [x] Enable all switches in settings and visit a site and disable block scripts. Kill and relaunch app and verify if the site shield settings are retained
## Site hacks
- [x] Test https://www.twitch.tv/adobe sub-page loads a video and you can play it
## Downloads
- [x] Test that you can save an image from a site
- [x] Test that you are able to save a gif image
## Fullscreen
- [x] Test that entering HTML5 full screen works. And pressing restore to go back exits full screen. (youtube.com)
## Gestures
- [x] Verify zoom in / out gestures works
- [x] Verify that navigating to a different origin resets the zoom
- [x] Swipe back and forward to navigate, verify this works as expected
## Password Managers
- [x] Test tapping on 1Password on the slide out keyboard launches 1Password App and able to select the stored credentials
- [x] Test tapping on bitwarden password manager in the autofill field launches the app and autofills the stored data
## Browser Lock
- [x] Test enabling browser pin settings asks for pin confirmation followed by reconfirm
- [x] Test swipe up/swip down with browser in focus doesn't ask for pin confirmation
- [x] Test clicking on set pin asks for pin to unlock before setting a new pin
- [x] Remove app from memory and relaunch, enter wrong pin, browser should not be unlocked
- [x] Test cancel fingerprint confirmation shows enter pin window when fingerprint unlock is setup on device
## Sync
- [x] Verify you are able to join sync chain by scanning the QR code
- [x] Verify you are able to join sync chain using code words
- [x] Verify you are able to create a sycn chain on the device and add other devices to the chain via QR code/Code words
- [x] Verify that bookmarks from other devices on the chain show up on the mobile device after sync completes
- [x] Verify newly created bookmarks get sync'd to all devices on the sync chain
- [x] Verify existing bookmarks before joining sync chain also gets sync'd to all devices on the sync chain
- [x] Verify sync works on a upgrade profile and new bookmarks added post upgrade sync's across devices on the chain
- [x] Verify you are able to create a standalone sync chain with one device
## Bravery settings
- [x] Check that HTTPS Everywhere works by loading http://https-everywhere.badssl.com/
- [x] Turning HTTPS Everywhere off or shields off both disable the redirect to https://https-everywhere.badssl.com/
- [x] Check that block ad and unblock ad works on http://slashdot.org
- [x] Check that toggling to blocking and allow ads works as expected
- [x] Test that clicking through a cert error in https://badssl.com/ works
- [x] Test that Safe Browsing works (https://www.raisegame.com/)
- [x] Turning Safe Browsing off and shields off both disable safe browsing for https://www.raisegame.com/
- [x] Enable block script globally from settings, Visit https://brianbondy.com/, nothing should load. Tap on Shields and disable block script, page should load properly
- [x] Test that preferences default Bravery settings take effect on pages with no site settings
- [x] Test that 3rd party storage results are blank at https://jsfiddle.net/7ke9r14a/7/ when 3rd party cookies are blocked
### Fingerprint Tests
- [x] Test that turning on fingerprinting protection in preferences shows 1 fingerprints blocked at https://browserleaks.com/canvas . Test that turning it off in the Bravery menu shows 0 fingerprints blocked
- [x] Test that audio fingerprint is blocked at https://audiofingerprint.openwpm.com/ when fingerprinting protection is on
- [x] Test that https://diafygi.github.io/webrtc-ips/ doesn't leak IP address when `Block all fingerprinting protection` is on
## Content tests
- [x] Go to https://brianbondy.com/ and click on the twitter icon on the top right. Test that context menus work in the new twitter tab
- [x] Load twitter and click on a tweet so the popup div shows. Click to dismiss and repeat with another div. Make sure it shows
- [x] Go to https://trac.torproject.org/projects/tor/login and make sure that the password can be saved. Make sure the saved password is auto-populated when you visit the site again
- [x] Open an email on http://mail.google.com/ or inbox.google.com and click on a link. Make sure it works
- [x] Test that PDF is loaded over https at https://basicattentiontoken.org/BasicAttentionTokenWhitePaper-4.pdf
- [x] Test that PDF is loaded over http at http://www.pdf995.com/samples/pdf.pdf
- [x] Test that https://mixed-script.badssl.com/ shows up as grey not red (no mixed content scripts are run)
- [x] Test that search results from https://startpage.com/ opens in a new tab (due to target being _blank)
## App linker
- [x] Long press on a link in the Twitter app to get the share picker, choose Brave. Verify Brave doesn't crash after opening the link
## Background
- [x] Start loading a page, background the app, wait >5 sec, then bring to front, Verify splash screen is not shown
## Session storage
- [ ] Test that tabs restore when closed, including active tab
| non_priority | manual test run for on ipad pro gen running per release speciality tests unable to navigate inside of a bookmark folder or open a bookmark maximizing video minimizing brave causes number pad to show with video ui unresponsive installer check that installer is close to the size of last release check the brave version in about and make sure it is exactly as expected data make sure that data from the last version appears in the new version ok test that the previous version s cookies are preserved in the next version test that saved passwords are retained upon upgrade verify stats are retained when upgrading from previous version verify per site settings are retained when upgrading from previous version verify sync chain created in previous version is still retained on upgrade bookmarks test that creating a bookmark in the left well works test that clicking a bookmark in the left well loads the bookmark test that deleting a bookmark in the left well works test that creating a bookmark folder works test that creating a bookmark inside the created folder works test that you are able to add a bookmark directly inside a bookmark folder test that you are able to delete a bookmark in edit mode test that you are able to delete a bookmark folder with bookmarks inside test adding a bookmark domain subpaths is retained and you are successfully able to visit the domain subpath in a new tab favourites test editing favourite and chaning url updates the favicons accordingly test that you are able to remove favourites test that you are able to add new favourites from share menu context menus make sure context menu items in the url bar work make sure context menu items on content work with no selected text make sure context menu items on content work with selected text make sure context menu items on content work inside an editable control input textarea or contenteditable context menu verify you can open in background tab and open in private tab find on page verify search box is shown when selected via the share menu test successful find test forward and backward find navigation test failed find shows results private mode create private tab go to search for yumyums exit private mode go to search box and begin typing yumyums and verify that word is not in the autocomplete list reader mode visit open any article verify the reader mode icon is shown in the url bar verify tapping on the reader mode icon opens the article in reader mode edit reader mode settings and open different pages in reader mode and verify if the setting is retained across each article history on youtube com thestar com or any other site using push state nav navigate the site and verify history is added also note if the progress bar activates and shows progress settings clear private data and clear all check history is cleared and none of the favourites are cleared shields settings enable all switches in settings and visit a site and disable block scripts kill and relaunch app and verify if the site shield settings are retained site hacks test sub page loads a video and you can play it downloads test that you can save an image from a site test that you are able to save a gif image fullscreen test that entering full screen works and pressing restore to go back exits full screen youtube com gestures verify zoom in out gestures works verify that navigating to a different origin resets the zoom swipe back and forward to navigate verify this works as expected password managers test tapping on on the slide out keyboard launches app and able to select the stored credentials test tapping on bitwarden password manager in the autofill field launches the app and autofills the stored data browser lock test enabling browser pin settings asks for pin confirmation followed by reconfirm test swipe up swip down with browser in focus doesn t ask for pin confirmation test clicking on set pin asks for pin to unlock before setting a new pin remove app from memory and relaunch enter wrong pin browser should not be unlocked test cancel fingerprint confirmation shows enter pin window when fingerprint unlock is setup on device sync verify you are able to join sync chain by scanning the qr code verify you are able to join sync chain using code words verify you are able to create a sycn chain on the device and add other devices to the chain via qr code code words verify that bookmarks from other devices on the chain show up on the mobile device after sync completes verify newly created bookmarks get sync d to all devices on the sync chain verify existing bookmarks before joining sync chain also gets sync d to all devices on the sync chain verify sync works on a upgrade profile and new bookmarks added post upgrade sync s across devices on the chain verify you are able to create a standalone sync chain with one device bravery settings check that https everywhere works by loading turning https everywhere off or shields off both disable the redirect to check that block ad and unblock ad works on check that toggling to blocking and allow ads works as expected test that clicking through a cert error in works test that safe browsing works turning safe browsing off and shields off both disable safe browsing for enable block script globally from settings visit nothing should load tap on shields and disable block script page should load properly test that preferences default bravery settings take effect on pages with no site settings test that party storage results are blank at when party cookies are blocked fingerprint tests test that turning on fingerprinting protection in preferences shows fingerprints blocked at test that turning it off in the bravery menu shows fingerprints blocked test that audio fingerprint is blocked at when fingerprinting protection is on test that doesn t leak ip address when block all fingerprinting protection is on content tests go to and click on the twitter icon on the top right test that context menus work in the new twitter tab load twitter and click on a tweet so the popup div shows click to dismiss and repeat with another div make sure it shows go to and make sure that the password can be saved make sure the saved password is auto populated when you visit the site again open an email on or inbox google com and click on a link make sure it works test that pdf is loaded over https at test that pdf is loaded over http at test that shows up as grey not red no mixed content scripts are run test that search results from opens in a new tab due to target being blank app linker long press on a link in the twitter app to get the share picker choose brave verify brave doesn t crash after opening the link background start loading a page background the app wait sec then bring to front verify splash screen is not shown session storage test that tabs restore when closed including active tab | 0 |
49,523 | 13,187,226,056 | IssuesEvent | 2020-08-13 02:44:53 | icecube-trac/tix3 | https://api.github.com/repos/icecube-trac/tix3 | opened | Steamshovel does not build as C++11 with clang (Trac #1593) | Incomplete Migration Migrated from Trac combo reconstruction defect | <details>
<summary><em>Migrated from <a href="https://code.icecube.wisc.edu/ticket/1593">https://code.icecube.wisc.edu/ticket/1593</a>, reported by cweaver and owned by cweaver</em></summary>
<p>
```json
{
"status": "closed",
"changetime": "2016-03-18T14:21:45",
"description": "Trying to compile steamshovel with \"Apple LLVM version 7.0.2 (clang-700.1.81)\" or \"clang version 3.9.0 (trunk 263374)\" in C++11 mode yields the an error:\n\n{{{\ncombo/src/steamshovel/private/scripting/qmeta_args.cpp:123:11:\nerror: no matching constructor for initialization of 'QVariant'\n}}}\n\nIt is unclear to me why this error occurs and whether this is a clang bug or a Qt bug, however, it can be worked around by:\n\n{{{\nIndex: private/scripting/qmeta_args.cpp\n===================================================================\n--- private/scripting/qmeta_args.cpp\t(revision 143308)\n+++ private/scripting/qmeta_args.cpp\t(working copy)\n@@ -120,7 +120,9 @@\n void property_write( QMetaProperty p, QObject* q, T value )\n {\n \tlog_trace_stream(\"Writing property \" << p.name() << \" of object \" << q );\n-\tQVariant v( value );\n+\tQVariant v;\n+\tv.setValue(value);\n \tbool success = false;\n \tif( q->thread() == QThread::currentThread() ){\n}}}\n\nI can post a more complete error message if necessary/useful. ",
"reporter": "cweaver",
"cc": "hdembinski",
"resolution": "fixed",
"_ts": "1458310905077210",
"component": "combo reconstruction",
"summary": "Steamshovel does not build as C++11 with clang",
"priority": "normal",
"keywords": "",
"time": "2016-03-18T06:15:01",
"milestone": "",
"owner": "cweaver",
"type": "defect"
}
```
</p>
</details>
| 1.0 | Steamshovel does not build as C++11 with clang (Trac #1593) - <details>
<summary><em>Migrated from <a href="https://code.icecube.wisc.edu/ticket/1593">https://code.icecube.wisc.edu/ticket/1593</a>, reported by cweaver and owned by cweaver</em></summary>
<p>
```json
{
"status": "closed",
"changetime": "2016-03-18T14:21:45",
"description": "Trying to compile steamshovel with \"Apple LLVM version 7.0.2 (clang-700.1.81)\" or \"clang version 3.9.0 (trunk 263374)\" in C++11 mode yields the an error:\n\n{{{\ncombo/src/steamshovel/private/scripting/qmeta_args.cpp:123:11:\nerror: no matching constructor for initialization of 'QVariant'\n}}}\n\nIt is unclear to me why this error occurs and whether this is a clang bug or a Qt bug, however, it can be worked around by:\n\n{{{\nIndex: private/scripting/qmeta_args.cpp\n===================================================================\n--- private/scripting/qmeta_args.cpp\t(revision 143308)\n+++ private/scripting/qmeta_args.cpp\t(working copy)\n@@ -120,7 +120,9 @@\n void property_write( QMetaProperty p, QObject* q, T value )\n {\n \tlog_trace_stream(\"Writing property \" << p.name() << \" of object \" << q );\n-\tQVariant v( value );\n+\tQVariant v;\n+\tv.setValue(value);\n \tbool success = false;\n \tif( q->thread() == QThread::currentThread() ){\n}}}\n\nI can post a more complete error message if necessary/useful. ",
"reporter": "cweaver",
"cc": "hdembinski",
"resolution": "fixed",
"_ts": "1458310905077210",
"component": "combo reconstruction",
"summary": "Steamshovel does not build as C++11 with clang",
"priority": "normal",
"keywords": "",
"time": "2016-03-18T06:15:01",
"milestone": "",
"owner": "cweaver",
"type": "defect"
}
```
</p>
</details>
| non_priority | steamshovel does not build as c with clang trac migrated from json status closed changetime description trying to compile steamshovel with apple llvm version clang or clang version trunk in c mode yields the an error n n ncombo src steamshovel private scripting qmeta args cpp nerror no matching constructor for initialization of qvariant n n nit is unclear to me why this error occurs and whether this is a clang bug or a qt bug however it can be worked around by n n nindex private scripting qmeta args cpp n n private scripting qmeta args cpp t revision n private scripting qmeta args cpp t working copy n n void property write qmetaproperty p qobject q t value n n tlog trace stream writing property thread qthread currentthread n n ni can post a more complete error message if necessary useful reporter cweaver cc hdembinski resolution fixed ts component combo reconstruction summary steamshovel does not build as c with clang priority normal keywords time milestone owner cweaver type defect | 0 |
232,421 | 25,578,598,105 | IssuesEvent | 2022-12-01 01:11:42 | wangsongc/mavonEditor | https://api.github.com/repos/wangsongc/mavonEditor | opened | CVE-2022-38900 (High) detected in decode-uri-component-0.2.0.tgz | security vulnerability | ## CVE-2022-38900 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>decode-uri-component-0.2.0.tgz</b></p></summary>
<p>A better decodeURIComponent</p>
<p>Library home page: <a href="https://registry.npmjs.org/decode-uri-component/-/decode-uri-component-0.2.0.tgz">https://registry.npmjs.org/decode-uri-component/-/decode-uri-component-0.2.0.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/decode-uri-component/package.json</p>
<p>
Dependency Hierarchy:
- vue-jest-3.0.7.tgz (Root Library)
- extract-from-css-0.4.4.tgz
- css-2.2.4.tgz
- source-map-resolve-0.5.3.tgz
- :x: **decode-uri-component-0.2.0.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/wangsongc/mavonEditor/commit/fb5f77da2e6a1abdc8035ddac751a729e7652710">fb5f77da2e6a1abdc8035ddac751a729e7652710</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
decode-uri-component 0.2.0 is vulnerable to Improper Input Validation resulting in DoS.
<p>Publish Date: 2022-11-28
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-38900>CVE-2022-38900</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2022-38900 (High) detected in decode-uri-component-0.2.0.tgz - ## CVE-2022-38900 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>decode-uri-component-0.2.0.tgz</b></p></summary>
<p>A better decodeURIComponent</p>
<p>Library home page: <a href="https://registry.npmjs.org/decode-uri-component/-/decode-uri-component-0.2.0.tgz">https://registry.npmjs.org/decode-uri-component/-/decode-uri-component-0.2.0.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/decode-uri-component/package.json</p>
<p>
Dependency Hierarchy:
- vue-jest-3.0.7.tgz (Root Library)
- extract-from-css-0.4.4.tgz
- css-2.2.4.tgz
- source-map-resolve-0.5.3.tgz
- :x: **decode-uri-component-0.2.0.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/wangsongc/mavonEditor/commit/fb5f77da2e6a1abdc8035ddac751a729e7652710">fb5f77da2e6a1abdc8035ddac751a729e7652710</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
decode-uri-component 0.2.0 is vulnerable to Improper Input Validation resulting in DoS.
<p>Publish Date: 2022-11-28
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-38900>CVE-2022-38900</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve high detected in decode uri component tgz cve high severity vulnerability vulnerable library decode uri component tgz a better decodeuricomponent library home page a href path to dependency file package json path to vulnerable library node modules decode uri component package json dependency hierarchy vue jest tgz root library extract from css tgz css tgz source map resolve tgz x decode uri component tgz vulnerable library found in head commit a href found in base branch master vulnerability details decode uri component is vulnerable to improper input validation resulting in dos publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href step up your open source security game with mend | 0 |
80,932 | 23,340,385,342 | IssuesEvent | 2022-08-09 13:36:14 | CatalaLang/catala | https://api.github.com/repos/CatalaLang/catala | closed | Extract runtime to pip-installable package and add CLI? | ✨ enhancement 🏗️ build system | Looking at the catala repo, I wonder if it would be worth extracting the python runtime (`catala.py`) to a `pip`-installable package (since it's not related to french law) and optionnally provide a generic CLI utility that would let one call a given scope with arguments? (i.e. a generic version of `main.py`)?
Rationale: this would make it easier getting started with using the python backend with arbitrary catala programs by reducing the boilerplate needed to drive the generated code | 1.0 | Extract runtime to pip-installable package and add CLI? - Looking at the catala repo, I wonder if it would be worth extracting the python runtime (`catala.py`) to a `pip`-installable package (since it's not related to french law) and optionnally provide a generic CLI utility that would let one call a given scope with arguments? (i.e. a generic version of `main.py`)?
Rationale: this would make it easier getting started with using the python backend with arbitrary catala programs by reducing the boilerplate needed to drive the generated code | non_priority | extract runtime to pip installable package and add cli looking at the catala repo i wonder if it would be worth extracting the python runtime catala py to a pip installable package since it s not related to french law and optionnally provide a generic cli utility that would let one call a given scope with arguments i e a generic version of main py rationale this would make it easier getting started with using the python backend with arbitrary catala programs by reducing the boilerplate needed to drive the generated code | 0 |
52,458 | 7,763,959,254 | IssuesEvent | 2018-06-01 18:28:19 | CICE-Consortium/CICE | https://api.github.com/repos/CICE-Consortium/CICE | closed | document basalstress scheme and ellipse-related changes | CICEdyn Documentation | We need an overview description of the fast-ice scheme, referencing publication(s), and including full documentation of the new namelist variables. Also describe hwater, bathymetry, and normalization of principal stresses. Remove prs_sig from the namelist index, and add sigP. | 1.0 | document basalstress scheme and ellipse-related changes - We need an overview description of the fast-ice scheme, referencing publication(s), and including full documentation of the new namelist variables. Also describe hwater, bathymetry, and normalization of principal stresses. Remove prs_sig from the namelist index, and add sigP. | non_priority | document basalstress scheme and ellipse related changes we need an overview description of the fast ice scheme referencing publication s and including full documentation of the new namelist variables also describe hwater bathymetry and normalization of principal stresses remove prs sig from the namelist index and add sigp | 0 |
11,775 | 5,082,030,439 | IssuesEvent | 2016-12-29 13:41:56 | opencv/opencv_contrib | https://api.github.com/repos/opencv/opencv_contrib | closed | Opencv3.2 freetype module build failed in macOS10.12 | category: build/install incomplete | - OpenCV => 3.2
- Operating System / Platform => macOS10.12
- Compiler => XCode8.2
- freetype version => 2.7
```
Undefined symbols for architecture x86_64:
"_FT_Done_Face", referenced from:
cv::freetype::FreeType2Impl::~FreeType2Impl() in freetype.o
cv::freetype::FreeType2Impl::loadFontData(cv::String, int) in freetype.o
"_FT_Done_FreeType", referenced from:
cv::freetype::FreeType2Impl::~FreeType2Impl() in freetype.o
"_FT_Init_FreeType", referenced from:
cv::freetype::FreeType2Impl::FreeType2Impl() in freetype.o
cv::freetype::FreeType2Impl::FreeType2Impl() in freetype.o
cv::freetype::createFreeType2() in freetype.o
"_FT_Load_Glyph", referenced from:
cv::freetype::FreeType2Impl::putTextBitmapBlend(cv::_InputOutputArray const&) in freetype.o
cv::freetype::FreeType2Impl::putTextBitmapMono(cv::_InputOutputArray const&) in freetype.o
cv::freetype::FreeType2Impl::putTextOutline(cv::_InputOutputArray const&) in freetype.o
"_FT_New_Face", referenced from:
cv::freetype::FreeType2Impl::loadFontData(cv::String, int) in freetype.o
"_FT_Outline_Decompose", referenced from:
cv::freetype::FreeType2Impl::putTextOutline(cv::_InputOutputArray const&) in freetype.o
"_FT_Outline_Transform", referenced from:
cv::freetype::FreeType2Impl::putTextOutline(cv::_InputOutputArray const&) in freetype.o
"_FT_Outline_Translate", referenced from:
cv::freetype::FreeType2Impl::putTextOutline(cv::_InputOutputArray const&) in freetype.o
"_FT_Render_Glyph", referenced from:
cv::freetype::FreeType2Impl::putTextBitmapBlend(cv::_InputOutputArray const&) in freetype.o
cv::freetype::FreeType2Impl::putTextBitmapMono(cv::_InputOutputArray const&) in freetype.o
"_FT_Set_Pixel_Sizes", referenced from:
cv::freetype::FreeType2Impl::putText(cv::_InputOutputArray const&, cv::String const&, cv::Point_<int>, int, cv::Scalar_<double>, int, int, bool) in freetype.o
"_hb_buffer_add_utf8", referenced from:
cv::freetype::FreeType2Impl::putTextBitmapBlend(cv::_InputOutputArray const&) in freetype.o
cv::freetype::FreeType2Impl::putTextBitmapMono(cv::_InputOutputArray const&) in freetype.o
cv::freetype::FreeType2Impl::putTextOutline(cv::_InputOutputArray const&) in freetype.o
"_hb_buffer_create", referenced from:
cv::freetype::FreeType2Impl::putTextBitmapBlend(cv::_InputOutputArray const&) in freetype.o
cv::freetype::FreeType2Impl::putTextBitmapMono(cv::_InputOutputArray const&) in freetype.o
cv::freetype::FreeType2Impl::putTextOutline(cv::_InputOutputArray const&) in freetype.o
"_hb_buffer_destroy", referenced from:
cv::freetype::FreeType2Impl::putTextBitmapBlend(cv::_InputOutputArray const&) in freetype.o
cv::freetype::FreeType2Impl::putTextBitmapMono(cv::_InputOutputArray const&) in freetype.o
cv::freetype::FreeType2Impl::putTextOutline(cv::_InputOutputArray const&) in freetype.o
"_hb_buffer_get_glyph_infos", referenced from:
cv::freetype::FreeType2Impl::putTextBitmapBlend(cv::_InputOutputArray const&) in freetype.o
cv::freetype::FreeType2Impl::putTextBitmapMono(cv::_InputOutputArray const&) in freetype.o
cv::freetype::FreeType2Impl::putTextOutline(cv::_InputOutputArray const&) in freetype.o
"_hb_buffer_guess_segment_properties", referenced from:
cv::freetype::FreeType2Impl::putTextBitmapBlend(cv::_InputOutputArray const&) in freetype.o
cv::freetype::FreeType2Impl::putTextBitmapMono(cv::_InputOutputArray const&) in freetype.o
cv::freetype::FreeType2Impl::putTextOutline(cv::_InputOutputArray const&) in freetype.o
"_hb_font_destroy", referenced from:
cv::freetype::FreeType2Impl::~FreeType2Impl() in freetype.o
cv::freetype::FreeType2Impl::loadFontData(cv::String, int) in freetype.o
"_hb_ft_font_create", referenced from:
cv::freetype::FreeType2Impl::loadFontData(cv::String, int) in freetype.o
"_hb_shape", referenced from:
cv::freetype::FreeType2Impl::putTextBitmapBlend(cv::_InputOutputArray const&) in freetype.o
cv::freetype::FreeType2Impl::putTextBitmapMono(cv::_InputOutputArray const&) in freetype.o
cv::freetype::FreeType2Impl::putTextOutline(cv::_InputOutputArray const&) in freetype.o
ld: symbol(s) not found for architecture x86_64
clang: error: linker command failed with exit code 1 (use -v to see invocation)
```
| 1.0 | Opencv3.2 freetype module build failed in macOS10.12 - - OpenCV => 3.2
- Operating System / Platform => macOS10.12
- Compiler => XCode8.2
- freetype version => 2.7
```
Undefined symbols for architecture x86_64:
"_FT_Done_Face", referenced from:
cv::freetype::FreeType2Impl::~FreeType2Impl() in freetype.o
cv::freetype::FreeType2Impl::loadFontData(cv::String, int) in freetype.o
"_FT_Done_FreeType", referenced from:
cv::freetype::FreeType2Impl::~FreeType2Impl() in freetype.o
"_FT_Init_FreeType", referenced from:
cv::freetype::FreeType2Impl::FreeType2Impl() in freetype.o
cv::freetype::FreeType2Impl::FreeType2Impl() in freetype.o
cv::freetype::createFreeType2() in freetype.o
"_FT_Load_Glyph", referenced from:
cv::freetype::FreeType2Impl::putTextBitmapBlend(cv::_InputOutputArray const&) in freetype.o
cv::freetype::FreeType2Impl::putTextBitmapMono(cv::_InputOutputArray const&) in freetype.o
cv::freetype::FreeType2Impl::putTextOutline(cv::_InputOutputArray const&) in freetype.o
"_FT_New_Face", referenced from:
cv::freetype::FreeType2Impl::loadFontData(cv::String, int) in freetype.o
"_FT_Outline_Decompose", referenced from:
cv::freetype::FreeType2Impl::putTextOutline(cv::_InputOutputArray const&) in freetype.o
"_FT_Outline_Transform", referenced from:
cv::freetype::FreeType2Impl::putTextOutline(cv::_InputOutputArray const&) in freetype.o
"_FT_Outline_Translate", referenced from:
cv::freetype::FreeType2Impl::putTextOutline(cv::_InputOutputArray const&) in freetype.o
"_FT_Render_Glyph", referenced from:
cv::freetype::FreeType2Impl::putTextBitmapBlend(cv::_InputOutputArray const&) in freetype.o
cv::freetype::FreeType2Impl::putTextBitmapMono(cv::_InputOutputArray const&) in freetype.o
"_FT_Set_Pixel_Sizes", referenced from:
cv::freetype::FreeType2Impl::putText(cv::_InputOutputArray const&, cv::String const&, cv::Point_<int>, int, cv::Scalar_<double>, int, int, bool) in freetype.o
"_hb_buffer_add_utf8", referenced from:
cv::freetype::FreeType2Impl::putTextBitmapBlend(cv::_InputOutputArray const&) in freetype.o
cv::freetype::FreeType2Impl::putTextBitmapMono(cv::_InputOutputArray const&) in freetype.o
cv::freetype::FreeType2Impl::putTextOutline(cv::_InputOutputArray const&) in freetype.o
"_hb_buffer_create", referenced from:
cv::freetype::FreeType2Impl::putTextBitmapBlend(cv::_InputOutputArray const&) in freetype.o
cv::freetype::FreeType2Impl::putTextBitmapMono(cv::_InputOutputArray const&) in freetype.o
cv::freetype::FreeType2Impl::putTextOutline(cv::_InputOutputArray const&) in freetype.o
"_hb_buffer_destroy", referenced from:
cv::freetype::FreeType2Impl::putTextBitmapBlend(cv::_InputOutputArray const&) in freetype.o
cv::freetype::FreeType2Impl::putTextBitmapMono(cv::_InputOutputArray const&) in freetype.o
cv::freetype::FreeType2Impl::putTextOutline(cv::_InputOutputArray const&) in freetype.o
"_hb_buffer_get_glyph_infos", referenced from:
cv::freetype::FreeType2Impl::putTextBitmapBlend(cv::_InputOutputArray const&) in freetype.o
cv::freetype::FreeType2Impl::putTextBitmapMono(cv::_InputOutputArray const&) in freetype.o
cv::freetype::FreeType2Impl::putTextOutline(cv::_InputOutputArray const&) in freetype.o
"_hb_buffer_guess_segment_properties", referenced from:
cv::freetype::FreeType2Impl::putTextBitmapBlend(cv::_InputOutputArray const&) in freetype.o
cv::freetype::FreeType2Impl::putTextBitmapMono(cv::_InputOutputArray const&) in freetype.o
cv::freetype::FreeType2Impl::putTextOutline(cv::_InputOutputArray const&) in freetype.o
"_hb_font_destroy", referenced from:
cv::freetype::FreeType2Impl::~FreeType2Impl() in freetype.o
cv::freetype::FreeType2Impl::loadFontData(cv::String, int) in freetype.o
"_hb_ft_font_create", referenced from:
cv::freetype::FreeType2Impl::loadFontData(cv::String, int) in freetype.o
"_hb_shape", referenced from:
cv::freetype::FreeType2Impl::putTextBitmapBlend(cv::_InputOutputArray const&) in freetype.o
cv::freetype::FreeType2Impl::putTextBitmapMono(cv::_InputOutputArray const&) in freetype.o
cv::freetype::FreeType2Impl::putTextOutline(cv::_InputOutputArray const&) in freetype.o
ld: symbol(s) not found for architecture x86_64
clang: error: linker command failed with exit code 1 (use -v to see invocation)
```
| non_priority | freetype module build failed in opencv operating system platform compiler freetype version undefined symbols for architecture ft done face referenced from cv freetype in freetype o cv freetype loadfontdata cv string int in freetype o ft done freetype referenced from cv freetype in freetype o ft init freetype referenced from cv freetype in freetype o cv freetype in freetype o cv freetype in freetype o ft load glyph referenced from cv freetype puttextbitmapblend cv inputoutputarray const in freetype o cv freetype puttextbitmapmono cv inputoutputarray const in freetype o cv freetype puttextoutline cv inputoutputarray const in freetype o ft new face referenced from cv freetype loadfontdata cv string int in freetype o ft outline decompose referenced from cv freetype puttextoutline cv inputoutputarray const in freetype o ft outline transform referenced from cv freetype puttextoutline cv inputoutputarray const in freetype o ft outline translate referenced from cv freetype puttextoutline cv inputoutputarray const in freetype o ft render glyph referenced from cv freetype puttextbitmapblend cv inputoutputarray const in freetype o cv freetype puttextbitmapmono cv inputoutputarray const in freetype o ft set pixel sizes referenced from cv freetype puttext cv inputoutputarray const cv string const cv point int cv scalar int int bool in freetype o hb buffer add referenced from cv freetype puttextbitmapblend cv inputoutputarray const in freetype o cv freetype puttextbitmapmono cv inputoutputarray const in freetype o cv freetype puttextoutline cv inputoutputarray const in freetype o hb buffer create referenced from cv freetype puttextbitmapblend cv inputoutputarray const in freetype o cv freetype puttextbitmapmono cv inputoutputarray const in freetype o cv freetype puttextoutline cv inputoutputarray const in freetype o hb buffer destroy referenced from cv freetype puttextbitmapblend cv inputoutputarray const in freetype o cv freetype puttextbitmapmono cv inputoutputarray const in freetype o cv freetype puttextoutline cv inputoutputarray const in freetype o hb buffer get glyph infos referenced from cv freetype puttextbitmapblend cv inputoutputarray const in freetype o cv freetype puttextbitmapmono cv inputoutputarray const in freetype o cv freetype puttextoutline cv inputoutputarray const in freetype o hb buffer guess segment properties referenced from cv freetype puttextbitmapblend cv inputoutputarray const in freetype o cv freetype puttextbitmapmono cv inputoutputarray const in freetype o cv freetype puttextoutline cv inputoutputarray const in freetype o hb font destroy referenced from cv freetype in freetype o cv freetype loadfontdata cv string int in freetype o hb ft font create referenced from cv freetype loadfontdata cv string int in freetype o hb shape referenced from cv freetype puttextbitmapblend cv inputoutputarray const in freetype o cv freetype puttextbitmapmono cv inputoutputarray const in freetype o cv freetype puttextoutline cv inputoutputarray const in freetype o ld symbol s not found for architecture clang error linker command failed with exit code use v to see invocation | 0 |
158,983 | 12,441,293,231 | IssuesEvent | 2020-05-26 13:26:57 | mozilla-mobile/fenix | https://api.github.com/repos/mozilla-mobile/fenix | closed | [Bug] Intermittent copyBookmarkURLTest androidx.test.espresso.NoMatchingViewException: No views in hierarchy found matching: (with content description text: is "Menu") | intermittent-test needs:triage 🐞 bug | https://treeherder.mozilla.org/logviewer.html#?job_id=296020928&repo=fenix
androidx.test.espresso.NoMatchingViewException: No views in hierarchy found matching: (with content description text: is "Menu")
View Hierarchy:
+>PopupDecorView{id=-1, visibility=VISIBLE, width=747, height=1428, has-focus=false, has-focusable=true, has-window-focus=true, is-clickable=false, is-enabled=true, is-focused=false, is-focusable=false, is-layout-requested=false, is-selected=false, layout-params={(981,349)(wrapxwrap) gr=TOP START CENTER DISPLAY_CLIP_VERTICAL sim={state=unchanged} ty=APPLICATION_PANEL fmt=TRANSPARENT wanim=0x7f1400fd surfaceInsets=Rect(45, 45 - 45, 45) (manual)
fl=SPLIT_TOUCH HARDWARE_ACCELERATED FLAG_LAYOUT_ATTACHED_IN_DECOR
pfl=WILL_NOT_REPLACE_ON_RELAUNCH LAYOUT_CHILD_WINDOW_IN_PARENT_FRAME}, tag=null, root-is-layout-requested=false, has-input-connection=false, x=0.0, y=0.0, child-count=1}
|
+->PopupBackgroundView{id=-1, visibility=VISIBLE, width=747, height=1428, has-focus=false, has-focusable=true, has-window-focus=true, is-clickable=false, is-enabled=true, is-focused=false, is-focusable=false, is-layout-requested=false, is-selected=false, layout-params=android.widget.FrameLayout$LayoutParams@3cdff41, tag=null, root-is-layout-requested=false, has-input-connection=false, x=0.0, y=0.0, child-count=1}
|
+-->CardView{id=-1, visibility=VISIBLE, width=747, height=1428, has-focus=false, has-focusable=true, has-window-focus=true, is-clickable=false, is-enabled=true, is-focused=false, is-focusable=false, is-layout-requested=false, is-selected=false, layout-params=android.widget.FrameLayout$LayoutParams@fc1ace6, tag=null, root-is-layout-requested=false, has-input-connection=false, x=0.0, y=0.0, child-count=1}
|
+--->RecyclerView{id=2131362491, res-name=mozac_browser_menu_recyclerView, visibility=VISIBLE, width=689, height=1348, has-focus=false, has-focusable=true, has-window-focus=true, is-clickable=false, is-enabled=true, is-focused=false, is-focusable=true, is-layout-requested=false, is-selected=false, layout-params=android.widget.FrameLayout$LayoutParams@808e227, tag=null, root-is-layout-requested=false, has-input-connection=false, x=29.0, y=40.0, child-count=12}
|
+---->LinearLayout{id=-1, visibility=VISIBLE, width=689, height=132, has-focus=false, has-focusable=true, has-window-focus=true, is-clickable=true, is-enabled=true, is-focused=false, is-focusable=true, is-layout-requested=false, is-selected=false, layout-params=androidx.recyclerview.widget.RecyclerView$LayoutParams@1da5cd4, tag=null, root-is-layout-requested=false, has-input-connection=false, x=0.0, y=0.0, child-count=2}
|
+----->AppCompatImageView{id=2131362364, res-name=image, visibility=VISIBLE, width=66, height=66, has-focus=false, has-focusable=false, has-window-focus=true, is-clickable=false, is-enabled=true, is-focused=false, is-focusable=false, is-layout-requested=false, is-selected=false, layout-params=android.widget.LinearLayout$LayoutParams@23a4e7d, tag=null, root-is-layout-requested=false, has-input-connection=false, x=44.0, y=33.0}
|
+----->AppCompatTextView{id=2131362823, res-name=text, visibility=VISIBLE, width=244, height=59, has-focus=false, has-focusable=false, has-window-focus=true, is-clickable=false, is-enabled=true, is-focused=false, is-focusable=false, is-layout-requested=false, is-selected=false, layout-params=android.widget.LinearLayout$LayoutParams@86bb172, tag=null, root-is-layout-requested=false, has-input-connection=false, x=110.0, y=36.0, text=Library, input-type=0, ime-target=false, has-links=false}
|
+---->LinearLayout{id=-1, visibility=VISIBLE, width=689, height=132, has-focus=false, has-focusable=true, has-window-focus=true, is-clickable=true, is-enabled=true, is-focused=false, is-focusable=true, is-layout-requested=false, is-selected=false, layout-params=androidx.recyclerview.widget.RecyclerView$LayoutParams@61779c3, tag=null, root-is-layout-requested=false, has-input-connection=false, x=0.0, y=132.0, child-count=2}
|
+----->AppCompatImageView{id=2131362364, res-name=image, visibility=VISIBLE, width=66, height=66, has-focus=false, has-focusable=false, has-window-focus=true, is-clickable=false, is-enabled=true, is-focused=false, is-focusable=false, is-layout-requested=false, is-selected=false, layout-params=android.widget.LinearLayout$LayoutParams@eea7240, tag=null, root-is-layout-requested=false, has-input-connection=false, x=44.0, y=33.0}
|
+----->AppCompatTextView{id=2131362823, res-name=text, visibility=VISIBLE, width=273, height=59, has-focus=false, has-focusable=false, has-window-focus=true, is-clickable=false, is-enabled=true, is-focused=false, is-focusable=false, is-layout-requested=false, is-selected=false, layout-params=android.widget.LinearLayout$LayoutParams@6225579, tag=null, root-is-layout-requested=false, has-input-connection=false, x=110.0, y=36.0, text=Add-ons, input-type=0, ime-target=false, has-links=false}
|
+---->ConstraintLayout{id=-1, visibility=VISIBLE, width=689, height=132, has-focus=false, has-focusable=true, has-window-focus=true, is-clickable=true, is-enabled=true, is-focused=false, is-focusable=true, is-layout-requested=false, is-selected=false, layout-params=androidx.recyclerview.widget.RecyclerView$LayoutParams@5e9d035, tag=null, root-is-layout-requested=false, has-input-connection=false, x=0.0, y=264.0, child-count=5}
|
+----->AppCompatImageView{id=2131362364, res-name=image, visibility=VISIBLE, width=66, height=66, has-focus=false, has-focusable=false, has-window-focus=true, is-clickable=false, is-enabled=true, is-focused=false, is-focusable=false, is-layout-requested=false, is-selected=false, layout-params=androidx.constraintlayout.widget.ConstraintLayout$LayoutParams@ffbfcca, tag=null, root-is-layout-requested=false, has-input-connection=false, x=44.0, y=33.0}
|
+----->AppCompatImageView{id=2131362562, res-name=notification_dot, visibility=GONE, width=0, height=0, has-focus=false, has-focusable=false, has-window-focus=true, is-clickable=false, is-enabled=true, is-focused=false, is-focusable=false, is-layout-requested=true, is-selected=false, layout-params=androidx.constraintlayout.widget.ConstraintLayout$LayoutParams@38c5e3b, tag=null, root-is-layout-requested=false, has-input-connection=false, x=11.025001, y=-11.025001}
|
+----->AppCompatTextView{id=2131362823, res-name=text, visibility=VISIBLE, width=270, height=59, has-focus=false, has-focusable=false, has-window-focus=true, is-clickable=false, is-enabled=true, is-focused=false, is-focusable=false, is-layout-requested=false, is-selected=false, layout-params=androidx.constraintlayout.widget.ConstraintLayout$LayoutParams@41c4958, tag=null, root-is-layout-requested=false, has-input-connection=false, x=110.0, y=37.0, text=Settings, input-type=0, ime-target=false, has-links=false}
|
+----->AppCompatTextView{id=2131362337, res-name=highlight_text, visibility=INVISIBLE, width=270, height=59, has-focus=false, has-focusable=false, has-window-focus=true, is-clickable=false, is-enabled=true, is-focused=false, is-focusable=false, is-layout-requested=false, is-selected=false, layout-params=androidx.constraintlayout.widget.ConstraintLayout$LayoutParams@743ab1, tag=null, root-is-layout-requested=false, has-input-connection=false, x=110.0, y=37.0, text=Settings, input-type=0, ime-target=false, has-links=false}
|
+----->AppCompatImageView{id=2131362266, res-name=end_image, visibility=GONE, width=0, height=0, has-focus=false, has-focusable=false, has-window-focus=true, is-clickable=false, is-enabled=true, is-focused=false, is-focusable=false, is-layout-requested=true, is-selected=false, layout-params=androidx.constraintlayout.widget.ConstraintLayout$LayoutParams@1451b96, tag=null, root-is-layout-requested=false, has-input-connection=false, x=0.0, y=0.0}
|
+---->View{id=-1, visibility=VISIBLE, width=689, height=3, has-focus=false, has-focusable=false, has-window-focus=true, is-clickable=false, is-enabled=true, is-focused=false, is-focusable=false, is-layout-requested=false, is-selected=false, layout-params=androidx.recyclerview.widget.RecyclerView$LayoutParams@4d8a317, tag=null, root-is-layout-requested=false, has-input-connection=false, x=0.0, y=396.0}
|
+---->LinearLayout{id=-1, visibility=VISIBLE, width=689, height=132, has-focus=false, has-focusable=true, has-window-focus=true, is-clickable=true, is-enabled=true, is-focused=false, is-focusable=true, is-layout-requested=false, is-selected=false, layout-params=androidx.recyclerview.widget.RecyclerView$LayoutParams@cb8a304, tag=null, root-is-layout-requested=false, has-input-connection=false, x=0.0, y=399.0, child-count=2}
|
+----->AppCompatImageView{id=2131362364, res-name=image, visibility=VISIBLE, width=66, height=66, has-focus=false, has-focusable=false, has-window-focus=true, is-clickable=false, is-enabled=true, is-focused=false, is-focusable=false, is-layout-requested=false, is-selected=false, layout-params=android.widget.LinearLayout$LayoutParams@560d0ed, tag=null, root-is-layout-requested=false, has-input-connection=false, x=44.0, y=33.0}
|
+----->AppCompatTextView{id=2131362823, res-name=text, visibility=VISIBLE, width=437, height=59, has-focus=false, has-focusable=false, has-window-focus=true, is-clickable=false, is-enabled=true, is-focused=false, is-focusable=false, is-layout-requested=false, is-selected=false, layout-params=android.widget.LinearLayout$LayoutParams@e2f5b22, tag=null, root-is-layout-requested=false, has-input-connection=false, x=110.0, y=36.0, text=Report site issue, input-type=0, ime-target=false, has-links=false}
|
+---->LinearLayout{id=-1, visibility=VISIBLE, width=689, height=132, has-focus=false, has-focusable=true, has-window-focus=true, is-clickable=true, is-enabled=true, is-focused=false, is-focusable=true, is-layout-requested=false, is-selected=false, layout-params=androidx.recyclerview.widget.RecyclerView$LayoutParams@63a59b3, tag=null, root-is-layout-requested=false, has-input-connection=false, x=0.0, y=531.0, child-count=2}
|
+----->AppCompatImageView{id=2131362364, res-name=image, visibility=VISIBLE, width=66, height=66, has-focus=false, has-focusable=false, has-window-focus=true, is-clickable=false, is-enabled=true, is-focused=false, is-focusable=false, is-layout-requested=false, is-selected=false, layout-params=android.widget.LinearLayout$LayoutParams@19eeb70, tag=null, root-is-layout-requested=false, has-input-connection=false, x=44.0, y=33.0}
|
+----->AppCompatTextView{id=2131362823, res-name=text, visibility=VISIBLE, width=348, height=59, has-focus=false, has-focusable=false, has-window-focus=true, is-clickable=false, is-enabled=true, is-focused=false, is-focusable=false, is-layout-requested=false, is-selected=false, layout-params=android.widget.LinearLayout$LayoutParams@5068ee9, tag=null, root-is-layout-requested=false, has-input-connection=false, x=110.0, y=36.0, text=Find in page, input-type=0, ime-target=false, has-links=false}
|
+---->LinearLayout{id=-1, visibility=VISIBLE, width=689, height=132, has-focus=false, has-focusable=true, has-window-focus=true, is-clickable=true, is-enabled=true, is-focused=false, is-focusable=true, is-layout-requested=false, is-selected=false, layout-params=androidx.recyclerview.widget.RecyclerView$LayoutParams@48c076e, tag=null, root-is-layout-requested=false, has-input-connection=false, x=0.0, y=663.0, child-count=2}
|
+----->AppCompatImageView{id=2131362364, res-name=image, visibility=VISIBLE, width=66, height=66, has-focus=false, has-focusable=false, has-window-focus=true, is-clickable=false, is-enabled=true, is-focused=false, is-focusable=false, is-layout-requested=false, is-selected=false, layout-params=android.widget.LinearLayout$LayoutParams@6f6de0f, tag=null, root-is-layout-requested=false, has-input-connection=false, x=44.0, y=33.0}
|
+----->AppCompatTextView{id=2131362823, res-name=text, visibility=VISIBLE, width=419, height=59, has-focus=false, has-focusable=false, has-window-focus=true, is-clickable=false, is-enabled=true, is-focused=false, is-focusable=false, is-layout-requested=false, is-selected=false, layout-params=android.widget.LinearLayout$LayoutParams@d5f4e9c, tag=null, root-is-layout-requested=false, has-input-connection=false, x=110.0, y=36.0, text=Add to top sites, input-type=0, ime-target=false, has-links=false}
|
+---->ConstraintLayout{id=-1, visibility=VISIBLE, width=689, height=132, has-focus=false, has-focusable=true, has-window-focus=true, is-clickable=true, is-enabled=true, is-focused=false, is-focusable=true, is-layout-requested=false, is-selected=false, layout-params=androidx.recyclerview.widget.RecyclerView$LayoutParams@160b888, tag=null, root-is-layout-requested=false, has-input-connection=false, x=0.0, y=795.0, child-count=5}
|
+----->AppCompatImageView{id=2131362364, res-name=image, visibility=VISIBLE, width=66, height=66, has-focus=false, has-focusable=false, has-window-focus=true, is-clickable=false, is-enabled=true, is-focused=false, is-focusable=false, is-layout-requested=false, is-selected=false, layout-params=androidx.constraintlayout.widget.ConstraintLayout$LayoutParams@f983221, tag=null, root-is-layout-requested=false, has-input-connection=false, x=44.0, y=33.0}
|
+----->AppCompatImageView{id=2131362562, res-name=notification_dot, visibility=GONE, width=0, height=0, has-focus=false, has-focusable=false, has-window-focus=true, is-clickable=false, is-enabled=true, is-focused=false, is-focusable=false, is-layout-requested=true, is-selected=false, layout-params=androidx.constraintlayout.widget.ConstraintLayout$LayoutParams@9999646, tag=null, root-is-layout-requested=false, has-input-connection=false, x=11.025001, y=-11.025001}
|
+----->AppCompatTextView{id=2131362823, res-name=text, visibility=VISIBLE, width=510, height=59, has-focus=false, has-focusable=false, has-window-focus=true, is-clickable=false, is-enabled=true, is-focused=false, is-focusable=false, is-layout-requested=false, is-selected=false, layout-params=androidx.constraintlayout.widget.ConstraintLayout$LayoutParams@2528007, tag=null, root-is-layout-requested=false, has-input-connection=false, x=110.0, y=37.0, text=Add to Home screen, input-type=0, ime-target=false, has-links=false}
|
+----->AppCompatTextView{id=2131362337, res-name=highlight_text, visibility=INVISIBLE, width=229, height=59, has-focus=false, has-focusable=false, has-window-focus=true, is-clickable=false, is-enabled=true, is-focused=false, is-focusable=false, is-layout-requested=false, is-selected=false, layout-params=androidx.constraintlayout.widget.ConstraintLayout$LayoutParams@c8cd534, tag=null, root-is-layout-requested=false, has-input-connection=false, x=110.0, y=37.0, text=Install, input-type=0, ime-target=false, has-links=false}
|
+----->AppCompatImageView{id=2131362266, res-name=end_image, visibility=GONE, width=0, height=0, has-focus=false, has-focusable=false, has-window-focus=true, is-clickable=false, is-enabled=true, is-focused=false, is-focusable=false, is-layout-requested=true, is-selected=false, layout-params=androidx.constraintlayout.widget.ConstraintLayout$LayoutParams@b24cf5d, tag=null, root-is-layout-requested=false, has-input-connection=false, x=0.0, y=0.0}
|
+---->LinearLayout{id=-1, visibility=VISIBLE, width=689, height=132, has-focus=false, has-focusable=true, has-window-focus=true, is-clickable=true, is-enabled=true, is-focused=false, is-focusable=true, is-layout-requested=false, is-selected=false, layout-params=androidx.recyclerview.widget.RecyclerView$LayoutParams@4c8d0d2, tag=null, root-is-layout-requested=false, has-input-connection=false, x=0.0, y=927.0, child-count=2}
|
+----->AppCompatImageView{id=2131362364, res-name=image, visibility=VISIBLE, width=66, height=66, has-focus=false, has-focusable=false, has-window-focus=true, is-clickable=false, is-enabled=true, is-focused=false, is-focusable=false, is-layout-requested=false, is-selected=false, layout-params=android.widget.LinearLayout$LayoutParams@d8d15a3, tag=null, root-is-layout-requested=false, has-input-connection=false, x=44.0, y=33.0}
|
+----->AppCompatTextView{id=2131362823, res-name=text, visibility=VISIBLE, width=455, height=59, has-focus=false, has-focusable=false, has-window-focus=true, is-clickable=false, is-enabled=true, is-focused=false, is-focusable=false, is-layout-requested=false, is-selected=false, layout-params=android.widget.LinearLayout$LayoutParams@bc10a0, tag=null, root-is-layout-requested=false, has-input-connection=false, x=110.0, y=36.0, text=Save to collection, input-type=0, ime-target=false, has-links=false}
|
+---->LinearLayout{id=-1, visibility=VISIBLE, width=689, height=132, has-focus=false, has-focusable=true, has-window-focus=true, is-clickable=true, is-enabled=true, is-focused=false, is-focusable=true, is-layout-requested=false, is-selected=false, layout-params=androidx.recyclerview.widget.RecyclerView$LayoutParams@8e40459, tag=null, root-is-layout-requested=false, has-input-connection=false, x=0.0, y=1059.0, child-count=2}
|
+----->AppCompatImageView{id=2131362364, res-name=image, visibility=VISIBLE, width=66, height=66, has-focus=false, has-focusable=false, has-window-focus=true, is-clickable=false, is-enabled=true, is-focused=false, is-focusable=false, is-layout-requested=false, is-selected=false, layout-params=android.widget.LinearLayout$LayoutParams@83f281e, tag=null, root-is-layout-requested=false, has-input-connection=false, x=44.0, y=33.0}
|
+----->SwitchCompat{id=2131362805, res-name=switch_widget, visibility=VISIBLE, width=535, height=132, has-focus=false, has-focusable=true, has-window-focus=true, is-clickable=true, is-enabled=true, is-focused=false, is-focusable=true, is-layout-requested=false, is-selected=false, layout-params=android.widget.LinearLayout$LayoutParams@65168ff, tag=null, root-is-layout-requested=false, has-input-connection=false, x=110.0, y=0.0, text=Desktop site, input-type=0, ime-target=false, has-links=false, is-checked=false}
|
+---->View{id=-1, visibility=VISIBLE, width=689, height=3, has-focus=false, has-focusable=false, has-window-focus=true, is-clickable=false, is-enabled=true, is-focused=false, is-focusable=false, is-layout-requested=false, is-selected=false, layout-params=androidx.recyclerview.widget.RecyclerView$LayoutParams@2e196cc, tag=null, root-is-layout-requested=false, has-input-connection=false, x=0.0, y=1191.0}
|
+---->LinearLayout{id=-1, visibility=VISIBLE, width=689, height=154, has-focus=false, has-focusable=true, has-window-focus=true, is-clickable=false, is-enabled=true, is-focused=false, is-focusable=false, is-layout-requested=false, is-selected=false, layout-params=androidx.recyclerview.widget.RecyclerView$LayoutParams@3c78d15, tag=null, root-is-layout-requested=false, has-input-connection=false, x=0.0, y=1194.0, child-count=4}
|
+----->AppCompatImageButton{id=-1, desc=Bookmark, visibility=VISIBLE, width=172, height=66, has-focus=false, has-focusable=true, has-window-focus=true, is-clickable=true, is-enabled=true, is-focused=false, is-focusable=true, is-layout-requested=false, is-selected=false, layout-params=android.widget.LinearLayout$LayoutParams@c31a82a, tag=null, root-is-layout-requested=false, has-input-connection=false, x=0.0, y=44.0}
|
+----->AppCompatImageButton{id=-1, desc=Share, visibility=VISIBLE, width=172, height=66, has-focus=false, has-focusable=true, has-window-focus=true, is-clickable=true, is-enabled=true, is-focused=false, is-focusable=true, is-layout-requested=false, is-selected=false, layout-params=android.widget.LinearLayout$LayoutParams@cdd961b, tag=null, root-is-layout-requested=false, has-input-connection=false, x=172.0, y=44.0}
|
+----->AppCompatImageButton{id=-1, desc=Forward, visibility=VISIBLE, width=172, height=66, has-focus=false, has-focusable=false, has-window-focus=true, is-clickable=true, is-enabled=false, is-focused=false, is-focusable=true, is-layout-requested=false, is-selected=false, layout-params=android.widget.LinearLayout$LayoutParams@1f753b8, tag=null, root-is-layout-requested=false, has-input-connection=false, x=344.0, y=44.0}
|
+----->AppCompatImageButton{id=-1, desc=Refresh, visibility=VISIBLE, width=173, height=66, has-focus=false, has-focusable=true, has-window-focus=true, is-clickable=true, is-enabled=true, is-focused=false, is-focusable=true, is-layout-requested=false, is-selected=false, layout-params=android.widget.LinearLayout$LayoutParams@a20e591, tag=null, root-is-layout-requested=false, has-input-connection=false, x=516.0, y=44.0}
|
at dalvik.system.VMStack.getThreadStackTrace(Native Method)
at java.lang.Thread.getStackTrace(Thread.java:1538)
at androidx.test.espresso.base.DefaultFailureHandler.getUserFriendlyError(DefaultFailureHandler.java:16)
at androidx.test.espresso.base.DefaultFailureHandler.handle(DefaultFailureHandler.java:36)
at androidx.test.espresso.ViewInteraction.waitForAndHandleInteractionResults(ViewInteraction.java:106)
at androidx.test.espresso.ViewInteraction.desugaredPerform(ViewInteraction.java:43)
at androidx.test.espresso.ViewInteraction.perform(ViewInteraction.java:94)
at org.mozilla.fenix.ui.robots.BrowserRobot$Transition.openThreeDotMenu(BrowserRobot.kt:331)
at org.mozilla.fenix.ui.BookmarksTest.copyBookmarkURLTest(BookmarksTest.kt:152)
at java.lang.reflect.Method.invoke(Native Method)
at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50)
at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47)
at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17)
at androidx.test.internal.runner.junit4.statement.RunBefores.evaluate(RunBefores.java:80)
at androidx.test.internal.runner.junit4.statement.RunAfters.evaluate(RunAfters.java:61)
at androidx.test.rule.ActivityTestRule$ActivityStatement.evaluate(ActivityTestRule.java:531)
at org.junit.rules.RunRules.evaluate(RunRules.java:20)
at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:325)
at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:78)
at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:57)
at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290)
at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71)
at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288)
at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58)
at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268)
at org.junit.runners.ParentRunner.run(ParentRunner.java:363)
at org.junit.runners.Suite.runChild(Suite.java:128)
at org.junit.runners.Suite.runChild(Suite.java:27)
at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290)
at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71)
at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288)
at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58)
at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268)
at org.junit.runners.ParentRunner.run(ParentRunner.java:363)
at org.junit.runner.JUnitCore.run(JUnitCore.java:137)
at org.junit.runner.JUnitCore.run(JUnitCore.java:115)
at androidx.test.internal.runner.TestExecutor.execute(TestExecutor.java:56)
at androidx.test.runner.AndroidJUnitRunner.onStart(AndroidJUnitRunner.java:395)
at android.app.Instrumentation$InstrumentationThread.run(Instrumentation.java:2145)
| 1.0 | [Bug] Intermittent copyBookmarkURLTest androidx.test.espresso.NoMatchingViewException: No views in hierarchy found matching: (with content description text: is "Menu") - https://treeherder.mozilla.org/logviewer.html#?job_id=296020928&repo=fenix
androidx.test.espresso.NoMatchingViewException: No views in hierarchy found matching: (with content description text: is "Menu")
View Hierarchy:
+>PopupDecorView{id=-1, visibility=VISIBLE, width=747, height=1428, has-focus=false, has-focusable=true, has-window-focus=true, is-clickable=false, is-enabled=true, is-focused=false, is-focusable=false, is-layout-requested=false, is-selected=false, layout-params={(981,349)(wrapxwrap) gr=TOP START CENTER DISPLAY_CLIP_VERTICAL sim={state=unchanged} ty=APPLICATION_PANEL fmt=TRANSPARENT wanim=0x7f1400fd surfaceInsets=Rect(45, 45 - 45, 45) (manual)
fl=SPLIT_TOUCH HARDWARE_ACCELERATED FLAG_LAYOUT_ATTACHED_IN_DECOR
pfl=WILL_NOT_REPLACE_ON_RELAUNCH LAYOUT_CHILD_WINDOW_IN_PARENT_FRAME}, tag=null, root-is-layout-requested=false, has-input-connection=false, x=0.0, y=0.0, child-count=1}
|
+->PopupBackgroundView{id=-1, visibility=VISIBLE, width=747, height=1428, has-focus=false, has-focusable=true, has-window-focus=true, is-clickable=false, is-enabled=true, is-focused=false, is-focusable=false, is-layout-requested=false, is-selected=false, layout-params=android.widget.FrameLayout$LayoutParams@3cdff41, tag=null, root-is-layout-requested=false, has-input-connection=false, x=0.0, y=0.0, child-count=1}
|
+-->CardView{id=-1, visibility=VISIBLE, width=747, height=1428, has-focus=false, has-focusable=true, has-window-focus=true, is-clickable=false, is-enabled=true, is-focused=false, is-focusable=false, is-layout-requested=false, is-selected=false, layout-params=android.widget.FrameLayout$LayoutParams@fc1ace6, tag=null, root-is-layout-requested=false, has-input-connection=false, x=0.0, y=0.0, child-count=1}
|
+--->RecyclerView{id=2131362491, res-name=mozac_browser_menu_recyclerView, visibility=VISIBLE, width=689, height=1348, has-focus=false, has-focusable=true, has-window-focus=true, is-clickable=false, is-enabled=true, is-focused=false, is-focusable=true, is-layout-requested=false, is-selected=false, layout-params=android.widget.FrameLayout$LayoutParams@808e227, tag=null, root-is-layout-requested=false, has-input-connection=false, x=29.0, y=40.0, child-count=12}
|
+---->LinearLayout{id=-1, visibility=VISIBLE, width=689, height=132, has-focus=false, has-focusable=true, has-window-focus=true, is-clickable=true, is-enabled=true, is-focused=false, is-focusable=true, is-layout-requested=false, is-selected=false, layout-params=androidx.recyclerview.widget.RecyclerView$LayoutParams@1da5cd4, tag=null, root-is-layout-requested=false, has-input-connection=false, x=0.0, y=0.0, child-count=2}
|
+----->AppCompatImageView{id=2131362364, res-name=image, visibility=VISIBLE, width=66, height=66, has-focus=false, has-focusable=false, has-window-focus=true, is-clickable=false, is-enabled=true, is-focused=false, is-focusable=false, is-layout-requested=false, is-selected=false, layout-params=android.widget.LinearLayout$LayoutParams@23a4e7d, tag=null, root-is-layout-requested=false, has-input-connection=false, x=44.0, y=33.0}
|
+----->AppCompatTextView{id=2131362823, res-name=text, visibility=VISIBLE, width=244, height=59, has-focus=false, has-focusable=false, has-window-focus=true, is-clickable=false, is-enabled=true, is-focused=false, is-focusable=false, is-layout-requested=false, is-selected=false, layout-params=android.widget.LinearLayout$LayoutParams@86bb172, tag=null, root-is-layout-requested=false, has-input-connection=false, x=110.0, y=36.0, text=Library, input-type=0, ime-target=false, has-links=false}
|
+---->LinearLayout{id=-1, visibility=VISIBLE, width=689, height=132, has-focus=false, has-focusable=true, has-window-focus=true, is-clickable=true, is-enabled=true, is-focused=false, is-focusable=true, is-layout-requested=false, is-selected=false, layout-params=androidx.recyclerview.widget.RecyclerView$LayoutParams@61779c3, tag=null, root-is-layout-requested=false, has-input-connection=false, x=0.0, y=132.0, child-count=2}
|
+----->AppCompatImageView{id=2131362364, res-name=image, visibility=VISIBLE, width=66, height=66, has-focus=false, has-focusable=false, has-window-focus=true, is-clickable=false, is-enabled=true, is-focused=false, is-focusable=false, is-layout-requested=false, is-selected=false, layout-params=android.widget.LinearLayout$LayoutParams@eea7240, tag=null, root-is-layout-requested=false, has-input-connection=false, x=44.0, y=33.0}
|
+----->AppCompatTextView{id=2131362823, res-name=text, visibility=VISIBLE, width=273, height=59, has-focus=false, has-focusable=false, has-window-focus=true, is-clickable=false, is-enabled=true, is-focused=false, is-focusable=false, is-layout-requested=false, is-selected=false, layout-params=android.widget.LinearLayout$LayoutParams@6225579, tag=null, root-is-layout-requested=false, has-input-connection=false, x=110.0, y=36.0, text=Add-ons, input-type=0, ime-target=false, has-links=false}
|
+---->ConstraintLayout{id=-1, visibility=VISIBLE, width=689, height=132, has-focus=false, has-focusable=true, has-window-focus=true, is-clickable=true, is-enabled=true, is-focused=false, is-focusable=true, is-layout-requested=false, is-selected=false, layout-params=androidx.recyclerview.widget.RecyclerView$LayoutParams@5e9d035, tag=null, root-is-layout-requested=false, has-input-connection=false, x=0.0, y=264.0, child-count=5}
|
+----->AppCompatImageView{id=2131362364, res-name=image, visibility=VISIBLE, width=66, height=66, has-focus=false, has-focusable=false, has-window-focus=true, is-clickable=false, is-enabled=true, is-focused=false, is-focusable=false, is-layout-requested=false, is-selected=false, layout-params=androidx.constraintlayout.widget.ConstraintLayout$LayoutParams@ffbfcca, tag=null, root-is-layout-requested=false, has-input-connection=false, x=44.0, y=33.0}
|
+----->AppCompatImageView{id=2131362562, res-name=notification_dot, visibility=GONE, width=0, height=0, has-focus=false, has-focusable=false, has-window-focus=true, is-clickable=false, is-enabled=true, is-focused=false, is-focusable=false, is-layout-requested=true, is-selected=false, layout-params=androidx.constraintlayout.widget.ConstraintLayout$LayoutParams@38c5e3b, tag=null, root-is-layout-requested=false, has-input-connection=false, x=11.025001, y=-11.025001}
|
+----->AppCompatTextView{id=2131362823, res-name=text, visibility=VISIBLE, width=270, height=59, has-focus=false, has-focusable=false, has-window-focus=true, is-clickable=false, is-enabled=true, is-focused=false, is-focusable=false, is-layout-requested=false, is-selected=false, layout-params=androidx.constraintlayout.widget.ConstraintLayout$LayoutParams@41c4958, tag=null, root-is-layout-requested=false, has-input-connection=false, x=110.0, y=37.0, text=Settings, input-type=0, ime-target=false, has-links=false}
|
+----->AppCompatTextView{id=2131362337, res-name=highlight_text, visibility=INVISIBLE, width=270, height=59, has-focus=false, has-focusable=false, has-window-focus=true, is-clickable=false, is-enabled=true, is-focused=false, is-focusable=false, is-layout-requested=false, is-selected=false, layout-params=androidx.constraintlayout.widget.ConstraintLayout$LayoutParams@743ab1, tag=null, root-is-layout-requested=false, has-input-connection=false, x=110.0, y=37.0, text=Settings, input-type=0, ime-target=false, has-links=false}
|
+----->AppCompatImageView{id=2131362266, res-name=end_image, visibility=GONE, width=0, height=0, has-focus=false, has-focusable=false, has-window-focus=true, is-clickable=false, is-enabled=true, is-focused=false, is-focusable=false, is-layout-requested=true, is-selected=false, layout-params=androidx.constraintlayout.widget.ConstraintLayout$LayoutParams@1451b96, tag=null, root-is-layout-requested=false, has-input-connection=false, x=0.0, y=0.0}
|
+---->View{id=-1, visibility=VISIBLE, width=689, height=3, has-focus=false, has-focusable=false, has-window-focus=true, is-clickable=false, is-enabled=true, is-focused=false, is-focusable=false, is-layout-requested=false, is-selected=false, layout-params=androidx.recyclerview.widget.RecyclerView$LayoutParams@4d8a317, tag=null, root-is-layout-requested=false, has-input-connection=false, x=0.0, y=396.0}
|
+---->LinearLayout{id=-1, visibility=VISIBLE, width=689, height=132, has-focus=false, has-focusable=true, has-window-focus=true, is-clickable=true, is-enabled=true, is-focused=false, is-focusable=true, is-layout-requested=false, is-selected=false, layout-params=androidx.recyclerview.widget.RecyclerView$LayoutParams@cb8a304, tag=null, root-is-layout-requested=false, has-input-connection=false, x=0.0, y=399.0, child-count=2}
|
+----->AppCompatImageView{id=2131362364, res-name=image, visibility=VISIBLE, width=66, height=66, has-focus=false, has-focusable=false, has-window-focus=true, is-clickable=false, is-enabled=true, is-focused=false, is-focusable=false, is-layout-requested=false, is-selected=false, layout-params=android.widget.LinearLayout$LayoutParams@560d0ed, tag=null, root-is-layout-requested=false, has-input-connection=false, x=44.0, y=33.0}
|
+----->AppCompatTextView{id=2131362823, res-name=text, visibility=VISIBLE, width=437, height=59, has-focus=false, has-focusable=false, has-window-focus=true, is-clickable=false, is-enabled=true, is-focused=false, is-focusable=false, is-layout-requested=false, is-selected=false, layout-params=android.widget.LinearLayout$LayoutParams@e2f5b22, tag=null, root-is-layout-requested=false, has-input-connection=false, x=110.0, y=36.0, text=Report site issue, input-type=0, ime-target=false, has-links=false}
|
+---->LinearLayout{id=-1, visibility=VISIBLE, width=689, height=132, has-focus=false, has-focusable=true, has-window-focus=true, is-clickable=true, is-enabled=true, is-focused=false, is-focusable=true, is-layout-requested=false, is-selected=false, layout-params=androidx.recyclerview.widget.RecyclerView$LayoutParams@63a59b3, tag=null, root-is-layout-requested=false, has-input-connection=false, x=0.0, y=531.0, child-count=2}
|
+----->AppCompatImageView{id=2131362364, res-name=image, visibility=VISIBLE, width=66, height=66, has-focus=false, has-focusable=false, has-window-focus=true, is-clickable=false, is-enabled=true, is-focused=false, is-focusable=false, is-layout-requested=false, is-selected=false, layout-params=android.widget.LinearLayout$LayoutParams@19eeb70, tag=null, root-is-layout-requested=false, has-input-connection=false, x=44.0, y=33.0}
|
+----->AppCompatTextView{id=2131362823, res-name=text, visibility=VISIBLE, width=348, height=59, has-focus=false, has-focusable=false, has-window-focus=true, is-clickable=false, is-enabled=true, is-focused=false, is-focusable=false, is-layout-requested=false, is-selected=false, layout-params=android.widget.LinearLayout$LayoutParams@5068ee9, tag=null, root-is-layout-requested=false, has-input-connection=false, x=110.0, y=36.0, text=Find in page, input-type=0, ime-target=false, has-links=false}
|
+---->LinearLayout{id=-1, visibility=VISIBLE, width=689, height=132, has-focus=false, has-focusable=true, has-window-focus=true, is-clickable=true, is-enabled=true, is-focused=false, is-focusable=true, is-layout-requested=false, is-selected=false, layout-params=androidx.recyclerview.widget.RecyclerView$LayoutParams@48c076e, tag=null, root-is-layout-requested=false, has-input-connection=false, x=0.0, y=663.0, child-count=2}
|
+----->AppCompatImageView{id=2131362364, res-name=image, visibility=VISIBLE, width=66, height=66, has-focus=false, has-focusable=false, has-window-focus=true, is-clickable=false, is-enabled=true, is-focused=false, is-focusable=false, is-layout-requested=false, is-selected=false, layout-params=android.widget.LinearLayout$LayoutParams@6f6de0f, tag=null, root-is-layout-requested=false, has-input-connection=false, x=44.0, y=33.0}
|
+----->AppCompatTextView{id=2131362823, res-name=text, visibility=VISIBLE, width=419, height=59, has-focus=false, has-focusable=false, has-window-focus=true, is-clickable=false, is-enabled=true, is-focused=false, is-focusable=false, is-layout-requested=false, is-selected=false, layout-params=android.widget.LinearLayout$LayoutParams@d5f4e9c, tag=null, root-is-layout-requested=false, has-input-connection=false, x=110.0, y=36.0, text=Add to top sites, input-type=0, ime-target=false, has-links=false}
|
+---->ConstraintLayout{id=-1, visibility=VISIBLE, width=689, height=132, has-focus=false, has-focusable=true, has-window-focus=true, is-clickable=true, is-enabled=true, is-focused=false, is-focusable=true, is-layout-requested=false, is-selected=false, layout-params=androidx.recyclerview.widget.RecyclerView$LayoutParams@160b888, tag=null, root-is-layout-requested=false, has-input-connection=false, x=0.0, y=795.0, child-count=5}
|
+----->AppCompatImageView{id=2131362364, res-name=image, visibility=VISIBLE, width=66, height=66, has-focus=false, has-focusable=false, has-window-focus=true, is-clickable=false, is-enabled=true, is-focused=false, is-focusable=false, is-layout-requested=false, is-selected=false, layout-params=androidx.constraintlayout.widget.ConstraintLayout$LayoutParams@f983221, tag=null, root-is-layout-requested=false, has-input-connection=false, x=44.0, y=33.0}
|
+----->AppCompatImageView{id=2131362562, res-name=notification_dot, visibility=GONE, width=0, height=0, has-focus=false, has-focusable=false, has-window-focus=true, is-clickable=false, is-enabled=true, is-focused=false, is-focusable=false, is-layout-requested=true, is-selected=false, layout-params=androidx.constraintlayout.widget.ConstraintLayout$LayoutParams@9999646, tag=null, root-is-layout-requested=false, has-input-connection=false, x=11.025001, y=-11.025001}
|
+----->AppCompatTextView{id=2131362823, res-name=text, visibility=VISIBLE, width=510, height=59, has-focus=false, has-focusable=false, has-window-focus=true, is-clickable=false, is-enabled=true, is-focused=false, is-focusable=false, is-layout-requested=false, is-selected=false, layout-params=androidx.constraintlayout.widget.ConstraintLayout$LayoutParams@2528007, tag=null, root-is-layout-requested=false, has-input-connection=false, x=110.0, y=37.0, text=Add to Home screen, input-type=0, ime-target=false, has-links=false}
|
+----->AppCompatTextView{id=2131362337, res-name=highlight_text, visibility=INVISIBLE, width=229, height=59, has-focus=false, has-focusable=false, has-window-focus=true, is-clickable=false, is-enabled=true, is-focused=false, is-focusable=false, is-layout-requested=false, is-selected=false, layout-params=androidx.constraintlayout.widget.ConstraintLayout$LayoutParams@c8cd534, tag=null, root-is-layout-requested=false, has-input-connection=false, x=110.0, y=37.0, text=Install, input-type=0, ime-target=false, has-links=false}
|
+----->AppCompatImageView{id=2131362266, res-name=end_image, visibility=GONE, width=0, height=0, has-focus=false, has-focusable=false, has-window-focus=true, is-clickable=false, is-enabled=true, is-focused=false, is-focusable=false, is-layout-requested=true, is-selected=false, layout-params=androidx.constraintlayout.widget.ConstraintLayout$LayoutParams@b24cf5d, tag=null, root-is-layout-requested=false, has-input-connection=false, x=0.0, y=0.0}
|
+---->LinearLayout{id=-1, visibility=VISIBLE, width=689, height=132, has-focus=false, has-focusable=true, has-window-focus=true, is-clickable=true, is-enabled=true, is-focused=false, is-focusable=true, is-layout-requested=false, is-selected=false, layout-params=androidx.recyclerview.widget.RecyclerView$LayoutParams@4c8d0d2, tag=null, root-is-layout-requested=false, has-input-connection=false, x=0.0, y=927.0, child-count=2}
|
+----->AppCompatImageView{id=2131362364, res-name=image, visibility=VISIBLE, width=66, height=66, has-focus=false, has-focusable=false, has-window-focus=true, is-clickable=false, is-enabled=true, is-focused=false, is-focusable=false, is-layout-requested=false, is-selected=false, layout-params=android.widget.LinearLayout$LayoutParams@d8d15a3, tag=null, root-is-layout-requested=false, has-input-connection=false, x=44.0, y=33.0}
|
+----->AppCompatTextView{id=2131362823, res-name=text, visibility=VISIBLE, width=455, height=59, has-focus=false, has-focusable=false, has-window-focus=true, is-clickable=false, is-enabled=true, is-focused=false, is-focusable=false, is-layout-requested=false, is-selected=false, layout-params=android.widget.LinearLayout$LayoutParams@bc10a0, tag=null, root-is-layout-requested=false, has-input-connection=false, x=110.0, y=36.0, text=Save to collection, input-type=0, ime-target=false, has-links=false}
|
+---->LinearLayout{id=-1, visibility=VISIBLE, width=689, height=132, has-focus=false, has-focusable=true, has-window-focus=true, is-clickable=true, is-enabled=true, is-focused=false, is-focusable=true, is-layout-requested=false, is-selected=false, layout-params=androidx.recyclerview.widget.RecyclerView$LayoutParams@8e40459, tag=null, root-is-layout-requested=false, has-input-connection=false, x=0.0, y=1059.0, child-count=2}
|
+----->AppCompatImageView{id=2131362364, res-name=image, visibility=VISIBLE, width=66, height=66, has-focus=false, has-focusable=false, has-window-focus=true, is-clickable=false, is-enabled=true, is-focused=false, is-focusable=false, is-layout-requested=false, is-selected=false, layout-params=android.widget.LinearLayout$LayoutParams@83f281e, tag=null, root-is-layout-requested=false, has-input-connection=false, x=44.0, y=33.0}
|
+----->SwitchCompat{id=2131362805, res-name=switch_widget, visibility=VISIBLE, width=535, height=132, has-focus=false, has-focusable=true, has-window-focus=true, is-clickable=true, is-enabled=true, is-focused=false, is-focusable=true, is-layout-requested=false, is-selected=false, layout-params=android.widget.LinearLayout$LayoutParams@65168ff, tag=null, root-is-layout-requested=false, has-input-connection=false, x=110.0, y=0.0, text=Desktop site, input-type=0, ime-target=false, has-links=false, is-checked=false}
|
+---->View{id=-1, visibility=VISIBLE, width=689, height=3, has-focus=false, has-focusable=false, has-window-focus=true, is-clickable=false, is-enabled=true, is-focused=false, is-focusable=false, is-layout-requested=false, is-selected=false, layout-params=androidx.recyclerview.widget.RecyclerView$LayoutParams@2e196cc, tag=null, root-is-layout-requested=false, has-input-connection=false, x=0.0, y=1191.0}
|
+---->LinearLayout{id=-1, visibility=VISIBLE, width=689, height=154, has-focus=false, has-focusable=true, has-window-focus=true, is-clickable=false, is-enabled=true, is-focused=false, is-focusable=false, is-layout-requested=false, is-selected=false, layout-params=androidx.recyclerview.widget.RecyclerView$LayoutParams@3c78d15, tag=null, root-is-layout-requested=false, has-input-connection=false, x=0.0, y=1194.0, child-count=4}
|
+----->AppCompatImageButton{id=-1, desc=Bookmark, visibility=VISIBLE, width=172, height=66, has-focus=false, has-focusable=true, has-window-focus=true, is-clickable=true, is-enabled=true, is-focused=false, is-focusable=true, is-layout-requested=false, is-selected=false, layout-params=android.widget.LinearLayout$LayoutParams@c31a82a, tag=null, root-is-layout-requested=false, has-input-connection=false, x=0.0, y=44.0}
|
+----->AppCompatImageButton{id=-1, desc=Share, visibility=VISIBLE, width=172, height=66, has-focus=false, has-focusable=true, has-window-focus=true, is-clickable=true, is-enabled=true, is-focused=false, is-focusable=true, is-layout-requested=false, is-selected=false, layout-params=android.widget.LinearLayout$LayoutParams@cdd961b, tag=null, root-is-layout-requested=false, has-input-connection=false, x=172.0, y=44.0}
|
+----->AppCompatImageButton{id=-1, desc=Forward, visibility=VISIBLE, width=172, height=66, has-focus=false, has-focusable=false, has-window-focus=true, is-clickable=true, is-enabled=false, is-focused=false, is-focusable=true, is-layout-requested=false, is-selected=false, layout-params=android.widget.LinearLayout$LayoutParams@1f753b8, tag=null, root-is-layout-requested=false, has-input-connection=false, x=344.0, y=44.0}
|
+----->AppCompatImageButton{id=-1, desc=Refresh, visibility=VISIBLE, width=173, height=66, has-focus=false, has-focusable=true, has-window-focus=true, is-clickable=true, is-enabled=true, is-focused=false, is-focusable=true, is-layout-requested=false, is-selected=false, layout-params=android.widget.LinearLayout$LayoutParams@a20e591, tag=null, root-is-layout-requested=false, has-input-connection=false, x=516.0, y=44.0}
|
at dalvik.system.VMStack.getThreadStackTrace(Native Method)
at java.lang.Thread.getStackTrace(Thread.java:1538)
at androidx.test.espresso.base.DefaultFailureHandler.getUserFriendlyError(DefaultFailureHandler.java:16)
at androidx.test.espresso.base.DefaultFailureHandler.handle(DefaultFailureHandler.java:36)
at androidx.test.espresso.ViewInteraction.waitForAndHandleInteractionResults(ViewInteraction.java:106)
at androidx.test.espresso.ViewInteraction.desugaredPerform(ViewInteraction.java:43)
at androidx.test.espresso.ViewInteraction.perform(ViewInteraction.java:94)
at org.mozilla.fenix.ui.robots.BrowserRobot$Transition.openThreeDotMenu(BrowserRobot.kt:331)
at org.mozilla.fenix.ui.BookmarksTest.copyBookmarkURLTest(BookmarksTest.kt:152)
at java.lang.reflect.Method.invoke(Native Method)
at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50)
at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47)
at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17)
at androidx.test.internal.runner.junit4.statement.RunBefores.evaluate(RunBefores.java:80)
at androidx.test.internal.runner.junit4.statement.RunAfters.evaluate(RunAfters.java:61)
at androidx.test.rule.ActivityTestRule$ActivityStatement.evaluate(ActivityTestRule.java:531)
at org.junit.rules.RunRules.evaluate(RunRules.java:20)
at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:325)
at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:78)
at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:57)
at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290)
at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71)
at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288)
at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58)
at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268)
at org.junit.runners.ParentRunner.run(ParentRunner.java:363)
at org.junit.runners.Suite.runChild(Suite.java:128)
at org.junit.runners.Suite.runChild(Suite.java:27)
at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290)
at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71)
at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288)
at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58)
at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268)
at org.junit.runners.ParentRunner.run(ParentRunner.java:363)
at org.junit.runner.JUnitCore.run(JUnitCore.java:137)
at org.junit.runner.JUnitCore.run(JUnitCore.java:115)
at androidx.test.internal.runner.TestExecutor.execute(TestExecutor.java:56)
at androidx.test.runner.AndroidJUnitRunner.onStart(AndroidJUnitRunner.java:395)
at android.app.Instrumentation$InstrumentationThread.run(Instrumentation.java:2145)
| non_priority | intermittent copybookmarkurltest androidx test espresso nomatchingviewexception no views in hierarchy found matching with content description text is menu androidx test espresso nomatchingviewexception no views in hierarchy found matching with content description text is menu view hierarchy popupdecorview id visibility visible width height has focus false has focusable true has window focus true is clickable false is enabled true is focused false is focusable false is layout requested false is selected false layout params wrapxwrap gr top start center display clip vertical sim state unchanged ty application panel fmt transparent wanim surfaceinsets rect manual fl split touch hardware accelerated flag layout attached in decor pfl will not replace on relaunch layout child window in parent frame tag null root is layout requested false has input connection false x y child count popupbackgroundview id visibility visible width height has focus false has focusable true has window focus true is clickable false is enabled true is focused false is focusable false is layout requested false is selected false layout params android widget framelayout layoutparams tag null root is layout requested false has input connection false x y child count cardview id visibility visible width height has focus false has focusable true has window focus true is clickable false is enabled true is focused false is focusable false is layout requested false is selected false layout params android widget framelayout layoutparams tag null root is layout requested false has input connection false x y child count recyclerview id res name mozac browser menu recyclerview visibility visible width height has focus false has focusable true has window focus true is clickable false is enabled true is focused false is focusable true is layout requested false is selected false layout params android widget framelayout layoutparams tag null root is layout requested false has input connection false x y child count linearlayout id visibility visible width height has focus false has focusable true has window focus true is clickable true is enabled true is focused false is focusable true is layout requested false is selected false layout params androidx recyclerview widget recyclerview layoutparams tag null root is layout requested false has input connection false x y child count appcompatimageview id res name image visibility visible width height has focus false has focusable false has window focus true is clickable false is enabled true is focused false is focusable false is layout requested false is selected false layout params android widget linearlayout layoutparams tag null root is layout requested false has input connection false x y appcompattextview id res name text visibility visible width height has focus false has focusable false has window focus true is clickable false is enabled true is focused false is focusable false is layout requested false is selected false layout params android widget linearlayout layoutparams tag null root is layout requested false has input connection false x y text library input type ime target false has links false linearlayout id visibility visible width height has focus false has focusable true has window focus true is clickable true is enabled true is focused false is focusable true is layout requested false is selected false layout params androidx recyclerview widget recyclerview layoutparams tag null root is layout requested false has input connection false x y child count appcompatimageview id res name image visibility visible width height has focus false has focusable false has window focus true is clickable false is enabled true is focused false is focusable false is layout requested false is selected false layout params android widget linearlayout layoutparams tag null root is layout requested false has input connection false x y appcompattextview id res name text visibility visible width height has focus false has focusable false has window focus true is clickable false is enabled true is focused false is focusable false is layout requested false is selected false layout params android widget linearlayout layoutparams tag null root is layout requested false has input connection false x y text add ons input type ime target false has links false constraintlayout id visibility visible width height has focus false has focusable true has window focus true is clickable true is enabled true is focused false is focusable true is layout requested false is selected false layout params androidx recyclerview widget recyclerview layoutparams tag null root is layout requested false has input connection false x y child count appcompatimageview id res name image visibility visible width height has focus false has focusable false has window focus true is clickable false is enabled true is focused false is focusable false is layout requested false is selected false layout params androidx constraintlayout widget constraintlayout layoutparams ffbfcca tag null root is layout requested false has input connection false x y appcompatimageview id res name notification dot visibility gone width height has focus false has focusable false has window focus true is clickable false is enabled true is focused false is focusable false is layout requested true is selected false layout params androidx constraintlayout widget constraintlayout layoutparams tag null root is layout requested false has input connection false x y appcompattextview id res name text visibility visible width height has focus false has focusable false has window focus true is clickable false is enabled true is focused false is focusable false is layout requested false is selected false layout params androidx constraintlayout widget constraintlayout layoutparams tag null root is layout requested false has input connection false x y text settings input type ime target false has links false appcompattextview id res name highlight text visibility invisible width height has focus false has focusable false has window focus true is clickable false is enabled true is focused false is focusable false is layout requested false is selected false layout params androidx constraintlayout widget constraintlayout layoutparams tag null root is layout requested false has input connection false x y text settings input type ime target false has links false appcompatimageview id res name end image visibility gone width height has focus false has focusable false has window focus true is clickable false is enabled true is focused false is focusable false is layout requested true is selected false layout params androidx constraintlayout widget constraintlayout layoutparams tag null root is layout requested false has input connection false x y view id visibility visible width height has focus false has focusable false has window focus true is clickable false is enabled true is focused false is focusable false is layout requested false is selected false layout params androidx recyclerview widget recyclerview layoutparams tag null root is layout requested false has input connection false x y linearlayout id visibility visible width height has focus false has focusable true has window focus true is clickable true is enabled true is focused false is focusable true is layout requested false is selected false layout params androidx recyclerview widget recyclerview layoutparams tag null root is layout requested false has input connection false x y child count appcompatimageview id res name image visibility visible width height has focus false has focusable false has window focus true is clickable false is enabled true is focused false is focusable false is layout requested false is selected false layout params android widget linearlayout layoutparams tag null root is layout requested false has input connection false x y appcompattextview id res name text visibility visible width height has focus false has focusable false has window focus true is clickable false is enabled true is focused false is focusable false is layout requested false is selected false layout params android widget linearlayout layoutparams tag null root is layout requested false has input connection false x y text report site issue input type ime target false has links false linearlayout id visibility visible width height has focus false has focusable true has window focus true is clickable true is enabled true is focused false is focusable true is layout requested false is selected false layout params androidx recyclerview widget recyclerview layoutparams tag null root is layout requested false has input connection false x y child count appcompatimageview id res name image visibility visible width height has focus false has focusable false has window focus true is clickable false is enabled true is focused false is focusable false is layout requested false is selected false layout params android widget linearlayout layoutparams tag null root is layout requested false has input connection false x y appcompattextview id res name text visibility visible width height has focus false has focusable false has window focus true is clickable false is enabled true is focused false is focusable false is layout requested false is selected false layout params android widget linearlayout layoutparams tag null root is layout requested false has input connection false x y text find in page input type ime target false has links false linearlayout id visibility visible width height has focus false has focusable true has window focus true is clickable true is enabled true is focused false is focusable true is layout requested false is selected false layout params androidx recyclerview widget recyclerview layoutparams tag null root is layout requested false has input connection false x y child count appcompatimageview id res name image visibility visible width height has focus false has focusable false has window focus true is clickable false is enabled true is focused false is focusable false is layout requested false is selected false layout params android widget linearlayout layoutparams tag null root is layout requested false has input connection false x y appcompattextview id res name text visibility visible width height has focus false has focusable false has window focus true is clickable false is enabled true is focused false is focusable false is layout requested false is selected false layout params android widget linearlayout layoutparams tag null root is layout requested false has input connection false x y text add to top sites input type ime target false has links false constraintlayout id visibility visible width height has focus false has focusable true has window focus true is clickable true is enabled true is focused false is focusable true is layout requested false is selected false layout params androidx recyclerview widget recyclerview layoutparams tag null root is layout requested false has input connection false x y child count appcompatimageview id res name image visibility visible width height has focus false has focusable false has window focus true is clickable false is enabled true is focused false is focusable false is layout requested false is selected false layout params androidx constraintlayout widget constraintlayout layoutparams tag null root is layout requested false has input connection false x y appcompatimageview id res name notification dot visibility gone width height has focus false has focusable false has window focus true is clickable false is enabled true is focused false is focusable false is layout requested true is selected false layout params androidx constraintlayout widget constraintlayout layoutparams tag null root is layout requested false has input connection false x y appcompattextview id res name text visibility visible width height has focus false has focusable false has window focus true is clickable false is enabled true is focused false is focusable false is layout requested false is selected false layout params androidx constraintlayout widget constraintlayout layoutparams tag null root is layout requested false has input connection false x y text add to home screen input type ime target false has links false appcompattextview id res name highlight text visibility invisible width height has focus false has focusable false has window focus true is clickable false is enabled true is focused false is focusable false is layout requested false is selected false layout params androidx constraintlayout widget constraintlayout layoutparams tag null root is layout requested false has input connection false x y text install input type ime target false has links false appcompatimageview id res name end image visibility gone width height has focus false has focusable false has window focus true is clickable false is enabled true is focused false is focusable false is layout requested true is selected false layout params androidx constraintlayout widget constraintlayout layoutparams tag null root is layout requested false has input connection false x y linearlayout id visibility visible width height has focus false has focusable true has window focus true is clickable true is enabled true is focused false is focusable true is layout requested false is selected false layout params androidx recyclerview widget recyclerview layoutparams tag null root is layout requested false has input connection false x y child count appcompatimageview id res name image visibility visible width height has focus false has focusable false has window focus true is clickable false is enabled true is focused false is focusable false is layout requested false is selected false layout params android widget linearlayout layoutparams tag null root is layout requested false has input connection false x y appcompattextview id res name text visibility visible width height has focus false has focusable false has window focus true is clickable false is enabled true is focused false is focusable false is layout requested false is selected false layout params android widget linearlayout layoutparams tag null root is layout requested false has input connection false x y text save to collection input type ime target false has links false linearlayout id visibility visible width height has focus false has focusable true has window focus true is clickable true is enabled true is focused false is focusable true is layout requested false is selected false layout params androidx recyclerview widget recyclerview layoutparams tag null root is layout requested false has input connection false x y child count appcompatimageview id res name image visibility visible width height has focus false has focusable false has window focus true is clickable false is enabled true is focused false is focusable false is layout requested false is selected false layout params android widget linearlayout layoutparams tag null root is layout requested false has input connection false x y switchcompat id res name switch widget visibility visible width height has focus false has focusable true has window focus true is clickable true is enabled true is focused false is focusable true is layout requested false is selected false layout params android widget linearlayout layoutparams tag null root is layout requested false has input connection false x y text desktop site input type ime target false has links false is checked false view id visibility visible width height has focus false has focusable false has window focus true is clickable false is enabled true is focused false is focusable false is layout requested false is selected false layout params androidx recyclerview widget recyclerview layoutparams tag null root is layout requested false has input connection false x y linearlayout id visibility visible width height has focus false has focusable true has window focus true is clickable false is enabled true is focused false is focusable false is layout requested false is selected false layout params androidx recyclerview widget recyclerview layoutparams tag null root is layout requested false has input connection false x y child count appcompatimagebutton id desc bookmark visibility visible width height has focus false has focusable true has window focus true is clickable true is enabled true is focused false is focusable true is layout requested false is selected false layout params android widget linearlayout layoutparams tag null root is layout requested false has input connection false x y appcompatimagebutton id desc share visibility visible width height has focus false has focusable true has window focus true is clickable true is enabled true is focused false is focusable true is layout requested false is selected false layout params android widget linearlayout layoutparams tag null root is layout requested false has input connection false x y appcompatimagebutton id desc forward visibility visible width height has focus false has focusable false has window focus true is clickable true is enabled false is focused false is focusable true is layout requested false is selected false layout params android widget linearlayout layoutparams tag null root is layout requested false has input connection false x y appcompatimagebutton id desc refresh visibility visible width height has focus false has focusable true has window focus true is clickable true is enabled true is focused false is focusable true is layout requested false is selected false layout params android widget linearlayout layoutparams tag null root is layout requested false has input connection false x y at dalvik system vmstack getthreadstacktrace native method at java lang thread getstacktrace thread java at androidx test espresso base defaultfailurehandler getuserfriendlyerror defaultfailurehandler java at androidx test espresso base defaultfailurehandler handle defaultfailurehandler java at androidx test espresso viewinteraction waitforandhandleinteractionresults viewinteraction java at androidx test espresso viewinteraction desugaredperform viewinteraction java at androidx test espresso viewinteraction perform viewinteraction java at org mozilla fenix ui robots browserrobot transition openthreedotmenu browserrobot kt at org mozilla fenix ui bookmarkstest copybookmarkurltest bookmarkstest kt at java lang reflect method invoke native method at org junit runners model frameworkmethod runreflectivecall frameworkmethod java at org junit internal runners model reflectivecallable run reflectivecallable java at org junit runners model frameworkmethod invokeexplosively frameworkmethod java at org junit internal runners statements invokemethod evaluate invokemethod java at androidx test internal runner statement runbefores evaluate runbefores java at androidx test internal runner statement runafters evaluate runafters java at androidx test rule activitytestrule activitystatement evaluate activitytestrule java at org junit rules runrules evaluate runrules java at org junit runners parentrunner runleaf parentrunner java at org junit runners runchild java at org junit runners runchild java at org junit runners parentrunner run parentrunner java at org junit runners parentrunner schedule parentrunner java at org junit runners parentrunner runchildren parentrunner java at org junit runners parentrunner access parentrunner java at org junit runners parentrunner evaluate parentrunner java at org junit runners parentrunner run parentrunner java at org junit runners suite runchild suite java at org junit runners suite runchild suite java at org junit runners parentrunner run parentrunner java at org junit runners parentrunner schedule parentrunner java at org junit runners parentrunner runchildren parentrunner java at org junit runners parentrunner access parentrunner java at org junit runners parentrunner evaluate parentrunner java at org junit runners parentrunner run parentrunner java at org junit runner junitcore run junitcore java at org junit runner junitcore run junitcore java at androidx test internal runner testexecutor execute testexecutor java at androidx test runner androidjunitrunner onstart androidjunitrunner java at android app instrumentation instrumentationthread run instrumentation java | 0 |
98,045 | 16,343,719,469 | IssuesEvent | 2021-05-13 03:29:42 | samq-wsdemo/easybuggy | https://api.github.com/repos/samq-wsdemo/easybuggy | opened | CVE-2020-11023 (Medium) detected in jquery-3.1.1.min.js | security vulnerability | ## CVE-2020-11023 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jquery-3.1.1.min.js</b></p></summary>
<p>JavaScript library for DOM operations</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/3.1.1/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/3.1.1/jquery.min.js</a></p>
<p>Path to dependency file: easybuggy/target/easybuggy-1-SNAPSHOT/dfi/style_bootstrap.html</p>
<p>Path to vulnerable library: easybuggy/target/easybuggy-1-SNAPSHOT/dfi/style_bootstrap.html,easybuggy/src/main/webapp/dfi/style_bootstrap.html,easybuggy/.extract/webapps/ROOT/dfi/style_bootstrap.html</p>
<p>
Dependency Hierarchy:
- :x: **jquery-3.1.1.min.js** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samq-wsdemo/easybuggy/commit/e5c5214a65668c2d872761f1094636c04a2c100d">e5c5214a65668c2d872761f1094636c04a2c100d</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
<p>Publish Date: 2020-04-29
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11023>CVE-2020-11023</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11023">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11023</a></p>
<p>Release Date: 2020-04-29</p>
<p>Fix Resolution: jquery - 3.5.0</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"JavaScript","packageName":"jquery","packageVersion":"3.1.1","packageFilePaths":["/target/easybuggy-1-SNAPSHOT/dfi/style_bootstrap.html","/src/main/webapp/dfi/style_bootstrap.html","/.extract/webapps/ROOT/dfi/style_bootstrap.html"],"isTransitiveDependency":false,"dependencyTree":"jquery:3.1.1","isMinimumFixVersionAvailable":true,"minimumFixVersion":"jquery - 3.5.0"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-11023","vulnerabilityDetails":"In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing \u003coption\u003e elements from untrusted sources - even after sanitizing it - to one of jQuery\u0027s DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11023","cvss3Severity":"medium","cvss3Score":"6.1","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Changed","C":"Low","UI":"Required","AV":"Network","I":"Low"},"extraData":{}}</REMEDIATE> --> | True | CVE-2020-11023 (Medium) detected in jquery-3.1.1.min.js - ## CVE-2020-11023 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jquery-3.1.1.min.js</b></p></summary>
<p>JavaScript library for DOM operations</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/3.1.1/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/3.1.1/jquery.min.js</a></p>
<p>Path to dependency file: easybuggy/target/easybuggy-1-SNAPSHOT/dfi/style_bootstrap.html</p>
<p>Path to vulnerable library: easybuggy/target/easybuggy-1-SNAPSHOT/dfi/style_bootstrap.html,easybuggy/src/main/webapp/dfi/style_bootstrap.html,easybuggy/.extract/webapps/ROOT/dfi/style_bootstrap.html</p>
<p>
Dependency Hierarchy:
- :x: **jquery-3.1.1.min.js** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samq-wsdemo/easybuggy/commit/e5c5214a65668c2d872761f1094636c04a2c100d">e5c5214a65668c2d872761f1094636c04a2c100d</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
<p>Publish Date: 2020-04-29
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11023>CVE-2020-11023</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11023">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11023</a></p>
<p>Release Date: 2020-04-29</p>
<p>Fix Resolution: jquery - 3.5.0</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"JavaScript","packageName":"jquery","packageVersion":"3.1.1","packageFilePaths":["/target/easybuggy-1-SNAPSHOT/dfi/style_bootstrap.html","/src/main/webapp/dfi/style_bootstrap.html","/.extract/webapps/ROOT/dfi/style_bootstrap.html"],"isTransitiveDependency":false,"dependencyTree":"jquery:3.1.1","isMinimumFixVersionAvailable":true,"minimumFixVersion":"jquery - 3.5.0"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-11023","vulnerabilityDetails":"In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing \u003coption\u003e elements from untrusted sources - even after sanitizing it - to one of jQuery\u0027s DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11023","cvss3Severity":"medium","cvss3Score":"6.1","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Changed","C":"Low","UI":"Required","AV":"Network","I":"Low"},"extraData":{}}</REMEDIATE> --> | non_priority | cve medium detected in jquery min js cve medium severity vulnerability vulnerable library jquery min js javascript library for dom operations library home page a href path to dependency file easybuggy target easybuggy snapshot dfi style bootstrap html path to vulnerable library easybuggy target easybuggy snapshot dfi style bootstrap html easybuggy src main webapp dfi style bootstrap html easybuggy extract webapps root dfi style bootstrap html dependency hierarchy x jquery min js vulnerable library found in head commit a href found in base branch master vulnerability details in jquery versions greater than or equal to and before passing html containing elements from untrusted sources even after sanitizing it to one of jquery s dom manipulation methods i e html append and others may execute untrusted code this problem is patched in jquery publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution jquery isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency false dependencytree jquery isminimumfixversionavailable true minimumfixversion jquery basebranches vulnerabilityidentifier cve vulnerabilitydetails in jquery versions greater than or equal to and before passing html containing elements from untrusted sources even after sanitizing it to one of jquery dom manipulation methods i e html append and others may execute untrusted code this problem is patched in jquery vulnerabilityurl | 0 |
79,721 | 23,028,666,741 | IssuesEvent | 2022-07-22 11:50:13 | sktime/BaseObject | https://api.github.com/repos/sktime/BaseObject | opened | Setup All Contributors Bot | ci / build documentation | **Is your feature request related to a problem? Please describe.**
A clear and concise description of what the problem is.
Let's setup the [All Contributors bot](https://allcontributors.org/docs/en/bot/overview).
| 1.0 | Setup All Contributors Bot - **Is your feature request related to a problem? Please describe.**
A clear and concise description of what the problem is.
Let's setup the [All Contributors bot](https://allcontributors.org/docs/en/bot/overview).
| non_priority | setup all contributors bot is your feature request related to a problem please describe a clear and concise description of what the problem is let s setup the | 0 |
65,645 | 19,620,668,342 | IssuesEvent | 2022-01-07 05:52:31 | pymc-devs/pymc | https://api.github.com/repos/pymc-devs/pymc | closed | Theano Issue with NumPy 1.22.0 | defects theano-related v3 | ## BLAS issue with the latest release of NumPy
Had this issue directly after importing `pymc3` or `theano`.
<details><summary>Complete error traceback</summary>
```python
Traceback (most recent call last):
File "/Users/ali.septiandri/anaconda/lib/python3.8/site-packages/theano/configparser.py", line 238, in fetch_val_for_key
return self._theano_cfg.get(section, option)
File "/Users/ali.septiandri/anaconda/lib/python3.8/configparser.py", line 781, in get
d = self._unify_values(section, vars)
File "/Users/ali.septiandri/anaconda/lib/python3.8/configparser.py", line 1149, in _unify_values
raise NoSectionError(section) from None
configparser.NoSectionError: No section: 'blas'
During handling of the above exception, another exception occurred:
Traceback (most recent call last):
File "/Users/ali.septiandri/anaconda/lib/python3.8/site-packages/theano/configparser.py", line 354, in __get__
val_str = cls.fetch_val_for_key(self.name, delete_key=delete_key)
File "/Users/ali.septiandri/anaconda/lib/python3.8/site-packages/theano/configparser.py", line 242, in fetch_val_for_key
raise KeyError(key)
KeyError: 'blas__ldflags'
During handling of the above exception, another exception occurred:
Traceback (most recent call last):
File "<stdin>", line 1, in <module>
File "/Users/ali.septiandri/anaconda/lib/python3.8/site-packages/pymc3/__init__.py", line 23, in <module>
import theano
File "/Users/ali.septiandri/anaconda/lib/python3.8/site-packages/theano/__init__.py", line 83, in <module>
from theano import scalar, tensor
File "/Users/ali.septiandri/anaconda/lib/python3.8/site-packages/theano/tensor/__init__.py", line 20, in <module>
from theano.tensor import nnet # used for softmax, sigmoid, etc.
File "/Users/ali.septiandri/anaconda/lib/python3.8/site-packages/theano/tensor/nnet/__init__.py", line 3, in <module>
from . import opt
File "/Users/ali.septiandri/anaconda/lib/python3.8/site-packages/theano/tensor/nnet/opt.py", line 32, in <module>
from theano.tensor.nnet.conv import ConvOp, conv2d
File "/Users/ali.septiandri/anaconda/lib/python3.8/site-packages/theano/tensor/nnet/conv.py", line 20, in <module>
from theano.tensor import blas
File "/Users/ali.septiandri/anaconda/lib/python3.8/site-packages/theano/tensor/blas.py", line 163, in <module>
from theano.tensor.blas_headers import blas_header_text, blas_header_version
File "/Users/ali.septiandri/anaconda/lib/python3.8/site-packages/theano/tensor/blas_headers.py", line 1016, in <module>
if not config.blas__ldflags:
File "/Users/ali.septiandri/anaconda/lib/python3.8/site-packages/theano/configparser.py", line 358, in __get__
val_str = self.default()
File "/Users/ali.septiandri/anaconda/lib/python3.8/site-packages/theano/link/c/cmodule.py", line 2621, in default_blas_ldflags
blas_info = numpy.distutils.__config__.blas_opt_info
AttributeError: module 'numpy.distutils.__config__' has no attribute 'blas_opt_info'
```
</details>
## Versions and main components
* PyMC/PyMC3 Version: 3.11.4
* Aesara/Theano Version: 1.1.2
* Python Version: 3.8
* Operating system: macOS Big Sur
* How did you install PyMC/PyMC3: conda
| 1.0 | Theano Issue with NumPy 1.22.0 - ## BLAS issue with the latest release of NumPy
Had this issue directly after importing `pymc3` or `theano`.
<details><summary>Complete error traceback</summary>
```python
Traceback (most recent call last):
File "/Users/ali.septiandri/anaconda/lib/python3.8/site-packages/theano/configparser.py", line 238, in fetch_val_for_key
return self._theano_cfg.get(section, option)
File "/Users/ali.septiandri/anaconda/lib/python3.8/configparser.py", line 781, in get
d = self._unify_values(section, vars)
File "/Users/ali.septiandri/anaconda/lib/python3.8/configparser.py", line 1149, in _unify_values
raise NoSectionError(section) from None
configparser.NoSectionError: No section: 'blas'
During handling of the above exception, another exception occurred:
Traceback (most recent call last):
File "/Users/ali.septiandri/anaconda/lib/python3.8/site-packages/theano/configparser.py", line 354, in __get__
val_str = cls.fetch_val_for_key(self.name, delete_key=delete_key)
File "/Users/ali.septiandri/anaconda/lib/python3.8/site-packages/theano/configparser.py", line 242, in fetch_val_for_key
raise KeyError(key)
KeyError: 'blas__ldflags'
During handling of the above exception, another exception occurred:
Traceback (most recent call last):
File "<stdin>", line 1, in <module>
File "/Users/ali.septiandri/anaconda/lib/python3.8/site-packages/pymc3/__init__.py", line 23, in <module>
import theano
File "/Users/ali.septiandri/anaconda/lib/python3.8/site-packages/theano/__init__.py", line 83, in <module>
from theano import scalar, tensor
File "/Users/ali.septiandri/anaconda/lib/python3.8/site-packages/theano/tensor/__init__.py", line 20, in <module>
from theano.tensor import nnet # used for softmax, sigmoid, etc.
File "/Users/ali.septiandri/anaconda/lib/python3.8/site-packages/theano/tensor/nnet/__init__.py", line 3, in <module>
from . import opt
File "/Users/ali.septiandri/anaconda/lib/python3.8/site-packages/theano/tensor/nnet/opt.py", line 32, in <module>
from theano.tensor.nnet.conv import ConvOp, conv2d
File "/Users/ali.septiandri/anaconda/lib/python3.8/site-packages/theano/tensor/nnet/conv.py", line 20, in <module>
from theano.tensor import blas
File "/Users/ali.septiandri/anaconda/lib/python3.8/site-packages/theano/tensor/blas.py", line 163, in <module>
from theano.tensor.blas_headers import blas_header_text, blas_header_version
File "/Users/ali.septiandri/anaconda/lib/python3.8/site-packages/theano/tensor/blas_headers.py", line 1016, in <module>
if not config.blas__ldflags:
File "/Users/ali.septiandri/anaconda/lib/python3.8/site-packages/theano/configparser.py", line 358, in __get__
val_str = self.default()
File "/Users/ali.septiandri/anaconda/lib/python3.8/site-packages/theano/link/c/cmodule.py", line 2621, in default_blas_ldflags
blas_info = numpy.distutils.__config__.blas_opt_info
AttributeError: module 'numpy.distutils.__config__' has no attribute 'blas_opt_info'
```
</details>
## Versions and main components
* PyMC/PyMC3 Version: 3.11.4
* Aesara/Theano Version: 1.1.2
* Python Version: 3.8
* Operating system: macOS Big Sur
* How did you install PyMC/PyMC3: conda
| non_priority | theano issue with numpy blas issue with the latest release of numpy had this issue directly after importing or theano complete error traceback python traceback most recent call last file users ali septiandri anaconda lib site packages theano configparser py line in fetch val for key return self theano cfg get section option file users ali septiandri anaconda lib configparser py line in get d self unify values section vars file users ali septiandri anaconda lib configparser py line in unify values raise nosectionerror section from none configparser nosectionerror no section blas during handling of the above exception another exception occurred traceback most recent call last file users ali septiandri anaconda lib site packages theano configparser py line in get val str cls fetch val for key self name delete key delete key file users ali septiandri anaconda lib site packages theano configparser py line in fetch val for key raise keyerror key keyerror blas ldflags during handling of the above exception another exception occurred traceback most recent call last file line in file users ali septiandri anaconda lib site packages init py line in import theano file users ali septiandri anaconda lib site packages theano init py line in from theano import scalar tensor file users ali septiandri anaconda lib site packages theano tensor init py line in from theano tensor import nnet used for softmax sigmoid etc file users ali septiandri anaconda lib site packages theano tensor nnet init py line in from import opt file users ali septiandri anaconda lib site packages theano tensor nnet opt py line in from theano tensor nnet conv import convop file users ali septiandri anaconda lib site packages theano tensor nnet conv py line in from theano tensor import blas file users ali septiandri anaconda lib site packages theano tensor blas py line in from theano tensor blas headers import blas header text blas header version file users ali septiandri anaconda lib site packages theano tensor blas headers py line in if not config blas ldflags file users ali septiandri anaconda lib site packages theano configparser py line in get val str self default file users ali septiandri anaconda lib site packages theano link c cmodule py line in default blas ldflags blas info numpy distutils config blas opt info attributeerror module numpy distutils config has no attribute blas opt info versions and main components pymc version aesara theano version python version operating system macos big sur how did you install pymc conda | 0 |
1,745 | 3,970,283,847 | IssuesEvent | 2016-05-04 06:13:21 | uidaho/squireproject | https://api.github.com/repos/uidaho/squireproject | closed | Put together a runnable finished product | sprint requirement | I think we already have this requirement covered. However, we should discuss anything we may have missed. | 1.0 | Put together a runnable finished product - I think we already have this requirement covered. However, we should discuss anything we may have missed. | non_priority | put together a runnable finished product i think we already have this requirement covered however we should discuss anything we may have missed | 0 |
251,496 | 27,175,547,824 | IssuesEvent | 2023-02-18 01:04:10 | vipinsun/TrustID | https://api.github.com/repos/vipinsun/TrustID | opened | CVE-2023-25653 (High) detected in node-jose-1.1.4.tgz | security vulnerability | ## CVE-2023-25653 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>node-jose-1.1.4.tgz</b></p></summary>
<p>A JavaScript implementation of the JSON Object Signing and Encryption (JOSE) for current web browsers and node.js-based servers</p>
<p>Library home page: <a href="https://registry.npmjs.org/node-jose/-/node-jose-1.1.4.tgz">https://registry.npmjs.org/node-jose/-/node-jose-1.1.4.tgz</a></p>
<p>Path to dependency file: /trustid-sdk/package.json</p>
<p>Path to vulnerable library: /trustid-sdk/node_modules/node-jose/package.json</p>
<p>
Dependency Hierarchy:
- :x: **node-jose-1.1.4.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/vipinsun/TrustID/commit/1c9178c5a1b42520307da1fa7f9b1899276178ed">1c9178c5a1b42520307da1fa7f9b1899276178ed</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
node-jose is a JavaScript implementation of the JSON Object Signing and Encryption (JOSE) for web browsers and node.js-based servers. Prior to version 2.2.0, when using the non-default "fallback" crypto back-end, ECC operations in `node-jose` can trigger a Denial-of-Service (DoS) condition, due to a possible infinite loop in an internal calculation. For some ECC operations, this condition is triggered randomly; for others, it can be triggered by malicious input. The issue has been patched in version 2.2.0. Since this issue is only present in the "fallback" crypto implementation, it can be avoided by ensuring that either WebCrypto or the Node `crypto` module is available in the JS environment where `node-jose` is being run.
<p>Publish Date: 2023-02-16
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2023-25653>CVE-2023-25653</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/cisco/node-jose/security/advisories/GHSA-5h4j-qrvg-9xhw">https://github.com/cisco/node-jose/security/advisories/GHSA-5h4j-qrvg-9xhw</a></p>
<p>Release Date: 2023-02-16</p>
<p>Fix Resolution: node-jose - 2.2.0
</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2023-25653 (High) detected in node-jose-1.1.4.tgz - ## CVE-2023-25653 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>node-jose-1.1.4.tgz</b></p></summary>
<p>A JavaScript implementation of the JSON Object Signing and Encryption (JOSE) for current web browsers and node.js-based servers</p>
<p>Library home page: <a href="https://registry.npmjs.org/node-jose/-/node-jose-1.1.4.tgz">https://registry.npmjs.org/node-jose/-/node-jose-1.1.4.tgz</a></p>
<p>Path to dependency file: /trustid-sdk/package.json</p>
<p>Path to vulnerable library: /trustid-sdk/node_modules/node-jose/package.json</p>
<p>
Dependency Hierarchy:
- :x: **node-jose-1.1.4.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/vipinsun/TrustID/commit/1c9178c5a1b42520307da1fa7f9b1899276178ed">1c9178c5a1b42520307da1fa7f9b1899276178ed</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
node-jose is a JavaScript implementation of the JSON Object Signing and Encryption (JOSE) for web browsers and node.js-based servers. Prior to version 2.2.0, when using the non-default "fallback" crypto back-end, ECC operations in `node-jose` can trigger a Denial-of-Service (DoS) condition, due to a possible infinite loop in an internal calculation. For some ECC operations, this condition is triggered randomly; for others, it can be triggered by malicious input. The issue has been patched in version 2.2.0. Since this issue is only present in the "fallback" crypto implementation, it can be avoided by ensuring that either WebCrypto or the Node `crypto` module is available in the JS environment where `node-jose` is being run.
<p>Publish Date: 2023-02-16
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2023-25653>CVE-2023-25653</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/cisco/node-jose/security/advisories/GHSA-5h4j-qrvg-9xhw">https://github.com/cisco/node-jose/security/advisories/GHSA-5h4j-qrvg-9xhw</a></p>
<p>Release Date: 2023-02-16</p>
<p>Fix Resolution: node-jose - 2.2.0
</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve high detected in node jose tgz cve high severity vulnerability vulnerable library node jose tgz a javascript implementation of the json object signing and encryption jose for current web browsers and node js based servers library home page a href path to dependency file trustid sdk package json path to vulnerable library trustid sdk node modules node jose package json dependency hierarchy x node jose tgz vulnerable library found in head commit a href found in base branch master vulnerability details node jose is a javascript implementation of the json object signing and encryption jose for web browsers and node js based servers prior to version when using the non default fallback crypto back end ecc operations in node jose can trigger a denial of service dos condition due to a possible infinite loop in an internal calculation for some ecc operations this condition is triggered randomly for others it can be triggered by malicious input the issue has been patched in version since this issue is only present in the fallback crypto implementation it can be avoided by ensuring that either webcrypto or the node crypto module is available in the js environment where node jose is being run publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution node jose step up your open source security game with mend | 0 |
263,312 | 28,029,919,391 | IssuesEvent | 2023-03-28 11:42:21 | RG4421/ampere-centos-kernel | https://api.github.com/repos/RG4421/ampere-centos-kernel | reopened | CVE-2022-2503 (Medium) detected in linuxv5.2 | Mend: dependency security vulnerability | ## CVE-2022-2503 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linuxv5.2</b></p></summary>
<p>
<p>Linux kernel source tree</p>
<p>Library home page: <a href=https://github.com/torvalds/linux.git>https://github.com/torvalds/linux.git</a></p>
<p>Found in base branch: <b>amp-centos-8.0-kernel</b></p></p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary>
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/md/dm-verity-target.c</b>
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Dm-verity is used for extending root-of-trust to root filesystems. LoadPin builds on this property to restrict module/firmware loads to just the trusted root filesystem. Device-mapper table reloads currently allow users with root privileges to switch out the target with an equivalent dm-linear target and bypass verification till reboot. This allows root to bypass LoadPin and can be used to load untrusted and unverified kernel modules and firmware, which implies arbitrary kernel execution and persistence for peripherals that do not verify firmware updates. We recommend upgrading past commit 4caae58406f8ceb741603eee460d79bacca9b1b5
<p>Publish Date: 2022-08-12
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-2503>CVE-2022-2503</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.7</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: High
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.linuxkernelcves.com/cves/CVE-2022-2503">https://www.linuxkernelcves.com/cves/CVE-2022-2503</a></p>
<p>Release Date: 2022-08-12</p>
<p>Fix Resolution: v4.9.317,v4.14.282,v4.19.246,v5.4.197,v5.10.120,v5.15.45,v5.17.13,v5.18.2</p>
</p>
</details>
<p></p>
| True | CVE-2022-2503 (Medium) detected in linuxv5.2 - ## CVE-2022-2503 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linuxv5.2</b></p></summary>
<p>
<p>Linux kernel source tree</p>
<p>Library home page: <a href=https://github.com/torvalds/linux.git>https://github.com/torvalds/linux.git</a></p>
<p>Found in base branch: <b>amp-centos-8.0-kernel</b></p></p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary>
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/md/dm-verity-target.c</b>
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Dm-verity is used for extending root-of-trust to root filesystems. LoadPin builds on this property to restrict module/firmware loads to just the trusted root filesystem. Device-mapper table reloads currently allow users with root privileges to switch out the target with an equivalent dm-linear target and bypass verification till reboot. This allows root to bypass LoadPin and can be used to load untrusted and unverified kernel modules and firmware, which implies arbitrary kernel execution and persistence for peripherals that do not verify firmware updates. We recommend upgrading past commit 4caae58406f8ceb741603eee460d79bacca9b1b5
<p>Publish Date: 2022-08-12
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-2503>CVE-2022-2503</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.7</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: High
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.linuxkernelcves.com/cves/CVE-2022-2503">https://www.linuxkernelcves.com/cves/CVE-2022-2503</a></p>
<p>Release Date: 2022-08-12</p>
<p>Fix Resolution: v4.9.317,v4.14.282,v4.19.246,v5.4.197,v5.10.120,v5.15.45,v5.17.13,v5.18.2</p>
</p>
</details>
<p></p>
| non_priority | cve medium detected in cve medium severity vulnerability vulnerable library linux kernel source tree library home page a href found in base branch amp centos kernel vulnerable source files drivers md dm verity target c vulnerability details dm verity is used for extending root of trust to root filesystems loadpin builds on this property to restrict module firmware loads to just the trusted root filesystem device mapper table reloads currently allow users with root privileges to switch out the target with an equivalent dm linear target and bypass verification till reboot this allows root to bypass loadpin and can be used to load untrusted and unverified kernel modules and firmware which implies arbitrary kernel execution and persistence for peripherals that do not verify firmware updates we recommend upgrading past commit publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required high user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution | 0 |
98,051 | 29,191,009,634 | IssuesEvent | 2023-05-19 20:00:18 | detekt/detekt | https://api.github.com/repos/detekt/detekt | opened | CI reported detekt-formatting issue that wasn't found locally | bug build ci | ## Expected Behavior
Local `gradlew detekt*` finds the same problems as CI
## Observed Behavior
Check out https://github.com/detekt/detekt/commit/e2a3af064762518976391edac9de01e590f6f8b4 from https://github.com/detekt/detekt/pull/5981 and run detekt on it offline -> no findings.
https://github.com/detekt/detekt/security/code-scanning/7293 -> found by CI.
## Steps to Reproduce
In `detekt-rules-style/src/main/kotlin/io/gitlab/arturbosch/detekt/rules/style/ForbiddenComment.kt` replace method with
```kotlin
private fun getErrorMessage(value: String): String =
@Suppress("DEPRECATION")
customMessage.takeUnless { it.isEmpty() } ?: String.format("DEFAULT_ERROR_MESSAGE__%s__NO_REASON", value)
```
(It doesn't make much sense, but hopefully it should repro if this is pushed in a PR.)
## Context
> Hi, @TWiStErRob do you know why this didn't get caught when I ran the `./gradlew detektMain detektTest detektTestFixtures apiDump generateDocumentation compileKotlin compileTestKotlin compileTestFixturesKotlin -PwarningsAsErrors=true --parallel` command locally? Running the command successfully passed on my local
_Originally posted by @atulgpt in https://github.com/detekt/detekt/pull/5981#discussion_r1195748650_
## Your Environment
<!-- Include as many relevant details about the environment you experienced the bug in -->
* Version of detekt used: 1.23 RCx
* Version of Gradle used (if applicable): 8.0.2
* Gradle scan link (add `--scan` option when running the gradle task):
* Operating System and version: Linux and Windows
* Link to your project (if it's a public repository): https://github.com/atulgpt/detekt/tree/e2a3af064762518976391edac9de01e590f6f8b4
| 1.0 | CI reported detekt-formatting issue that wasn't found locally - ## Expected Behavior
Local `gradlew detekt*` finds the same problems as CI
## Observed Behavior
Check out https://github.com/detekt/detekt/commit/e2a3af064762518976391edac9de01e590f6f8b4 from https://github.com/detekt/detekt/pull/5981 and run detekt on it offline -> no findings.
https://github.com/detekt/detekt/security/code-scanning/7293 -> found by CI.
## Steps to Reproduce
In `detekt-rules-style/src/main/kotlin/io/gitlab/arturbosch/detekt/rules/style/ForbiddenComment.kt` replace method with
```kotlin
private fun getErrorMessage(value: String): String =
@Suppress("DEPRECATION")
customMessage.takeUnless { it.isEmpty() } ?: String.format("DEFAULT_ERROR_MESSAGE__%s__NO_REASON", value)
```
(It doesn't make much sense, but hopefully it should repro if this is pushed in a PR.)
## Context
> Hi, @TWiStErRob do you know why this didn't get caught when I ran the `./gradlew detektMain detektTest detektTestFixtures apiDump generateDocumentation compileKotlin compileTestKotlin compileTestFixturesKotlin -PwarningsAsErrors=true --parallel` command locally? Running the command successfully passed on my local
_Originally posted by @atulgpt in https://github.com/detekt/detekt/pull/5981#discussion_r1195748650_
## Your Environment
<!-- Include as many relevant details about the environment you experienced the bug in -->
* Version of detekt used: 1.23 RCx
* Version of Gradle used (if applicable): 8.0.2
* Gradle scan link (add `--scan` option when running the gradle task):
* Operating System and version: Linux and Windows
* Link to your project (if it's a public repository): https://github.com/atulgpt/detekt/tree/e2a3af064762518976391edac9de01e590f6f8b4
| non_priority | ci reported detekt formatting issue that wasn t found locally expected behavior local gradlew detekt finds the same problems as ci observed behavior check out from and run detekt on it offline no findings found by ci steps to reproduce in detekt rules style src main kotlin io gitlab arturbosch detekt rules style forbiddencomment kt replace method with kotlin private fun geterrormessage value string string suppress deprecation custommessage takeunless it isempty string format default error message s no reason value it doesn t make much sense but hopefully it should repro if this is pushed in a pr context hi twisterrob do you know why this didn t get caught when i ran the gradlew detektmain detekttest detekttestfixtures apidump generatedocumentation compilekotlin compiletestkotlin compiletestfixtureskotlin pwarningsaserrors true parallel command locally running the command successfully passed on my local originally posted by atulgpt in your environment version of detekt used rcx version of gradle used if applicable gradle scan link add scan option when running the gradle task operating system and version linux and windows link to your project if it s a public repository | 0 |
101,604 | 21,724,706,859 | IssuesEvent | 2022-05-11 06:22:08 | 0chain/0chain | https://api.github.com/repos/0chain/0chain | opened | Add gitactions to run benchmark tests | Code Quality CI Pipeline mainnet | Setup a github action to run benchmark tests for new PRs, new changes should not break the benchmark code. | 1.0 | Add gitactions to run benchmark tests - Setup a github action to run benchmark tests for new PRs, new changes should not break the benchmark code. | non_priority | add gitactions to run benchmark tests setup a github action to run benchmark tests for new prs new changes should not break the benchmark code | 0 |
96,874 | 12,168,700,819 | IssuesEvent | 2020-04-27 13:06:35 | elastic/kibana | https://api.github.com/repos/elastic/kibana | closed | [Ingest] Agent configurations - edit global output | Feature:EPM Feature:Fleet Ingest Management:alpha1 Team:Ingest Management design |


[View in Figma](https://www.figma.com/file/0IiPRxG8NKuLYjIJDn9Nuk/Ingest-Manager-Screens?node-id=2533%3A1799)
Add "General settings" link to navigation bar. This opens a flyout where the user can edit:
- Option to auto update agent binary
- Option to auto update integrations
- Global output settings
**Tasks**
- [ ]
- [ ]
- [ ] | 1.0 | [Ingest] Agent configurations - edit global output -


[View in Figma](https://www.figma.com/file/0IiPRxG8NKuLYjIJDn9Nuk/Ingest-Manager-Screens?node-id=2533%3A1799)
Add "General settings" link to navigation bar. This opens a flyout where the user can edit:
- Option to auto update agent binary
- Option to auto update integrations
- Global output settings
**Tasks**
- [ ]
- [ ]
- [ ] | non_priority | agent configurations edit global output add general settings link to navigation bar this opens a flyout where the user can edit option to auto update agent binary option to auto update integrations global output settings tasks | 0 |
51,848 | 6,199,898,537 | IssuesEvent | 2017-07-05 22:55:46 | golang/go | https://api.github.com/repos/golang/go | closed | net/http: TestClientTimeout_Headers_h2 prints message even without -v specified | Testing | ### What version of Go are you using (`go version`)?
go version devel +96414ca Wed Dec 14 19:36:20 2016 +0000 windows/386
### What operating system and processor architecture are you using (`go env`)?
set GOARCH=386
set GOBIN=
set GOEXE=.exe
set GOHOSTARCH=386
set GOHOSTOS=windows
set GOOS=windows
set GOPATH=c:\dev
set GORACE=
set GOROOT=c:\dev\go
set GOTOOLDIR=c:\dev\go\pkg\tool\windows_386
set GCCGO=gccgo
set GO386=
set CC=gcc
set GOGCCFLAGS=-m32 -mthreads -fmessage-length=0 -fdebug-prefix-map=C:\DOCUME~1\brainman\LOCALS~1\Temp\go-build977159903=/tmp/go-build -gno-record-gcc-switches
set CXX=g++
set CGO_ENABLED=1
set PKG_CONFIG=pkg-config
set CGO_CFLAGS=-g -O2
set CGO_CPPFLAGS=
set CGO_CXXFLAGS=-g -O2
set CGO_FFLAGS=-g -O2
set CGO_LDFLAGS=-g -O2
### What did you do?
go test -short -run=TestClientTimeout_Headers_h2 net/http
### What did you expect to see?
PASS
### What did you see instead?
2016/12/15 09:55:14 http: TLS handshake error from 127.0.0.1:1418: read tcp 127.0.0.1:1417->127.0.0.1:1418: use of closed network connection
PASS
Maybe there is something else to learn from that message being printed. I did not look into it to make a judgement.
Alex | 1.0 | net/http: TestClientTimeout_Headers_h2 prints message even without -v specified - ### What version of Go are you using (`go version`)?
go version devel +96414ca Wed Dec 14 19:36:20 2016 +0000 windows/386
### What operating system and processor architecture are you using (`go env`)?
set GOARCH=386
set GOBIN=
set GOEXE=.exe
set GOHOSTARCH=386
set GOHOSTOS=windows
set GOOS=windows
set GOPATH=c:\dev
set GORACE=
set GOROOT=c:\dev\go
set GOTOOLDIR=c:\dev\go\pkg\tool\windows_386
set GCCGO=gccgo
set GO386=
set CC=gcc
set GOGCCFLAGS=-m32 -mthreads -fmessage-length=0 -fdebug-prefix-map=C:\DOCUME~1\brainman\LOCALS~1\Temp\go-build977159903=/tmp/go-build -gno-record-gcc-switches
set CXX=g++
set CGO_ENABLED=1
set PKG_CONFIG=pkg-config
set CGO_CFLAGS=-g -O2
set CGO_CPPFLAGS=
set CGO_CXXFLAGS=-g -O2
set CGO_FFLAGS=-g -O2
set CGO_LDFLAGS=-g -O2
### What did you do?
go test -short -run=TestClientTimeout_Headers_h2 net/http
### What did you expect to see?
PASS
### What did you see instead?
2016/12/15 09:55:14 http: TLS handshake error from 127.0.0.1:1418: read tcp 127.0.0.1:1417->127.0.0.1:1418: use of closed network connection
PASS
Maybe there is something else to learn from that message being printed. I did not look into it to make a judgement.
Alex | non_priority | net http testclienttimeout headers prints message even without v specified what version of go are you using go version go version devel wed dec windows what operating system and processor architecture are you using go env set goarch set gobin set goexe exe set gohostarch set gohostos windows set goos windows set gopath c dev set gorace set goroot c dev go set gotooldir c dev go pkg tool windows set gccgo gccgo set set cc gcc set gogccflags mthreads fmessage length fdebug prefix map c docume brainman locals temp go tmp go build gno record gcc switches set cxx g set cgo enabled set pkg config pkg config set cgo cflags g set cgo cppflags set cgo cxxflags g set cgo fflags g set cgo ldflags g what did you do go test short run testclienttimeout headers net http what did you expect to see pass what did you see instead http tls handshake error from read tcp use of closed network connection pass maybe there is something else to learn from that message being printed i did not look into it to make a judgement alex | 0 |
31,523 | 5,957,144,595 | IssuesEvent | 2017-05-28 23:30:15 | kalabox/lando | https://api.github.com/repos/kalabox/lando | closed | do initial pass on docs | documentation | Other things to include
- [ ] Move `CHANGELOG` to docs
- [ ] Make sure examples are being surfaced in docs via `codesnippet` plugin
- [ ] Make sure README is all synced up | 1.0 | do initial pass on docs - Other things to include
- [ ] Move `CHANGELOG` to docs
- [ ] Make sure examples are being surfaced in docs via `codesnippet` plugin
- [ ] Make sure README is all synced up | non_priority | do initial pass on docs other things to include move changelog to docs make sure examples are being surfaced in docs via codesnippet plugin make sure readme is all synced up | 0 |
810 | 10,556,645,665 | IssuesEvent | 2019-10-04 02:49:02 | solid/specification | https://api.github.com/repos/solid/specification | opened | Specify data validation with shapes | data interoperability and portability | Specify how and when to apply shape-based data validation as data is written/modified in the pod. An effort to produce a candidate proposal to this end is [currently underway](https://github.com/solid/data-interoperability-panel/tree/master/data-validation) by the data interoperability panel. See these [use cases](https://github.com/solid/data-interoperability-panel/blob/master/data-validation/use-cases.md) for more detail. | True | Specify data validation with shapes - Specify how and when to apply shape-based data validation as data is written/modified in the pod. An effort to produce a candidate proposal to this end is [currently underway](https://github.com/solid/data-interoperability-panel/tree/master/data-validation) by the data interoperability panel. See these [use cases](https://github.com/solid/data-interoperability-panel/blob/master/data-validation/use-cases.md) for more detail. | non_priority | specify data validation with shapes specify how and when to apply shape based data validation as data is written modified in the pod an effort to produce a candidate proposal to this end is by the data interoperability panel see these for more detail | 0 |
55,118 | 6,429,501,358 | IssuesEvent | 2017-08-10 01:48:09 | nodejs/node | https://api.github.com/repos/nodejs/node | closed | nodejs Makefile:196: recipe for target 'test' failed make: *** [test] Error 1 | os test | Version: node-v8.2.1
Platform: Linux 4.4.0-89-generic #112-Ubuntu SMP Mon Jul 31 19:38:41 UTC 2017 x86_64 x86_64 x86_64 GNU/Linux
Subsystem: if known, please specify affected core module name
* **Version**: node-v8.2.1
* **Platform**: Ubuntu 16.04 LTS -Linux 4.4.0-89-generic x86_64 x86_64 x86_64 GNU/Linux
* **Subsystem**:
tail of "make test"
```console
[----------] Global test environment tear-down
[==========] 47 tests from 6 test cases ran. (1410 ms total)
[ PASSED ] 47 tests.
/usr/bin/python tools/test.py --mode=release -J \
async-hooks doctool inspector known_issues message parallel pseudo-tty sequential \
addons addons-napi
=== release test-os ===
Path: parallel/test-os
assert.js:60
throw new errors.AssertionError({
^
AssertionError [ERR_ASSERTION]: [ { address: '127.0.0.1',
netmask: '255.0.0.0',
family: 'IPv4',
mac: '00:00:00:00:00:00',
internal: true },
{ deepStrictEqual [ { address: '127.0.0.1',
netmask: '255.0.0.0',
mac: '00:00:00:00:00:00',
family: 'IPv4',
internal: true } ]
at Object.<anonymous> (/home/developer2/node-v8.2.1/test/parallel/test-os.js:124:14)
at Module._compile (module.js:569:30)
at Object.Module._extensions..js (module.js:580:10)
at Module.load (module.js:503:32)
at tryModuleLoad (module.js:466:12)
at Function.Module._load (module.js:458:3)
at Function.Module.runMain (module.js:605:10)
at startup (bootstrap_node.js:158:16)
at bootstrap_node.js:575:3
Command: out/Release/node /home/developer2/node-v8.2.1/test/parallel/test-os.js
[07:49|% 100|+ 1635|- 1]: Done
Makefile:196: recipe for target 'test' failed
make: *** [test] Error 1
```
<sub>_(edited by @vsemozhetbyt: added backticks for the output block, delete template's comments residue)_</sub> | 1.0 | nodejs Makefile:196: recipe for target 'test' failed make: *** [test] Error 1 - Version: node-v8.2.1
Platform: Linux 4.4.0-89-generic #112-Ubuntu SMP Mon Jul 31 19:38:41 UTC 2017 x86_64 x86_64 x86_64 GNU/Linux
Subsystem: if known, please specify affected core module name
* **Version**: node-v8.2.1
* **Platform**: Ubuntu 16.04 LTS -Linux 4.4.0-89-generic x86_64 x86_64 x86_64 GNU/Linux
* **Subsystem**:
tail of "make test"
```console
[----------] Global test environment tear-down
[==========] 47 tests from 6 test cases ran. (1410 ms total)
[ PASSED ] 47 tests.
/usr/bin/python tools/test.py --mode=release -J \
async-hooks doctool inspector known_issues message parallel pseudo-tty sequential \
addons addons-napi
=== release test-os ===
Path: parallel/test-os
assert.js:60
throw new errors.AssertionError({
^
AssertionError [ERR_ASSERTION]: [ { address: '127.0.0.1',
netmask: '255.0.0.0',
family: 'IPv4',
mac: '00:00:00:00:00:00',
internal: true },
{ deepStrictEqual [ { address: '127.0.0.1',
netmask: '255.0.0.0',
mac: '00:00:00:00:00:00',
family: 'IPv4',
internal: true } ]
at Object.<anonymous> (/home/developer2/node-v8.2.1/test/parallel/test-os.js:124:14)
at Module._compile (module.js:569:30)
at Object.Module._extensions..js (module.js:580:10)
at Module.load (module.js:503:32)
at tryModuleLoad (module.js:466:12)
at Function.Module._load (module.js:458:3)
at Function.Module.runMain (module.js:605:10)
at startup (bootstrap_node.js:158:16)
at bootstrap_node.js:575:3
Command: out/Release/node /home/developer2/node-v8.2.1/test/parallel/test-os.js
[07:49|% 100|+ 1635|- 1]: Done
Makefile:196: recipe for target 'test' failed
make: *** [test] Error 1
```
<sub>_(edited by @vsemozhetbyt: added backticks for the output block, delete template's comments residue)_</sub> | non_priority | nodejs makefile recipe for target test failed make error version node platform linux generic ubuntu smp mon jul utc gnu linux subsystem if known please specify affected core module name version node platform ubuntu lts linux generic gnu linux subsystem tail of make test console global test environment tear down tests from test cases ran ms total tests usr bin python tools test py mode release j async hooks doctool inspector known issues message parallel pseudo tty sequential addons addons napi release test os path parallel test os assert js throw new errors assertionerror assertionerror address netmask family mac internal true deepstrictequal address netmask mac family internal true at object home node test parallel test os js at module compile module js at object module extensions js module js at module load module js at trymoduleload module js at function module load module js at function module runmain module js at startup bootstrap node js at bootstrap node js command out release node home node test parallel test os js done makefile recipe for target test failed make error edited by vsemozhetbyt added backticks for the output block delete template s comments residue | 0 |
401,864 | 27,340,460,538 | IssuesEvent | 2023-02-26 18:33:06 | JuliaHEP/UnROOT.jl | https://api.github.com/repos/JuliaHEP/UnROOT.jl | closed | Version selection in documentation is missing | documentation good first issue | I stumble upon this over and over and never have time to fix it immediately and then forget about it 😆 So let me create an issue, maybe someone has time to quickly skim over it. It should be easy (but I am in hurry again).
The version selection (bottom left corner of the docs) is stopped working after v0.1: https://juliahep.github.io/UnROOT.jl/dev/ | 1.0 | Version selection in documentation is missing - I stumble upon this over and over and never have time to fix it immediately and then forget about it 😆 So let me create an issue, maybe someone has time to quickly skim over it. It should be easy (but I am in hurry again).
The version selection (bottom left corner of the docs) is stopped working after v0.1: https://juliahep.github.io/UnROOT.jl/dev/ | non_priority | version selection in documentation is missing i stumble upon this over and over and never have time to fix it immediately and then forget about it 😆 so let me create an issue maybe someone has time to quickly skim over it it should be easy but i am in hurry again the version selection bottom left corner of the docs is stopped working after | 0 |
16,138 | 10,577,674,674 | IssuesEvent | 2019-10-07 20:38:58 | kids-first/kf-ui-data-tracker | https://api.github.com/repos/kids-first/kf-ui-data-tracker | opened | Study list view default for ADMIN users | usability improvement | user feedback from`ADMIN` role users suggest that by defaulting the study view to list/table view will allow them to more efficiently skim the study list | True | Study list view default for ADMIN users - user feedback from`ADMIN` role users suggest that by defaulting the study view to list/table view will allow them to more efficiently skim the study list | non_priority | study list view default for admin users user feedback from admin role users suggest that by defaulting the study view to list table view will allow them to more efficiently skim the study list | 0 |
402,870 | 27,391,514,068 | IssuesEvent | 2023-02-28 16:33:36 | scanapi/website | https://api.github.com/repos/scanapi/website | closed | Update `Quick Start` docs page with new Demo API | documentation | ## Description
We need to update the examples in the `Quick Start` docs page that uses demo.scanapi.dev/api/. We've [changed the API](https://github.com/scanapi/demo-api/issues/16) and the doc should reflect that | 1.0 | Update `Quick Start` docs page with new Demo API - ## Description
We need to update the examples in the `Quick Start` docs page that uses demo.scanapi.dev/api/. We've [changed the API](https://github.com/scanapi/demo-api/issues/16) and the doc should reflect that | non_priority | update quick start docs page with new demo api description we need to update the examples in the quick start docs page that uses demo scanapi dev api we ve and the doc should reflect that | 0 |
93,252 | 26,903,051,277 | IssuesEvent | 2023-02-06 16:56:25 | mogrifier/arduino | https://api.github.com/repos/mogrifier/arduino | closed | add IFS control knobs | synthbuild | 4 matrices- a,b,c,d - so 4 knobs. Analog sensor hookup. tight ranges on output map. (like -1 to 1 I think). | 1.0 | add IFS control knobs - 4 matrices- a,b,c,d - so 4 knobs. Analog sensor hookup. tight ranges on output map. (like -1 to 1 I think). | non_priority | add ifs control knobs matrices a b c d so knobs analog sensor hookup tight ranges on output map like to i think | 0 |
3,762 | 4,544,231,123 | IssuesEvent | 2016-09-10 15:31:12 | dotnet/corefx | https://api.github.com/repos/dotnet/corefx | closed | ExternalPackages versions.props lists incorrect versions | 3 - Ready For Review Infrastructure | https://github.com/dotnet/corefx/blob/master/pkg/ExternalPackages/versions.props lists the win10 non-aot packages as External, when it should list the aot packages. We do not ship the non-aot packages from TFS, so this file should be updated for correctness to:
```
<ExternalPackage Include="runtime.win10-amd64-aot.runtime.native.System.IO.Compression">
<Version>4.0.1-$(ExternalExpectedPrerelease)</Version>
</ExternalPackage>
<ExternalPackage Include="runtime.win10-arm-aot.runtime.native.System.IO.Compression">
<Version>4.0.1-$(ExternalExpectedPrerelease)</Version>
</ExternalPackage>
<ExternalPackage Include="runtime.win10-x86-aot.runtime.native.System.IO.Compression">
<Version>4.0.1-$(ExternalExpectedPrerelease)</Version>
</ExternalPackage>
```
This does raise the question of how it's currently functioning without errors, since it's looking for a package that does not exist.
@jhendrixMSFT @chcosta | 1.0 | ExternalPackages versions.props lists incorrect versions - https://github.com/dotnet/corefx/blob/master/pkg/ExternalPackages/versions.props lists the win10 non-aot packages as External, when it should list the aot packages. We do not ship the non-aot packages from TFS, so this file should be updated for correctness to:
```
<ExternalPackage Include="runtime.win10-amd64-aot.runtime.native.System.IO.Compression">
<Version>4.0.1-$(ExternalExpectedPrerelease)</Version>
</ExternalPackage>
<ExternalPackage Include="runtime.win10-arm-aot.runtime.native.System.IO.Compression">
<Version>4.0.1-$(ExternalExpectedPrerelease)</Version>
</ExternalPackage>
<ExternalPackage Include="runtime.win10-x86-aot.runtime.native.System.IO.Compression">
<Version>4.0.1-$(ExternalExpectedPrerelease)</Version>
</ExternalPackage>
```
This does raise the question of how it's currently functioning without errors, since it's looking for a package that does not exist.
@jhendrixMSFT @chcosta | non_priority | externalpackages versions props lists incorrect versions lists the non aot packages as external when it should list the aot packages we do not ship the non aot packages from tfs so this file should be updated for correctness to externalexpectedprerelease externalexpectedprerelease externalexpectedprerelease this does raise the question of how it s currently functioning without errors since it s looking for a package that does not exist jhendrixmsft chcosta | 0 |
89,884 | 18,045,489,156 | IssuesEvent | 2021-09-18 20:35:15 | julz0815/veracode-flaws-to-issues | https://api.github.com/repos/julz0815/veracode-flaws-to-issues | closed | Improper Output Neutralization for Logs ('CRLF Injection') [VID:4] | VeracodeFlaw: Medium Veracode Policy Scan | NaN:L2375
**Filename:** UserController.java
**Line:** 237
**CWE:** 117 (Improper Output Neutralization for Logs ('CRLF Injection'))
<span>This call to org.apache.log4j.Category.info() could result in a log forging attack. Writing untrusted data into a log file allows an attacker to forge log entries or inject malicious content into log files. Corrupted log files can be used to cover an attacker's tracks or as a delivery mechanism for an attack on a log viewing or processing utility. For example, if a web administrator uses a browser-based utility to review logs, a cross-site scripting attack might be possible. The first argument to info() contains tainted data. The tainted data originated from an earlier call to AnnotationVirtualController.vc_annotation_entry.</span> <span>Avoid directly embedding user input in log files when possible. Sanitize untrusted data used to construct log entries by using a safe logging mechanism such as the OWASP ESAPI Logger, which will automatically remove unexpected carriage returns and line feeds and can be configured to use HTML entity encoding for non-alphanumeric data. Alternatively, some of the XSS escaping functions from the OWASP Java Encoder project will also sanitize CRLF sequences. Only create a custom blocklist when absolutely necessary. Always validate untrusted input to ensure that it conforms to the expected format, using centralized data validation routines when possible.</span> <span>References: <a href="https://cwe.mitre.org/data/definitions/117.html">CWE</a> <a href="https://www.owasp.org/index.php/Log_injection">OWASP</a> <a href="https://webappsec.pbworks.com/Improper-Output-Handling">WASC</a> <a href="https://help.veracode.com/reader/4EKhlLSMHm5jC8P8j3XccQ/IiF_rOE79ANbwnZwreSPGA">Supported Cleansers</a></span> | 2.0 | Improper Output Neutralization for Logs ('CRLF Injection') [VID:4] - NaN:L2375
**Filename:** UserController.java
**Line:** 237
**CWE:** 117 (Improper Output Neutralization for Logs ('CRLF Injection'))
<span>This call to org.apache.log4j.Category.info() could result in a log forging attack. Writing untrusted data into a log file allows an attacker to forge log entries or inject malicious content into log files. Corrupted log files can be used to cover an attacker's tracks or as a delivery mechanism for an attack on a log viewing or processing utility. For example, if a web administrator uses a browser-based utility to review logs, a cross-site scripting attack might be possible. The first argument to info() contains tainted data. The tainted data originated from an earlier call to AnnotationVirtualController.vc_annotation_entry.</span> <span>Avoid directly embedding user input in log files when possible. Sanitize untrusted data used to construct log entries by using a safe logging mechanism such as the OWASP ESAPI Logger, which will automatically remove unexpected carriage returns and line feeds and can be configured to use HTML entity encoding for non-alphanumeric data. Alternatively, some of the XSS escaping functions from the OWASP Java Encoder project will also sanitize CRLF sequences. Only create a custom blocklist when absolutely necessary. Always validate untrusted input to ensure that it conforms to the expected format, using centralized data validation routines when possible.</span> <span>References: <a href="https://cwe.mitre.org/data/definitions/117.html">CWE</a> <a href="https://www.owasp.org/index.php/Log_injection">OWASP</a> <a href="https://webappsec.pbworks.com/Improper-Output-Handling">WASC</a> <a href="https://help.veracode.com/reader/4EKhlLSMHm5jC8P8j3XccQ/IiF_rOE79ANbwnZwreSPGA">Supported Cleansers</a></span> | non_priority | improper output neutralization for logs crlf injection nan filename usercontroller java line cwe improper output neutralization for logs crlf injection this call to org apache category info could result in a log forging attack writing untrusted data into a log file allows an attacker to forge log entries or inject malicious content into log files corrupted log files can be used to cover an attacker s tracks or as a delivery mechanism for an attack on a log viewing or processing utility for example if a web administrator uses a browser based utility to review logs a cross site scripting attack might be possible the first argument to info contains tainted data the tainted data originated from an earlier call to annotationvirtualcontroller vc annotation entry avoid directly embedding user input in log files when possible sanitize untrusted data used to construct log entries by using a safe logging mechanism such as the owasp esapi logger which will automatically remove unexpected carriage returns and line feeds and can be configured to use html entity encoding for non alphanumeric data alternatively some of the xss escaping functions from the owasp java encoder project will also sanitize crlf sequences only create a custom blocklist when absolutely necessary always validate untrusted input to ensure that it conforms to the expected format using centralized data validation routines when possible references | 0 |
276,963 | 24,035,427,330 | IssuesEvent | 2022-09-15 18:41:47 | Isaac-Sousa/Projeto_validacao | https://api.github.com/repos/Isaac-Sousa/Projeto_validacao | closed | Nova autenticação | Implementar Segurança Banco Teste | A criptografia usada não pode ser revertida, mas pode-se checar se o valor criptografado bate com uma string, e por meio de tal deve-se ser feito uma autenticação para que o usuário só entre com sua senha. | 1.0 | Nova autenticação - A criptografia usada não pode ser revertida, mas pode-se checar se o valor criptografado bate com uma string, e por meio de tal deve-se ser feito uma autenticação para que o usuário só entre com sua senha. | non_priority | nova autenticação a criptografia usada não pode ser revertida mas pode se checar se o valor criptografado bate com uma string e por meio de tal deve se ser feito uma autenticação para que o usuário só entre com sua senha | 0 |
65,033 | 6,937,135,198 | IssuesEvent | 2017-12-04 02:39:05 | naver/egjs-view360 | https://api.github.com/repos/naver/egjs-view360 | opened | Suuport adaptive test image for renderer test | test | ## Description
The rendering test is failing when it has non HiDPI display.
Because the test image is from HiDPI display. | 1.0 | Suuport adaptive test image for renderer test - ## Description
The rendering test is failing when it has non HiDPI display.
Because the test image is from HiDPI display. | non_priority | suuport adaptive test image for renderer test description the rendering test is failing when it has non hidpi display because the test image is from hidpi display | 0 |
222,010 | 17,032,056,508 | IssuesEvent | 2021-07-04 19:23:21 | TsubakiBotPad/pad-cogs | https://api.github.com/repos/TsubakiBotPad/pad-cogs | closed | Delete some of the examples in aep add docstring | documentation enhancement padevents | Delete these examples:
* ^aep add rubydra NA "ruby dragon"
* ^aep add ekmd NA "Extreme King Metal Dragon" @red @blue @green
* ^aep add monday JP "monday dungeon" @eventping
* ^aep add tama NA "tama" #channel | 1.0 | Delete some of the examples in aep add docstring - Delete these examples:
* ^aep add rubydra NA "ruby dragon"
* ^aep add ekmd NA "Extreme King Metal Dragon" @red @blue @green
* ^aep add monday JP "monday dungeon" @eventping
* ^aep add tama NA "tama" #channel | non_priority | delete some of the examples in aep add docstring delete these examples aep add rubydra na ruby dragon aep add ekmd na extreme king metal dragon red blue green aep add monday jp monday dungeon eventping aep add tama na tama channel | 0 |
53,417 | 13,261,584,905 | IssuesEvent | 2020-08-20 20:09:58 | icecube-trac/tix4 | https://api.github.com/repos/icecube-trac/tix4 | closed | steamshovel remove segfault (Trac #1355) | Migrated from Trac combo reconstruction defect | Steamshovel keeps segfaulting when I try to remove stuff. No difference if an event is currently displayed or not. I'm using icerec-V04-11-02 and Ubuntu 15.04, but it happened with earlier releases and Ubuntu versions (14.04) as well. Apparently nobody else has this problem...
<details>
<summary><em>Migrated from <a href="https://code.icecube.wisc.edu/projects/icecube/ticket/1355">https://code.icecube.wisc.edu/projects/icecube/ticket/1355</a>, reported by berghaus</summary>
<p>
```json
{
"status": "closed",
"changetime": "2015-10-29T10:55:37",
"_ts": "1446116137408985",
"description": "Steamshovel keeps segfaulting when I try to remove stuff. No difference if an event is currently displayed or not. I'm using icerec-V04-11-02 and Ubuntu 15.04, but it happened with earlier releases and Ubuntu versions (14.04) as well. Apparently nobody else has this problem...",
"reporter": "berghaus",
"cc": "",
"resolution": "invalid",
"time": "2015-09-18T07:21:20",
"component": "combo reconstruction",
"summary": "steamshovel remove segfault",
"priority": "normal",
"keywords": "",
"milestone": "",
"owner": "",
"type": "defect"
}
```
</p>
</details>
| 1.0 | steamshovel remove segfault (Trac #1355) - Steamshovel keeps segfaulting when I try to remove stuff. No difference if an event is currently displayed or not. I'm using icerec-V04-11-02 and Ubuntu 15.04, but it happened with earlier releases and Ubuntu versions (14.04) as well. Apparently nobody else has this problem...
<details>
<summary><em>Migrated from <a href="https://code.icecube.wisc.edu/projects/icecube/ticket/1355">https://code.icecube.wisc.edu/projects/icecube/ticket/1355</a>, reported by berghaus</summary>
<p>
```json
{
"status": "closed",
"changetime": "2015-10-29T10:55:37",
"_ts": "1446116137408985",
"description": "Steamshovel keeps segfaulting when I try to remove stuff. No difference if an event is currently displayed or not. I'm using icerec-V04-11-02 and Ubuntu 15.04, but it happened with earlier releases and Ubuntu versions (14.04) as well. Apparently nobody else has this problem...",
"reporter": "berghaus",
"cc": "",
"resolution": "invalid",
"time": "2015-09-18T07:21:20",
"component": "combo reconstruction",
"summary": "steamshovel remove segfault",
"priority": "normal",
"keywords": "",
"milestone": "",
"owner": "",
"type": "defect"
}
```
</p>
</details>
| non_priority | steamshovel remove segfault trac steamshovel keeps segfaulting when i try to remove stuff no difference if an event is currently displayed or not i m using icerec and ubuntu but it happened with earlier releases and ubuntu versions as well apparently nobody else has this problem migrated from json status closed changetime ts description steamshovel keeps segfaulting when i try to remove stuff no difference if an event is currently displayed or not i m using icerec and ubuntu but it happened with earlier releases and ubuntu versions as well apparently nobody else has this problem reporter berghaus cc resolution invalid time component combo reconstruction summary steamshovel remove segfault priority normal keywords milestone owner type defect | 0 |
163,549 | 20,363,878,120 | IssuesEvent | 2022-02-21 01:39:47 | rlennon/whitesource_bolt_demo | https://api.github.com/repos/rlennon/whitesource_bolt_demo | opened | CVE-2022-0512 (High) detected in url-parse-1.4.7.tgz | security vulnerability | ## CVE-2022-0512 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>url-parse-1.4.7.tgz</b></p></summary>
<p>Small footprint URL parser that works seamlessly across Node.js and browser environments</p>
<p>Library home page: <a href="https://registry.npmjs.org/url-parse/-/url-parse-1.4.7.tgz">https://registry.npmjs.org/url-parse/-/url-parse-1.4.7.tgz</a></p>
<p>Path to dependency file: /portainer-develop/portainer-develop/package.json</p>
<p>Path to vulnerable library: /portainer-develop/portainer-develop/node_modules/url-parse/package.json</p>
<p>
Dependency Hierarchy:
- webpack-dev-server-3.11.0.tgz (Root Library)
- sockjs-client-1.4.0.tgz
- :x: **url-parse-1.4.7.tgz** (Vulnerable Library)
<p>Found in base branch: <b>main</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Authorization Bypass Through User-Controlled Key in NPM url-parse prior to 1.5.6.
<p>Publish Date: 2022-02-14
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-0512>CVE-2022-0512</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0512">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0512</a></p>
<p>Release Date: 2022-02-14</p>
<p>Fix Resolution: url-parse - 1.5.6</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2022-0512 (High) detected in url-parse-1.4.7.tgz - ## CVE-2022-0512 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>url-parse-1.4.7.tgz</b></p></summary>
<p>Small footprint URL parser that works seamlessly across Node.js and browser environments</p>
<p>Library home page: <a href="https://registry.npmjs.org/url-parse/-/url-parse-1.4.7.tgz">https://registry.npmjs.org/url-parse/-/url-parse-1.4.7.tgz</a></p>
<p>Path to dependency file: /portainer-develop/portainer-develop/package.json</p>
<p>Path to vulnerable library: /portainer-develop/portainer-develop/node_modules/url-parse/package.json</p>
<p>
Dependency Hierarchy:
- webpack-dev-server-3.11.0.tgz (Root Library)
- sockjs-client-1.4.0.tgz
- :x: **url-parse-1.4.7.tgz** (Vulnerable Library)
<p>Found in base branch: <b>main</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Authorization Bypass Through User-Controlled Key in NPM url-parse prior to 1.5.6.
<p>Publish Date: 2022-02-14
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-0512>CVE-2022-0512</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0512">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0512</a></p>
<p>Release Date: 2022-02-14</p>
<p>Fix Resolution: url-parse - 1.5.6</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve high detected in url parse tgz cve high severity vulnerability vulnerable library url parse tgz small footprint url parser that works seamlessly across node js and browser environments library home page a href path to dependency file portainer develop portainer develop package json path to vulnerable library portainer develop portainer develop node modules url parse package json dependency hierarchy webpack dev server tgz root library sockjs client tgz x url parse tgz vulnerable library found in base branch main vulnerability details authorization bypass through user controlled key in npm url parse prior to publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution url parse step up your open source security game with whitesource | 0 |
124,982 | 17,795,137,588 | IssuesEvent | 2021-08-31 21:03:49 | ghc-dev/Zachary-Knight | https://api.github.com/repos/ghc-dev/Zachary-Knight | opened | CVE-2020-9488 (Low) detected in log4j-core-2.8.2.jar | security vulnerability | ## CVE-2020-9488 - Low Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>log4j-core-2.8.2.jar</b></p></summary>
<p>The Apache Log4j Implementation</p>
<p>Library home page: <a href="https://logging.apache.org/log4j/2.x/log4j-core/">https://logging.apache.org/log4j/2.x/log4j-core/</a></p>
<p>Path to dependency file: Zachary-Knight/pom.xml</p>
<p>Path to vulnerable library: sitory/org/apache/logging/log4j/log4j-core/2.8.2/log4j-core-2.8.2.jar</p>
<p>
Dependency Hierarchy:
- :x: **log4j-core-2.8.2.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/ghc-dev/Zachary-Knight/commit/26a3dc5f4e559bfa4d5aa28747e9179df86729e6">26a3dc5f4e559bfa4d5aa28747e9179df86729e6</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Improper validation of certificate with host mismatch in Apache Log4j SMTP appender. This could allow an SMTPS connection to be intercepted by a man-in-the-middle attack which could leak any log messages sent through that appender.
<p>Publish Date: 2020-04-27
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-9488>CVE-2020-9488</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>3.7</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://issues.apache.org/jira/browse/LOG4J2-2819">https://issues.apache.org/jira/browse/LOG4J2-2819</a></p>
<p>Release Date: 2020-04-27</p>
<p>Fix Resolution: org.apache.logging.log4j:log4j-core:2.13.2</p>
</p>
</details>
<p></p>
***
:rescue_worker_helmet: Automatic Remediation is available for this issue
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"org.apache.logging.log4j","packageName":"log4j-core","packageVersion":"2.8.2","packageFilePaths":["/pom.xml"],"isTransitiveDependency":false,"dependencyTree":"org.apache.logging.log4j:log4j-core:2.8.2","isMinimumFixVersionAvailable":true,"minimumFixVersion":"org.apache.logging.log4j:log4j-core:2.13.2"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-9488","vulnerabilityDetails":"Improper validation of certificate with host mismatch in Apache Log4j SMTP appender. This could allow an SMTPS connection to be intercepted by a man-in-the-middle attack which could leak any log messages sent through that appender.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-9488","cvss3Severity":"low","cvss3Score":"3.7","cvss3Metrics":{"A":"None","AC":"High","PR":"None","S":"Unchanged","C":"Low","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> --> | True | CVE-2020-9488 (Low) detected in log4j-core-2.8.2.jar - ## CVE-2020-9488 - Low Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>log4j-core-2.8.2.jar</b></p></summary>
<p>The Apache Log4j Implementation</p>
<p>Library home page: <a href="https://logging.apache.org/log4j/2.x/log4j-core/">https://logging.apache.org/log4j/2.x/log4j-core/</a></p>
<p>Path to dependency file: Zachary-Knight/pom.xml</p>
<p>Path to vulnerable library: sitory/org/apache/logging/log4j/log4j-core/2.8.2/log4j-core-2.8.2.jar</p>
<p>
Dependency Hierarchy:
- :x: **log4j-core-2.8.2.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/ghc-dev/Zachary-Knight/commit/26a3dc5f4e559bfa4d5aa28747e9179df86729e6">26a3dc5f4e559bfa4d5aa28747e9179df86729e6</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Improper validation of certificate with host mismatch in Apache Log4j SMTP appender. This could allow an SMTPS connection to be intercepted by a man-in-the-middle attack which could leak any log messages sent through that appender.
<p>Publish Date: 2020-04-27
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-9488>CVE-2020-9488</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>3.7</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://issues.apache.org/jira/browse/LOG4J2-2819">https://issues.apache.org/jira/browse/LOG4J2-2819</a></p>
<p>Release Date: 2020-04-27</p>
<p>Fix Resolution: org.apache.logging.log4j:log4j-core:2.13.2</p>
</p>
</details>
<p></p>
***
:rescue_worker_helmet: Automatic Remediation is available for this issue
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"org.apache.logging.log4j","packageName":"log4j-core","packageVersion":"2.8.2","packageFilePaths":["/pom.xml"],"isTransitiveDependency":false,"dependencyTree":"org.apache.logging.log4j:log4j-core:2.8.2","isMinimumFixVersionAvailable":true,"minimumFixVersion":"org.apache.logging.log4j:log4j-core:2.13.2"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-9488","vulnerabilityDetails":"Improper validation of certificate with host mismatch in Apache Log4j SMTP appender. This could allow an SMTPS connection to be intercepted by a man-in-the-middle attack which could leak any log messages sent through that appender.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-9488","cvss3Severity":"low","cvss3Score":"3.7","cvss3Metrics":{"A":"None","AC":"High","PR":"None","S":"Unchanged","C":"Low","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> --> | non_priority | cve low detected in core jar cve low severity vulnerability vulnerable library core jar the apache implementation library home page a href path to dependency file zachary knight pom xml path to vulnerable library sitory org apache logging core core jar dependency hierarchy x core jar vulnerable library found in head commit a href found in base branch master vulnerability details improper validation of certificate with host mismatch in apache smtp appender this could allow an smtps connection to be intercepted by a man in the middle attack which could leak any log messages sent through that appender publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org apache logging core rescue worker helmet automatic remediation is available for this issue isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency false dependencytree org apache logging core isminimumfixversionavailable true minimumfixversion org apache logging core basebranches vulnerabilityidentifier cve vulnerabilitydetails improper validation of certificate with host mismatch in apache smtp appender this could allow an smtps connection to be intercepted by a man in the middle attack which could leak any log messages sent through that appender vulnerabilityurl | 0 |
214,471 | 24,077,713,040 | IssuesEvent | 2022-09-19 01:03:08 | DavidSpek/kubeflownotebooks | https://api.github.com/repos/DavidSpek/kubeflownotebooks | opened | CVE-2022-35941 (Medium) detected in tensorflow_gpu-2.8.0-cp37-cp37m-manylinux2010_x86_64.whl, tensorflow-2.8.0-cp37-cp37m-manylinux2010_x86_64.whl | security vulnerability | ## CVE-2022-35941 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>tensorflow_gpu-2.8.0-cp37-cp37m-manylinux2010_x86_64.whl</b>, <b>tensorflow-2.8.0-cp37-cp37m-manylinux2010_x86_64.whl</b></p></summary>
<p>
<details><summary><b>tensorflow_gpu-2.8.0-cp37-cp37m-manylinux2010_x86_64.whl</b></p></summary>
<p>TensorFlow is an open source machine learning framework for everyone.</p>
<p>Library home page: <a href="https://files.pythonhosted.org/packages/d8/d4/9fe4a157732125206185970c6e673483468bda299378be52bc4b8e765943/tensorflow_gpu-2.8.0-cp37-cp37m-manylinux2010_x86_64.whl">https://files.pythonhosted.org/packages/d8/d4/9fe4a157732125206185970c6e673483468bda299378be52bc4b8e765943/tensorflow_gpu-2.8.0-cp37-cp37m-manylinux2010_x86_64.whl</a></p>
<p>Path to dependency file: /jupyter-tensorflow/cuda-requirements.txt</p>
<p>Path to vulnerable library: /jupyter-tensorflow/cuda-requirements.txt</p>
<p>
Dependency Hierarchy:
- :x: **tensorflow_gpu-2.8.0-cp37-cp37m-manylinux2010_x86_64.whl** (Vulnerable Library)
</details>
<details><summary><b>tensorflow-2.8.0-cp37-cp37m-manylinux2010_x86_64.whl</b></p></summary>
<p>TensorFlow is an open source machine learning framework for everyone.</p>
<p>Library home page: <a href="https://files.pythonhosted.org/packages/31/66/d9cd0b850397dbd33f070cc371a183b4903120b1c103419e9bf20568456e/tensorflow-2.8.0-cp37-cp37m-manylinux2010_x86_64.whl">https://files.pythonhosted.org/packages/31/66/d9cd0b850397dbd33f070cc371a183b4903120b1c103419e9bf20568456e/tensorflow-2.8.0-cp37-cp37m-manylinux2010_x86_64.whl</a></p>
<p>Path to dependency file: /jupyter-tensorflow/cpu-requirements.txt</p>
<p>Path to vulnerable library: /jupyter-tensorflow/cpu-requirements.txt</p>
<p>
Dependency Hierarchy:
- :x: **tensorflow-2.8.0-cp37-cp37m-manylinux2010_x86_64.whl** (Vulnerable Library)
</details>
<p>Found in HEAD commit: <a href="https://github.com/DavidSpek/kubeflownotebooks/commit/513157c5d3f5743d53e228da1ec8289e92c92836">513157c5d3f5743d53e228da1ec8289e92c92836</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
TensorFlow is an open source platform for machine learning. The `AvgPoolOp` function takes an argument `ksize` that must be positive but is not checked. A negative `ksize` can trigger a `CHECK` failure and crash the program. We have patched the issue in GitHub commit 3a6ac52664c6c095aa2b114e742b0aa17fdce78f. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds to this issue.
<p>Publish Date: 2022-09-16
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-35941>CVE-2022-35941</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.9</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rh87-q4vg-m45j">https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rh87-q4vg-m45j</a></p>
<p>Release Date: 2022-09-16</p>
<p>Fix Resolution: tensorflow - 2.7.2,2.8.1,2.9.1,2.10.0, tensorflow-cpu - 2.7.2,2.8.1,2.9.1,2.10.0, tensorflow-gpu - 2.7.2,2.8.1,2.9.1,2.10.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2022-35941 (Medium) detected in tensorflow_gpu-2.8.0-cp37-cp37m-manylinux2010_x86_64.whl, tensorflow-2.8.0-cp37-cp37m-manylinux2010_x86_64.whl - ## CVE-2022-35941 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>tensorflow_gpu-2.8.0-cp37-cp37m-manylinux2010_x86_64.whl</b>, <b>tensorflow-2.8.0-cp37-cp37m-manylinux2010_x86_64.whl</b></p></summary>
<p>
<details><summary><b>tensorflow_gpu-2.8.0-cp37-cp37m-manylinux2010_x86_64.whl</b></p></summary>
<p>TensorFlow is an open source machine learning framework for everyone.</p>
<p>Library home page: <a href="https://files.pythonhosted.org/packages/d8/d4/9fe4a157732125206185970c6e673483468bda299378be52bc4b8e765943/tensorflow_gpu-2.8.0-cp37-cp37m-manylinux2010_x86_64.whl">https://files.pythonhosted.org/packages/d8/d4/9fe4a157732125206185970c6e673483468bda299378be52bc4b8e765943/tensorflow_gpu-2.8.0-cp37-cp37m-manylinux2010_x86_64.whl</a></p>
<p>Path to dependency file: /jupyter-tensorflow/cuda-requirements.txt</p>
<p>Path to vulnerable library: /jupyter-tensorflow/cuda-requirements.txt</p>
<p>
Dependency Hierarchy:
- :x: **tensorflow_gpu-2.8.0-cp37-cp37m-manylinux2010_x86_64.whl** (Vulnerable Library)
</details>
<details><summary><b>tensorflow-2.8.0-cp37-cp37m-manylinux2010_x86_64.whl</b></p></summary>
<p>TensorFlow is an open source machine learning framework for everyone.</p>
<p>Library home page: <a href="https://files.pythonhosted.org/packages/31/66/d9cd0b850397dbd33f070cc371a183b4903120b1c103419e9bf20568456e/tensorflow-2.8.0-cp37-cp37m-manylinux2010_x86_64.whl">https://files.pythonhosted.org/packages/31/66/d9cd0b850397dbd33f070cc371a183b4903120b1c103419e9bf20568456e/tensorflow-2.8.0-cp37-cp37m-manylinux2010_x86_64.whl</a></p>
<p>Path to dependency file: /jupyter-tensorflow/cpu-requirements.txt</p>
<p>Path to vulnerable library: /jupyter-tensorflow/cpu-requirements.txt</p>
<p>
Dependency Hierarchy:
- :x: **tensorflow-2.8.0-cp37-cp37m-manylinux2010_x86_64.whl** (Vulnerable Library)
</details>
<p>Found in HEAD commit: <a href="https://github.com/DavidSpek/kubeflownotebooks/commit/513157c5d3f5743d53e228da1ec8289e92c92836">513157c5d3f5743d53e228da1ec8289e92c92836</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
TensorFlow is an open source platform for machine learning. The `AvgPoolOp` function takes an argument `ksize` that must be positive but is not checked. A negative `ksize` can trigger a `CHECK` failure and crash the program. We have patched the issue in GitHub commit 3a6ac52664c6c095aa2b114e742b0aa17fdce78f. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds to this issue.
<p>Publish Date: 2022-09-16
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-35941>CVE-2022-35941</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.9</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rh87-q4vg-m45j">https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rh87-q4vg-m45j</a></p>
<p>Release Date: 2022-09-16</p>
<p>Fix Resolution: tensorflow - 2.7.2,2.8.1,2.9.1,2.10.0, tensorflow-cpu - 2.7.2,2.8.1,2.9.1,2.10.0, tensorflow-gpu - 2.7.2,2.8.1,2.9.1,2.10.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve medium detected in tensorflow gpu whl tensorflow whl cve medium severity vulnerability vulnerable libraries tensorflow gpu whl tensorflow whl tensorflow gpu whl tensorflow is an open source machine learning framework for everyone library home page a href path to dependency file jupyter tensorflow cuda requirements txt path to vulnerable library jupyter tensorflow cuda requirements txt dependency hierarchy x tensorflow gpu whl vulnerable library tensorflow whl tensorflow is an open source machine learning framework for everyone library home page a href path to dependency file jupyter tensorflow cpu requirements txt path to vulnerable library jupyter tensorflow cpu requirements txt dependency hierarchy x tensorflow whl vulnerable library found in head commit a href found in base branch master vulnerability details tensorflow is an open source platform for machine learning the avgpoolop function takes an argument ksize that must be positive but is not checked a negative ksize can trigger a check failure and crash the program we have patched the issue in github commit the fix will be included in tensorflow we will also cherrypick this commit on tensorflow tensorflow and tensorflow as these are also affected and still in supported range there are no known workarounds to this issue publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution tensorflow tensorflow cpu tensorflow gpu step up your open source security game with mend | 0 |
280,044 | 21,192,285,010 | IssuesEvent | 2022-04-08 18:54:40 | kiwiproject/kiwi | https://api.github.com/repos/kiwiproject/kiwi | closed | Make retrying-again a link in Background Information section in KiwiRetryer | documentation | Make the "retrying-again" project reference a hyperlink in the _Background Information_ section of `KiwiRetryer`'s javadocs | 1.0 | Make retrying-again a link in Background Information section in KiwiRetryer - Make the "retrying-again" project reference a hyperlink in the _Background Information_ section of `KiwiRetryer`'s javadocs | non_priority | make retrying again a link in background information section in kiwiretryer make the retrying again project reference a hyperlink in the background information section of kiwiretryer s javadocs | 0 |
8,644 | 7,543,487,686 | IssuesEvent | 2018-04-17 15:38:35 | Mobsya/aseba | https://api.github.com/repos/Mobsya/aseba | opened | Check and notify user when new binaries are available | Infrastructure Mobsya Wish | <a href="https://github.com/vaussard"><img src="https://avatars0.githubusercontent.com/u/974146?v=4" align="left" width="96" height="96" hspace="10"></img></a> **Issue by [vaussard](https://github.com/vaussard)**
_Thursday Sep 15, 2011 at 09:27 GMT_
_Originally opened as https://github.com/aseba-community/aseba/issues/5_
----
As we now have a central place for binaries, Aseba Studio should offer the possibility to check for updates, and possibly launch the update process, or at least notify the user on how to update.
Maybe should this be part of a separate program, mainly Aseba Updater?
| 1.0 | Check and notify user when new binaries are available - <a href="https://github.com/vaussard"><img src="https://avatars0.githubusercontent.com/u/974146?v=4" align="left" width="96" height="96" hspace="10"></img></a> **Issue by [vaussard](https://github.com/vaussard)**
_Thursday Sep 15, 2011 at 09:27 GMT_
_Originally opened as https://github.com/aseba-community/aseba/issues/5_
----
As we now have a central place for binaries, Aseba Studio should offer the possibility to check for updates, and possibly launch the update process, or at least notify the user on how to update.
Maybe should this be part of a separate program, mainly Aseba Updater?
| non_priority | check and notify user when new binaries are available issue by thursday sep at gmt originally opened as as we now have a central place for binaries aseba studio should offer the possibility to check for updates and possibly launch the update process or at least notify the user on how to update maybe should this be part of a separate program mainly aseba updater | 0 |
178,102 | 29,498,296,657 | IssuesEvent | 2023-06-02 19:02:58 | microsoft/TypeScript | https://api.github.com/repos/microsoft/TypeScript | opened | Design Meeting Notes, 6/2/2023 | Design Notes | # Import Assertions / Import Attributes
```ts
import Resource from "./some-json-file.json" with { type: "json" };
```
```ts
import Resource from "./some-json-file.json" assert { type: "json" };
```
* At last TC39, progressed *conditionally* - some paperwork to be done.
* Babel and at least one other implementer has it.
* Node merged (shipped?) this already.
* Probably safe - but we want concrete stage 3 to make sure.
* Feels like we need confidence for at least syntax - should be able to use the `with` syntax instead of `assert` as soon as it hits stage 3.
* But new semantics are tougher - this is a feature that is largely implementation defined. Unless we have a strong vision or the community coalesces on semantics, it is hard for us to figure out.
* Will wait on true stage 3.
# Plugins!
* 3 things we've been talking a lot about
* Watch plugins
* Module resolution
* Transformer (emit)
* Also, module resolution has some asymmetry with the language service - generating a `.d.ts` on the fly for a GraphQL schema/query would mean you have to save a file on disk.
* The most common thing is for CSS.
* Ties into issues around the `System` interface expecting `string`s instead of binary buffers.
* How do you map back an error span back to a binary?
* Why did we start exploring transformer plugins?
* Wanted people to stop patching TypeScript.
* Patchers said they'd keep maintaining ts-patch.
* Arguable that transformer plugins just fragment things more. esbuild, swc, Babel, Bun, Deno - none of them could leverage these transformers.
* Feels like one of the concerns is type-driven emit, right?
* Maybe, but also having parity mismatch is its own issue between all of these compilers.
* People do use our output, but the marketplace for TypeScript compilers is broad.
* Really what you'd want to do is describe how the code will be changed before it hits the checker.
* e.g. transforms over a tagged template string to give better types
* Mixed feelings about supporting that.
* Lose invariants - need to know which kinds of nodes occur in the tree.
* Could do a walk of the tree.
* Really prefer having a source of truth on disk if possible (i.e. a `.d.ts` file or something)
* "Running" things in the type system is slow and hits recursion limiters. Eventually might need to think about a way to enable these scenarios.
* We probably would be best-served by splitting up the umbrella "compiler plugins" issue into 6 new issues so we can discuss them with some more clarity.
* Watch
* Transform
* Resolution
* Post-Execution (e.g. linting)
* Post-parse
* Mid-Check (?)
* ...?
| 1.0 | Design Meeting Notes, 6/2/2023 - # Import Assertions / Import Attributes
```ts
import Resource from "./some-json-file.json" with { type: "json" };
```
```ts
import Resource from "./some-json-file.json" assert { type: "json" };
```
* At last TC39, progressed *conditionally* - some paperwork to be done.
* Babel and at least one other implementer has it.
* Node merged (shipped?) this already.
* Probably safe - but we want concrete stage 3 to make sure.
* Feels like we need confidence for at least syntax - should be able to use the `with` syntax instead of `assert` as soon as it hits stage 3.
* But new semantics are tougher - this is a feature that is largely implementation defined. Unless we have a strong vision or the community coalesces on semantics, it is hard for us to figure out.
* Will wait on true stage 3.
# Plugins!
* 3 things we've been talking a lot about
* Watch plugins
* Module resolution
* Transformer (emit)
* Also, module resolution has some asymmetry with the language service - generating a `.d.ts` on the fly for a GraphQL schema/query would mean you have to save a file on disk.
* The most common thing is for CSS.
* Ties into issues around the `System` interface expecting `string`s instead of binary buffers.
* How do you map back an error span back to a binary?
* Why did we start exploring transformer plugins?
* Wanted people to stop patching TypeScript.
* Patchers said they'd keep maintaining ts-patch.
* Arguable that transformer plugins just fragment things more. esbuild, swc, Babel, Bun, Deno - none of them could leverage these transformers.
* Feels like one of the concerns is type-driven emit, right?
* Maybe, but also having parity mismatch is its own issue between all of these compilers.
* People do use our output, but the marketplace for TypeScript compilers is broad.
* Really what you'd want to do is describe how the code will be changed before it hits the checker.
* e.g. transforms over a tagged template string to give better types
* Mixed feelings about supporting that.
* Lose invariants - need to know which kinds of nodes occur in the tree.
* Could do a walk of the tree.
* Really prefer having a source of truth on disk if possible (i.e. a `.d.ts` file or something)
* "Running" things in the type system is slow and hits recursion limiters. Eventually might need to think about a way to enable these scenarios.
* We probably would be best-served by splitting up the umbrella "compiler plugins" issue into 6 new issues so we can discuss them with some more clarity.
* Watch
* Transform
* Resolution
* Post-Execution (e.g. linting)
* Post-parse
* Mid-Check (?)
* ...?
| non_priority | design meeting notes import assertions import attributes ts import resource from some json file json with type json ts import resource from some json file json assert type json at last progressed conditionally some paperwork to be done babel and at least one other implementer has it node merged shipped this already probably safe but we want concrete stage to make sure feels like we need confidence for at least syntax should be able to use the with syntax instead of assert as soon as it hits stage but new semantics are tougher this is a feature that is largely implementation defined unless we have a strong vision or the community coalesces on semantics it is hard for us to figure out will wait on true stage plugins things we ve been talking a lot about watch plugins module resolution transformer emit also module resolution has some asymmetry with the language service generating a d ts on the fly for a graphql schema query would mean you have to save a file on disk the most common thing is for css ties into issues around the system interface expecting string s instead of binary buffers how do you map back an error span back to a binary why did we start exploring transformer plugins wanted people to stop patching typescript patchers said they d keep maintaining ts patch arguable that transformer plugins just fragment things more esbuild swc babel bun deno none of them could leverage these transformers feels like one of the concerns is type driven emit right maybe but also having parity mismatch is its own issue between all of these compilers people do use our output but the marketplace for typescript compilers is broad really what you d want to do is describe how the code will be changed before it hits the checker e g transforms over a tagged template string to give better types mixed feelings about supporting that lose invariants need to know which kinds of nodes occur in the tree could do a walk of the tree really prefer having a source of truth on disk if possible i e a d ts file or something running things in the type system is slow and hits recursion limiters eventually might need to think about a way to enable these scenarios we probably would be best served by splitting up the umbrella compiler plugins issue into new issues so we can discuss them with some more clarity watch transform resolution post execution e g linting post parse mid check | 0 |
30,846 | 4,662,176,544 | IssuesEvent | 2016-10-05 02:01:19 | metabase/metabase | https://api.github.com/repos/metabase/metabase | closed | Permissions Stage 1 Test Suite | CI & Tests Permissions Security | This enumerates a test suite for rules in #3362
All of these scenarios must be tested before releasing 0.20
**Setup**
Databases
* DB-A - Sample database
* DB-2 - Crunchbase
Groups
* All users:
* full access to DB-A + SQL
* no access to DB-2
* Admins
* Full Access to DB-A + SQL
* Full Access to DB-B + SQL
* Operations
* full access to DB-A
* partial access to DB2
* No SQL
* only access to companies
Users
* Admin McAdminster (belongs to admin, all users)
* Normal Userface (belongs to all users)
* Operations McSpecialPerson (belongs to operations, all users)
Questions
* crunchbase
* count of companies
* count of acquisitions
* count of rounds
* SQL count of acquisitions
* sample database
* count of orders
* count of people
* count of reviews
* SQL count of people
Dashboards
* All crunchbase
* count of people, companies, rounds
* Public crunchbase
* just count of companies
* all sample
Pulses
* AllCrunchbase
* count of acquisitions, companies, rounds
* PublicCrunchbase
* just count of companies
* RestrictedCrunchbase
* count of acquisitions, count of rounds
* AllSample
* AllOfEverything (sign everyone up)
* crunchbase + sample cards
Metrics
* Sample
* revenue (sum of total | orders table)
* Crunchbase
* total acquisitions (sum of price amount in acquisitions)
* average funding rounds (average of number of rounds of funding in companies)
Segments
* Sample
* expensive shit (price > 50 in products)
* Crunchbase
* swedish acquisitions (company country code = SWE in acquisitions)
* swedish companies (company country code = SWE in companies)
**Tests Cases:**
Query Builder
- Admin
* [x] can see all tables in crunchbase
* [x] can see all tables in sample
* [x] can ask SQL questions of either
* [x] can see all metrics + segments
- Normal
* [x] can see all tables in sample
* [x] can see no tables in crunchbase
* [x] can ask SQL questions in sample but not crunchbase
* [x] can see sample metrics (revenue) + segments
- Operations
* [x] can see all tables in sample
* [x] can see companies in crunchbase
* [x] can ask SQL questions in sample but not crunchbase
* [x] can see all sample segments + metrics
* [x] can see swedish companies + avg funding rounds
Saved Questions
- Admin
* [x] Can see all questions
- Normal
* [x] Can only see 3 sample questions + SQL count of people
- Operations
* [x] Can see all sample questions
* [x] Can only see "count of companies" crunchbase questions
* [x] can see SQL count of people (yes, this is weird)
- (Rules)
- I can see saved questions for tables I have access to
- I can’t see saved questions for tables I don’t have access to
- I can't see saved sql questions for databases I don’t have access to
- I can see saved sql questions for databases I have access to
- I can see saved questions for databases I have full access to
Dashboards
- Admin
* [x] can see all 3 dashboards
- Normal
* [x] can only see sample dashboard
- Operations
* [x] can see public crunchbase + sample dashboard
- (Rules)
- I can see dashboards that contain cards I have access to
- I can see dashboards that contains any card I have access to
- I can’t see dashboards that contain cards I don’t have access to
Pulses
- Admin
* [x] can see all 5 pulses
- Normal
* [x] can see AllOfEverything, AllSample
- Operations
* [x] Can see Public Crunchbase, AllSample, AllOfEverything
- (Rule)
- I can see a pulse that only contains cards I have access to
- I can’t see a pulse that contains a card I don’t have access to
- I can’t see a pulse that has no cards I have access to
- I can see a pulse that has cards I don’t have access to if an admin added me to it but I can’t edit
Data Model Reference
- Admin
* [x] can see all sample + crunchbase metrics, segments + tables
- Normal
* [x] can see all sample stuff
- Operations
* [x] can see revenue, avg funding rounds in metrics
* [x] can see expensive shit, swedish companies in segments
* [x] can see all sample tables
* [x] can only see companies table in crunchbase
- (Rules)
- I can only see metrics for tables I have access to
- I can only see segments for tables I have access to
- I can only see the databases + tables I have access to
| 1.0 | Permissions Stage 1 Test Suite - This enumerates a test suite for rules in #3362
All of these scenarios must be tested before releasing 0.20
**Setup**
Databases
* DB-A - Sample database
* DB-2 - Crunchbase
Groups
* All users:
* full access to DB-A + SQL
* no access to DB-2
* Admins
* Full Access to DB-A + SQL
* Full Access to DB-B + SQL
* Operations
* full access to DB-A
* partial access to DB2
* No SQL
* only access to companies
Users
* Admin McAdminster (belongs to admin, all users)
* Normal Userface (belongs to all users)
* Operations McSpecialPerson (belongs to operations, all users)
Questions
* crunchbase
* count of companies
* count of acquisitions
* count of rounds
* SQL count of acquisitions
* sample database
* count of orders
* count of people
* count of reviews
* SQL count of people
Dashboards
* All crunchbase
* count of people, companies, rounds
* Public crunchbase
* just count of companies
* all sample
Pulses
* AllCrunchbase
* count of acquisitions, companies, rounds
* PublicCrunchbase
* just count of companies
* RestrictedCrunchbase
* count of acquisitions, count of rounds
* AllSample
* AllOfEverything (sign everyone up)
* crunchbase + sample cards
Metrics
* Sample
* revenue (sum of total | orders table)
* Crunchbase
* total acquisitions (sum of price amount in acquisitions)
* average funding rounds (average of number of rounds of funding in companies)
Segments
* Sample
* expensive shit (price > 50 in products)
* Crunchbase
* swedish acquisitions (company country code = SWE in acquisitions)
* swedish companies (company country code = SWE in companies)
**Tests Cases:**
Query Builder
- Admin
* [x] can see all tables in crunchbase
* [x] can see all tables in sample
* [x] can ask SQL questions of either
* [x] can see all metrics + segments
- Normal
* [x] can see all tables in sample
* [x] can see no tables in crunchbase
* [x] can ask SQL questions in sample but not crunchbase
* [x] can see sample metrics (revenue) + segments
- Operations
* [x] can see all tables in sample
* [x] can see companies in crunchbase
* [x] can ask SQL questions in sample but not crunchbase
* [x] can see all sample segments + metrics
* [x] can see swedish companies + avg funding rounds
Saved Questions
- Admin
* [x] Can see all questions
- Normal
* [x] Can only see 3 sample questions + SQL count of people
- Operations
* [x] Can see all sample questions
* [x] Can only see "count of companies" crunchbase questions
* [x] can see SQL count of people (yes, this is weird)
- (Rules)
- I can see saved questions for tables I have access to
- I can’t see saved questions for tables I don’t have access to
- I can't see saved sql questions for databases I don’t have access to
- I can see saved sql questions for databases I have access to
- I can see saved questions for databases I have full access to
Dashboards
- Admin
* [x] can see all 3 dashboards
- Normal
* [x] can only see sample dashboard
- Operations
* [x] can see public crunchbase + sample dashboard
- (Rules)
- I can see dashboards that contain cards I have access to
- I can see dashboards that contains any card I have access to
- I can’t see dashboards that contain cards I don’t have access to
Pulses
- Admin
* [x] can see all 5 pulses
- Normal
* [x] can see AllOfEverything, AllSample
- Operations
* [x] Can see Public Crunchbase, AllSample, AllOfEverything
- (Rule)
- I can see a pulse that only contains cards I have access to
- I can’t see a pulse that contains a card I don’t have access to
- I can’t see a pulse that has no cards I have access to
- I can see a pulse that has cards I don’t have access to if an admin added me to it but I can’t edit
Data Model Reference
- Admin
* [x] can see all sample + crunchbase metrics, segments + tables
- Normal
* [x] can see all sample stuff
- Operations
* [x] can see revenue, avg funding rounds in metrics
* [x] can see expensive shit, swedish companies in segments
* [x] can see all sample tables
* [x] can only see companies table in crunchbase
- (Rules)
- I can only see metrics for tables I have access to
- I can only see segments for tables I have access to
- I can only see the databases + tables I have access to
| non_priority | permissions stage test suite this enumerates a test suite for rules in all of these scenarios must be tested before releasing setup databases db a sample database db crunchbase groups all users full access to db a sql no access to db admins full access to db a sql full access to db b sql operations full access to db a partial access to no sql only access to companies users admin mcadminster belongs to admin all users normal userface belongs to all users operations mcspecialperson belongs to operations all users questions crunchbase count of companies count of acquisitions count of rounds sql count of acquisitions sample database count of orders count of people count of reviews sql count of people dashboards all crunchbase count of people companies rounds public crunchbase just count of companies all sample pulses allcrunchbase count of acquisitions companies rounds publiccrunchbase just count of companies restrictedcrunchbase count of acquisitions count of rounds allsample allofeverything sign everyone up crunchbase sample cards metrics sample revenue sum of total orders table crunchbase total acquisitions sum of price amount in acquisitions average funding rounds average of number of rounds of funding in companies segments sample expensive shit price in products crunchbase swedish acquisitions company country code swe in acquisitions swedish companies company country code swe in companies tests cases query builder admin can see all tables in crunchbase can see all tables in sample can ask sql questions of either can see all metrics segments normal can see all tables in sample can see no tables in crunchbase can ask sql questions in sample but not crunchbase can see sample metrics revenue segments operations can see all tables in sample can see companies in crunchbase can ask sql questions in sample but not crunchbase can see all sample segments metrics can see swedish companies avg funding rounds saved questions admin can see all questions normal can only see sample questions sql count of people operations can see all sample questions can only see count of companies crunchbase questions can see sql count of people yes this is weird rules i can see saved questions for tables i have access to i can’t see saved questions for tables i don’t have access to i can t see saved sql questions for databases i don’t have access to i can see saved sql questions for databases i have access to i can see saved questions for databases i have full access to dashboards admin can see all dashboards normal can only see sample dashboard operations can see public crunchbase sample dashboard rules i can see dashboards that contain cards i have access to i can see dashboards that contains any card i have access to i can’t see dashboards that contain cards i don’t have access to pulses admin can see all pulses normal can see allofeverything allsample operations can see public crunchbase allsample allofeverything rule i can see a pulse that only contains cards i have access to i can’t see a pulse that contains a card i don’t have access to i can’t see a pulse that has no cards i have access to i can see a pulse that has cards i don’t have access to if an admin added me to it but i can’t edit data model reference admin can see all sample crunchbase metrics segments tables normal can see all sample stuff operations can see revenue avg funding rounds in metrics can see expensive shit swedish companies in segments can see all sample tables can only see companies table in crunchbase rules i can only see metrics for tables i have access to i can only see segments for tables i have access to i can only see the databases tables i have access to | 0 |
188,340 | 15,159,239,571 | IssuesEvent | 2021-02-12 03:37:07 | cake-contrib/Cake.BuildSystems.Module | https://api.github.com/repos/cake-contrib/Cake.BuildSystems.Module | closed | Use cake-contrib icon | Documentation | The [currently used icon](https://github.com/cake-contrib/Cake.BuildSystems.Module/blob/6fbba30a8c2881bda9e9abe9760751be45a083c1/src/Cake.BuildSystems.Module/Cake.BuildSystems.Module.csproj#L29) no longer exists. Module should use cake-contrib icon as in §3.2 in [guidelines](https://cakebuild.net/docs/extending/addins/best-practices#package-metadata). | 1.0 | Use cake-contrib icon - The [currently used icon](https://github.com/cake-contrib/Cake.BuildSystems.Module/blob/6fbba30a8c2881bda9e9abe9760751be45a083c1/src/Cake.BuildSystems.Module/Cake.BuildSystems.Module.csproj#L29) no longer exists. Module should use cake-contrib icon as in §3.2 in [guidelines](https://cakebuild.net/docs/extending/addins/best-practices#package-metadata). | non_priority | use cake contrib icon the no longer exists module should use cake contrib icon as in § in | 0 |
12,061 | 14,233,072,316 | IssuesEvent | 2020-11-18 11:36:13 | AdguardTeam/CoreLibs | https://api.github.com/repos/AdguardTeam/CoreLibs | opened | Adobe Creative Cloud sync issue | P3: Medium bug compatibility | - Several users have complained about issues with the Adobe Creative Cloud synchronization
### Customer ID
<!--- Send us a diagnostic report through the application, click on the gear icon in the app's main window, and choose "Support". You will get an auto-reply with you Customer ID after sending a report -->
[AdGuard Forum](https://forum.adguard.com/index.php?threads/problem-with-adobe-creative-cloud-big-sur.40472/#post-204824)
### Your environment
<!--- Please include all relevant details about the environment you experienced the bug in -->
* Application version: 2.5.1.918 release (CL-1.7.143)
* OS: Version 11.0.1 (Build 20B29)
### Additional Info
- Users provided log files, I added them to NClound and attachment to Jira.
| True | Adobe Creative Cloud sync issue - - Several users have complained about issues with the Adobe Creative Cloud synchronization
### Customer ID
<!--- Send us a diagnostic report through the application, click on the gear icon in the app's main window, and choose "Support". You will get an auto-reply with you Customer ID after sending a report -->
[AdGuard Forum](https://forum.adguard.com/index.php?threads/problem-with-adobe-creative-cloud-big-sur.40472/#post-204824)
### Your environment
<!--- Please include all relevant details about the environment you experienced the bug in -->
* Application version: 2.5.1.918 release (CL-1.7.143)
* OS: Version 11.0.1 (Build 20B29)
### Additional Info
- Users provided log files, I added them to NClound and attachment to Jira.
| non_priority | adobe creative cloud sync issue several users have complained about issues with the adobe creative cloud synchronization customer id your environment application version release cl os version build additional info users provided log files i added them to nclound and attachment to jira | 0 |
206,570 | 23,392,580,784 | IssuesEvent | 2022-08-11 19:23:27 | elastic/kibana | https://api.github.com/repos/elastic/kibana | closed | Read-only Kibana Administrator | Team:Security loe:hours Feature:Security/Feature Controls impact:low NeededFor:Core EnableJiraSync | As agreed in #95143, we need to create the equivalent of a read-only kibana administrator.
More about that in @legrego's comment: https://github.com/elastic/kibana/issues/95143#issuecomment-807220090 | True | Read-only Kibana Administrator - As agreed in #95143, we need to create the equivalent of a read-only kibana administrator.
More about that in @legrego's comment: https://github.com/elastic/kibana/issues/95143#issuecomment-807220090 | non_priority | read only kibana administrator as agreed in we need to create the equivalent of a read only kibana administrator more about that in legrego s comment | 0 |
145,343 | 22,666,465,290 | IssuesEvent | 2022-07-03 00:52:39 | Rad-Touristik-Club-Koln-e-V-1972/Rad-Touristik-Club-Koln-e-V-1972.github.io | https://api.github.com/repos/Rad-Touristik-Club-Koln-e-V-1972/Rad-Touristik-Club-Koln-e-V-1972.github.io | closed | Seite - Home - Countdown | enhancement design | Auf der Hauptseite einen Countdown für das nächste besondere Event integrieren
Z. B. Countdown-Uhr in Klein von https://www.dreilaendergiro.at/de
Für RTF am 29.5.
Beispieltext „Noch 135 Tage bis zur Jubiläums-Forsbachtour“ | 1.0 | Seite - Home - Countdown - Auf der Hauptseite einen Countdown für das nächste besondere Event integrieren
Z. B. Countdown-Uhr in Klein von https://www.dreilaendergiro.at/de
Für RTF am 29.5.
Beispieltext „Noch 135 Tage bis zur Jubiläums-Forsbachtour“ | non_priority | seite home countdown auf der hauptseite einen countdown für das nächste besondere event integrieren z b countdown uhr in klein von für rtf am beispieltext „noch tage bis zur jubiläums forsbachtour“ | 0 |
302,338 | 22,797,207,535 | IssuesEvent | 2022-07-10 22:16:45 | ophews/lightsout | https://api.github.com/repos/ophews/lightsout | closed | vA0.8.1 | 07/10/2022, 3:34AM | bug documentation update | Fixed some visual bugs and re-designed the main menu.
> Features of vA0.8.1;
- [x] Water doesn't glitch when you join the lobby
- [x] Semi-new GUI
- [x] Added Easter Eggs to the main menu 👀
> To-do in vA0.8.2;
- [x] Fix ambience sounds
- [x] Start working on parts of the online map
- [x] Fix first-person visual bugs❗
- [x] Add Easter Eggs | 1.0 | vA0.8.1 | 07/10/2022, 3:34AM - Fixed some visual bugs and re-designed the main menu.
> Features of vA0.8.1;
- [x] Water doesn't glitch when you join the lobby
- [x] Semi-new GUI
- [x] Added Easter Eggs to the main menu 👀
> To-do in vA0.8.2;
- [x] Fix ambience sounds
- [x] Start working on parts of the online map
- [x] Fix first-person visual bugs❗
- [x] Add Easter Eggs | non_priority | fixed some visual bugs and re designed the main menu features of water doesn t glitch when you join the lobby semi new gui added easter eggs to the main menu 👀 to do in fix ambience sounds start working on parts of the online map fix first person visual bugs❗ add easter eggs | 0 |
116,244 | 11,905,162,914 | IssuesEvent | 2020-03-30 18:05:08 | newrelic/newrelic-client-go | https://api.github.com/repos/newrelic/newrelic-client-go | closed | Following README.md File Instructions Results in Failure to Compile App | bug documentation size:S | ### Description
When following the instructions contained within the `README.md` file within this repository an error is thrown.
### Go Version
`go version go1.14.1 darwin/amd64`
### Current behavior
When copying/pasting the example in `README.md` and running, the following occurs.
```
colinjohnson@cjohnson07 newrelic_api_connector % go run newrelic_api_connector.go
# command-line-arguments
./newrelic_api_connector.go:9:2: imported and not used: "github.com/newrelic/newrelic-client-go/pkg/config"
./newrelic_api_connector.go:14:5: assignment mismatch: 1 variable but newrelic.New returns 2 values
./newrelic_api_connector.go:14:21: undefined: ConfigAPIKey
```
### Expected behavior
When copying/pasting the example in `README.md` it is expected that the example will run properly (including connecting to NewRelic and, potentially, printing a list of NewRelic applications.
### Steps To Reproduce
Steps to reproduce the behavior:
1. Copy the text from `README.md` into a `.go` file.
2. Run the command `go run filename.go`
3. The result is a file that is not able to be compiled.
### Debug Output (if applicable)
NA.
### Additional Context
This occurs with the following newrelic-go-client: `github.com/newrelic/newrelic-client-go v0.19.0`.
I've been running with a configuration that looks as follows:
```
package main
import (
"fmt"
"os"
"github.com/newrelic/newrelic-client-go/newrelic"
"github.com/newrelic/newrelic-client-go/pkg/apm"
)
func main() {
apiKey := os.Getenv("NEW_RELIC_API_KEY")
nr, _ := newrelic.New(newrelic.ConfigAdminAPIKey(apiKey))
params := apm.ListApplicationsParams{
Name: "RPM",
}
apps, err := nr.APM.ListApplications(¶ms)
if err != nil {
fmt.Print(err)
}
fmt.Printf("%#v\n", apps)
}
```
I believe the sample code I've written is not ideal because the configuration does not reflect the different methods of providing API Keys to a NewRelic API client - either a ConfigPersonalAPIKey or a ConfigAdminAPIKey - I simply assume the user is providing an environment variable named `NEW_RELIC_API_KEY`.
### References or Related Issues
Are there any other related GitHub issues (open or closed) or Pull Requests that should be linked here?
| 1.0 | Following README.md File Instructions Results in Failure to Compile App - ### Description
When following the instructions contained within the `README.md` file within this repository an error is thrown.
### Go Version
`go version go1.14.1 darwin/amd64`
### Current behavior
When copying/pasting the example in `README.md` and running, the following occurs.
```
colinjohnson@cjohnson07 newrelic_api_connector % go run newrelic_api_connector.go
# command-line-arguments
./newrelic_api_connector.go:9:2: imported and not used: "github.com/newrelic/newrelic-client-go/pkg/config"
./newrelic_api_connector.go:14:5: assignment mismatch: 1 variable but newrelic.New returns 2 values
./newrelic_api_connector.go:14:21: undefined: ConfigAPIKey
```
### Expected behavior
When copying/pasting the example in `README.md` it is expected that the example will run properly (including connecting to NewRelic and, potentially, printing a list of NewRelic applications.
### Steps To Reproduce
Steps to reproduce the behavior:
1. Copy the text from `README.md` into a `.go` file.
2. Run the command `go run filename.go`
3. The result is a file that is not able to be compiled.
### Debug Output (if applicable)
NA.
### Additional Context
This occurs with the following newrelic-go-client: `github.com/newrelic/newrelic-client-go v0.19.0`.
I've been running with a configuration that looks as follows:
```
package main
import (
"fmt"
"os"
"github.com/newrelic/newrelic-client-go/newrelic"
"github.com/newrelic/newrelic-client-go/pkg/apm"
)
func main() {
apiKey := os.Getenv("NEW_RELIC_API_KEY")
nr, _ := newrelic.New(newrelic.ConfigAdminAPIKey(apiKey))
params := apm.ListApplicationsParams{
Name: "RPM",
}
apps, err := nr.APM.ListApplications(¶ms)
if err != nil {
fmt.Print(err)
}
fmt.Printf("%#v\n", apps)
}
```
I believe the sample code I've written is not ideal because the configuration does not reflect the different methods of providing API Keys to a NewRelic API client - either a ConfigPersonalAPIKey or a ConfigAdminAPIKey - I simply assume the user is providing an environment variable named `NEW_RELIC_API_KEY`.
### References or Related Issues
Are there any other related GitHub issues (open or closed) or Pull Requests that should be linked here?
| non_priority | following readme md file instructions results in failure to compile app description when following the instructions contained within the readme md file within this repository an error is thrown go version go version darwin current behavior when copying pasting the example in readme md and running the following occurs colinjohnson newrelic api connector go run newrelic api connector go command line arguments newrelic api connector go imported and not used github com newrelic newrelic client go pkg config newrelic api connector go assignment mismatch variable but newrelic new returns values newrelic api connector go undefined configapikey expected behavior when copying pasting the example in readme md it is expected that the example will run properly including connecting to newrelic and potentially printing a list of newrelic applications steps to reproduce steps to reproduce the behavior copy the text from readme md into a go file run the command go run filename go the result is a file that is not able to be compiled debug output if applicable na additional context this occurs with the following newrelic go client github com newrelic newrelic client go i ve been running with a configuration that looks as follows package main import fmt os github com newrelic newrelic client go newrelic github com newrelic newrelic client go pkg apm func main apikey os getenv new relic api key nr newrelic new newrelic configadminapikey apikey params apm listapplicationsparams name rpm apps err nr apm listapplications params if err nil fmt print err fmt printf v n apps i believe the sample code i ve written is not ideal because the configuration does not reflect the different methods of providing api keys to a newrelic api client either a configpersonalapikey or a configadminapikey i simply assume the user is providing an environment variable named new relic api key references or related issues are there any other related github issues open or closed or pull requests that should be linked here | 0 |
79,102 | 9,829,373,925 | IssuesEvent | 2019-06-15 20:08:56 | lightingft/appinventor-sources | https://api.github.com/repos/lightingft/appinventor-sources | closed | Mock Line Chart similar styling | Part: Designer Status: Finished Type: Improvement | The Mock Line Chart should be made more alike to the actual MPAndroidChart Line Chart. This mostly involves positioning of the legend, title as well as some minor changes. | 1.0 | Mock Line Chart similar styling - The Mock Line Chart should be made more alike to the actual MPAndroidChart Line Chart. This mostly involves positioning of the legend, title as well as some minor changes. | non_priority | mock line chart similar styling the mock line chart should be made more alike to the actual mpandroidchart line chart this mostly involves positioning of the legend title as well as some minor changes | 0 |
81,501 | 30,881,173,721 | IssuesEvent | 2023-08-03 17:43:13 | SeleniumHQ/selenium | https://api.github.com/repos/SeleniumHQ/selenium | closed | [🐛 Bug]: Selenium Manager proxy management issue | R-awaiting answer I-defect needs-triaging | ### What happened?
When trying to run scripts under vpn, Selenium manager requires proxy to be set for it to download the necessary drivers through capabilities. This, if I'm not wrongly concluding, is setting the proxy for the entire framework/session which fails my scripts since it needs to run without proxy.
Is there a way to avoid around this?
### How can we reproduce the issue?
```shell
ChromeOptions chromeOptions = new ChromeOptions();
chromeOptions.setCapability("proxy", <proxy-url>);
chromeOptions.addArguments("--disable-dev-shm-usage");
chromeOptions.addArguments("--no-sandbox");
chromeOptions.setBrowserVersion("113");
```
### Relevant log output
```shell
org.openqa.selenium.remote.NoSuchDriverException: Unable to obtain: Capabilities {browserName: chrome, browserVersion: 113, goog:chromeOptions: {args: [--remote-allow-origins=*, --disable-dev-shm-usage, --no-sandbox], extensions: []}}, error Command failed with code: 65, executed: [<path>\selenium-manager2136117563690013775312814197890619\selenium-manager.exe, --browser, chrome, --output, json, --browser-version, 113]
error sending request for url (https://googlechromelabs.github.io/chrome-for-testing/known-good-versions-with-downloads.json): error trying to connect: tcp connect error: A connection attempt failed because the connected party did not properly respond after a period of time, or established connection failed because connected host has failed to respond. (os error 10060)
Build info: version: '4.11.0', revision: '040bc5406b'
System info: os.name: 'Windows 10', os.arch: 'amd64', os.version: '10.0', java.version: '17.0.5'
```
### Operating System
Windows 10
### Selenium version
4.11.0
### What are the browser(s) and version(s) where you see this issue?
Chrome 115, Firefox 102.14 esr
### What are the browser driver(s) and version(s) where you see this issue?
Chromedriver 115, geckodriver 113
### Are you using Selenium Grid?
_No response_ | 1.0 | [🐛 Bug]: Selenium Manager proxy management issue - ### What happened?
When trying to run scripts under vpn, Selenium manager requires proxy to be set for it to download the necessary drivers through capabilities. This, if I'm not wrongly concluding, is setting the proxy for the entire framework/session which fails my scripts since it needs to run without proxy.
Is there a way to avoid around this?
### How can we reproduce the issue?
```shell
ChromeOptions chromeOptions = new ChromeOptions();
chromeOptions.setCapability("proxy", <proxy-url>);
chromeOptions.addArguments("--disable-dev-shm-usage");
chromeOptions.addArguments("--no-sandbox");
chromeOptions.setBrowserVersion("113");
```
### Relevant log output
```shell
org.openqa.selenium.remote.NoSuchDriverException: Unable to obtain: Capabilities {browserName: chrome, browserVersion: 113, goog:chromeOptions: {args: [--remote-allow-origins=*, --disable-dev-shm-usage, --no-sandbox], extensions: []}}, error Command failed with code: 65, executed: [<path>\selenium-manager2136117563690013775312814197890619\selenium-manager.exe, --browser, chrome, --output, json, --browser-version, 113]
error sending request for url (https://googlechromelabs.github.io/chrome-for-testing/known-good-versions-with-downloads.json): error trying to connect: tcp connect error: A connection attempt failed because the connected party did not properly respond after a period of time, or established connection failed because connected host has failed to respond. (os error 10060)
Build info: version: '4.11.0', revision: '040bc5406b'
System info: os.name: 'Windows 10', os.arch: 'amd64', os.version: '10.0', java.version: '17.0.5'
```
### Operating System
Windows 10
### Selenium version
4.11.0
### What are the browser(s) and version(s) where you see this issue?
Chrome 115, Firefox 102.14 esr
### What are the browser driver(s) and version(s) where you see this issue?
Chromedriver 115, geckodriver 113
### Are you using Selenium Grid?
_No response_ | non_priority | selenium manager proxy management issue what happened when trying to run scripts under vpn selenium manager requires proxy to be set for it to download the necessary drivers through capabilities this if i m not wrongly concluding is setting the proxy for the entire framework session which fails my scripts since it needs to run without proxy is there a way to avoid around this how can we reproduce the issue shell chromeoptions chromeoptions new chromeoptions chromeoptions setcapability proxy chromeoptions addarguments disable dev shm usage chromeoptions addarguments no sandbox chromeoptions setbrowserversion relevant log output shell org openqa selenium remote nosuchdriverexception unable to obtain capabilities browsername chrome browserversion goog chromeoptions args extensions error command failed with code executed error sending request for url error trying to connect tcp connect error a connection attempt failed because the connected party did not properly respond after a period of time or established connection failed because connected host has failed to respond os error build info version revision system info os name windows os arch os version java version operating system windows selenium version what are the browser s and version s where you see this issue chrome firefox esr what are the browser driver s and version s where you see this issue chromedriver geckodriver are you using selenium grid no response | 0 |
71,832 | 8,683,603,679 | IssuesEvent | 2018-12-02 19:35:14 | nikita-skobov/collabopath | https://api.github.com/repos/nikita-skobov/collabopath | closed | add a explicit content warning upon clicking one of the start buttons | Design | when clicking "start from beginning" or "start from specific path id" it should first pop up a modal that warns the user that there might be explicit content, and that they accept that it might be offensive if they continue. | 1.0 | add a explicit content warning upon clicking one of the start buttons - when clicking "start from beginning" or "start from specific path id" it should first pop up a modal that warns the user that there might be explicit content, and that they accept that it might be offensive if they continue. | non_priority | add a explicit content warning upon clicking one of the start buttons when clicking start from beginning or start from specific path id it should first pop up a modal that warns the user that there might be explicit content and that they accept that it might be offensive if they continue | 0 |
452,049 | 32,048,996,934 | IssuesEvent | 2023-09-23 10:22:04 | chiragbiradar/DDoS-Attack-Detection-and-Mitigation | https://api.github.com/repos/chiragbiradar/DDoS-Attack-Detection-and-Mitigation | opened | [Documentation] Improve clarity and organization of documentation for [topic] | documentation help wanted good first issue hacktoberfest-accepted | **Description:**
Please describe the specific part of the documentation that you think is unclear or unorganized, and suggest a change that would improve it.
**Examples:**
* **Unorganized:** [Documentation is little unorganized ](https://github.com/chiragbiradar/DDoS-Attack-Detection-and-Mitigation/blob/main/README.md)
* **Organized** Adding Table of contents, etc.,
> For example some References are not linked to their research paper
* **Unorganized:** [Please rephrase the installation instructions for improved clarity](https://github.com/chiragbiradar/DDoS-Attack-Detection-and-Mitigation/blob/main/Installation_setup/Readme.md)
* **More organized:** Add code blocks where required,
**Please note:** This issue template is for small changes to the documentation. If you have a suggestion for a larger change, such as adding a new section or reorganizing the entire documentation, please create a separate issue.
**Thank you for helping to improve the documentation!**
**Additional notes:**
* When submitting an issue, please be as specific as possible about the problem and the suggested solution.
* Please include screenshots or code snippets to help illustrate the problem and the solution.
* If you are able to make the change yourself, please submit a pull request with your changes.
* If you are not able to make the change yourself, please be patient and we will try to address the issue as soon as possible. | 1.0 | [Documentation] Improve clarity and organization of documentation for [topic] - **Description:**
Please describe the specific part of the documentation that you think is unclear or unorganized, and suggest a change that would improve it.
**Examples:**
* **Unorganized:** [Documentation is little unorganized ](https://github.com/chiragbiradar/DDoS-Attack-Detection-and-Mitigation/blob/main/README.md)
* **Organized** Adding Table of contents, etc.,
> For example some References are not linked to their research paper
* **Unorganized:** [Please rephrase the installation instructions for improved clarity](https://github.com/chiragbiradar/DDoS-Attack-Detection-and-Mitigation/blob/main/Installation_setup/Readme.md)
* **More organized:** Add code blocks where required,
**Please note:** This issue template is for small changes to the documentation. If you have a suggestion for a larger change, such as adding a new section or reorganizing the entire documentation, please create a separate issue.
**Thank you for helping to improve the documentation!**
**Additional notes:**
* When submitting an issue, please be as specific as possible about the problem and the suggested solution.
* Please include screenshots or code snippets to help illustrate the problem and the solution.
* If you are able to make the change yourself, please submit a pull request with your changes.
* If you are not able to make the change yourself, please be patient and we will try to address the issue as soon as possible. | non_priority | improve clarity and organization of documentation for description please describe the specific part of the documentation that you think is unclear or unorganized and suggest a change that would improve it examples unorganized organized adding table of contents etc for example some references are not linked to their research paper unorganized more organized add code blocks where required please note this issue template is for small changes to the documentation if you have a suggestion for a larger change such as adding a new section or reorganizing the entire documentation please create a separate issue thank you for helping to improve the documentation additional notes when submitting an issue please be as specific as possible about the problem and the suggested solution please include screenshots or code snippets to help illustrate the problem and the solution if you are able to make the change yourself please submit a pull request with your changes if you are not able to make the change yourself please be patient and we will try to address the issue as soon as possible | 0 |
10,354 | 3,384,304,772 | IssuesEvent | 2015-11-27 00:21:50 | demiurgosoft/maelstrom | https://api.github.com/repos/demiurgosoft/maelstrom | closed | Iteration 1 docs | documentation | Documentation of iteration 1:
- [x] Iteration summary
- [x] Issues Summary
- [x] Software design and requirements changes
- [x] Timeline update | 1.0 | Iteration 1 docs - Documentation of iteration 1:
- [x] Iteration summary
- [x] Issues Summary
- [x] Software design and requirements changes
- [x] Timeline update | non_priority | iteration docs documentation of iteration iteration summary issues summary software design and requirements changes timeline update | 0 |
28,410 | 4,103,648,320 | IssuesEvent | 2016-06-04 20:39:24 | devopsdays/devopsdays-web | https://api.github.com/repos/devopsdays/devopsdays-web | closed | redesign how sponsors are displayed | design fixed-in-branch in progress sponsors | We have a number of open issues around the sponsor logos. This meta-issue will help us plan that work. I just read through all the sponsor-related issues, and there's one obvious choice that helps almost every issue.
I assert that the sponsors belong at the bottom of each page, not on the right-hand side. This would allow a lot more flexibility in the responsiveness of the pages without constraining us to make room for a column. I'm picturing something pretty much exactly like what Velocity does: http://conferences.oreilly.com/velocity/devops-web-performance-ca (scroll down).
Here are all the issues around how we display sponsors:
https://github.com/devopsdays/devopsdays-web/issues/227 - consider allowing different sizes of sponsor images
https://github.com/devopsdays/devopsdays-web/issues/216 - consider supporting sponsor links with no image
https://github.com/devopsdays/devopsdays-web/issues/197 - Make sponsor border links optional
https://github.com/devopsdays/devopsdays-web/issues/195 - Add ability to disable sponsor sidebar
https://github.com/devopsdays/devopsdays-web/issues/108 - Sponsor logos are two wide instead of three
https://github.com/devopsdays/devopsdays-web/issues/87 - Sponsor sidebar looks weird on iOS
https://github.com/devopsdays/devopsdays-web/issues/93 - Ability to control "Become a <level> sponsor" links
https://github.com/devopsdays/devopsdays-web/issues/26 - add an enhancement to show "become the FIRST x sponsor"
Discussion welcome.
| 1.0 | redesign how sponsors are displayed - We have a number of open issues around the sponsor logos. This meta-issue will help us plan that work. I just read through all the sponsor-related issues, and there's one obvious choice that helps almost every issue.
I assert that the sponsors belong at the bottom of each page, not on the right-hand side. This would allow a lot more flexibility in the responsiveness of the pages without constraining us to make room for a column. I'm picturing something pretty much exactly like what Velocity does: http://conferences.oreilly.com/velocity/devops-web-performance-ca (scroll down).
Here are all the issues around how we display sponsors:
https://github.com/devopsdays/devopsdays-web/issues/227 - consider allowing different sizes of sponsor images
https://github.com/devopsdays/devopsdays-web/issues/216 - consider supporting sponsor links with no image
https://github.com/devopsdays/devopsdays-web/issues/197 - Make sponsor border links optional
https://github.com/devopsdays/devopsdays-web/issues/195 - Add ability to disable sponsor sidebar
https://github.com/devopsdays/devopsdays-web/issues/108 - Sponsor logos are two wide instead of three
https://github.com/devopsdays/devopsdays-web/issues/87 - Sponsor sidebar looks weird on iOS
https://github.com/devopsdays/devopsdays-web/issues/93 - Ability to control "Become a <level> sponsor" links
https://github.com/devopsdays/devopsdays-web/issues/26 - add an enhancement to show "become the FIRST x sponsor"
Discussion welcome.
| non_priority | redesign how sponsors are displayed we have a number of open issues around the sponsor logos this meta issue will help us plan that work i just read through all the sponsor related issues and there s one obvious choice that helps almost every issue i assert that the sponsors belong at the bottom of each page not on the right hand side this would allow a lot more flexibility in the responsiveness of the pages without constraining us to make room for a column i m picturing something pretty much exactly like what velocity does scroll down here are all the issues around how we display sponsors consider allowing different sizes of sponsor images consider supporting sponsor links with no image make sponsor border links optional add ability to disable sponsor sidebar sponsor logos are two wide instead of three sponsor sidebar looks weird on ios ability to control become a sponsor links add an enhancement to show become the first x sponsor discussion welcome | 0 |
129,538 | 12,413,453,153 | IssuesEvent | 2020-05-22 12:45:09 | capnmidnight/Primrose | https://api.github.com/repos/capnmidnight/Primrose | closed | Write a wiki page on "VR-ready PCs" | documentation help wanted medium | For anyone just getting started in VR, it can be confusing as to what is necessary to get up and running with development work. Let's [make a document in the Wiki](https://github.com/NotionTheory/Primrose/wiki/VR-ready-PC) to cover some of the issues.
Include details on:
- [ ] building a PC for the HTC Vive
- [ ] building a PC for the Oculus Rift
- [ ] getting a Samsung Gear VR
- [ ] getting a Google Pixel with Daydream
- [ ] constructing your own Google Cardboard setup | 1.0 | Write a wiki page on "VR-ready PCs" - For anyone just getting started in VR, it can be confusing as to what is necessary to get up and running with development work. Let's [make a document in the Wiki](https://github.com/NotionTheory/Primrose/wiki/VR-ready-PC) to cover some of the issues.
Include details on:
- [ ] building a PC for the HTC Vive
- [ ] building a PC for the Oculus Rift
- [ ] getting a Samsung Gear VR
- [ ] getting a Google Pixel with Daydream
- [ ] constructing your own Google Cardboard setup | non_priority | write a wiki page on vr ready pcs for anyone just getting started in vr it can be confusing as to what is necessary to get up and running with development work let s to cover some of the issues include details on building a pc for the htc vive building a pc for the oculus rift getting a samsung gear vr getting a google pixel with daydream constructing your own google cardboard setup | 0 |
86,080 | 10,710,598,321 | IssuesEvent | 2019-10-25 02:52:39 | erikc5000/island-time | https://api.github.com/repos/erikc5000/island-time | opened | Consider converting some of the current inline classes to non-inline | design | Current inline classes that are candidates for being converted to regular classes:
- `Year`
- `YearMonth`
- `UtcOffset`
- `TimeZone`
While having `Year` and `YearMonth` as inline classes might reduce allocations in some situations, it creates issues with construction, validation, and Java/ObjC interop. I see these classes being more valuable once a base class is introduced that allows mixed precision dates and ranges to be represented (ie. 2004/2005-02-08 or 2018-04/2019). When used in that context, they'll be boxed anyway. But having `Year` as a thin wrapper around an `Int` that exposes appropriate operations can be nice.
```kotlin
val year = Year(2020)
val leapYear = year.isLeap
```
I'm leaning in favor of regular classes, but would like to hear other's thoughts.
As for `UtcOffset` and `TimeZone`, they could probably just use some form of caching to reduce allocations instead of being inline classes. | 1.0 | Consider converting some of the current inline classes to non-inline - Current inline classes that are candidates for being converted to regular classes:
- `Year`
- `YearMonth`
- `UtcOffset`
- `TimeZone`
While having `Year` and `YearMonth` as inline classes might reduce allocations in some situations, it creates issues with construction, validation, and Java/ObjC interop. I see these classes being more valuable once a base class is introduced that allows mixed precision dates and ranges to be represented (ie. 2004/2005-02-08 or 2018-04/2019). When used in that context, they'll be boxed anyway. But having `Year` as a thin wrapper around an `Int` that exposes appropriate operations can be nice.
```kotlin
val year = Year(2020)
val leapYear = year.isLeap
```
I'm leaning in favor of regular classes, but would like to hear other's thoughts.
As for `UtcOffset` and `TimeZone`, they could probably just use some form of caching to reduce allocations instead of being inline classes. | non_priority | consider converting some of the current inline classes to non inline current inline classes that are candidates for being converted to regular classes year yearmonth utcoffset timezone while having year and yearmonth as inline classes might reduce allocations in some situations it creates issues with construction validation and java objc interop i see these classes being more valuable once a base class is introduced that allows mixed precision dates and ranges to be represented ie or when used in that context they ll be boxed anyway but having year as a thin wrapper around an int that exposes appropriate operations can be nice kotlin val year year val leapyear year isleap i m leaning in favor of regular classes but would like to hear other s thoughts as for utcoffset and timezone they could probably just use some form of caching to reduce allocations instead of being inline classes | 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.