Unnamed: 0
int64
0
832k
id
float64
2.49B
32.1B
type
stringclasses
1 value
created_at
stringlengths
19
19
repo
stringlengths
5
112
repo_url
stringlengths
34
141
action
stringclasses
3 values
title
stringlengths
1
844
labels
stringlengths
4
721
body
stringlengths
1
261k
index
stringclasses
12 values
text_combine
stringlengths
96
261k
label
stringclasses
2 values
text
stringlengths
96
248k
binary_label
int64
0
1
151,173
12,016,494,834
IssuesEvent
2020-04-10 16:13:29
mathjax/MathJax
https://api.github.com/repos/mathjax/MathJax
closed
Spacing after \setminus too large
Accepted Fixed Merged Test Needed v3
$A\setminus B$ produces excessive space before the B. Live page with example: https://logrus.math.tecnico.ulisboa.pt/test (MathJax 3.0.1) Counterexample: https://cdi1tp.math.tecnico.ulisboa.pt/solucoes/T1B20181110 (MathJax 2.7.x) ![Screenshot_2020-02-11 CDI II — Taguspark — Teste](https://user-images.githubusercontent.com/1136663/74236988-66cc6f00-4cca-11ea-9467-f8aba8044093.png) Observed in current versions of Firefox and Chromium on Linux.
1.0
Spacing after \setminus too large - $A\setminus B$ produces excessive space before the B. Live page with example: https://logrus.math.tecnico.ulisboa.pt/test (MathJax 3.0.1) Counterexample: https://cdi1tp.math.tecnico.ulisboa.pt/solucoes/T1B20181110 (MathJax 2.7.x) ![Screenshot_2020-02-11 CDI II — Taguspark — Teste](https://user-images.githubusercontent.com/1136663/74236988-66cc6f00-4cca-11ea-9467-f8aba8044093.png) Observed in current versions of Firefox and Chromium on Linux.
non_priority
spacing after setminus too large a setminus b produces excessive space before the b live page with example mathjax counterexample mathjax x observed in current versions of firefox and chromium on linux
0
82,212
10,275,531,701
IssuesEvent
2019-08-24 08:42:35
cookiecutter/cookiecutter
https://api.github.com/repos/cookiecutter/cookiecutter
closed
Remove dead projects from "Similar projects"
documentation
* Cookiecutter version: Any * Python version: All * Operating System: All ### Description: The similar projects list has projects with dead links. Or in the case of Pyramid's pcreate, have been superseded by Cookiecutter. Remove them from the list.
1.0
Remove dead projects from "Similar projects" - * Cookiecutter version: Any * Python version: All * Operating System: All ### Description: The similar projects list has projects with dead links. Or in the case of Pyramid's pcreate, have been superseded by Cookiecutter. Remove them from the list.
non_priority
remove dead projects from similar projects cookiecutter version any python version all operating system all description the similar projects list has projects with dead links or in the case of pyramid s pcreate have been superseded by cookiecutter remove them from the list
0
108,202
16,762,815,080
IssuesEvent
2021-06-14 03:16:08
gms-ws-sandbox/nibrs-pr-test
https://api.github.com/repos/gms-ws-sandbox/nibrs-pr-test
opened
CVE-2019-11284 (High) detected in reactor-netty-0.8.8.RELEASE.jar
security vulnerability
## CVE-2019-11284 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>reactor-netty-0.8.8.RELEASE.jar</b></p></summary> <p>Reactive Streams Netty driver</p> <p>Library home page: <a href="https://github.com/reactor/reactor-netty">https://github.com/reactor/reactor-netty</a></p> <p>Path to dependency file: nibrs-pr-test/tools/nibrs-summary-report-common/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/io/projectreactor/netty/reactor-netty/0.8.8.RELEASE/reactor-netty-0.8.8.RELEASE.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-webflux-2.1.5.RELEASE.jar (Root Library) - spring-boot-starter-reactor-netty-2.1.5.RELEASE.jar - :x: **reactor-netty-0.8.8.RELEASE.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/gms-ws-sandbox/nibrs-pr-test/commit/860cc22f54e17594e32e303f0716fb065202fff5">860cc22f54e17594e32e303f0716fb065202fff5</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Pivotal Reactor Netty, versions prior to 0.8.11, passes headers through redirects, including authorization ones. A remote unauthenticated malicious user may gain access to credentials for a different server than they have access to. <p>Publish Date: 2019-10-17 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-11284>CVE-2019-11284</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.6</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Changed - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11284">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11284</a></p> <p>Release Date: 2019-10-17</p> <p>Fix Resolution: 0.8.11</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"io.projectreactor.netty","packageName":"reactor-netty","packageVersion":"0.8.8.RELEASE","packageFilePaths":["/tools/nibrs-summary-report-common/pom.xml"],"isTransitiveDependency":true,"dependencyTree":"org.springframework.boot:spring-boot-starter-webflux:2.1.5.RELEASE;org.springframework.boot:spring-boot-starter-reactor-netty:2.1.5.RELEASE;io.projectreactor.netty:reactor-netty:0.8.8.RELEASE","isMinimumFixVersionAvailable":true,"minimumFixVersion":"0.8.11"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2019-11284","vulnerabilityDetails":"Pivotal Reactor Netty, versions prior to 0.8.11, passes headers through redirects, including authorization ones. A remote unauthenticated malicious user may gain access to credentials for a different server than they have access to.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-11284","cvss3Severity":"high","cvss3Score":"8.6","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Changed","C":"High","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> -->
True
CVE-2019-11284 (High) detected in reactor-netty-0.8.8.RELEASE.jar - ## CVE-2019-11284 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>reactor-netty-0.8.8.RELEASE.jar</b></p></summary> <p>Reactive Streams Netty driver</p> <p>Library home page: <a href="https://github.com/reactor/reactor-netty">https://github.com/reactor/reactor-netty</a></p> <p>Path to dependency file: nibrs-pr-test/tools/nibrs-summary-report-common/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/io/projectreactor/netty/reactor-netty/0.8.8.RELEASE/reactor-netty-0.8.8.RELEASE.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-webflux-2.1.5.RELEASE.jar (Root Library) - spring-boot-starter-reactor-netty-2.1.5.RELEASE.jar - :x: **reactor-netty-0.8.8.RELEASE.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/gms-ws-sandbox/nibrs-pr-test/commit/860cc22f54e17594e32e303f0716fb065202fff5">860cc22f54e17594e32e303f0716fb065202fff5</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Pivotal Reactor Netty, versions prior to 0.8.11, passes headers through redirects, including authorization ones. A remote unauthenticated malicious user may gain access to credentials for a different server than they have access to. <p>Publish Date: 2019-10-17 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-11284>CVE-2019-11284</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.6</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Changed - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11284">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11284</a></p> <p>Release Date: 2019-10-17</p> <p>Fix Resolution: 0.8.11</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"io.projectreactor.netty","packageName":"reactor-netty","packageVersion":"0.8.8.RELEASE","packageFilePaths":["/tools/nibrs-summary-report-common/pom.xml"],"isTransitiveDependency":true,"dependencyTree":"org.springframework.boot:spring-boot-starter-webflux:2.1.5.RELEASE;org.springframework.boot:spring-boot-starter-reactor-netty:2.1.5.RELEASE;io.projectreactor.netty:reactor-netty:0.8.8.RELEASE","isMinimumFixVersionAvailable":true,"minimumFixVersion":"0.8.11"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2019-11284","vulnerabilityDetails":"Pivotal Reactor Netty, versions prior to 0.8.11, passes headers through redirects, including authorization ones. A remote unauthenticated malicious user may gain access to credentials for a different server than they have access to.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-11284","cvss3Severity":"high","cvss3Score":"8.6","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Changed","C":"High","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> -->
non_priority
cve high detected in reactor netty release jar cve high severity vulnerability vulnerable library reactor netty release jar reactive streams netty driver library home page a href path to dependency file nibrs pr test tools nibrs summary report common pom xml path to vulnerable library home wss scanner repository io projectreactor netty reactor netty release reactor netty release jar dependency hierarchy spring boot starter webflux release jar root library spring boot starter reactor netty release jar x reactor netty release jar vulnerable library found in head commit a href found in base branch master vulnerability details pivotal reactor netty versions prior to passes headers through redirects including authorization ones a remote unauthenticated malicious user may gain access to credentials for a different server than they have access to publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope changed impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree org springframework boot spring boot starter webflux release org springframework boot spring boot starter reactor netty release io projectreactor netty reactor netty release isminimumfixversionavailable true minimumfixversion basebranches vulnerabilityidentifier cve vulnerabilitydetails pivotal reactor netty versions prior to passes headers through redirects including authorization ones a remote unauthenticated malicious user may gain access to credentials for a different server than they have access to vulnerabilityurl
0
172,155
14,350,974,102
IssuesEvent
2020-11-29 23:17:45
MazamaScience/RAWSmet
https://api.github.com/repos/MazamaScience/RAWSmet
closed
add a Developer_Style_Guide.Rmd vignette
documentation
For anyone in the future who might want to modify or enhance the code in this package, it will be useful to have a good understanding of how and why things are named as they are. To support consistency, we should provide a style guide for developers. Please copy the following file to the vignettes/ directory and modify it as needed to reflect the "objects" and functions in the **RAWSmet** package: https://github.com/MazamaScience/MazamaSpatialUtils/blob/master/vignettes/Developer_Style_Guide.Rmd
1.0
add a Developer_Style_Guide.Rmd vignette - For anyone in the future who might want to modify or enhance the code in this package, it will be useful to have a good understanding of how and why things are named as they are. To support consistency, we should provide a style guide for developers. Please copy the following file to the vignettes/ directory and modify it as needed to reflect the "objects" and functions in the **RAWSmet** package: https://github.com/MazamaScience/MazamaSpatialUtils/blob/master/vignettes/Developer_Style_Guide.Rmd
non_priority
add a developer style guide rmd vignette for anyone in the future who might want to modify or enhance the code in this package it will be useful to have a good understanding of how and why things are named as they are to support consistency we should provide a style guide for developers please copy the following file to the vignettes directory and modify it as needed to reflect the objects and functions in the rawsmet package
0
173,919
27,543,908,997
IssuesEvent
2023-03-07 10:24:42
pace-neutrons/Horace
https://api.github.com/repos/pace-neutrons/Horace
closed
Define performance tests
Design Testing
The system test plan notes that a set of full performance tests should be defined. This ticket will define what those test are: - what data (small and large data sets) - what processes - which systems to run on Output: - detailed description of the test cases and test data - where the test data can be obtained
1.0
Define performance tests - The system test plan notes that a set of full performance tests should be defined. This ticket will define what those test are: - what data (small and large data sets) - what processes - which systems to run on Output: - detailed description of the test cases and test data - where the test data can be obtained
non_priority
define performance tests the system test plan notes that a set of full performance tests should be defined this ticket will define what those test are what data small and large data sets what processes which systems to run on output detailed description of the test cases and test data where the test data can be obtained
0
167,411
13,024,535,288
IssuesEvent
2020-07-27 12:02:44
microsoft/botbuilder-python
https://api.github.com/repos/microsoft/botbuilder-python
closed
[PORT] add TestFlow.AssertNoReply and tests
BF Agility R10 testing framework
> Port this change from botbuilder-dotnet/master branch: https://github.com/microsoft/botbuilder-dotnet/pull/3125 To make sure the bot really ends. Unexpected replies once happend in VA-Skill interactions in solutions project.
1.0
[PORT] add TestFlow.AssertNoReply and tests - > Port this change from botbuilder-dotnet/master branch: https://github.com/microsoft/botbuilder-dotnet/pull/3125 To make sure the bot really ends. Unexpected replies once happend in VA-Skill interactions in solutions project.
non_priority
add testflow assertnoreply and tests port this change from botbuilder dotnet master branch to make sure the bot really ends unexpected replies once happend in va skill interactions in solutions project
0
61,843
15,096,418,126
IssuesEvent
2021-02-07 15:00:52
rclone/rclone
https://api.github.com/repos/rclone/rclone
closed
Support for Apple Silicon M1 chipset
Needs Go 1.16 OS: Mac build enhancement
#### Output of `rclone version` Not applicable #### Describe the issue Apple has a new chipset called the M1 which runs ARM instead of x86. What is the plan for adding support for rclone on this chipset? [https://en.wikipedia.org/wiki/Apple_M1](https://en.wikipedia.org/wiki/Apple_M1)
1.0
Support for Apple Silicon M1 chipset - #### Output of `rclone version` Not applicable #### Describe the issue Apple has a new chipset called the M1 which runs ARM instead of x86. What is the plan for adding support for rclone on this chipset? [https://en.wikipedia.org/wiki/Apple_M1](https://en.wikipedia.org/wiki/Apple_M1)
non_priority
support for apple silicon chipset output of rclone version not applicable describe the issue apple has a new chipset called the which runs arm instead of what is the plan for adding support for rclone on this chipset
0
39,570
5,240,907,572
IssuesEvent
2017-01-31 14:27:20
ValveSoftware/Source-1-Games
https://api.github.com/repos/ValveSoftware/Source-1-Games
closed
[CS:S] the main branch and the prerelease branch srcds.exe wont launch
Counter-Strike: Source Need Retest Reviewed Windows
had me and a friend download the cs:s dedicated server and i'm sure the windows loading thing appears and disappears for us and it doesn't appear in the processes on windows task manager when we try to launch it, no errors occurred as far as we know.
1.0
[CS:S] the main branch and the prerelease branch srcds.exe wont launch - had me and a friend download the cs:s dedicated server and i'm sure the windows loading thing appears and disappears for us and it doesn't appear in the processes on windows task manager when we try to launch it, no errors occurred as far as we know.
non_priority
the main branch and the prerelease branch srcds exe wont launch had me and a friend download the cs s dedicated server and i m sure the windows loading thing appears and disappears for us and it doesn t appear in the processes on windows task manager when we try to launch it no errors occurred as far as we know
0
113,680
17,150,869,302
IssuesEvent
2021-07-13 20:24:50
snowdensb/braindump
https://api.github.com/repos/snowdensb/braindump
opened
CVE-2019-11358 (Medium) detected in multiple libraries
security vulnerability
## CVE-2019-11358 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>jquery-2.2.4.tgz</b>, <b>jquery-2.1.4.min.js</b>, <b>jquery-1.11.1.min.js</b>, <b>jquery-1.10.1.min.js</b></p></summary> <p> <details><summary><b>jquery-2.2.4.tgz</b></p></summary> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://registry.npmjs.org/jquery/-/jquery-2.2.4.tgz">https://registry.npmjs.org/jquery/-/jquery-2.2.4.tgz</a></p> <p>Path to dependency file: braindump/package.json</p> <p>Path to vulnerable library: braindump/node_modules/jquery</p> <p> Dependency Hierarchy: - :x: **jquery-2.2.4.tgz** (Vulnerable Library) </details> <details><summary><b>jquery-2.1.4.min.js</b></p></summary> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/2.1.4/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/2.1.4/jquery.min.js</a></p> <p>Path to dependency file: braindump/node_modules/bootstrap-tagsinput/examples/index.html</p> <p>Path to vulnerable library: braindump/node_modules/bootstrap-tagsinput/examples/index.html</p> <p> Dependency Hierarchy: - :x: **jquery-2.1.4.min.js** (Vulnerable Library) </details> <details><summary><b>jquery-1.11.1.min.js</b></p></summary> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.11.1/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/1.11.1/jquery.min.js</a></p> <p>Path to dependency file: braindump/node_modules/bootstrap-tagsinput/examples/bootstrap-2.3.2.html</p> <p>Path to vulnerable library: braindump/node_modules/bootstrap-tagsinput/examples/bootstrap-2.3.2.html</p> <p> Dependency Hierarchy: - :x: **jquery-1.11.1.min.js** (Vulnerable Library) </details> <details><summary><b>jquery-1.10.1.min.js</b></p></summary> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.10.1/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/1.10.1/jquery.min.js</a></p> <p>Path to dependency file: braindump/node_modules/bootstrap-tabcollapse/example/example.html</p> <p>Path to vulnerable library: braindump/node_modules/bootstrap-tabcollapse/example/lib/js/jquery-1.10.1.min.js</p> <p> Dependency Hierarchy: - :x: **jquery-1.10.1.min.js** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/snowdensb/braindump/commit/815ae0afebcf867f02143f3ab9cf88b1d4dacdec">815ae0afebcf867f02143f3ab9cf88b1d4dacdec</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype. <p>Publish Date: 2019-04-20 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-11358>CVE-2019-11358</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11358">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11358</a></p> <p>Release Date: 2019-04-20</p> <p>Fix Resolution: 3.4.0</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"jquery","packageVersion":"2.2.4","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"jquery:2.2.4","isMinimumFixVersionAvailable":true,"minimumFixVersion":"3.4.0"},{"packageType":"JavaScript","packageName":"jquery","packageVersion":"2.1.4","packageFilePaths":["/node_modules/bootstrap-tagsinput/examples/index.html"],"isTransitiveDependency":false,"dependencyTree":"jquery:2.1.4","isMinimumFixVersionAvailable":true,"minimumFixVersion":"3.4.0"},{"packageType":"JavaScript","packageName":"jquery","packageVersion":"1.11.1","packageFilePaths":["/node_modules/bootstrap-tagsinput/examples/bootstrap-2.3.2.html"],"isTransitiveDependency":false,"dependencyTree":"jquery:1.11.1","isMinimumFixVersionAvailable":true,"minimumFixVersion":"3.4.0"},{"packageType":"JavaScript","packageName":"jquery","packageVersion":"1.10.1","packageFilePaths":["/node_modules/bootstrap-tabcollapse/example/example.html"],"isTransitiveDependency":false,"dependencyTree":"jquery:1.10.1","isMinimumFixVersionAvailable":true,"minimumFixVersion":"3.4.0"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2019-11358","vulnerabilityDetails":"jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-11358","cvss3Severity":"medium","cvss3Score":"6.1","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Changed","C":"Low","UI":"Required","AV":"Network","I":"Low"},"extraData":{}}</REMEDIATE> -->
True
CVE-2019-11358 (Medium) detected in multiple libraries - ## CVE-2019-11358 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>jquery-2.2.4.tgz</b>, <b>jquery-2.1.4.min.js</b>, <b>jquery-1.11.1.min.js</b>, <b>jquery-1.10.1.min.js</b></p></summary> <p> <details><summary><b>jquery-2.2.4.tgz</b></p></summary> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://registry.npmjs.org/jquery/-/jquery-2.2.4.tgz">https://registry.npmjs.org/jquery/-/jquery-2.2.4.tgz</a></p> <p>Path to dependency file: braindump/package.json</p> <p>Path to vulnerable library: braindump/node_modules/jquery</p> <p> Dependency Hierarchy: - :x: **jquery-2.2.4.tgz** (Vulnerable Library) </details> <details><summary><b>jquery-2.1.4.min.js</b></p></summary> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/2.1.4/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/2.1.4/jquery.min.js</a></p> <p>Path to dependency file: braindump/node_modules/bootstrap-tagsinput/examples/index.html</p> <p>Path to vulnerable library: braindump/node_modules/bootstrap-tagsinput/examples/index.html</p> <p> Dependency Hierarchy: - :x: **jquery-2.1.4.min.js** (Vulnerable Library) </details> <details><summary><b>jquery-1.11.1.min.js</b></p></summary> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.11.1/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/1.11.1/jquery.min.js</a></p> <p>Path to dependency file: braindump/node_modules/bootstrap-tagsinput/examples/bootstrap-2.3.2.html</p> <p>Path to vulnerable library: braindump/node_modules/bootstrap-tagsinput/examples/bootstrap-2.3.2.html</p> <p> Dependency Hierarchy: - :x: **jquery-1.11.1.min.js** (Vulnerable Library) </details> <details><summary><b>jquery-1.10.1.min.js</b></p></summary> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.10.1/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/1.10.1/jquery.min.js</a></p> <p>Path to dependency file: braindump/node_modules/bootstrap-tabcollapse/example/example.html</p> <p>Path to vulnerable library: braindump/node_modules/bootstrap-tabcollapse/example/lib/js/jquery-1.10.1.min.js</p> <p> Dependency Hierarchy: - :x: **jquery-1.10.1.min.js** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/snowdensb/braindump/commit/815ae0afebcf867f02143f3ab9cf88b1d4dacdec">815ae0afebcf867f02143f3ab9cf88b1d4dacdec</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype. <p>Publish Date: 2019-04-20 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-11358>CVE-2019-11358</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11358">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11358</a></p> <p>Release Date: 2019-04-20</p> <p>Fix Resolution: 3.4.0</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"jquery","packageVersion":"2.2.4","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"jquery:2.2.4","isMinimumFixVersionAvailable":true,"minimumFixVersion":"3.4.0"},{"packageType":"JavaScript","packageName":"jquery","packageVersion":"2.1.4","packageFilePaths":["/node_modules/bootstrap-tagsinput/examples/index.html"],"isTransitiveDependency":false,"dependencyTree":"jquery:2.1.4","isMinimumFixVersionAvailable":true,"minimumFixVersion":"3.4.0"},{"packageType":"JavaScript","packageName":"jquery","packageVersion":"1.11.1","packageFilePaths":["/node_modules/bootstrap-tagsinput/examples/bootstrap-2.3.2.html"],"isTransitiveDependency":false,"dependencyTree":"jquery:1.11.1","isMinimumFixVersionAvailable":true,"minimumFixVersion":"3.4.0"},{"packageType":"JavaScript","packageName":"jquery","packageVersion":"1.10.1","packageFilePaths":["/node_modules/bootstrap-tabcollapse/example/example.html"],"isTransitiveDependency":false,"dependencyTree":"jquery:1.10.1","isMinimumFixVersionAvailable":true,"minimumFixVersion":"3.4.0"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2019-11358","vulnerabilityDetails":"jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-11358","cvss3Severity":"medium","cvss3Score":"6.1","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Changed","C":"Low","UI":"Required","AV":"Network","I":"Low"},"extraData":{}}</REMEDIATE> -->
non_priority
cve medium detected in multiple libraries cve medium severity vulnerability vulnerable libraries jquery tgz jquery min js jquery min js jquery min js jquery tgz javascript library for dom operations library home page a href path to dependency file braindump package json path to vulnerable library braindump node modules jquery dependency hierarchy x jquery tgz vulnerable library jquery min js javascript library for dom operations library home page a href path to dependency file braindump node modules bootstrap tagsinput examples index html path to vulnerable library braindump node modules bootstrap tagsinput examples index html dependency hierarchy x jquery min js vulnerable library jquery min js javascript library for dom operations library home page a href path to dependency file braindump node modules bootstrap tagsinput examples bootstrap html path to vulnerable library braindump node modules bootstrap tagsinput examples bootstrap html dependency hierarchy x jquery min js vulnerable library jquery min js javascript library for dom operations library home page a href path to dependency file braindump node modules bootstrap tabcollapse example example html path to vulnerable library braindump node modules bootstrap tabcollapse example lib js jquery min js dependency hierarchy x jquery min js vulnerable library found in head commit a href found in base branch master vulnerability details jquery before as used in drupal backdrop cms and other products mishandles jquery extend true because of object prototype pollution if an unsanitized source object contained an enumerable proto property it could extend the native object prototype publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency false dependencytree jquery isminimumfixversionavailable true minimumfixversion packagetype javascript packagename jquery packageversion packagefilepaths istransitivedependency false dependencytree jquery isminimumfixversionavailable true minimumfixversion packagetype javascript packagename jquery packageversion packagefilepaths istransitivedependency false dependencytree jquery isminimumfixversionavailable true minimumfixversion packagetype javascript packagename jquery packageversion packagefilepaths istransitivedependency false dependencytree jquery isminimumfixversionavailable true minimumfixversion basebranches vulnerabilityidentifier cve vulnerabilitydetails jquery before as used in drupal backdrop cms and other products mishandles jquery extend true because of object prototype pollution if an unsanitized source object contained an enumerable proto property it could extend the native object prototype vulnerabilityurl
0
97,421
20,255,785,562
IssuesEvent
2022-02-14 23:02:41
sourcegraph/sourcegraph
https://api.github.com/repos/sourcegraph/sourcegraph
closed
insights: persisted global capture groups loading state should match normal loading state
bug team/code-insights backend capture-groups-insight insights-capture-groups-v2
Both of these insights have not run yet, but they show different states: ![image](https://user-images.githubusercontent.com/11967660/150630047-c23a97ec-4306-413b-89da-422eba84ce31.png) Right side: capture group that hasn't run yet. Left side: normal global search insights. We should show the same loading state for both, that the capture group insight is processing, *not* "no data to display." This will mislead users to thinking their query was wrong because they would expect both to show the loading state. I realize there may be some backend complexity in how we expose loading state from compute.
1.0
insights: persisted global capture groups loading state should match normal loading state - Both of these insights have not run yet, but they show different states: ![image](https://user-images.githubusercontent.com/11967660/150630047-c23a97ec-4306-413b-89da-422eba84ce31.png) Right side: capture group that hasn't run yet. Left side: normal global search insights. We should show the same loading state for both, that the capture group insight is processing, *not* "no data to display." This will mislead users to thinking their query was wrong because they would expect both to show the loading state. I realize there may be some backend complexity in how we expose loading state from compute.
non_priority
insights persisted global capture groups loading state should match normal loading state both of these insights have not run yet but they show different states right side capture group that hasn t run yet left side normal global search insights we should show the same loading state for both that the capture group insight is processing not no data to display this will mislead users to thinking their query was wrong because they would expect both to show the loading state i realize there may be some backend complexity in how we expose loading state from compute
0
55,434
23,469,225,467
IssuesEvent
2022-08-16 19:56:38
cityofaustin/atd-data-tech
https://api.github.com/repos/cityofaustin/atd-data-tech
closed
Create Web App for Traffic Engineering Areas
Service: Geo Workgroup: TDS
<!-- Email --> <!-- nathan.aubert@austintexas.gov --> > What application are you using? ArcGIS > Describe the problem. Our team has a map that we use to show areas which has changed. Both the people listed and the Council Districts have been updated. We would like a version which is updated or allows us to update as people transition into/out of the team. > How soon do you need this? Flexible — An extended timeline is OK > Requested By Nathan A. [Attachment](https://api.knack.com/v1/applications/595d00ebd315cc4cb98daff4/download/asset/62d0728fe49830001e2d09b7/engineer_areas_11x17_12102019.mxd) (916.0kb) Request ID: DTS22-104635
1.0
Create Web App for Traffic Engineering Areas - <!-- Email --> <!-- nathan.aubert@austintexas.gov --> > What application are you using? ArcGIS > Describe the problem. Our team has a map that we use to show areas which has changed. Both the people listed and the Council Districts have been updated. We would like a version which is updated or allows us to update as people transition into/out of the team. > How soon do you need this? Flexible — An extended timeline is OK > Requested By Nathan A. [Attachment](https://api.knack.com/v1/applications/595d00ebd315cc4cb98daff4/download/asset/62d0728fe49830001e2d09b7/engineer_areas_11x17_12102019.mxd) (916.0kb) Request ID: DTS22-104635
non_priority
create web app for traffic engineering areas what application are you using arcgis describe the problem our team has a map that we use to show areas which has changed both the people listed and the council districts have been updated we would like a version which is updated or allows us to update as people transition into out of the team how soon do you need this flexible — an extended timeline is ok requested by nathan a request id
0
94,790
11,911,348,558
IssuesEvent
2020-03-31 08:28:30
ember-learn/ember-styleguide
https://api.github.com/repos/ember-learn/ember-styleguide
closed
Part 3: Create Issues based on analysis from parts 1 and 2.
Website Redesign RFC
At this point, the documentation should exist that identifies components needed for each page.
1.0
Part 3: Create Issues based on analysis from parts 1 and 2. - At this point, the documentation should exist that identifies components needed for each page.
non_priority
part create issues based on analysis from parts and at this point the documentation should exist that identifies components needed for each page
0
290,584
21,890,277,035
IssuesEvent
2022-05-20 00:15:28
LGomez96/LIM017-md-links
https://api.github.com/repos/LGomez96/LIM017-md-links
closed
Desacoplar file system
documentation good first issue
quiero guardar en un solo archivo separado las funciones que usaré de esta librería para importarlas donde las necesite
1.0
Desacoplar file system - quiero guardar en un solo archivo separado las funciones que usaré de esta librería para importarlas donde las necesite
non_priority
desacoplar file system quiero guardar en un solo archivo separado las funciones que usaré de esta librería para importarlas donde las necesite
0
49,674
13,187,249,559
IssuesEvent
2020-08-13 02:49:14
icecube-trac/tix3
https://api.github.com/repos/icecube-trac/tix3
opened
[I3OmDb] Not compiling for icerec/V05-00-02 (Trac #1853)
Incomplete Migration Migrated from Trac combo reconstruction defect
<details> <summary><em>Migrated from <a href="https://code.icecube.wisc.edu/ticket/1853">https://code.icecube.wisc.edu/ticket/1853</a>, reported by maryon and owned by joertlin</em></summary> <p> ```json { "status": "closed", "changetime": "2019-02-13T14:13:24", "description": "Does not compile for me when using clang however gcc works. Forward declaration wrongly executed.\n\n{{{\n[ 88%] Building CXX object STTools/CMakeFiles/STTools-pybindings.dir/private/pybindings/algorithms/seededRT/I3SeededRTConfigurationService.cxx.o\nIn file included from /home/maryon/software/meta-projects/icerec/V05-00-02/src/I3Db/private/I3OmDb/I3OmDbFactory.cxx:2:\n/home/maryon/software/meta-projects/icerec/V05-00-02/src/I3Db/public/I3Db/I3OmDb/I3OmDb.h:1280:8: error: 'Om_s' redeclared with 'private' access\nstruct Om_s \n ^\n/home/maryon/software/meta-projects/icerec/V05-00-02/src/I3Db/public/I3Db/I3OmDb/I3OmDb.h:977:8: note: previously declared 'public' here\nstruct Om_s;\n ^\n1 error generated.\nmake[2]: *** [I3Db/CMakeFiles/I3Db.dir/private/I3OmDb/I3OmDbFactory.cxx.o] Error 1\nmake[2]: Target `I3Db/CMakeFiles/I3Db.dir/build' not remade because of errors.\nmake[1]: *** [I3Db/CMakeFiles/I3Db.dir/all] Error 2\n}}}\n", "reporter": "maryon", "cc": "", "resolution": "fixed", "_ts": "1550067204154158", "component": "combo reconstruction", "summary": "[I3OmDb] Not compiling for icerec/V05-00-02", "priority": "blocker", "keywords": "I3OmDb icerec", "time": "2016-09-09T11:50:36", "milestone": "", "owner": "joertlin", "type": "defect" } ``` </p> </details>
1.0
[I3OmDb] Not compiling for icerec/V05-00-02 (Trac #1853) - <details> <summary><em>Migrated from <a href="https://code.icecube.wisc.edu/ticket/1853">https://code.icecube.wisc.edu/ticket/1853</a>, reported by maryon and owned by joertlin</em></summary> <p> ```json { "status": "closed", "changetime": "2019-02-13T14:13:24", "description": "Does not compile for me when using clang however gcc works. Forward declaration wrongly executed.\n\n{{{\n[ 88%] Building CXX object STTools/CMakeFiles/STTools-pybindings.dir/private/pybindings/algorithms/seededRT/I3SeededRTConfigurationService.cxx.o\nIn file included from /home/maryon/software/meta-projects/icerec/V05-00-02/src/I3Db/private/I3OmDb/I3OmDbFactory.cxx:2:\n/home/maryon/software/meta-projects/icerec/V05-00-02/src/I3Db/public/I3Db/I3OmDb/I3OmDb.h:1280:8: error: 'Om_s' redeclared with 'private' access\nstruct Om_s \n ^\n/home/maryon/software/meta-projects/icerec/V05-00-02/src/I3Db/public/I3Db/I3OmDb/I3OmDb.h:977:8: note: previously declared 'public' here\nstruct Om_s;\n ^\n1 error generated.\nmake[2]: *** [I3Db/CMakeFiles/I3Db.dir/private/I3OmDb/I3OmDbFactory.cxx.o] Error 1\nmake[2]: Target `I3Db/CMakeFiles/I3Db.dir/build' not remade because of errors.\nmake[1]: *** [I3Db/CMakeFiles/I3Db.dir/all] Error 2\n}}}\n", "reporter": "maryon", "cc": "", "resolution": "fixed", "_ts": "1550067204154158", "component": "combo reconstruction", "summary": "[I3OmDb] Not compiling for icerec/V05-00-02", "priority": "blocker", "keywords": "I3OmDb icerec", "time": "2016-09-09T11:50:36", "milestone": "", "owner": "joertlin", "type": "defect" } ``` </p> </details>
non_priority
not compiling for icerec trac migrated from json status closed changetime description does not compile for me when using clang however gcc works forward declaration wrongly executed n n n building cxx object sttools cmakefiles sttools pybindings dir private pybindings algorithms seededrt cxx o nin file included from home maryon software meta projects icerec src private cxx n home maryon software meta projects icerec src public h error om s redeclared with private access nstruct om s n n home maryon software meta projects icerec src public h note previously declared public here nstruct om s n error generated nmake error nmake target cmakefiles dir build not remade because of errors nmake error n n reporter maryon cc resolution fixed ts component combo reconstruction summary not compiling for icerec priority blocker keywords icerec time milestone owner joertlin type defect
0
26,932
5,299,995,292
IssuesEvent
2017-02-10 02:28:18
systemd/systemd
https://api.github.com/repos/systemd/systemd
closed
document or imply that settings such as RestrictAddressFamily= should be combined with SystemCallArchitectures=native
documentation has-pr pid1
As discussed in #5254.
1.0
document or imply that settings such as RestrictAddressFamily= should be combined with SystemCallArchitectures=native - As discussed in #5254.
non_priority
document or imply that settings such as restrictaddressfamily should be combined with systemcallarchitectures native as discussed in
0
222,581
17,083,601,882
IssuesEvent
2021-07-08 08:58:30
ridgei/large_scale_ablation
https://api.github.com/repos/ridgei/large_scale_ablation
opened
make a draft research proposal draft
documentation
## Summary make a draft research proposal ## Goal submit to Kimura-san ## Todo - [ ] make a draft research proposal by Takemoto - [ ] review and modify by Okuda-san - [ ] submit to Kimura-san ## Deadline 07/16 ## Parent issue None ## References None ## Notes None
1.0
make a draft research proposal draft - ## Summary make a draft research proposal ## Goal submit to Kimura-san ## Todo - [ ] make a draft research proposal by Takemoto - [ ] review and modify by Okuda-san - [ ] submit to Kimura-san ## Deadline 07/16 ## Parent issue None ## References None ## Notes None
non_priority
make a draft research proposal draft summary make a draft research proposal goal submit to kimura san todo make a draft research proposal by takemoto review and modify by okuda san submit to kimura san deadline parent issue none references none notes none
0
106,483
9,160,103,925
IssuesEvent
2019-03-01 05:57:57
xcat2/xcat2-task-management
https://api.github.com/repos/xcat2/xcat2-task-management
closed
offer a osimage definition to set up ppc build server docker host
sprint3 test
what to do: * [ ] offer a osimage definition to leverage xcat_inventory to set up ppc build server docker host * [ ] update doc [How to set up a ppc build server docker host from stracth](https://github.ibm.com/xcat2/team_process/blob/master/FVT/docs/The_steps_of_ppc_build_server_docker_host_setup.md)
1.0
offer a osimage definition to set up ppc build server docker host - what to do: * [ ] offer a osimage definition to leverage xcat_inventory to set up ppc build server docker host * [ ] update doc [How to set up a ppc build server docker host from stracth](https://github.ibm.com/xcat2/team_process/blob/master/FVT/docs/The_steps_of_ppc_build_server_docker_host_setup.md)
non_priority
offer a osimage definition to set up ppc build server docker host what to do offer a osimage definition to leverage xcat inventory to set up ppc build server docker host update doc
0
53,861
6,762,035,899
IssuesEvent
2017-10-25 05:54:40
kbenoit/quanteda
https://api.github.com/repos/kbenoit/quanteda
closed
What the best way to do lemmatization?
design
I have tried to do lemmatization myself after seeing https://stackoverflow.com/questions/46731429/quanteda-fastest-way-to-replace-tokens-with-lemma-from-dictionary/46742533#46742533. `tokens_lookup` takes 114.234 sec only with 2000 docs, while `tokens_convert` is 0.067 sec (738 times faster!). We need to think. ```r require(quanteda) load("/home/kohei/Documents/Brexit/Analysis/data_tokens_guardian.RData") toks <- head(data_tokens_guardian, 2000) # http://www.lexiconista.com/Datasets/lemmatization-en.zip data <- read.csv("/home/kohei/Documents/Dictionary/Lemma list/lemmatization-en.txt", sep = '\t', as.is = TRUE, header = FALSE) system.time( dict <- dictionary(split(data[,2], data[,1])) ) # user system elapsed # 67.772 1.376 69.394 length(dict) # 26058 system.time( toks_lemma <- tokens_lookup(toks, dict, valuetype = 'fixed', exclusive = FALSE, capkeys = FALSE) ) # user system elapsed # 43.888 3.656 44.840 tokens_convert <- function(x, from, to) { type <- attr(x, 'types') type_new <- to[match(type, from)] type_new <- ifelse(is.na(type_new), type, type_new) attr(x, 'types') <- type_new quanteda:::tokens_recompile(x) } system.time( toks_lemma2 <- tokens_convert(toks, from = data[,2], to = data[,1]) ) # user system elapsed # 0.072 0.004 0.067 ```
1.0
What the best way to do lemmatization? - I have tried to do lemmatization myself after seeing https://stackoverflow.com/questions/46731429/quanteda-fastest-way-to-replace-tokens-with-lemma-from-dictionary/46742533#46742533. `tokens_lookup` takes 114.234 sec only with 2000 docs, while `tokens_convert` is 0.067 sec (738 times faster!). We need to think. ```r require(quanteda) load("/home/kohei/Documents/Brexit/Analysis/data_tokens_guardian.RData") toks <- head(data_tokens_guardian, 2000) # http://www.lexiconista.com/Datasets/lemmatization-en.zip data <- read.csv("/home/kohei/Documents/Dictionary/Lemma list/lemmatization-en.txt", sep = '\t', as.is = TRUE, header = FALSE) system.time( dict <- dictionary(split(data[,2], data[,1])) ) # user system elapsed # 67.772 1.376 69.394 length(dict) # 26058 system.time( toks_lemma <- tokens_lookup(toks, dict, valuetype = 'fixed', exclusive = FALSE, capkeys = FALSE) ) # user system elapsed # 43.888 3.656 44.840 tokens_convert <- function(x, from, to) { type <- attr(x, 'types') type_new <- to[match(type, from)] type_new <- ifelse(is.na(type_new), type, type_new) attr(x, 'types') <- type_new quanteda:::tokens_recompile(x) } system.time( toks_lemma2 <- tokens_convert(toks, from = data[,2], to = data[,1]) ) # user system elapsed # 0.072 0.004 0.067 ```
non_priority
what the best way to do lemmatization i have tried to do lemmatization myself after seeing tokens lookup takes sec only with docs while tokens convert is sec times faster we need to think r require quanteda load home kohei documents brexit analysis data tokens guardian rdata toks head data tokens guardian data read csv home kohei documents dictionary lemma list lemmatization en txt sep t as is true header false system time dict dictionary split data data user system elapsed length dict system time toks lemma tokens lookup toks dict valuetype fixed exclusive false capkeys false user system elapsed tokens convert function x from to type attr x types type new to type new ifelse is na type new type type new attr x types type new quanteda tokens recompile x system time toks tokens convert toks from data to data user system elapsed
0
20,074
11,382,042,453
IssuesEvent
2020-01-29 00:18:44
badges/shields
https://api.github.com/repos/badges/shields
closed
MavenMetadata Service Test Failing
keep-service-tests-green service-badge
:clock11: **When did the problem start?** ~ 15th of January <!-- Indicate when the problem started --> :camera: **Live badge** <!-- Provide a link to the live badge in plain text and markdown. --> https://img.shields.io/maven-metadata/v?metadataUrl=https%3A%2F%2Frepo1.maven.org%2Fmaven2%2Fcom%2Fgoogle%2Fcode%2Fgson%2Fgson%2Fmaven-metadata.xml ![](https://img.shields.io/maven-metadata/v?metadataUrl=https%3A%2F%2Frepo1.maven.org%2Fmaven2%2Fcom%2Fgoogle%2Fcode%2Fgson%2Fgson%2Fmaven-metadata.xml) :wrench: **Is the live badge working?** Yes <!-- Indicate whether or not the live badge is working. --> :link: **CircleCI link** https://circleci.com/gh/badges/daily-tests/854 <!-- Provide a link to the failing test in CircleCI. --> :beetle: **Stack trace** ``` MavenMetadata [live] valid maven-metadata.xml uri [ GET /v.json?metadataUrl=http://central.maven.org/maven2/com/google/code/gson/gson/maven-metadata.xml ] - [ GET /v.json?metadataUrl=http://central.maven.org/maven2/com/google/code/gson/gson/maven-metadata.xml ] ValidationError: message mismatch: "value" with value "inaccessible" fails to match the required pattern: /^v\d+(\.\d+)?(\.\d+)?$/ ``` :bulb: **Possible solution** Seems there's been some changes to Maven Central requiring HTTPS, so we just need to update our test targets accordingly (and probably the badge examples too) https://blog.sonatype.com/central-repository-moving-to-https <!--- Optional: only if you have suggestions on a fix/reason for the bug --> <!-- Love Shields? Please consider donating $10 to sustain our activities: 👉 https://opencollective.com/shields -->
2.0
MavenMetadata Service Test Failing - :clock11: **When did the problem start?** ~ 15th of January <!-- Indicate when the problem started --> :camera: **Live badge** <!-- Provide a link to the live badge in plain text and markdown. --> https://img.shields.io/maven-metadata/v?metadataUrl=https%3A%2F%2Frepo1.maven.org%2Fmaven2%2Fcom%2Fgoogle%2Fcode%2Fgson%2Fgson%2Fmaven-metadata.xml ![](https://img.shields.io/maven-metadata/v?metadataUrl=https%3A%2F%2Frepo1.maven.org%2Fmaven2%2Fcom%2Fgoogle%2Fcode%2Fgson%2Fgson%2Fmaven-metadata.xml) :wrench: **Is the live badge working?** Yes <!-- Indicate whether or not the live badge is working. --> :link: **CircleCI link** https://circleci.com/gh/badges/daily-tests/854 <!-- Provide a link to the failing test in CircleCI. --> :beetle: **Stack trace** ``` MavenMetadata [live] valid maven-metadata.xml uri [ GET /v.json?metadataUrl=http://central.maven.org/maven2/com/google/code/gson/gson/maven-metadata.xml ] - [ GET /v.json?metadataUrl=http://central.maven.org/maven2/com/google/code/gson/gson/maven-metadata.xml ] ValidationError: message mismatch: "value" with value "inaccessible" fails to match the required pattern: /^v\d+(\.\d+)?(\.\d+)?$/ ``` :bulb: **Possible solution** Seems there's been some changes to Maven Central requiring HTTPS, so we just need to update our test targets accordingly (and probably the badge examples too) https://blog.sonatype.com/central-repository-moving-to-https <!--- Optional: only if you have suggestions on a fix/reason for the bug --> <!-- Love Shields? Please consider donating $10 to sustain our activities: 👉 https://opencollective.com/shields -->
non_priority
mavenmetadata service test failing when did the problem start of january camera live badge wrench is the live badge working yes link circleci link beetle stack trace mavenmetadata valid maven metadata xml uri validationerror message mismatch value with value inaccessible fails to match the required pattern v d d d bulb possible solution seems there s been some changes to maven central requiring https so we just need to update our test targets accordingly and probably the badge examples too love shields please consider donating to sustain our activities 👉
0
172,727
27,318,467,709
IssuesEvent
2023-02-24 17:34:53
dotnet/machinelearning-modelbuilder
https://api.github.com/repos/dotnet/machinelearning-modelbuilder
opened
Redesign Model Builder Scenario Screen
Needs Design Needs PM
**Is your feature request related to a problem? Please describe.** As we've expanded the number of scenarios in Model Builder, the screen has become cluttered and some scenarios require scrolling because the current tile design takes up too much space for each of the tiles. ![image](https://user-images.githubusercontent.com/46974588/221248505-bff7d476-14c1-4ae9-94c4-116c7732a58a.png) **Describe the solution you'd like** Work with design team to come up with a more discoverable scenario screen. **Describe alternatives you've considered** N/A **Additional context** N/A
1.0
Redesign Model Builder Scenario Screen - **Is your feature request related to a problem? Please describe.** As we've expanded the number of scenarios in Model Builder, the screen has become cluttered and some scenarios require scrolling because the current tile design takes up too much space for each of the tiles. ![image](https://user-images.githubusercontent.com/46974588/221248505-bff7d476-14c1-4ae9-94c4-116c7732a58a.png) **Describe the solution you'd like** Work with design team to come up with a more discoverable scenario screen. **Describe alternatives you've considered** N/A **Additional context** N/A
non_priority
redesign model builder scenario screen is your feature request related to a problem please describe as we ve expanded the number of scenarios in model builder the screen has become cluttered and some scenarios require scrolling because the current tile design takes up too much space for each of the tiles describe the solution you d like work with design team to come up with a more discoverable scenario screen describe alternatives you ve considered n a additional context n a
0
326,352
24,080,415,557
IssuesEvent
2022-09-19 05:48:10
codestates-seb/seb39_main_001
https://api.github.com/repos/codestates-seb/seb39_main_001
opened
[API 수정]
documentation BE
- [ ] PATCH /boards/{board-id}/{user-id} - [ ] DELETE /boards/{board-id}/{user-id} - [ ] POST /applications/{board-id}/{user-id}?position= - [ ] POST /questions/{board-id}/{user-id} - [ ] PATCH /questions/{question-id}/{user-id} - [ ] POST /boards/{user-id} - [ ] POST /bookmarks/{board-id}/{user-id} - [ ] DELETE /bookmarks/{board-id}/{user-id} - [ ] POST /answers/{question-id}/{user-id} - [ ] PATCH /answers/{answer-id}/{user-id} - [ ] DELETE /answers/{answer-id}/{user-id} - [ ] DELETE /questions/{question-id}/{user-id}
1.0
[API 수정] - - [ ] PATCH /boards/{board-id}/{user-id} - [ ] DELETE /boards/{board-id}/{user-id} - [ ] POST /applications/{board-id}/{user-id}?position= - [ ] POST /questions/{board-id}/{user-id} - [ ] PATCH /questions/{question-id}/{user-id} - [ ] POST /boards/{user-id} - [ ] POST /bookmarks/{board-id}/{user-id} - [ ] DELETE /bookmarks/{board-id}/{user-id} - [ ] POST /answers/{question-id}/{user-id} - [ ] PATCH /answers/{answer-id}/{user-id} - [ ] DELETE /answers/{answer-id}/{user-id} - [ ] DELETE /questions/{question-id}/{user-id}
non_priority
patch boards board id user id delete boards board id user id post applications board id user id position post questions board id user id patch questions question id user id post boards user id post bookmarks board id user id delete bookmarks board id user id post answers question id user id patch answers answer id user id delete answers answer id user id delete questions question id user id
0
98,628
8,682,353,025
IssuesEvent
2018-12-02 07:12:24
AOSC-Dev/aosc-os-abbs
https://api.github.com/repos/AOSC-Dev/aosc-os-abbs
reopened
ghostscript: multiple vulnerabilities
security to-testing
**CVE IDs:** CVE-2018-17961, CVE-2018-18073, CVE-2018-18284 **Other security advisory IDs:** USN-3803-1, DSA-4336-1, MGASA-2018-0408, ASA-201811-3 **Descriptions:** Tavis Ormandy discovered multiple security issues in Ghostscript. If a user or automated system were tricked into processing a specially crafted file, a remote attacker could possibly use these issues to access arbitrary files, execute arbitrary code, or cause a denial of service. **Patches:** from Ubuntu, *update to Ghostscript 9.25 first!* **Architectural progress:** <!-- Please remove any architecture to which the security vulnerabilities do not apply. --> - [x] AMD64 `amd64` - [x] 32-bit Optional Environment `optenv32` - [ ] AArch64 `arm64` - [ ] ARMv7 `armel` - [ ] PowerPC 64-bit BE `ppc64` - [ ] PowerPC 32-bit BE `powerpc` - [ ] RISC-V 64-bit `riscv64`
1.0
ghostscript: multiple vulnerabilities - **CVE IDs:** CVE-2018-17961, CVE-2018-18073, CVE-2018-18284 **Other security advisory IDs:** USN-3803-1, DSA-4336-1, MGASA-2018-0408, ASA-201811-3 **Descriptions:** Tavis Ormandy discovered multiple security issues in Ghostscript. If a user or automated system were tricked into processing a specially crafted file, a remote attacker could possibly use these issues to access arbitrary files, execute arbitrary code, or cause a denial of service. **Patches:** from Ubuntu, *update to Ghostscript 9.25 first!* **Architectural progress:** <!-- Please remove any architecture to which the security vulnerabilities do not apply. --> - [x] AMD64 `amd64` - [x] 32-bit Optional Environment `optenv32` - [ ] AArch64 `arm64` - [ ] ARMv7 `armel` - [ ] PowerPC 64-bit BE `ppc64` - [ ] PowerPC 32-bit BE `powerpc` - [ ] RISC-V 64-bit `riscv64`
non_priority
ghostscript multiple vulnerabilities cve ids cve cve cve other security advisory ids usn dsa mgasa asa descriptions tavis ormandy discovered multiple security issues in ghostscript if a user or automated system were tricked into processing a specially crafted file a remote attacker could possibly use these issues to access arbitrary files execute arbitrary code or cause a denial of service patches from ubuntu update to ghostscript first architectural progress bit optional environment armel powerpc bit be powerpc bit be powerpc risc v bit
0
45,697
5,725,607,231
IssuesEvent
2017-04-20 16:57:43
miw-upm/SPRING.tpv
https://api.github.com/repos/miw-upm/SPRING.tpv
closed
Database Seeder
high test
### Poblador de BD a partir de Yaml - Una sola carga inicial para todos los test - Disponible en el API. Se permite elegir el fichero de precarga > Tiempo estimado: **5h**. Tiempo real: **??h** [Wiki](url)
1.0
Database Seeder - ### Poblador de BD a partir de Yaml - Una sola carga inicial para todos los test - Disponible en el API. Se permite elegir el fichero de precarga > Tiempo estimado: **5h**. Tiempo real: **??h** [Wiki](url)
non_priority
database seeder poblador de bd a partir de yaml una sola carga inicial para todos los test disponible en el api se permite elegir el fichero de precarga tiempo estimado tiempo real h url
0
3,307
2,666,937,760
IssuesEvent
2015-03-22 02:30:06
danshannon/javastravav3api
https://api.github.com/repos/danshannon/javastravav3api
closed
get segment effort returns activity without resource_state
has issue test has workaround Strava issue
`HTTP GET https://www.strava.com/api/v3/segment_efforts/5591276015` returns `"activity":{"id":237374614}` Should return `"activity":{"id":237374614, "resource_state":1}` to indicate that this is a META representation of the activity.
1.0
get segment effort returns activity without resource_state - `HTTP GET https://www.strava.com/api/v3/segment_efforts/5591276015` returns `"activity":{"id":237374614}` Should return `"activity":{"id":237374614, "resource_state":1}` to indicate that this is a META representation of the activity.
non_priority
get segment effort returns activity without resource state http get returns activity id should return activity id resource state to indicate that this is a meta representation of the activity
0
36,265
5,040,792,297
IssuesEvent
2016-12-19 07:41:53
db0sch/mnmlist
https://api.github.com/repos/db0sch/mnmlist
closed
Testing // Sign up & Sign In
primary ready testing
Write feature specs (which acts as a user on the browser) for sign up, sign in, problem with sign up and sign in. Editing password, username, fisrt_name, and last_name... etc.
1.0
Testing // Sign up & Sign In - Write feature specs (which acts as a user on the browser) for sign up, sign in, problem with sign up and sign in. Editing password, username, fisrt_name, and last_name... etc.
non_priority
testing sign up sign in write feature specs which acts as a user on the browser for sign up sign in problem with sign up and sign in editing password username fisrt name and last name etc
0
152,255
13,449,790,587
IssuesEvent
2020-09-08 17:27:50
Frankkwizera/films-webapp
https://api.github.com/repos/Frankkwizera/films-webapp
opened
Add project readme
documentation
Google how project readme files are written and write one for this repository
1.0
Add project readme - Google how project readme files are written and write one for this repository
non_priority
add project readme google how project readme files are written and write one for this repository
0
216,655
24,287,825,724
IssuesEvent
2022-09-29 01:04:09
DavidSpek/pipelines
https://api.github.com/repos/DavidSpek/pipelines
opened
CVE-2022-21797 (High) detected in joblib-0.14.1-py2.py3-none-any.whl
security vulnerability
## CVE-2022-21797 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>joblib-0.14.1-py2.py3-none-any.whl</b></p></summary> <p>Lightweight pipelining: using Python functions as pipeline jobs.</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/28/5c/cf6a2b65a321c4a209efcdf64c2689efae2cb62661f8f6f4bb28547cf1bf/joblib-0.14.1-py2.py3-none-any.whl">https://files.pythonhosted.org/packages/28/5c/cf6a2b65a321c4a209efcdf64c2689efae2cb62661f8f6f4bb28547cf1bf/joblib-0.14.1-py2.py3-none-any.whl</a></p> <p>Path to dependency file: /backend/requirements.txt</p> <p>Path to vulnerable library: /backend/requirements.txt,/backend/src/apiserver/visualization/requirements.txt,/test/sample-test/requirements.txt</p> <p> Dependency Hierarchy: - :x: **joblib-0.14.1-py2.py3-none-any.whl** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The package joblib from 0 and before 1.2.0 are vulnerable to Arbitrary Code Execution via the pre_dispatch flag in Parallel() class due to the eval() statement. <p>Publish Date: 2022-09-26 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-21797>CVE-2022-21797</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Release Date: 2022-09-26</p> <p>Fix Resolution: joblib - 1.2.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2022-21797 (High) detected in joblib-0.14.1-py2.py3-none-any.whl - ## CVE-2022-21797 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>joblib-0.14.1-py2.py3-none-any.whl</b></p></summary> <p>Lightweight pipelining: using Python functions as pipeline jobs.</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/28/5c/cf6a2b65a321c4a209efcdf64c2689efae2cb62661f8f6f4bb28547cf1bf/joblib-0.14.1-py2.py3-none-any.whl">https://files.pythonhosted.org/packages/28/5c/cf6a2b65a321c4a209efcdf64c2689efae2cb62661f8f6f4bb28547cf1bf/joblib-0.14.1-py2.py3-none-any.whl</a></p> <p>Path to dependency file: /backend/requirements.txt</p> <p>Path to vulnerable library: /backend/requirements.txt,/backend/src/apiserver/visualization/requirements.txt,/test/sample-test/requirements.txt</p> <p> Dependency Hierarchy: - :x: **joblib-0.14.1-py2.py3-none-any.whl** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The package joblib from 0 and before 1.2.0 are vulnerable to Arbitrary Code Execution via the pre_dispatch flag in Parallel() class due to the eval() statement. <p>Publish Date: 2022-09-26 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-21797>CVE-2022-21797</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Release Date: 2022-09-26</p> <p>Fix Resolution: joblib - 1.2.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in joblib none any whl cve high severity vulnerability vulnerable library joblib none any whl lightweight pipelining using python functions as pipeline jobs library home page a href path to dependency file backend requirements txt path to vulnerable library backend requirements txt backend src apiserver visualization requirements txt test sample test requirements txt dependency hierarchy x joblib none any whl vulnerable library found in base branch master vulnerability details the package joblib from and before are vulnerable to arbitrary code execution via the pre dispatch flag in parallel class due to the eval statement publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version release date fix resolution joblib step up your open source security game with mend
0
105,006
22,820,493,705
IssuesEvent
2022-07-12 01:26:48
arduino/arduino-ide
https://api.github.com/repos/arduino/arduino-ide
closed
Text colour clash.
topic: code type: imperfection topic: theme
**Describe the bug** The _Dark (Theia)_ theme renders the intelli-sense info unreadable. **To Reproduce** Steps to reproduce the behavior: 1. Set theme to _Dark (Theia)_. 2. Try to read the intellisense/quick-info. **Expected behavior** The contrast between text and background is high enough to be readable. **Screenshots** ![image](https://user-images.githubusercontent.com/996280/137603188-ea3dd825-4ea5-4b01-9f0b-512fd2573877.png) Desktop (please complete the following information): - Edition Windows 10 Home - Version 21H1 - OS build 19043.1288 - Experience Windows Feature Experience Pack 120.2212.3920.0 Additional context IDE: - Version 2.0.0-beta.12 - Date 2021-10-07T07:55:54.325Z - CLI Version 0.19.1 alpha [718bbbf2]
1.0
Text colour clash. - **Describe the bug** The _Dark (Theia)_ theme renders the intelli-sense info unreadable. **To Reproduce** Steps to reproduce the behavior: 1. Set theme to _Dark (Theia)_. 2. Try to read the intellisense/quick-info. **Expected behavior** The contrast between text and background is high enough to be readable. **Screenshots** ![image](https://user-images.githubusercontent.com/996280/137603188-ea3dd825-4ea5-4b01-9f0b-512fd2573877.png) Desktop (please complete the following information): - Edition Windows 10 Home - Version 21H1 - OS build 19043.1288 - Experience Windows Feature Experience Pack 120.2212.3920.0 Additional context IDE: - Version 2.0.0-beta.12 - Date 2021-10-07T07:55:54.325Z - CLI Version 0.19.1 alpha [718bbbf2]
non_priority
text colour clash describe the bug the dark theia theme renders the intelli sense info unreadable to reproduce steps to reproduce the behavior set theme to dark theia try to read the intellisense quick info expected behavior the contrast between text and background is high enough to be readable screenshots desktop please complete the following information edition windows home version os build experience windows feature experience pack additional context ide version beta date cli version alpha
0
308,959
26,640,658,918
IssuesEvent
2023-01-25 04:17:04
galaxyproject/galaxy
https://api.github.com/repos/galaxyproject/galaxy
opened
New datatypes page renders an empty table
kind/bug area/UI-UX release-testing-23.0
**Describe the bug** Testing #14464. The `/datatypes` page should show a list of available datatypes but on Ubuntu/Chrome I got a long table of blank rows (screenshot below). I don't see any console or request errors. Hard-refresh did not fix. The request to https://usegalaxy.org/api/datatypes?extension_only=true appears to be successful, returning a list of datatype strings: ```js ["ab1","affybatch","agilentbrukeryep.d.tar","agilentmasshunter.d.tar", ... ] ``` **Galaxy Version and/or server at which you observed the bug** 23.0 **To Reproduce** Steps to reproduce the behaviour: 1. Visit https://usegalaxy.org/datatypes **Expected behaviour** The table should be populated with available datatypes. **Screenshots** ![image](https://user-images.githubusercontent.com/42562517/214477964-daefedfe-d0a0-489c-a93e-a5d4859fd770.png)
1.0
New datatypes page renders an empty table - **Describe the bug** Testing #14464. The `/datatypes` page should show a list of available datatypes but on Ubuntu/Chrome I got a long table of blank rows (screenshot below). I don't see any console or request errors. Hard-refresh did not fix. The request to https://usegalaxy.org/api/datatypes?extension_only=true appears to be successful, returning a list of datatype strings: ```js ["ab1","affybatch","agilentbrukeryep.d.tar","agilentmasshunter.d.tar", ... ] ``` **Galaxy Version and/or server at which you observed the bug** 23.0 **To Reproduce** Steps to reproduce the behaviour: 1. Visit https://usegalaxy.org/datatypes **Expected behaviour** The table should be populated with available datatypes. **Screenshots** ![image](https://user-images.githubusercontent.com/42562517/214477964-daefedfe-d0a0-489c-a93e-a5d4859fd770.png)
non_priority
new datatypes page renders an empty table describe the bug testing the datatypes page should show a list of available datatypes but on ubuntu chrome i got a long table of blank rows screenshot below i don t see any console or request errors hard refresh did not fix the request to appears to be successful returning a list of datatype strings js galaxy version and or server at which you observed the bug to reproduce steps to reproduce the behaviour visit expected behaviour the table should be populated with available datatypes screenshots
0
1,859
3,409,845,869
IssuesEvent
2015-12-04 17:25:26
ChandraCXC/iris
https://api.github.com/repos/ChandraCXC/iris
closed
Prototype Approach for Integration Testing
story:test-infrastructure
We are not yet sure what the integration test setup is going to look like. Note that this is just to prototype and be sure we have a valid approach for setting up SAMP and SHERPA-SAMP.
1.0
Prototype Approach for Integration Testing - We are not yet sure what the integration test setup is going to look like. Note that this is just to prototype and be sure we have a valid approach for setting up SAMP and SHERPA-SAMP.
non_priority
prototype approach for integration testing we are not yet sure what the integration test setup is going to look like note that this is just to prototype and be sure we have a valid approach for setting up samp and sherpa samp
0
75,214
25,590,112,856
IssuesEvent
2022-12-01 12:21:58
vector-im/element-web
https://api.github.com/repos/vector-im/element-web
closed
EDUs with room id field cause notifications
T-Defect A-Notifications X-Needs-Investigation
### Description Incoming EDUs over /sync can produce notifications if they contain the room_id field Conduit: ``` { "ephemeral": { "events": [ { "type": "m.receipt", "content": { "$zLsGHlRy8UIQnfoBCqagxOVz79DDb2y56XketZhxdw8": { "m.read": { "@tulir:maunium.net": { "ts": 1620812476643 } } } }, "room_id": "!EgoVrPyOnPSVXERlxj:gruenhage.xyz" } ] } } ``` Synapse: ``` { "ephemeral": { "events": [ { "type": "m.receipt", "content": { "$inJlQ2wHie4DHUbNCbFRVCxInkCe5GFTqFbPwAEAbx8": { "m.read": { "@ace:kittenface.studio": { "ts": 1620812386378 } } } } } ] } } ``` I assume the presence of the room_id key triggers Element to apply a push rule to the event. You can see here in the spec that receipt events should contain a room id: https://matrix.org/docs/spec/client_server/r0.6.1#m-receipt You can also see it in the example response to /sync: https://matrix.org/docs/spec/client_server/r0.6.1#get-matrix-client-r0-sync (but the /sync definition for `Event` doesn't list the room_id field, so maybe it's a gray zone). I think Element should not play notifications sounds for EDUs in any case Version: Element Web staging
1.0
EDUs with room id field cause notifications - ### Description Incoming EDUs over /sync can produce notifications if they contain the room_id field Conduit: ``` { "ephemeral": { "events": [ { "type": "m.receipt", "content": { "$zLsGHlRy8UIQnfoBCqagxOVz79DDb2y56XketZhxdw8": { "m.read": { "@tulir:maunium.net": { "ts": 1620812476643 } } } }, "room_id": "!EgoVrPyOnPSVXERlxj:gruenhage.xyz" } ] } } ``` Synapse: ``` { "ephemeral": { "events": [ { "type": "m.receipt", "content": { "$inJlQ2wHie4DHUbNCbFRVCxInkCe5GFTqFbPwAEAbx8": { "m.read": { "@ace:kittenface.studio": { "ts": 1620812386378 } } } } } ] } } ``` I assume the presence of the room_id key triggers Element to apply a push rule to the event. You can see here in the spec that receipt events should contain a room id: https://matrix.org/docs/spec/client_server/r0.6.1#m-receipt You can also see it in the example response to /sync: https://matrix.org/docs/spec/client_server/r0.6.1#get-matrix-client-r0-sync (but the /sync definition for `Event` doesn't list the room_id field, so maybe it's a gray zone). I think Element should not play notifications sounds for EDUs in any case Version: Element Web staging
non_priority
edus with room id field cause notifications description incoming edus over sync can produce notifications if they contain the room id field conduit ephemeral events type m receipt content m read tulir maunium net ts room id egovrpyonpsvxerlxj gruenhage xyz synapse ephemeral events type m receipt content m read ace kittenface studio ts i assume the presence of the room id key triggers element to apply a push rule to the event you can see here in the spec that receipt events should contain a room id you can also see it in the example response to sync but the sync definition for event doesn t list the room id field so maybe it s a gray zone i think element should not play notifications sounds for edus in any case version element web staging
0
37,990
8,393,559,213
IssuesEvent
2018-10-09 20:54:41
phy25/tweetpi
https://api.github.com/repos/phy25/tweetpi
closed
Code Review by lyhuang@bu.edu
bug code review
**Code Review by lyhuang@bu.edu** Congratulation on your finishing minipj1. However, you still have some problems. I can not run your code through your readme. Your code can **ONLY** be used on LINUX. On windows, when I use: `TweetPI.py annotatedvideo --timeline POTUS --limit 50 --options '{"twitter_consumer_key":"...", "twitter_consumer_secret":"...", "twitter_access_token":"...", "twitter_access_secret":"...", "google_key_json":"gapi.json"}'` I put everything in and nothing happens when I run the command(Even no errors!!!). Default setting is important so that I can check if your code works in least time. Basically, your code meets the MVP of this task. It can generate video from twitter pictures automatically and provide labels for them. Advantages: 1. Your API has many functions to use. I believe users can benefit a lot from your API. 2. You have considered many conditions including: - No json file or keys - Twitter API fails - No enough arguments - FFMPEG API fails - Photo sizes not adapted to ffmpeg 3. Users can user many functions in your API such as setting font color, size, from users’ homeline etc, which is good for those who have many requirements. 4. Naming convention is good for reader to know what the variable is as soon as possible. However, there is still many disadvantages that I suggest to adjust. 1. First, if someone runs on windows, the code will not raise any errors, please write an environment check or adjust your code on windows system. 2. Second, too many arguments make users confused especially when they are required arguments. I need to type secrets and keys EVERY TIME I run your code, which is not user-friendly to those who just want to use as soon as possible. I strongly recommend you read keys and secrets in a given txt file or let users adjust in the code so that users do not need to type every time. 3. Third, too many functions with fewest tutorials is not recommended. I can’t even know how to use such a great number of arguments. Please write more in your tutorial. 4. Forth, Using as a library is so confused because I don’t know even know the name of your classes and their functions, could you please provide more guide to use as a library of your code? 5. Fifth, you can not deal with too many pictures situation, it is important because users may be confused if they can not get videos in a short period. 6. Sixth, default settings are important. For a starter, it is easiest and fastest way to access your API through simplest command with fewest or none parameters. I spend many times on learning to use your API, which I think is not user-friendly. Other Details: 1. It is not a good idea to write all functions in a file. This may make your code confusing and look messing. To separate your class into different files may be a good idea. 2. More comments should be added otherwise readers may be confused. 3. Too many commits may confuse yourself. You have committed over 60 times in all the branches. This may make yourself confused when errors are found. If you setup automatic push in IDE, I strongly recommend you set a long time period.
1.0
Code Review by lyhuang@bu.edu - **Code Review by lyhuang@bu.edu** Congratulation on your finishing minipj1. However, you still have some problems. I can not run your code through your readme. Your code can **ONLY** be used on LINUX. On windows, when I use: `TweetPI.py annotatedvideo --timeline POTUS --limit 50 --options '{"twitter_consumer_key":"...", "twitter_consumer_secret":"...", "twitter_access_token":"...", "twitter_access_secret":"...", "google_key_json":"gapi.json"}'` I put everything in and nothing happens when I run the command(Even no errors!!!). Default setting is important so that I can check if your code works in least time. Basically, your code meets the MVP of this task. It can generate video from twitter pictures automatically and provide labels for them. Advantages: 1. Your API has many functions to use. I believe users can benefit a lot from your API. 2. You have considered many conditions including: - No json file or keys - Twitter API fails - No enough arguments - FFMPEG API fails - Photo sizes not adapted to ffmpeg 3. Users can user many functions in your API such as setting font color, size, from users’ homeline etc, which is good for those who have many requirements. 4. Naming convention is good for reader to know what the variable is as soon as possible. However, there is still many disadvantages that I suggest to adjust. 1. First, if someone runs on windows, the code will not raise any errors, please write an environment check or adjust your code on windows system. 2. Second, too many arguments make users confused especially when they are required arguments. I need to type secrets and keys EVERY TIME I run your code, which is not user-friendly to those who just want to use as soon as possible. I strongly recommend you read keys and secrets in a given txt file or let users adjust in the code so that users do not need to type every time. 3. Third, too many functions with fewest tutorials is not recommended. I can’t even know how to use such a great number of arguments. Please write more in your tutorial. 4. Forth, Using as a library is so confused because I don’t know even know the name of your classes and their functions, could you please provide more guide to use as a library of your code? 5. Fifth, you can not deal with too many pictures situation, it is important because users may be confused if they can not get videos in a short period. 6. Sixth, default settings are important. For a starter, it is easiest and fastest way to access your API through simplest command with fewest or none parameters. I spend many times on learning to use your API, which I think is not user-friendly. Other Details: 1. It is not a good idea to write all functions in a file. This may make your code confusing and look messing. To separate your class into different files may be a good idea. 2. More comments should be added otherwise readers may be confused. 3. Too many commits may confuse yourself. You have committed over 60 times in all the branches. This may make yourself confused when errors are found. If you setup automatic push in IDE, I strongly recommend you set a long time period.
non_priority
code review by lyhuang bu edu code review by lyhuang bu edu congratulation on your finishing however you still have some problems i can not run your code through your readme your code can only be used on linux on windows when i use tweetpi py annotatedvideo timeline potus limit options twitter consumer key twitter consumer secret twitter access token twitter access secret google key json gapi json i put everything in and nothing happens when i run the command even no errors default setting is important so that i can check if your code works in least time basically your code meets the mvp of this task it can generate video from twitter pictures automatically and provide labels for them advantages your api has many functions to use i believe users can benefit a lot from your api you have considered many conditions including no json file or keys twitter api fails no enough arguments ffmpeg api fails photo sizes not adapted to ffmpeg users can user many functions in your api such as setting font color size from users’ homeline etc which is good for those who have many requirements naming convention is good for reader to know what the variable is as soon as possible however there is still many disadvantages that i suggest to adjust first if someone runs on windows the code will not raise any errors please write an environment check or adjust your code on windows system second too many arguments make users confused especially when they are required arguments i need to type secrets and keys every time i run your code which is not user friendly to those who just want to use as soon as possible i strongly recommend you read keys and secrets in a given txt file or let users adjust in the code so that users do not need to type every time third too many functions with fewest tutorials is not recommended i can’t even know how to use such a great number of arguments please write more in your tutorial forth using as a library is so confused because i don’t know even know the name of your classes and their functions could you please provide more guide to use as a library of your code fifth you can not deal with too many pictures situation it is important because users may be confused if they can not get videos in a short period sixth default settings are important for a starter it is easiest and fastest way to access your api through simplest command with fewest or none parameters i spend many times on learning to use your api which i think is not user friendly other details it is not a good idea to write all functions in a file this may make your code confusing and look messing to separate your class into different files may be a good idea more comments should be added otherwise readers may be confused too many commits may confuse yourself you have committed over times in all the branches this may make yourself confused when errors are found if you setup automatic push in ide i strongly recommend you set a long time period
0
8,010
11,266,878,720
IssuesEvent
2020-01-14 00:13:52
proot-me/gsoc
https://api.github.com/repos/proot-me/gsoc
closed
Project template
requirement
> Each project on the Ideas list should include: a) a project title/description b) more detailed description of the project (2-5 sentences) c) expected outcomes d) skills required/preferred e) possible mentors. And if possible, an easy, medium or hard rating of each project. > Don’t be vague about the ideas. Be sure to write a few sentences describing what you need accomplished and not just an overall theoretical version of what you might want. See: https://google.github.io/gsocguides/mentor/defining-a-project-ideas-list
1.0
Project template - > Each project on the Ideas list should include: a) a project title/description b) more detailed description of the project (2-5 sentences) c) expected outcomes d) skills required/preferred e) possible mentors. And if possible, an easy, medium or hard rating of each project. > Don’t be vague about the ideas. Be sure to write a few sentences describing what you need accomplished and not just an overall theoretical version of what you might want. See: https://google.github.io/gsocguides/mentor/defining-a-project-ideas-list
non_priority
project template each project on the ideas list should include a a project title description b more detailed description of the project sentences c expected outcomes d skills required preferred e possible mentors and if possible an easy medium or hard rating of each project don’t be vague about the ideas be sure to write a few sentences describing what you need accomplished and not just an overall theoretical version of what you might want see
0
5,871
3,294,911,300
IssuesEvent
2015-10-31 13:37:21
joomla/joomla-cms
https://api.github.com/repos/joomla/joomla-cms
closed
Not a bug but a suggestion for MODAL Image selection
No Code Attached Yet
#### Steps to reproduce the issue The current use of bootstrap wells etc in a modal for the top and the bottom can be confusing to users since the upload and navigations are hidden without scrolling etc. I would like to suggest making the top thumbnail list or grid well fixed and the bottom upload a photo fixed as well. Here is my suggestion. #### Expected result .browser { height: 325px; width: 100%; overflow: auto; position: relative; margin: 40px 0 40px 0; padding: 40px 0; } .well { margin: 0px; position: fixed; top: 0; width: 94%; z-index: 2; } #### Actual result #### System information (as much as possible) #### Additional comments
1.0
Not a bug but a suggestion for MODAL Image selection - #### Steps to reproduce the issue The current use of bootstrap wells etc in a modal for the top and the bottom can be confusing to users since the upload and navigations are hidden without scrolling etc. I would like to suggest making the top thumbnail list or grid well fixed and the bottom upload a photo fixed as well. Here is my suggestion. #### Expected result .browser { height: 325px; width: 100%; overflow: auto; position: relative; margin: 40px 0 40px 0; padding: 40px 0; } .well { margin: 0px; position: fixed; top: 0; width: 94%; z-index: 2; } #### Actual result #### System information (as much as possible) #### Additional comments
non_priority
not a bug but a suggestion for modal image selection steps to reproduce the issue the current use of bootstrap wells etc in a modal for the top and the bottom can be confusing to users since the upload and navigations are hidden without scrolling etc i would like to suggest making the top thumbnail list or grid well fixed and the bottom upload a photo fixed as well here is my suggestion expected result browser height width overflow auto position relative margin padding well margin position fixed top width z index actual result system information as much as possible additional comments
0
20,263
6,019,351,744
IssuesEvent
2017-06-07 14:21:29
mozilla/addons-server
https://api.github.com/repos/mozilla/addons-server
closed
Remove legacy devhub index page
component: code quality component: devhub triaged
Our new devhub pages landed with mozilla/addons-frontend#1021 but our old index page is still in our code. * [ ] Remove `devhub/index.html` - or replace it by the new index.html * [ ] Add migration to remove waffle flag. * [ ] Find unused css and images and remove them
1.0
Remove legacy devhub index page - Our new devhub pages landed with mozilla/addons-frontend#1021 but our old index page is still in our code. * [ ] Remove `devhub/index.html` - or replace it by the new index.html * [ ] Add migration to remove waffle flag. * [ ] Find unused css and images and remove them
non_priority
remove legacy devhub index page our new devhub pages landed with mozilla addons frontend but our old index page is still in our code remove devhub index html or replace it by the new index html add migration to remove waffle flag find unused css and images and remove them
0
5,836
5,190,706,266
IssuesEvent
2017-01-21 12:32:25
tensorflow/tensorflow
https://api.github.com/repos/tensorflow/tensorflow
closed
XLA: random numbers are the same across `session.run` calls
type:bug/performance
Not sure if that's intended, but that changes behavior of training pipelines: ``` from tensorflow.contrib.compiler import jit jit_scope = jit.experimental_jit_scope with jit_scope(compile_ops=True): x = tf.random_uniform(()) sess = tf.Session() print(sess.run(x)) print(sess.run(x)) ``` Output: ``` 0.768917 0.768917 ```
True
XLA: random numbers are the same across `session.run` calls - Not sure if that's intended, but that changes behavior of training pipelines: ``` from tensorflow.contrib.compiler import jit jit_scope = jit.experimental_jit_scope with jit_scope(compile_ops=True): x = tf.random_uniform(()) sess = tf.Session() print(sess.run(x)) print(sess.run(x)) ``` Output: ``` 0.768917 0.768917 ```
non_priority
xla random numbers are the same across session run calls not sure if that s intended but that changes behavior of training pipelines from tensorflow contrib compiler import jit jit scope jit experimental jit scope with jit scope compile ops true x tf random uniform sess tf session print sess run x print sess run x output
0
179,921
21,606,571,012
IssuesEvent
2022-05-04 04:25:52
testdemo1227/Demo-WebGoat1
https://api.github.com/repos/testdemo1227/Demo-WebGoat1
opened
jquery-1.10.2.min.js: 4 vulnerabilities (highest severity is: 6.1)
security vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jquery-1.10.2.min.js</b></p></summary> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.10.2/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/1.10.2/jquery.min.js</a></p> <p>Path to dependency file: /newDesign/index.html</p> <p>Path to vulnerable library: /newDesign/assets/js/jquery-1.10.2.min.js,/src/main/webapp/js/jquery/jquery-1.10.2.min.js,/newDesign/assets/js/jquery-1.10.2.min.js</p> <p> <p>Found in HEAD commit: <a href="https://github.com/testdemo1227/Demo-WebGoat1/commit/4bc811a006e2ea4234387fe41dc021407d92aae0">4bc811a006e2ea4234387fe41dc021407d92aae0</a></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | --- | --- | | [CVE-2020-11023](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11023) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | jquery-1.10.2.min.js | Direct | jquery - 3.5.0;jquery-rails - 4.4.0 | &#10060; | | [CVE-2020-11022](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11022) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | jquery-1.10.2.min.js | Direct | jQuery - 3.5.0 | &#10060; | | [CVE-2015-9251](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2015-9251) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | jquery-1.10.2.min.js | Direct | jQuery - v3.0.0 | &#10060; | | [CVE-2019-11358](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-11358) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | jquery-1.10.2.min.js | Direct | 3.4.0 | &#10060; | ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2020-11023</summary> ### Vulnerable Library - <b>jquery-1.10.2.min.js</b></p> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.10.2/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/1.10.2/jquery.min.js</a></p> <p>Path to dependency file: /newDesign/index.html</p> <p>Path to vulnerable library: /newDesign/assets/js/jquery-1.10.2.min.js,/src/main/webapp/js/jquery/jquery-1.10.2.min.js,/newDesign/assets/js/jquery-1.10.2.min.js</p> <p> Dependency Hierarchy: - :x: **jquery-1.10.2.min.js** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/testdemo1227/Demo-WebGoat1/commit/4bc811a006e2ea4234387fe41dc021407d92aae0">4bc811a006e2ea4234387fe41dc021407d92aae0</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0. <p>Publish Date: 2020-04-29 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11023>CVE-2020-11023</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>6.1</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/jquery/jquery/security/advisories/GHSA-jpcq-cgw6-v4j6,https://github.com/rails/jquery-rails/blob/master/CHANGELOG.md#440">https://github.com/jquery/jquery/security/advisories/GHSA-jpcq-cgw6-v4j6,https://github.com/rails/jquery-rails/blob/master/CHANGELOG.md#440</a></p> <p>Release Date: 2020-04-29</p> <p>Fix Resolution: jquery - 3.5.0;jquery-rails - 4.4.0</p> </p> <p></p> Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2020-11022</summary> ### Vulnerable Library - <b>jquery-1.10.2.min.js</b></p> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.10.2/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/1.10.2/jquery.min.js</a></p> <p>Path to dependency file: /newDesign/index.html</p> <p>Path to vulnerable library: /newDesign/assets/js/jquery-1.10.2.min.js,/src/main/webapp/js/jquery/jquery-1.10.2.min.js,/newDesign/assets/js/jquery-1.10.2.min.js</p> <p> Dependency Hierarchy: - :x: **jquery-1.10.2.min.js** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/testdemo1227/Demo-WebGoat1/commit/4bc811a006e2ea4234387fe41dc021407d92aae0">4bc811a006e2ea4234387fe41dc021407d92aae0</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0. <p>Publish Date: 2020-04-29 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11022>CVE-2020-11022</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>6.1</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/">https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/</a></p> <p>Release Date: 2020-04-29</p> <p>Fix Resolution: jQuery - 3.5.0</p> </p> <p></p> Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2015-9251</summary> ### Vulnerable Library - <b>jquery-1.10.2.min.js</b></p> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.10.2/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/1.10.2/jquery.min.js</a></p> <p>Path to dependency file: /newDesign/index.html</p> <p>Path to vulnerable library: /newDesign/assets/js/jquery-1.10.2.min.js,/src/main/webapp/js/jquery/jquery-1.10.2.min.js,/newDesign/assets/js/jquery-1.10.2.min.js</p> <p> Dependency Hierarchy: - :x: **jquery-1.10.2.min.js** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/testdemo1227/Demo-WebGoat1/commit/4bc811a006e2ea4234387fe41dc021407d92aae0">4bc811a006e2ea4234387fe41dc021407d92aae0</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed. <p>Publish Date: 2018-01-18 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2015-9251>CVE-2015-9251</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>6.1</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2015-9251">https://nvd.nist.gov/vuln/detail/CVE-2015-9251</a></p> <p>Release Date: 2018-01-18</p> <p>Fix Resolution: jQuery - v3.0.0</p> </p> <p></p> Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2019-11358</summary> ### Vulnerable Library - <b>jquery-1.10.2.min.js</b></p> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.10.2/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/1.10.2/jquery.min.js</a></p> <p>Path to dependency file: /newDesign/index.html</p> <p>Path to vulnerable library: /newDesign/assets/js/jquery-1.10.2.min.js,/src/main/webapp/js/jquery/jquery-1.10.2.min.js,/newDesign/assets/js/jquery-1.10.2.min.js</p> <p> Dependency Hierarchy: - :x: **jquery-1.10.2.min.js** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/testdemo1227/Demo-WebGoat1/commit/4bc811a006e2ea4234387fe41dc021407d92aae0">4bc811a006e2ea4234387fe41dc021407d92aae0</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype. <p>Publish Date: 2019-04-20 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-11358>CVE-2019-11358</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>6.1</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11358">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11358</a></p> <p>Release Date: 2019-04-20</p> <p>Fix Resolution: 3.4.0</p> </p> <p></p> Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details> <!-- <REMEDIATE>[{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"JavaScript","packageName":"jquery","packageVersion":"1.10.2","packageFilePaths":["/newDesign/index.html"],"isTransitiveDependency":false,"dependencyTree":"jquery:1.10.2","isMinimumFixVersionAvailable":true,"minimumFixVersion":"jquery - 3.5.0;jquery-rails - 4.4.0","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-11023","vulnerabilityDetails":"In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing \u003coption\u003e elements from untrusted sources - even after sanitizing it - to one of jQuery\u0027s DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11023","cvss3Severity":"medium","cvss3Score":"6.1","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Changed","C":"Low","UI":"Required","AV":"Network","I":"Low"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"JavaScript","packageName":"jquery","packageVersion":"1.10.2","packageFilePaths":["/newDesign/index.html"],"isTransitiveDependency":false,"dependencyTree":"jquery:1.10.2","isMinimumFixVersionAvailable":true,"minimumFixVersion":"jQuery - 3.5.0","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-11022","vulnerabilityDetails":"In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery\u0027s DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11022","cvss3Severity":"medium","cvss3Score":"6.1","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Changed","C":"Low","UI":"Required","AV":"Network","I":"Low"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"JavaScript","packageName":"jquery","packageVersion":"1.10.2","packageFilePaths":["/newDesign/index.html"],"isTransitiveDependency":false,"dependencyTree":"jquery:1.10.2","isMinimumFixVersionAvailable":true,"minimumFixVersion":"jQuery - v3.0.0","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2015-9251","vulnerabilityDetails":"jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2015-9251","cvss3Severity":"medium","cvss3Score":"6.1","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Changed","C":"Low","UI":"Required","AV":"Network","I":"Low"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"JavaScript","packageName":"jquery","packageVersion":"1.10.2","packageFilePaths":["/newDesign/index.html"],"isTransitiveDependency":false,"dependencyTree":"jquery:1.10.2","isMinimumFixVersionAvailable":true,"minimumFixVersion":"3.4.0","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2019-11358","vulnerabilityDetails":"jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-11358","cvss3Severity":"medium","cvss3Score":"6.1","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Changed","C":"Low","UI":"Required","AV":"Network","I":"Low"},"extraData":{}}]</REMEDIATE> -->
True
jquery-1.10.2.min.js: 4 vulnerabilities (highest severity is: 6.1) - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jquery-1.10.2.min.js</b></p></summary> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.10.2/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/1.10.2/jquery.min.js</a></p> <p>Path to dependency file: /newDesign/index.html</p> <p>Path to vulnerable library: /newDesign/assets/js/jquery-1.10.2.min.js,/src/main/webapp/js/jquery/jquery-1.10.2.min.js,/newDesign/assets/js/jquery-1.10.2.min.js</p> <p> <p>Found in HEAD commit: <a href="https://github.com/testdemo1227/Demo-WebGoat1/commit/4bc811a006e2ea4234387fe41dc021407d92aae0">4bc811a006e2ea4234387fe41dc021407d92aae0</a></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | --- | --- | | [CVE-2020-11023](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11023) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | jquery-1.10.2.min.js | Direct | jquery - 3.5.0;jquery-rails - 4.4.0 | &#10060; | | [CVE-2020-11022](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11022) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | jquery-1.10.2.min.js | Direct | jQuery - 3.5.0 | &#10060; | | [CVE-2015-9251](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2015-9251) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | jquery-1.10.2.min.js | Direct | jQuery - v3.0.0 | &#10060; | | [CVE-2019-11358](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-11358) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | jquery-1.10.2.min.js | Direct | 3.4.0 | &#10060; | ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2020-11023</summary> ### Vulnerable Library - <b>jquery-1.10.2.min.js</b></p> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.10.2/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/1.10.2/jquery.min.js</a></p> <p>Path to dependency file: /newDesign/index.html</p> <p>Path to vulnerable library: /newDesign/assets/js/jquery-1.10.2.min.js,/src/main/webapp/js/jquery/jquery-1.10.2.min.js,/newDesign/assets/js/jquery-1.10.2.min.js</p> <p> Dependency Hierarchy: - :x: **jquery-1.10.2.min.js** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/testdemo1227/Demo-WebGoat1/commit/4bc811a006e2ea4234387fe41dc021407d92aae0">4bc811a006e2ea4234387fe41dc021407d92aae0</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0. <p>Publish Date: 2020-04-29 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11023>CVE-2020-11023</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>6.1</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/jquery/jquery/security/advisories/GHSA-jpcq-cgw6-v4j6,https://github.com/rails/jquery-rails/blob/master/CHANGELOG.md#440">https://github.com/jquery/jquery/security/advisories/GHSA-jpcq-cgw6-v4j6,https://github.com/rails/jquery-rails/blob/master/CHANGELOG.md#440</a></p> <p>Release Date: 2020-04-29</p> <p>Fix Resolution: jquery - 3.5.0;jquery-rails - 4.4.0</p> </p> <p></p> Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2020-11022</summary> ### Vulnerable Library - <b>jquery-1.10.2.min.js</b></p> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.10.2/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/1.10.2/jquery.min.js</a></p> <p>Path to dependency file: /newDesign/index.html</p> <p>Path to vulnerable library: /newDesign/assets/js/jquery-1.10.2.min.js,/src/main/webapp/js/jquery/jquery-1.10.2.min.js,/newDesign/assets/js/jquery-1.10.2.min.js</p> <p> Dependency Hierarchy: - :x: **jquery-1.10.2.min.js** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/testdemo1227/Demo-WebGoat1/commit/4bc811a006e2ea4234387fe41dc021407d92aae0">4bc811a006e2ea4234387fe41dc021407d92aae0</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0. <p>Publish Date: 2020-04-29 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11022>CVE-2020-11022</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>6.1</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/">https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/</a></p> <p>Release Date: 2020-04-29</p> <p>Fix Resolution: jQuery - 3.5.0</p> </p> <p></p> Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2015-9251</summary> ### Vulnerable Library - <b>jquery-1.10.2.min.js</b></p> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.10.2/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/1.10.2/jquery.min.js</a></p> <p>Path to dependency file: /newDesign/index.html</p> <p>Path to vulnerable library: /newDesign/assets/js/jquery-1.10.2.min.js,/src/main/webapp/js/jquery/jquery-1.10.2.min.js,/newDesign/assets/js/jquery-1.10.2.min.js</p> <p> Dependency Hierarchy: - :x: **jquery-1.10.2.min.js** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/testdemo1227/Demo-WebGoat1/commit/4bc811a006e2ea4234387fe41dc021407d92aae0">4bc811a006e2ea4234387fe41dc021407d92aae0</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed. <p>Publish Date: 2018-01-18 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2015-9251>CVE-2015-9251</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>6.1</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2015-9251">https://nvd.nist.gov/vuln/detail/CVE-2015-9251</a></p> <p>Release Date: 2018-01-18</p> <p>Fix Resolution: jQuery - v3.0.0</p> </p> <p></p> Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2019-11358</summary> ### Vulnerable Library - <b>jquery-1.10.2.min.js</b></p> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.10.2/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/1.10.2/jquery.min.js</a></p> <p>Path to dependency file: /newDesign/index.html</p> <p>Path to vulnerable library: /newDesign/assets/js/jquery-1.10.2.min.js,/src/main/webapp/js/jquery/jquery-1.10.2.min.js,/newDesign/assets/js/jquery-1.10.2.min.js</p> <p> Dependency Hierarchy: - :x: **jquery-1.10.2.min.js** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/testdemo1227/Demo-WebGoat1/commit/4bc811a006e2ea4234387fe41dc021407d92aae0">4bc811a006e2ea4234387fe41dc021407d92aae0</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype. <p>Publish Date: 2019-04-20 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-11358>CVE-2019-11358</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>6.1</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11358">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11358</a></p> <p>Release Date: 2019-04-20</p> <p>Fix Resolution: 3.4.0</p> </p> <p></p> Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details> <!-- <REMEDIATE>[{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"JavaScript","packageName":"jquery","packageVersion":"1.10.2","packageFilePaths":["/newDesign/index.html"],"isTransitiveDependency":false,"dependencyTree":"jquery:1.10.2","isMinimumFixVersionAvailable":true,"minimumFixVersion":"jquery - 3.5.0;jquery-rails - 4.4.0","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-11023","vulnerabilityDetails":"In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing \u003coption\u003e elements from untrusted sources - even after sanitizing it - to one of jQuery\u0027s DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11023","cvss3Severity":"medium","cvss3Score":"6.1","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Changed","C":"Low","UI":"Required","AV":"Network","I":"Low"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"JavaScript","packageName":"jquery","packageVersion":"1.10.2","packageFilePaths":["/newDesign/index.html"],"isTransitiveDependency":false,"dependencyTree":"jquery:1.10.2","isMinimumFixVersionAvailable":true,"minimumFixVersion":"jQuery - 3.5.0","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-11022","vulnerabilityDetails":"In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery\u0027s DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11022","cvss3Severity":"medium","cvss3Score":"6.1","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Changed","C":"Low","UI":"Required","AV":"Network","I":"Low"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"JavaScript","packageName":"jquery","packageVersion":"1.10.2","packageFilePaths":["/newDesign/index.html"],"isTransitiveDependency":false,"dependencyTree":"jquery:1.10.2","isMinimumFixVersionAvailable":true,"minimumFixVersion":"jQuery - v3.0.0","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2015-9251","vulnerabilityDetails":"jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2015-9251","cvss3Severity":"medium","cvss3Score":"6.1","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Changed","C":"Low","UI":"Required","AV":"Network","I":"Low"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"JavaScript","packageName":"jquery","packageVersion":"1.10.2","packageFilePaths":["/newDesign/index.html"],"isTransitiveDependency":false,"dependencyTree":"jquery:1.10.2","isMinimumFixVersionAvailable":true,"minimumFixVersion":"3.4.0","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2019-11358","vulnerabilityDetails":"jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-11358","cvss3Severity":"medium","cvss3Score":"6.1","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Changed","C":"Low","UI":"Required","AV":"Network","I":"Low"},"extraData":{}}]</REMEDIATE> -->
non_priority
jquery min js vulnerabilities highest severity is vulnerable library jquery min js javascript library for dom operations library home page a href path to dependency file newdesign index html path to vulnerable library newdesign assets js jquery min js src main webapp js jquery jquery min js newdesign assets js jquery min js found in head commit a href vulnerabilities cve severity cvss dependency type fixed in remediation available medium jquery min js direct jquery jquery rails medium jquery min js direct jquery medium jquery min js direct jquery medium jquery min js direct details cve vulnerable library jquery min js javascript library for dom operations library home page a href path to dependency file newdesign index html path to vulnerable library newdesign assets js jquery min js src main webapp js jquery jquery min js newdesign assets js jquery min js dependency hierarchy x jquery min js vulnerable library found in head commit a href found in base branch master vulnerability details in jquery versions greater than or equal to and before passing html containing elements from untrusted sources even after sanitizing it to one of jquery s dom manipulation methods i e html append and others may execute untrusted code this problem is patched in jquery publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution jquery jquery rails step up your open source security game with whitesource cve vulnerable library jquery min js javascript library for dom operations library home page a href path to dependency file newdesign index html path to vulnerable library newdesign assets js jquery min js src main webapp js jquery jquery min js newdesign assets js jquery min js dependency hierarchy x jquery min js vulnerable library found in head commit a href found in base branch master vulnerability details in jquery versions greater than or equal to and before passing html from untrusted sources even after sanitizing it to one of jquery s dom manipulation methods i e html append and others may execute untrusted code this problem is patched in jquery publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution jquery step up your open source security game with whitesource cve vulnerable library jquery min js javascript library for dom operations library home page a href path to dependency file newdesign index html path to vulnerable library newdesign assets js jquery min js src main webapp js jquery jquery min js newdesign assets js jquery min js dependency hierarchy x jquery min js vulnerable library found in head commit a href found in base branch master vulnerability details jquery before is vulnerable to cross site scripting xss attacks when a cross domain ajax request is performed without the datatype option causing text javascript responses to be executed publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution jquery step up your open source security game with whitesource cve vulnerable library jquery min js javascript library for dom operations library home page a href path to dependency file newdesign index html path to vulnerable library newdesign assets js jquery min js src main webapp js jquery jquery min js newdesign assets js jquery min js dependency hierarchy x jquery min js vulnerable library found in head commit a href found in base branch master vulnerability details jquery before as used in drupal backdrop cms and other products mishandles jquery extend true because of object prototype pollution if an unsanitized source object contained an enumerable proto property it could extend the native object prototype publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource istransitivedependency false dependencytree jquery isminimumfixversionavailable true minimumfixversion jquery jquery rails isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails in jquery versions greater than or equal to and before passing html containing elements from untrusted sources even after sanitizing it to one of jquery dom manipulation methods i e html append and others may execute untrusted code this problem is patched in jquery vulnerabilityurl istransitivedependency false dependencytree jquery isminimumfixversionavailable true minimumfixversion jquery isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails in jquery versions greater than or equal to and before passing html from untrusted sources even after sanitizing it to one of jquery dom manipulation methods i e html append and others may execute untrusted code this problem is patched in jquery vulnerabilityurl istransitivedependency false dependencytree jquery isminimumfixversionavailable true minimumfixversion jquery isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails jquery before is vulnerable to cross site scripting xss attacks when a cross domain ajax request is performed without the datatype option causing text javascript responses to be executed vulnerabilityurl istransitivedependency false dependencytree jquery isminimumfixversionavailable true minimumfixversion isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails jquery before as used in drupal backdrop cms and other products mishandles jquery extend true because of object prototype pollution if an unsanitized source object contained an enumerable proto property it could extend the native object prototype vulnerabilityurl
0
156,421
13,648,717,424
IssuesEvent
2020-09-26 10:44:48
wolfgangB33r/tabshop-android-issues
https://api.github.com/repos/wolfgangB33r/tabshop-android-issues
closed
Add printer setup instructions to TabShop help page
documentation
Setup documentation is needed to explain how to print invoices on a network printer or how to connect a Bluetooth Thermo printer. Also some information about the ESC/POS commands is useful.
1.0
Add printer setup instructions to TabShop help page - Setup documentation is needed to explain how to print invoices on a network printer or how to connect a Bluetooth Thermo printer. Also some information about the ESC/POS commands is useful.
non_priority
add printer setup instructions to tabshop help page setup documentation is needed to explain how to print invoices on a network printer or how to connect a bluetooth thermo printer also some information about the esc pos commands is useful
0
313,597
23,484,011,341
IssuesEvent
2022-08-17 13:04:47
dipzza/ultrastar-song2txt
https://api.github.com/repos/dipzza/ultrastar-song2txt
opened
Determine metrics to evaluate the pitch aplication.
documentation
Related to #11. The most important behavior for the application is that the predicted pitches with high enough confidence are correct, if not the user would have to check the tones manually anyways. As the intention is to automate the process, is much more useful to get 60% right 40% unknown that 70% right 10% wrong 20% unknown for example. To evaluate this behavior the classic Accuracy metric is useful, as well as precision and recall for multi-class classification (each note being a class) and we could favor precision in the precision-recall tradeoff. Evaluation with metrics designed for pitch estimation could be useful to see if predictions are closer to be correct even if they are not exact, but it runs the risk of reevaluating the used techniques and not the final output of the application for little value. Nonetheless, raw pitch accuracy or some of the metrics defined here https://archives.ismir.net/ismir2019/paper/000090.pdf may be worth to take a look at. Metrics usually used for linear regression may provide the information we are looking for aside from accuracy. MAE (mean squared error) for example heavily penalizes large differences between the predicted value and the ground truth, which is a desired behavior, as a semitone error may be overlooked, but a large enough difference is catastrophic.
1.0
Determine metrics to evaluate the pitch aplication. - Related to #11. The most important behavior for the application is that the predicted pitches with high enough confidence are correct, if not the user would have to check the tones manually anyways. As the intention is to automate the process, is much more useful to get 60% right 40% unknown that 70% right 10% wrong 20% unknown for example. To evaluate this behavior the classic Accuracy metric is useful, as well as precision and recall for multi-class classification (each note being a class) and we could favor precision in the precision-recall tradeoff. Evaluation with metrics designed for pitch estimation could be useful to see if predictions are closer to be correct even if they are not exact, but it runs the risk of reevaluating the used techniques and not the final output of the application for little value. Nonetheless, raw pitch accuracy or some of the metrics defined here https://archives.ismir.net/ismir2019/paper/000090.pdf may be worth to take a look at. Metrics usually used for linear regression may provide the information we are looking for aside from accuracy. MAE (mean squared error) for example heavily penalizes large differences between the predicted value and the ground truth, which is a desired behavior, as a semitone error may be overlooked, but a large enough difference is catastrophic.
non_priority
determine metrics to evaluate the pitch aplication related to the most important behavior for the application is that the predicted pitches with high enough confidence are correct if not the user would have to check the tones manually anyways as the intention is to automate the process is much more useful to get right unknown that right wrong unknown for example to evaluate this behavior the classic accuracy metric is useful as well as precision and recall for multi class classification each note being a class and we could favor precision in the precision recall tradeoff evaluation with metrics designed for pitch estimation could be useful to see if predictions are closer to be correct even if they are not exact but it runs the risk of reevaluating the used techniques and not the final output of the application for little value nonetheless raw pitch accuracy or some of the metrics defined here may be worth to take a look at metrics usually used for linear regression may provide the information we are looking for aside from accuracy mae mean squared error for example heavily penalizes large differences between the predicted value and the ground truth which is a desired behavior as a semitone error may be overlooked but a large enough difference is catastrophic
0
122,406
17,703,856,507
IssuesEvent
2021-08-25 03:59:02
Chiencc/Sample_Webgoat
https://api.github.com/repos/Chiencc/Sample_Webgoat
opened
CVE-2017-15095 (High) detected in jackson-databind-2.6.3.jar
security vulnerability
## CVE-2017-15095 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.6.3.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: Sample_Webgoat_depth_0/SourceCode/webgoat-standalone/webgoat-standalone/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.6.3/jackson-databind-2.6.3.jar</p> <p> Dependency Hierarchy: - webgoat-container-7.1.jar (Root Library) - :x: **jackson-databind-2.6.3.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Chiencc/Sample_Webgoat/commit/8c8daafbebc152c1aabb39157cf71791044ee1af">8c8daafbebc152c1aabb39157cf71791044ee1af</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A deserialization flaw was discovered in the jackson-databind in versions before 2.8.10 and 2.9.1, which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readValue method of the ObjectMapper. This issue extends the previous flaw CVE-2017-7525 by blacklisting more classes that could be used maliciously. <p>Publish Date: 2018-02-06 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-15095>CVE-2017-15095</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2017-15095">https://nvd.nist.gov/vuln/detail/CVE-2017-15095</a></p> <p>Release Date: 2018-02-06</p> <p>Fix Resolution: 2.8.10,2.9.1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2017-15095 (High) detected in jackson-databind-2.6.3.jar - ## CVE-2017-15095 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.6.3.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: Sample_Webgoat_depth_0/SourceCode/webgoat-standalone/webgoat-standalone/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.6.3/jackson-databind-2.6.3.jar</p> <p> Dependency Hierarchy: - webgoat-container-7.1.jar (Root Library) - :x: **jackson-databind-2.6.3.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Chiencc/Sample_Webgoat/commit/8c8daafbebc152c1aabb39157cf71791044ee1af">8c8daafbebc152c1aabb39157cf71791044ee1af</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A deserialization flaw was discovered in the jackson-databind in versions before 2.8.10 and 2.9.1, which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readValue method of the ObjectMapper. This issue extends the previous flaw CVE-2017-7525 by blacklisting more classes that could be used maliciously. <p>Publish Date: 2018-02-06 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-15095>CVE-2017-15095</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2017-15095">https://nvd.nist.gov/vuln/detail/CVE-2017-15095</a></p> <p>Release Date: 2018-02-06</p> <p>Fix Resolution: 2.8.10,2.9.1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in jackson databind jar cve high severity vulnerability vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file sample webgoat depth sourcecode webgoat standalone webgoat standalone pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy webgoat container jar root library x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details a deserialization flaw was discovered in the jackson databind in versions before and which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readvalue method of the objectmapper this issue extends the previous flaw cve by blacklisting more classes that could be used maliciously publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
0
154,042
19,710,768,632
IssuesEvent
2022-01-13 04:53:28
ChoeMinji/react-17.0.2
https://api.github.com/repos/ChoeMinji/react-17.0.2
opened
CVE-2017-16138 (High) detected in multiple libraries
security vulnerability
## CVE-2017-16138 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>mime-1.3.4.tgz</b>, <b>mime-1.3.6.tgz</b>, <b>mime-1.2.11.tgz</b></p></summary> <p> <details><summary><b>mime-1.3.4.tgz</b></p></summary> <p>A comprehensive library for mime-type mapping</p> <p>Library home page: <a href="https://registry.npmjs.org/mime/-/mime-1.3.4.tgz">https://registry.npmjs.org/mime/-/mime-1.3.4.tgz</a></p> <p>Path to dependency file: /fixtures/fiber-debugger/package.json</p> <p>Path to vulnerable library: /fixtures/fiber-debugger/node_modules/mime/package.json</p> <p> Dependency Hierarchy: - express-4.15.2.tgz (Root Library) - send-0.15.1.tgz - :x: **mime-1.3.4.tgz** (Vulnerable Library) </details> <details><summary><b>mime-1.3.6.tgz</b></p></summary> <p>A comprehensive library for mime-type mapping</p> <p>Library home page: <a href="https://registry.npmjs.org/mime/-/mime-1.3.6.tgz">https://registry.npmjs.org/mime/-/mime-1.3.6.tgz</a></p> <p> Dependency Hierarchy: - :x: **mime-1.3.6.tgz** (Vulnerable Library) </details> <details><summary><b>mime-1.2.11.tgz</b></p></summary> <p>A comprehensive library for mime-type mapping</p> <p>Library home page: <a href="https://registry.npmjs.org/mime/-/mime-1.2.11.tgz">https://registry.npmjs.org/mime/-/mime-1.2.11.tgz</a></p> <p>Path to dependency file: /fixtures/fiber-debugger/package.json</p> <p>Path to vulnerable library: /fixtures/fiber-debugger/node_modules/url-loader/node_modules/mime/package.json</p> <p> Dependency Hierarchy: - react-scripts-0.9.5.tgz (Root Library) - url-loader-0.5.7.tgz - :x: **mime-1.2.11.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/ChoeMinji/react-17.0.2/commit/4669645897ed4ebcd4ee037f4dabb509ed4754c7">4669645897ed4ebcd4ee037f4dabb509ed4754c7</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The mime module < 1.4.1, 2.0.1, 2.0.2 is vulnerable to regular expression denial of service when a mime lookup is performed on untrusted user input. <p>Publish Date: 2018-06-07 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-16138>CVE-2017-16138</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16138">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16138</a></p> <p>Release Date: 2018-06-07</p> <p>Fix Resolution: 1.4.1,2.0.3</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2017-16138 (High) detected in multiple libraries - ## CVE-2017-16138 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>mime-1.3.4.tgz</b>, <b>mime-1.3.6.tgz</b>, <b>mime-1.2.11.tgz</b></p></summary> <p> <details><summary><b>mime-1.3.4.tgz</b></p></summary> <p>A comprehensive library for mime-type mapping</p> <p>Library home page: <a href="https://registry.npmjs.org/mime/-/mime-1.3.4.tgz">https://registry.npmjs.org/mime/-/mime-1.3.4.tgz</a></p> <p>Path to dependency file: /fixtures/fiber-debugger/package.json</p> <p>Path to vulnerable library: /fixtures/fiber-debugger/node_modules/mime/package.json</p> <p> Dependency Hierarchy: - express-4.15.2.tgz (Root Library) - send-0.15.1.tgz - :x: **mime-1.3.4.tgz** (Vulnerable Library) </details> <details><summary><b>mime-1.3.6.tgz</b></p></summary> <p>A comprehensive library for mime-type mapping</p> <p>Library home page: <a href="https://registry.npmjs.org/mime/-/mime-1.3.6.tgz">https://registry.npmjs.org/mime/-/mime-1.3.6.tgz</a></p> <p> Dependency Hierarchy: - :x: **mime-1.3.6.tgz** (Vulnerable Library) </details> <details><summary><b>mime-1.2.11.tgz</b></p></summary> <p>A comprehensive library for mime-type mapping</p> <p>Library home page: <a href="https://registry.npmjs.org/mime/-/mime-1.2.11.tgz">https://registry.npmjs.org/mime/-/mime-1.2.11.tgz</a></p> <p>Path to dependency file: /fixtures/fiber-debugger/package.json</p> <p>Path to vulnerable library: /fixtures/fiber-debugger/node_modules/url-loader/node_modules/mime/package.json</p> <p> Dependency Hierarchy: - react-scripts-0.9.5.tgz (Root Library) - url-loader-0.5.7.tgz - :x: **mime-1.2.11.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/ChoeMinji/react-17.0.2/commit/4669645897ed4ebcd4ee037f4dabb509ed4754c7">4669645897ed4ebcd4ee037f4dabb509ed4754c7</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The mime module < 1.4.1, 2.0.1, 2.0.2 is vulnerable to regular expression denial of service when a mime lookup is performed on untrusted user input. <p>Publish Date: 2018-06-07 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-16138>CVE-2017-16138</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16138">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16138</a></p> <p>Release Date: 2018-06-07</p> <p>Fix Resolution: 1.4.1,2.0.3</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in multiple libraries cve high severity vulnerability vulnerable libraries mime tgz mime tgz mime tgz mime tgz a comprehensive library for mime type mapping library home page a href path to dependency file fixtures fiber debugger package json path to vulnerable library fixtures fiber debugger node modules mime package json dependency hierarchy express tgz root library send tgz x mime tgz vulnerable library mime tgz a comprehensive library for mime type mapping library home page a href dependency hierarchy x mime tgz vulnerable library mime tgz a comprehensive library for mime type mapping library home page a href path to dependency file fixtures fiber debugger package json path to vulnerable library fixtures fiber debugger node modules url loader node modules mime package json dependency hierarchy react scripts tgz root library url loader tgz x mime tgz vulnerable library found in head commit a href found in base branch master vulnerability details the mime module is vulnerable to regular expression denial of service when a mime lookup is performed on untrusted user input publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
0
126,509
26,869,318,656
IssuesEvent
2023-02-04 08:44:52
lukebrogan/WebGoat
https://api.github.com/repos/lukebrogan/WebGoat
opened
Code Security Report: 45 high severity findings, 156 total findings
code security findings
# Code Security Report **Latest Scan:** 2023-02-04 08:43am **Total Findings:** 156 **Tested Project Files:** 424 **Detected Programming Languages:** 2 <!-- SAST-MANUAL-SCAN-START --> - [ ] Check this box to manually trigger a scan <!-- SAST-MANUAL-SCAN-END --> ## Language: Java | Severity | CWE | Vulnerability Type | Count | |-|-|-|-| |<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High|[CWE-89](https://cwe.mitre.org/data/definitions/89.html)|SQL Injection|26| |<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High|[CWE-22](https://cwe.mitre.org/data/definitions/22.html)|Path/Directory Traversal|9| |<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High|[CWE-79](https://cwe.mitre.org/data/definitions/79.html)|Cross-Site Scripting|4| |<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High|[CWE-502](https://cwe.mitre.org/data/definitions/502.html)|Deserialization of Untrusted Data|1| |<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High|[CWE-918](https://cwe.mitre.org/data/definitions/918.html)|Server Side Request Forgery|2| |<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium|[CWE-798](https://cwe.mitre.org/data/definitions/798.html)|Hardcoded Password/Credentials|11| |<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium|[CWE-611](https://cwe.mitre.org/data/definitions/611.html)|XML External Entity (XXE) Injection|3| |<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium|[CWE-338](https://cwe.mitre.org/data/definitions/338.html)|Weak Pseudo-Random|9| |<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium|[CWE-244](https://cwe.mitre.org/data/definitions/244.html)|Heap Inspection|33| |<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium|[CWE-676](https://cwe.mitre.org/data/definitions/676.html)|Miscellaneous Dangerous Functions|2| |<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium|[CWE-209](https://cwe.mitre.org/data/definitions/209.html)|Console Output|2| |<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium|[CWE-209](https://cwe.mitre.org/data/definitions/209.html)|Error Messages Information Exposure|46| |<img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> Low|[CWE-916](https://cwe.mitre.org/data/definitions/916.html)|Weak Hash Strength|1| |<img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> Low|[CWE-20](https://cwe.mitre.org/data/definitions/20.html)|Cookie Injection|2| ### Details > The below list presents the 20 most relevant findings that need your attention. To view information on the remaining findings, navigate to the [Mend SAST Application](https://saas.mend.io/sast/#/scans/d643c714-feee-4b72-8b10-0b3149c6dc8c/details). <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20>SQL Injection (CWE-89) : 20</summary> #### Findings <details> <summary>mitigation/Servers.java:71</summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/mitigation/Servers.java#L66-L71 </details> <details> <summary>advanced/SqlInjectionLesson6a.java:71</summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/advanced/SqlInjectionLesson6a.java#L66-L71 <details> <summary> Trace </summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/mitigation/SqlOnlyInputValidationOnKeywords.java#L57 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/advanced/SqlInjectionLesson6a.java#L62 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/advanced/SqlInjectionLesson6a.java#L66 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/advanced/SqlInjectionLesson6a.java#L71 </details> </details> <details> <summary>advanced/SqlInjectionLesson6a.java:71</summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/advanced/SqlInjectionLesson6a.java#L66-L71 <details> <summary> Trace </summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/mitigation/SqlOnlyInputValidation.java#L51 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/advanced/SqlInjectionLesson6a.java#L62 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/advanced/SqlInjectionLesson6a.java#L66 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/advanced/SqlInjectionLesson6a.java#L71 </details> </details> <details> <summary>introduction/SqlInjectionLesson10.java:71</summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson10.java#L66-L71 <details> <summary> Trace </summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson10.java#L59 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson10.java#L62 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson10.java#L64 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson10.java#L71 </details> </details> <details> <summary>introduction/SqlInjectionLesson5a.java:64</summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson5a.java#L59-L64 <details> <summary> Trace </summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson5a.java#L56 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson5a.java#L59 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson5a.java#L62 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson5a.java#L64 </details> </details> <details> <summary>advanced/SqlInjectionChallenge.java:69</summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/advanced/SqlInjectionChallenge.java#L64-L69 <details> <summary> Trace </summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/advanced/SqlInjectionChallenge.java#L66 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/advanced/SqlInjectionChallenge.java#L69 </details> </details> <details> <summary>introduction/SqlInjectionLesson4.java:60</summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson4.java#L55-L60 <details> <summary> Trace </summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson4.java#L55 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson4.java#L58 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson4.java#L60 </details> </details> <details> <summary>introduction/SqlInjectionLesson9.java:76</summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson9.java#L71-L76 <details> <summary> Trace </summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson9.java#L61 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson9.java#L64 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson9.java#L66 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson9.java#L76 </details> </details> <details> <summary>introduction/SqlInjectionLesson2.java:65</summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson2.java#L60-L65 </details> <details> <summary>introduction/SqlInjectionLesson8.java:78</summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson8.java#L73-L78 <details> <summary> Trace </summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson8.java#L60 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson8.java#L63 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson8.java#L65 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson8.java#L78 </details> </details> <details> <summary>introduction/SqlInjectionLesson8.java:78</summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson8.java#L73-L78 <details> <summary> Trace </summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson8.java#L65 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson8.java#L78 </details> </details> <details> <summary>introduction/SqlInjectionLesson8.java:78</summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson8.java#L73-L78 <details> <summary> Trace </summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson8.java#L65 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson8.java#L78 </details> </details> <details> <summary>introduction/SqlInjectionLesson5a.java:64</summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson5a.java#L59-L64 <details> <summary> Trace </summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson5a.java#L56 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson5a.java#L59 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson5a.java#L62 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson5a.java#L64 </details> </details> <details> <summary>introduction/SqlInjectionLesson3.java:63</summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson3.java#L58-L63 <details> <summary> Trace </summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson3.java#L54 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson3.java#L57 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson3.java#L63 </details> </details> <details> <summary>introduction/SqlInjectionLesson5a.java:64</summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson5a.java#L59-L64 <details> <summary> Trace </summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson5a.java#L56 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson5a.java#L59 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson5a.java#L62 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson5a.java#L64 </details> </details> <details> <summary>challenge5/Assignment5.java:59</summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/challenges/challenge5/Assignment5.java#L54-L59 </details> <details> <summary>introduction/SqlInjectionLesson3.java:63</summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson3.java#L58-L63 </details> <details> <summary>introduction/SqlInjectionLesson9.java:76</summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson9.java#L71-L76 <details> <summary> Trace </summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson9.java#L61 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson9.java#L64 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson9.java#L66 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson9.java#L76 </details> </details> <details> <summary>challenge5/Assignment5.java:59</summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/challenges/challenge5/Assignment5.java#L54-L59 </details> <details> <summary>introduction/SqlInjectionLesson8.java:78</summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson8.java#L73-L78 <details> <summary> Trace </summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson8.java#L60 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson8.java#L63 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson8.java#L65 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson8.java#L78 </details> </details> </details> ## Language: JavaScript / Node.js | Severity | CWE | Vulnerability Type | Count | |-|-|-|-| |<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High|[CWE-79](https://cwe.mitre.org/data/definitions/79.html)|DOM Based Cross-Site Scripting|3| |<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium|[CWE-338](https://cwe.mitre.org/data/definitions/338.html)|Weak Pseudo-Random|2| ### Details > The below list presents the 3 high vulnerability findings that need your attention. To view information on these findings, navigate to the [Mend SAST Application](https://saas.mend.io/sast/#/scans/d643c714-feee-4b72-8b10-0b3149c6dc8c/details). <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20>DOM Based Cross-Site Scripting (CWE-79) : 3</summary> #### Findings <details> <summary>js/quiz.js:34</summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/resources/webgoat/static/js/quiz.js#L29-L34 <details> <summary> Trace </summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/resources/webgoat/static/js/quiz.js#L18 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/resources/webgoat/static/js/quiz.js#L20 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/resources/webgoat/static/js/quiz.js#L21 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/resources/webgoat/static/js/quiz.js#L23 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/resources/webgoat/static/js/quiz.js#L24 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/resources/webgoat/static/js/quiz.js#L25 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/resources/webgoat/static/js/quiz.js#L34 </details> </details> <details> <summary>js/quiz.js:34</summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/resources/webgoat/static/js/quiz.js#L29-L34 <details> <summary> Trace </summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/resources/webgoat/static/js/quiz.js#L18 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/resources/webgoat/static/js/quiz.js#L20 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/resources/webgoat/static/js/quiz.js#L21 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/resources/webgoat/static/js/quiz.js#L23 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/resources/webgoat/static/js/quiz.js#L24 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/resources/webgoat/static/js/quiz.js#L25 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/resources/webgoat/static/js/quiz.js#L34 </details> </details> <details> <summary>js/quiz.js:34</summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/resources/webgoat/static/js/quiz.js#L29-L34 <details> <summary> Trace </summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/resources/webgoat/static/js/quiz.js#L18 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/resources/webgoat/static/js/quiz.js#L20 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/resources/webgoat/static/js/quiz.js#L21 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/resources/webgoat/static/js/quiz.js#L23 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/resources/webgoat/static/js/quiz.js#L24 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/resources/webgoat/static/js/quiz.js#L29 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/resources/webgoat/static/js/quiz.js#L34 </details> </details> </details>
1.0
Code Security Report: 45 high severity findings, 156 total findings - # Code Security Report **Latest Scan:** 2023-02-04 08:43am **Total Findings:** 156 **Tested Project Files:** 424 **Detected Programming Languages:** 2 <!-- SAST-MANUAL-SCAN-START --> - [ ] Check this box to manually trigger a scan <!-- SAST-MANUAL-SCAN-END --> ## Language: Java | Severity | CWE | Vulnerability Type | Count | |-|-|-|-| |<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High|[CWE-89](https://cwe.mitre.org/data/definitions/89.html)|SQL Injection|26| |<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High|[CWE-22](https://cwe.mitre.org/data/definitions/22.html)|Path/Directory Traversal|9| |<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High|[CWE-79](https://cwe.mitre.org/data/definitions/79.html)|Cross-Site Scripting|4| |<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High|[CWE-502](https://cwe.mitre.org/data/definitions/502.html)|Deserialization of Untrusted Data|1| |<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High|[CWE-918](https://cwe.mitre.org/data/definitions/918.html)|Server Side Request Forgery|2| |<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium|[CWE-798](https://cwe.mitre.org/data/definitions/798.html)|Hardcoded Password/Credentials|11| |<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium|[CWE-611](https://cwe.mitre.org/data/definitions/611.html)|XML External Entity (XXE) Injection|3| |<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium|[CWE-338](https://cwe.mitre.org/data/definitions/338.html)|Weak Pseudo-Random|9| |<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium|[CWE-244](https://cwe.mitre.org/data/definitions/244.html)|Heap Inspection|33| |<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium|[CWE-676](https://cwe.mitre.org/data/definitions/676.html)|Miscellaneous Dangerous Functions|2| |<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium|[CWE-209](https://cwe.mitre.org/data/definitions/209.html)|Console Output|2| |<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium|[CWE-209](https://cwe.mitre.org/data/definitions/209.html)|Error Messages Information Exposure|46| |<img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> Low|[CWE-916](https://cwe.mitre.org/data/definitions/916.html)|Weak Hash Strength|1| |<img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> Low|[CWE-20](https://cwe.mitre.org/data/definitions/20.html)|Cookie Injection|2| ### Details > The below list presents the 20 most relevant findings that need your attention. To view information on the remaining findings, navigate to the [Mend SAST Application](https://saas.mend.io/sast/#/scans/d643c714-feee-4b72-8b10-0b3149c6dc8c/details). <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20>SQL Injection (CWE-89) : 20</summary> #### Findings <details> <summary>mitigation/Servers.java:71</summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/mitigation/Servers.java#L66-L71 </details> <details> <summary>advanced/SqlInjectionLesson6a.java:71</summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/advanced/SqlInjectionLesson6a.java#L66-L71 <details> <summary> Trace </summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/mitigation/SqlOnlyInputValidationOnKeywords.java#L57 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/advanced/SqlInjectionLesson6a.java#L62 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/advanced/SqlInjectionLesson6a.java#L66 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/advanced/SqlInjectionLesson6a.java#L71 </details> </details> <details> <summary>advanced/SqlInjectionLesson6a.java:71</summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/advanced/SqlInjectionLesson6a.java#L66-L71 <details> <summary> Trace </summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/mitigation/SqlOnlyInputValidation.java#L51 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/advanced/SqlInjectionLesson6a.java#L62 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/advanced/SqlInjectionLesson6a.java#L66 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/advanced/SqlInjectionLesson6a.java#L71 </details> </details> <details> <summary>introduction/SqlInjectionLesson10.java:71</summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson10.java#L66-L71 <details> <summary> Trace </summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson10.java#L59 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson10.java#L62 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson10.java#L64 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson10.java#L71 </details> </details> <details> <summary>introduction/SqlInjectionLesson5a.java:64</summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson5a.java#L59-L64 <details> <summary> Trace </summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson5a.java#L56 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson5a.java#L59 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson5a.java#L62 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson5a.java#L64 </details> </details> <details> <summary>advanced/SqlInjectionChallenge.java:69</summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/advanced/SqlInjectionChallenge.java#L64-L69 <details> <summary> Trace </summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/advanced/SqlInjectionChallenge.java#L66 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/advanced/SqlInjectionChallenge.java#L69 </details> </details> <details> <summary>introduction/SqlInjectionLesson4.java:60</summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson4.java#L55-L60 <details> <summary> Trace </summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson4.java#L55 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson4.java#L58 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson4.java#L60 </details> </details> <details> <summary>introduction/SqlInjectionLesson9.java:76</summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson9.java#L71-L76 <details> <summary> Trace </summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson9.java#L61 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson9.java#L64 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson9.java#L66 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson9.java#L76 </details> </details> <details> <summary>introduction/SqlInjectionLesson2.java:65</summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson2.java#L60-L65 </details> <details> <summary>introduction/SqlInjectionLesson8.java:78</summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson8.java#L73-L78 <details> <summary> Trace </summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson8.java#L60 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson8.java#L63 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson8.java#L65 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson8.java#L78 </details> </details> <details> <summary>introduction/SqlInjectionLesson8.java:78</summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson8.java#L73-L78 <details> <summary> Trace </summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson8.java#L65 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson8.java#L78 </details> </details> <details> <summary>introduction/SqlInjectionLesson8.java:78</summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson8.java#L73-L78 <details> <summary> Trace </summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson8.java#L65 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson8.java#L78 </details> </details> <details> <summary>introduction/SqlInjectionLesson5a.java:64</summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson5a.java#L59-L64 <details> <summary> Trace </summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson5a.java#L56 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson5a.java#L59 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson5a.java#L62 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson5a.java#L64 </details> </details> <details> <summary>introduction/SqlInjectionLesson3.java:63</summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson3.java#L58-L63 <details> <summary> Trace </summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson3.java#L54 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson3.java#L57 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson3.java#L63 </details> </details> <details> <summary>introduction/SqlInjectionLesson5a.java:64</summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson5a.java#L59-L64 <details> <summary> Trace </summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson5a.java#L56 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson5a.java#L59 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson5a.java#L62 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson5a.java#L64 </details> </details> <details> <summary>challenge5/Assignment5.java:59</summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/challenges/challenge5/Assignment5.java#L54-L59 </details> <details> <summary>introduction/SqlInjectionLesson3.java:63</summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson3.java#L58-L63 </details> <details> <summary>introduction/SqlInjectionLesson9.java:76</summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson9.java#L71-L76 <details> <summary> Trace </summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson9.java#L61 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson9.java#L64 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson9.java#L66 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson9.java#L76 </details> </details> <details> <summary>challenge5/Assignment5.java:59</summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/challenges/challenge5/Assignment5.java#L54-L59 </details> <details> <summary>introduction/SqlInjectionLesson8.java:78</summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson8.java#L73-L78 <details> <summary> Trace </summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson8.java#L60 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson8.java#L63 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson8.java#L65 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/java/org/owasp/webgoat/lessons/sqlinjection/introduction/SqlInjectionLesson8.java#L78 </details> </details> </details> ## Language: JavaScript / Node.js | Severity | CWE | Vulnerability Type | Count | |-|-|-|-| |<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High|[CWE-79](https://cwe.mitre.org/data/definitions/79.html)|DOM Based Cross-Site Scripting|3| |<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium|[CWE-338](https://cwe.mitre.org/data/definitions/338.html)|Weak Pseudo-Random|2| ### Details > The below list presents the 3 high vulnerability findings that need your attention. To view information on these findings, navigate to the [Mend SAST Application](https://saas.mend.io/sast/#/scans/d643c714-feee-4b72-8b10-0b3149c6dc8c/details). <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20>DOM Based Cross-Site Scripting (CWE-79) : 3</summary> #### Findings <details> <summary>js/quiz.js:34</summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/resources/webgoat/static/js/quiz.js#L29-L34 <details> <summary> Trace </summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/resources/webgoat/static/js/quiz.js#L18 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/resources/webgoat/static/js/quiz.js#L20 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/resources/webgoat/static/js/quiz.js#L21 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/resources/webgoat/static/js/quiz.js#L23 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/resources/webgoat/static/js/quiz.js#L24 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/resources/webgoat/static/js/quiz.js#L25 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/resources/webgoat/static/js/quiz.js#L34 </details> </details> <details> <summary>js/quiz.js:34</summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/resources/webgoat/static/js/quiz.js#L29-L34 <details> <summary> Trace </summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/resources/webgoat/static/js/quiz.js#L18 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/resources/webgoat/static/js/quiz.js#L20 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/resources/webgoat/static/js/quiz.js#L21 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/resources/webgoat/static/js/quiz.js#L23 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/resources/webgoat/static/js/quiz.js#L24 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/resources/webgoat/static/js/quiz.js#L25 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/resources/webgoat/static/js/quiz.js#L34 </details> </details> <details> <summary>js/quiz.js:34</summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/resources/webgoat/static/js/quiz.js#L29-L34 <details> <summary> Trace </summary> https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/resources/webgoat/static/js/quiz.js#L18 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/resources/webgoat/static/js/quiz.js#L20 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/resources/webgoat/static/js/quiz.js#L21 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/resources/webgoat/static/js/quiz.js#L23 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/resources/webgoat/static/js/quiz.js#L24 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/resources/webgoat/static/js/quiz.js#L29 https://github.com/lukebrogan/WebGoat/blob/e50ad86a16eb0b10c53e398650e38965362b899a/src/main/resources/webgoat/static/js/quiz.js#L34 </details> </details> </details>
non_priority
code security report high severity findings total findings code security report latest scan total findings tested project files detected programming languages check this box to manually trigger a scan language java severity cwe vulnerability type count high injection high traversal high scripting high of untrusted data high side request forgery medium password credentials medium external entity xxe injection medium pseudo random medium inspection medium dangerous functions medium output medium messages information exposure low hash strength low injection details the below list presents the most relevant findings that need your attention to view information on the remaining findings navigate to the sql injection cwe findings mitigation servers java advanced java trace advanced java trace introduction java trace introduction java trace advanced sqlinjectionchallenge java trace introduction java trace introduction java trace introduction java introduction java trace introduction java trace introduction java trace introduction java trace introduction java trace introduction java trace java introduction java introduction java trace java introduction java trace language javascript node js severity cwe vulnerability type count high based cross site scripting medium pseudo random details the below list presents the high vulnerability findings that need your attention to view information on these findings navigate to the dom based cross site scripting cwe findings js quiz js trace js quiz js trace js quiz js trace
0
285,051
24,639,618,626
IssuesEvent
2022-10-17 10:33:59
mantidproject/mantid
https://api.github.com/repos/mantidproject/mantid
closed
Windows Plotting Smoke Tests :chart_with_upwards_trend: :bar_chart:
Windows Only Manual Tests
**Before testing**: - Check this testing issue relates to the OS you will test on. - If unassigned, please assign yourself as for a normal Github issue. - Please run these tests on the release package of Mantid; **not a locally built version**. **Afterwards**: - Comment below with any issues you came across. - If no major issues were found, please **close this testing issue**. - Check the main issue for this OS for other unassigned smoke tests. If you have any questions please contact the creator of this issue. :chart_with_upwards_trend: :bar_chart: * 1D plotting:[instructions](http://docs.mantidproject.org/nightly/tutorials/mantid_basic_course/loading_and_displaying_data/03_displaying_1D_data.html#displaying-1d-data) - [x] Simple plot - [x] Another way to plot - [x] Adding curves to existing plots - [x] Also, test out [waterfall](https://docs.mantidproject.org/nightly/plotting/WaterfallPlotsHelp.html#waterfall-plots) and [tiled]( https://docs.mantidproject.org/nightly/plotting/1DPlotsHelp.html#tiled-plots) - [x] Check Toolbar buttons * 2D plotting: [instructions](http://docs.mantidproject.org/nightly/tutorials/mantid_basic_course/loading_and_displaying_data/04_displaying_2D_data.html#displaying-2d-data) - [x] Plot all spectra - [x] Change colour map - [x] [Contour plot](https://docs.mantidproject.org/nightly/plotting/ColorfillPlotsHelp.html#contour-plots) (under 3D menu) - [x] Check Toolbar buttons * [3D plotting](https://docs.mantidproject.org/nightly/plotting/3DPlotsHelp.html): - Load some data eg `LOQ7041` from the ISIS sample data - [x] 3D surface - [x] 3D wire frame - [x] Check Toolbar buttons ## Sliceviewer - [x] Overly long instructions (don't spend long!) and data [here](https://developer.mantidproject.org/Testing/SliceViewer/SliceViewer.html). In particular try editing the data in a workspace while it is open in Sliceviewer!
1.0
Windows Plotting Smoke Tests :chart_with_upwards_trend: :bar_chart: - **Before testing**: - Check this testing issue relates to the OS you will test on. - If unassigned, please assign yourself as for a normal Github issue. - Please run these tests on the release package of Mantid; **not a locally built version**. **Afterwards**: - Comment below with any issues you came across. - If no major issues were found, please **close this testing issue**. - Check the main issue for this OS for other unassigned smoke tests. If you have any questions please contact the creator of this issue. :chart_with_upwards_trend: :bar_chart: * 1D plotting:[instructions](http://docs.mantidproject.org/nightly/tutorials/mantid_basic_course/loading_and_displaying_data/03_displaying_1D_data.html#displaying-1d-data) - [x] Simple plot - [x] Another way to plot - [x] Adding curves to existing plots - [x] Also, test out [waterfall](https://docs.mantidproject.org/nightly/plotting/WaterfallPlotsHelp.html#waterfall-plots) and [tiled]( https://docs.mantidproject.org/nightly/plotting/1DPlotsHelp.html#tiled-plots) - [x] Check Toolbar buttons * 2D plotting: [instructions](http://docs.mantidproject.org/nightly/tutorials/mantid_basic_course/loading_and_displaying_data/04_displaying_2D_data.html#displaying-2d-data) - [x] Plot all spectra - [x] Change colour map - [x] [Contour plot](https://docs.mantidproject.org/nightly/plotting/ColorfillPlotsHelp.html#contour-plots) (under 3D menu) - [x] Check Toolbar buttons * [3D plotting](https://docs.mantidproject.org/nightly/plotting/3DPlotsHelp.html): - Load some data eg `LOQ7041` from the ISIS sample data - [x] 3D surface - [x] 3D wire frame - [x] Check Toolbar buttons ## Sliceviewer - [x] Overly long instructions (don't spend long!) and data [here](https://developer.mantidproject.org/Testing/SliceViewer/SliceViewer.html). In particular try editing the data in a workspace while it is open in Sliceviewer!
non_priority
windows plotting smoke tests chart with upwards trend bar chart before testing check this testing issue relates to the os you will test on if unassigned please assign yourself as for a normal github issue please run these tests on the release package of mantid not a locally built version afterwards comment below with any issues you came across if no major issues were found please close this testing issue check the main issue for this os for other unassigned smoke tests if you have any questions please contact the creator of this issue chart with upwards trend bar chart plotting simple plot another way to plot adding curves to existing plots also test out and check toolbar buttons plotting plot all spectra change colour map under menu check toolbar buttons load some data eg from the isis sample data surface wire frame check toolbar buttons sliceviewer overly long instructions don t spend long and data in particular try editing the data in a workspace while it is open in sliceviewer
0
160,862
25,246,476,944
IssuesEvent
2022-11-15 11:28:21
mdn/yari
https://api.github.com/repos/mdn/yari
closed
Navigation bar is not sticky
enhancement 🧑‍🤝‍🧑 community 🐌 idle redesign
MDN URL: https://developer.mozilla.org/en-US/docs/MDN/Contribute/Feedback #### What information was incorrect, unhelpful, or incomplete? Hi Team, When we are trying to study anything content is good but your navigation bar is not sticky. If your navigation bar would be sticky then we could not scroll up again and again. We can save our time and we can easily reach out to our desired topic. By the way Your website is very helpful for us :). Thanks, Satyam #### Specific section or headline? #### What did you expect to see? #### Did you test this? If so, how? <!-- Do not make changes below this line --> <details> <summary>MDN Content page report details</summary> * Folder: `en-us/mdn/contribute/feedback` * MDN URL: https://developer.mozilla.org/en-US/docs/MDN/Contribute/Feedback * GitHub URL: https://github.com/mdn/content/blob/main/files/en-us/mdn/contribute/feedback/index.md * Last commit: https://github.com/mdn/content/commit/072ff0c2bdfa29c02861450b6a91ff93f46e2218 * Document last modified: 2022-02-18T09:11:14.000Z </details>
1.0
Navigation bar is not sticky - MDN URL: https://developer.mozilla.org/en-US/docs/MDN/Contribute/Feedback #### What information was incorrect, unhelpful, or incomplete? Hi Team, When we are trying to study anything content is good but your navigation bar is not sticky. If your navigation bar would be sticky then we could not scroll up again and again. We can save our time and we can easily reach out to our desired topic. By the way Your website is very helpful for us :). Thanks, Satyam #### Specific section or headline? #### What did you expect to see? #### Did you test this? If so, how? <!-- Do not make changes below this line --> <details> <summary>MDN Content page report details</summary> * Folder: `en-us/mdn/contribute/feedback` * MDN URL: https://developer.mozilla.org/en-US/docs/MDN/Contribute/Feedback * GitHub URL: https://github.com/mdn/content/blob/main/files/en-us/mdn/contribute/feedback/index.md * Last commit: https://github.com/mdn/content/commit/072ff0c2bdfa29c02861450b6a91ff93f46e2218 * Document last modified: 2022-02-18T09:11:14.000Z </details>
non_priority
navigation bar is not sticky mdn url what information was incorrect unhelpful or incomplete hi team when we are trying to study anything content is good but your navigation bar is not sticky if your navigation bar would be sticky then we could not scroll up again and again we can save our time and we can easily reach out to our desired topic by the way your website is very helpful for us thanks satyam specific section or headline what did you expect to see did you test this if so how mdn content page report details folder en us mdn contribute feedback mdn url github url last commit document last modified
0
10,882
12,876,370,748
IssuesEvent
2020-07-11 04:22:27
ProgVal/Limnoria
https://api.github.com/repos/ProgVal/Limnoria
closed
UnicodeDecodeError with some Akas
Bug Python 2 compatibility
give is an aka alias: ``` .aka add give "echo $1, [$*]" ``` Giving something like 'list' works fine, but giving the weather in finnish: ``` .give Bane wunderground ``` Result: ``` supybot Uncaught exception in ['echo']. Traceback (most recent call last): File "/usr/lib/python2.7/site-packages/supybot/callbacks.py", line 1267, in _callCommand self.callCommand(command, irc, msg, *args, **kwargs) File "/usr/lib/python2.7/site-packages/supybot/utils/python.py", line 91, in g f(self, *args, **kwargs) File "/usr/lib/python2.7/site-packages/supybot/callbacks.py", line 1248, in callCommand method(irc, msg, *args, **kwargs) File "/usr/lib/python2.7/site-packages/supybot/commands.py", line 1071, in newf state = spec(irc, msg, args, stateAttrs={'cb': self, 'log': self.log}) File "/usr/lib/python2.7/site-packages/supybot/commands.py", line 1057, in __call__ context(irc, msg, args, state) File "/usr/lib/python2.7/site-packages/supybot/commands.py", line 837, in __call__ self.converter(irc, msg, args, state, *self.args) File "/usr/lib/python2.7/site-packages/supybot/commands.py", line 715, in getText state.args.append(' '.join(args)) UnicodeDecodeError: 'ascii' codec can't decode byte 0xc3 in position 67: ordinal not in range(128) ``` 'args' with '.give Bane wunderground': ``` Python [u'Bane,', '\x02Salo, Suomi\x02 :: Ukkosta :: \x030825C\x03 | \x02Maanantai\x02: Osittain pilvist\xc3\xa4. Ylin l\xc3\xa4mp\xc3\xb6tila 27\xc2\xbaC. Tuuli ESE, nopeus 15\xe2\x88\x9230 km/h. \x02Maanantaiy\xc3\xb6\x02: Aluksi ukkosta. Alin l\xc3\xa4mp\xc3\xb6tila 10\xc2\xbaC. Tuuli SSW, nopeus 15\xe2\x88\x9225 km/h. Sateen mahd: 50%.'] ``` 'echo [wunderground]' works fine, here's 'args' list with it: ``` Python ['\x02Salo, Suomi\x02 :: Ukkosta :: \x030825C\x03 | \x02Maanantai\x02: Osittain pilvist\xc3\xa4. Ylin l\xc3\xa4mp\xc3\xb6tila 27\xc2\xbaC. Tuuli ESE, nopeus 15\xe2\x88\x9230 km/h. \x02Maanantaiy\xc3\xb6\x02: Aluksi ukkosta. Alin l\xc3\xa4mp\xc3\xb6tila 10\xc2\xbaC. Tuuli SSW, nopeus 15\xe2\x88\x9225 km/h. Sateen mahd: 50%.'] ```
True
UnicodeDecodeError with some Akas - give is an aka alias: ``` .aka add give "echo $1, [$*]" ``` Giving something like 'list' works fine, but giving the weather in finnish: ``` .give Bane wunderground ``` Result: ``` supybot Uncaught exception in ['echo']. Traceback (most recent call last): File "/usr/lib/python2.7/site-packages/supybot/callbacks.py", line 1267, in _callCommand self.callCommand(command, irc, msg, *args, **kwargs) File "/usr/lib/python2.7/site-packages/supybot/utils/python.py", line 91, in g f(self, *args, **kwargs) File "/usr/lib/python2.7/site-packages/supybot/callbacks.py", line 1248, in callCommand method(irc, msg, *args, **kwargs) File "/usr/lib/python2.7/site-packages/supybot/commands.py", line 1071, in newf state = spec(irc, msg, args, stateAttrs={'cb': self, 'log': self.log}) File "/usr/lib/python2.7/site-packages/supybot/commands.py", line 1057, in __call__ context(irc, msg, args, state) File "/usr/lib/python2.7/site-packages/supybot/commands.py", line 837, in __call__ self.converter(irc, msg, args, state, *self.args) File "/usr/lib/python2.7/site-packages/supybot/commands.py", line 715, in getText state.args.append(' '.join(args)) UnicodeDecodeError: 'ascii' codec can't decode byte 0xc3 in position 67: ordinal not in range(128) ``` 'args' with '.give Bane wunderground': ``` Python [u'Bane,', '\x02Salo, Suomi\x02 :: Ukkosta :: \x030825C\x03 | \x02Maanantai\x02: Osittain pilvist\xc3\xa4. Ylin l\xc3\xa4mp\xc3\xb6tila 27\xc2\xbaC. Tuuli ESE, nopeus 15\xe2\x88\x9230 km/h. \x02Maanantaiy\xc3\xb6\x02: Aluksi ukkosta. Alin l\xc3\xa4mp\xc3\xb6tila 10\xc2\xbaC. Tuuli SSW, nopeus 15\xe2\x88\x9225 km/h. Sateen mahd: 50%.'] ``` 'echo [wunderground]' works fine, here's 'args' list with it: ``` Python ['\x02Salo, Suomi\x02 :: Ukkosta :: \x030825C\x03 | \x02Maanantai\x02: Osittain pilvist\xc3\xa4. Ylin l\xc3\xa4mp\xc3\xb6tila 27\xc2\xbaC. Tuuli ESE, nopeus 15\xe2\x88\x9230 km/h. \x02Maanantaiy\xc3\xb6\x02: Aluksi ukkosta. Alin l\xc3\xa4mp\xc3\xb6tila 10\xc2\xbaC. Tuuli SSW, nopeus 15\xe2\x88\x9225 km/h. Sateen mahd: 50%.'] ```
non_priority
unicodedecodeerror with some akas give is an aka alias aka add give echo giving something like list works fine but giving the weather in finnish give bane wunderground result supybot uncaught exception in traceback most recent call last file usr lib site packages supybot callbacks py line in callcommand self callcommand command irc msg args kwargs file usr lib site packages supybot utils python py line in g f self args kwargs file usr lib site packages supybot callbacks py line in callcommand method irc msg args kwargs file usr lib site packages supybot commands py line in newf state spec irc msg args stateattrs cb self log self log file usr lib site packages supybot commands py line in call context irc msg args state file usr lib site packages supybot commands py line in call self converter irc msg args state self args file usr lib site packages supybot commands py line in gettext state args append join args unicodedecodeerror ascii codec can t decode byte in position ordinal not in range args with give bane wunderground python echo works fine here s args list with it python
0
139,656
31,722,256,437
IssuesEvent
2023-09-10 14:44:09
llvm/llvm-project
https://api.github.com/repos/llvm/llvm-project
closed
Code Generation Failure and Crash
clang:codegen bugzilla
| | | | --- | --- | | Bugzilla Link | [51269](https://llvm.org/bz51269) | | Version | 12.0 | | OS | Linux | | Attachments | [Preprocessed source(s)](https://user-images.githubusercontent.com/60944935/143762381-1133ca1a-1c65-4c3f-826b-b50e02965f85.gz), [run script(s)](https://user-images.githubusercontent.com/60944935/143762382-71308e15-1d25-49ee-b7e7-5dca69990878.gz), [bc file](https://user-images.githubusercontent.com/60944935/143762383-00d55f8b-bbf9-414f-971b-4bcb94013291.gz), [reduced and simplified bc file.](https://user-images.githubusercontent.com/60944935/143762384-abd2e864-8166-441d-a55b-0ba2c5ed1373.gz) | | Reporter | LLVM Bugzilla Contributor | | CC | @aaronpuchert,@kamleshbhalui,@zygoloid | ## Extended Description PLEASE submit a bug report to https://bugs.llvm.org/ and include the crash backtrace, preprocessed source, and associated run script. Stack dump: 0. Program arguments: /mnt/share/toolchains/linux-x86_64/clang/bin/clang -fheinous-gnu-extensions -fstack-check -fstack-protector-all -g -fno-omit-frame-pointer -fsanitize=memory,undefined -fsanitize-memory-track-origins -fsanitize-memory-use-after-dtor -fno-optimize-sibling-calls -fsanitize-recover=all -fsanitize-blacklist=/mnt/jlsws2/dev/orthrus/master/src/tools/toolchain/sanitizer/inc/ortsanitizer-orthrus-build-clang-sanitizer-memory.blacklist -DHAVE_CONFIG_H -I. -I/mnt/jlsws2/dev/orthrus/master/build/centos7-64-sanitizer-clang-memory/build/phase3/speex/orthrus-speex/build/speex/speex-1.2rc1/libspeex -I.. -I/mnt/jlsws2/dev/orthrus/master/build/centos7-64-sanitizer-clang-memory/build/phase3/speex/orthrus-speex/build/speex/speex-1.2rc1/include -I../include -I.. -I/mnt/jlsws2/dev/orthrus/master/build/centos7-64-sanitizer-clang-memory/stage/libogg/include -O3 -g -fPIC -fvisibility=hidden -MT lsp.lo -MD -MP -MF .deps/lsp.Tpo -c /mnt/jlsws2/dev/orthrus/master/build/centos7-64-sanitizer-clang-memory/build/phase3/speex/orthrus-speex/build/speex/speex-1.2rc1/libspeex/lsp.c 1. <eof> parser at end of file 2. Code generation #&#8203;0 0x00007f99476b507d llvm::sys::PrintStackTrace(llvm::raw_ostream&, int) (/mnt/share/toolchains/linux-x86_64/toolchains-staged/clang-12.0.1-centos6-64/bin/../lib/libLLVM-12.so+0xcfb07d) #&#8203;1 0x00007f99476b2d84 llvm::sys::RunSignalHandlers() (/mnt/share/toolchains/linux-x86_64/toolchains-staged/clang-12.0.1-centos6-64/bin/../lib/libLLVM-12.so+0xcf8d84) #&#8203;2 0x00007f99475d61c8 CrashRecoverySignalHandler(int) (/mnt/share/toolchains/linux-x86_64/toolchains-staged/clang-12.0.1-centos6-64/bin/../lib/libLLVM-12.so+0xc1c1c8) #&#8203;3 0x00007f9951068630 __restore_rt (/lib64/libpthread.so.0+0xf630) #&#8203;4 0x00007f994800aa30 llvm::DIE::getUnitDie() const (/mnt/share/toolchains/linux-x86_64/toolchains-staged/clang-12.0.1-centos6-64/bin/../lib/libLLVM-12.so+0x1650a30) #&#8203;5 0x00007f994802993c llvm::DwarfDebug::finishEntityDefinitions() (/mnt/share/toolchains/linux-x86_64/toolchains-staged/clang-12.0.1-centos6-64/bin/../lib/libLLVM-12.so+0x166f93c) #&#8203;6 0x00007f9948042375 llvm::DwarfDebug::finalizeModuleInfo() (/mnt/share/toolchains/linux-x86_64/toolchains-staged/clang-12.0.1-centos6-64/bin/../lib/libLLVM-12.so+0x1688375) #&#8203;7 0x00007f99480454b8 llvm::DwarfDebug::endModule() (/mnt/share/toolchains/linux-x86_64/toolchains-staged/clang-12.0.1-centos6-64/bin/../lib/libLLVM-12.so+0x168b4b8) #&#8203;8 0x00007f9947ff4299 llvm::AsmPrinter::doFinalization(llvm::Module&) (/mnt/share/toolchains/linux-x86_64/toolchains-staged/clang-12.0.1-centos6-64/bin/../lib/libLLVM-12.so+0x163a299) #&#8203;9 0x00007f99477f6b6d llvm::FPPassManager::doFinalization(llvm::Module&) (.localalias) (/mnt/share/toolchains/linux-x86_64/toolchains-staged/clang-12.0.1-centos6-64/bin/../lib/libLLVM-12.so+0xe3cb6d) #&#8203;10 0x00007f9947802bd0 llvm::legacy::PassManagerImpl::run(llvm::Module&) (/mnt/share/toolchains/linux-x86_64/toolchains-staged/clang-12.0.1-centos6-64/bin/../lib/libLLVM-12.so+0xe48bd0) #&#8203;11 0x00007f994f00e4af clang::EmitBackendOutput(clang::DiagnosticsEngine&, clang::HeaderSearchOptions const&, clang::CodeGenOptions const&, clang::TargetOptions const&, clang::LangOptions const&, llvm::DataLayout const&, llvm::Module*, clang::BackendAction, std::unique_ptr<llvm::raw_pwrite_stream, std::default_delete<llvm::raw_pwrite_stream> >) (/mnt/share/toolchains/linux-x86_64/toolchains-staged/clang-12.0.1-centos6-64/bin/../lib/libclang-cpp.so.12+0x19404af) #&#8203;12 0x00007f994f378a74 clang::BackendConsumer::HandleTranslationUnit(clang::ASTContext&) (/mnt/share/toolchains/linux-x86_64/toolchains-staged/clang-12.0.1-centos6-64/bin/../lib/libclang-cpp.so.12+0x1caaa74) #&#8203;13 0x00007f994e0b2949 clang::ParseAST(clang::Sema&, bool, bool) (/mnt/share/toolchains/linux-x86_64/toolchains-staged/clang-12.0.1-centos6-64/bin/../lib/libclang-cpp.so.12+0x9e4949) #&#8203;14 0x00007f994fae4139 clang::FrontendAction::Execute() (/mnt/share/toolchains/linux-x86_64/toolchains-staged/clang-12.0.1-centos6-64/bin/../lib/libclang-cpp.so.12+0x2416139) #&#8203;15 0x00007f994fa7c86b clang::CompilerInstance::ExecuteAction(clang::FrontendAction&) (/mnt/share/toolchains/linux-x86_64/toolchains-staged/clang-12.0.1-centos6-64/bin/../lib/libclang-cpp.so.12+0x23ae86b) #&#8203;16 0x00007f994fb5fd08 clang::ExecuteCompilerInvocation(clang::CompilerInstance*) (/mnt/share/toolchains/linux-x86_64/toolchains-staged/clang-12.0.1-centos6-64/bin/../lib/libclang-cpp.so.12+0x2491d08) #&#8203;17 0x0000555e1061417d cc1_main(llvm::ArrayRef<char const*>, char const*, void*) (/mnt/share/toolchains/linux-x86_64/clang/bin/clang+0x1417d) #&#8203;18 0x0000555e10611777 ExecuteCC1Tool(llvm::SmallVectorImpl<char const*>&) (/mnt/share/toolchains/linux-x86_64/clang/bin/clang+0x11777) #&#8203;19 0x00007f994f747d05 void llvm::function_ref<void ()>::callback_fn<clang::driver::CC1Command::Execute(llvm::ArrayRef<llvm::Optional<llvm::StringRef> >, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >*, bool*) const::'lambda'()>(long) (/mnt/share/toolchains/linux-x86_64/toolchains-staged/clang-12.0.1-centos6-64/bin/../lib/libclang-cpp.so.12+0x2079d05) #&#8203;20 0x00007f99475d62d3 llvm::CrashRecoveryContext::RunSafely(llvm::function_ref<void ()>) (/mnt/share/toolchains/linux-x86_64/toolchains-staged/clang-12.0.1-centos6-64/bin/../lib/libLLVM-12.so+0xc1c2d3) #&#8203;21 0x00007f994f748e55 clang::driver::CC1Command::Execute(llvm::ArrayRef<llvm::Optional<llvm::StringRef> >, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >*, bool*) const (.part.0) (/mnt/share/toolchains/linux-x86_64/toolchains-staged/clang-12.0.1-centos6-64/bin/../lib/libclang-cpp.so.12+0x207ae55) #&#8203;22 0x00007f994f71ca57 clang::driver::Compilation::ExecuteCommand(clang::driver::Command const&, clang::driver::Command const*&) const (/mnt/share/toolchains/linux-x86_64/toolchains-staged/clang-12.0.1-centos6-64/bin/../lib/libclang-cpp.so.12+0x204ea57) #&#8203;23 0x00007f994f71d449 clang::driver::Compilation::ExecuteJobs(clang::driver::JobList const&, llvm::SmallVectorImpl<std::pair<int, clang::driver::Command const*> >&) const (/mnt/share/toolchains/linux-x86_64/toolchains-staged/clang-12.0.1-centos6-64/bin/../lib/libclang-cpp.so.12+0x204f449) #&#8203;24 0x00007f994f72d129 clang::driver::Driver::ExecuteCompilation(clang::driver::Compilation&, llvm::SmallVectorImpl<std::pair<int, clang::driver::Command const*> >&) (/mnt/share/toolchains/linux-x86_64/toolchains-staged/clang-12.0.1-centos6-64/bin/../lib/libclang-cpp.so.12+0x205f129) #&#8203;25 0x0000555e1060f4d4 main (/mnt/share/toolchains/linux-x86_64/clang/bin/clang+0xf4d4) #&#8203;26 0x00007f99460f5555 __libc_start_main (/lib64/libc.so.6+0x22555) #&#8203;27 0x0000555e106110ad _start (/mnt/share/toolchains/linux-x86_64/clang/bin/clang+0x110ad) clang-12: error: clang frontend command failed with exit code 139 (use -v to see invocation) clang version 12.0.1 Target: x86_64-unknown-linux-gnu Thread model: posix InstalledDir: /mnt/share/toolchains/linux-x86_64/clang/bin clang-12: note: diagnostic msg: ******************** PLEASE ATTACH THE FOLLOWING FILES TO THE BUG REPORT: Preprocessed source(s) and associated run script(s) are located at: clang-12: note: diagnostic msg: /tmp/lsp-f48f4a.c clang-12: note: diagnostic msg: /tmp/lsp-f48f4a.sh clang-12: note: diagnostic msg:
1.0
Code Generation Failure and Crash - | | | | --- | --- | | Bugzilla Link | [51269](https://llvm.org/bz51269) | | Version | 12.0 | | OS | Linux | | Attachments | [Preprocessed source(s)](https://user-images.githubusercontent.com/60944935/143762381-1133ca1a-1c65-4c3f-826b-b50e02965f85.gz), [run script(s)](https://user-images.githubusercontent.com/60944935/143762382-71308e15-1d25-49ee-b7e7-5dca69990878.gz), [bc file](https://user-images.githubusercontent.com/60944935/143762383-00d55f8b-bbf9-414f-971b-4bcb94013291.gz), [reduced and simplified bc file.](https://user-images.githubusercontent.com/60944935/143762384-abd2e864-8166-441d-a55b-0ba2c5ed1373.gz) | | Reporter | LLVM Bugzilla Contributor | | CC | @aaronpuchert,@kamleshbhalui,@zygoloid | ## Extended Description PLEASE submit a bug report to https://bugs.llvm.org/ and include the crash backtrace, preprocessed source, and associated run script. Stack dump: 0. Program arguments: /mnt/share/toolchains/linux-x86_64/clang/bin/clang -fheinous-gnu-extensions -fstack-check -fstack-protector-all -g -fno-omit-frame-pointer -fsanitize=memory,undefined -fsanitize-memory-track-origins -fsanitize-memory-use-after-dtor -fno-optimize-sibling-calls -fsanitize-recover=all -fsanitize-blacklist=/mnt/jlsws2/dev/orthrus/master/src/tools/toolchain/sanitizer/inc/ortsanitizer-orthrus-build-clang-sanitizer-memory.blacklist -DHAVE_CONFIG_H -I. -I/mnt/jlsws2/dev/orthrus/master/build/centos7-64-sanitizer-clang-memory/build/phase3/speex/orthrus-speex/build/speex/speex-1.2rc1/libspeex -I.. -I/mnt/jlsws2/dev/orthrus/master/build/centos7-64-sanitizer-clang-memory/build/phase3/speex/orthrus-speex/build/speex/speex-1.2rc1/include -I../include -I.. -I/mnt/jlsws2/dev/orthrus/master/build/centos7-64-sanitizer-clang-memory/stage/libogg/include -O3 -g -fPIC -fvisibility=hidden -MT lsp.lo -MD -MP -MF .deps/lsp.Tpo -c /mnt/jlsws2/dev/orthrus/master/build/centos7-64-sanitizer-clang-memory/build/phase3/speex/orthrus-speex/build/speex/speex-1.2rc1/libspeex/lsp.c 1. <eof> parser at end of file 2. Code generation #&#8203;0 0x00007f99476b507d llvm::sys::PrintStackTrace(llvm::raw_ostream&, int) (/mnt/share/toolchains/linux-x86_64/toolchains-staged/clang-12.0.1-centos6-64/bin/../lib/libLLVM-12.so+0xcfb07d) #&#8203;1 0x00007f99476b2d84 llvm::sys::RunSignalHandlers() (/mnt/share/toolchains/linux-x86_64/toolchains-staged/clang-12.0.1-centos6-64/bin/../lib/libLLVM-12.so+0xcf8d84) #&#8203;2 0x00007f99475d61c8 CrashRecoverySignalHandler(int) (/mnt/share/toolchains/linux-x86_64/toolchains-staged/clang-12.0.1-centos6-64/bin/../lib/libLLVM-12.so+0xc1c1c8) #&#8203;3 0x00007f9951068630 __restore_rt (/lib64/libpthread.so.0+0xf630) #&#8203;4 0x00007f994800aa30 llvm::DIE::getUnitDie() const (/mnt/share/toolchains/linux-x86_64/toolchains-staged/clang-12.0.1-centos6-64/bin/../lib/libLLVM-12.so+0x1650a30) #&#8203;5 0x00007f994802993c llvm::DwarfDebug::finishEntityDefinitions() (/mnt/share/toolchains/linux-x86_64/toolchains-staged/clang-12.0.1-centos6-64/bin/../lib/libLLVM-12.so+0x166f93c) #&#8203;6 0x00007f9948042375 llvm::DwarfDebug::finalizeModuleInfo() (/mnt/share/toolchains/linux-x86_64/toolchains-staged/clang-12.0.1-centos6-64/bin/../lib/libLLVM-12.so+0x1688375) #&#8203;7 0x00007f99480454b8 llvm::DwarfDebug::endModule() (/mnt/share/toolchains/linux-x86_64/toolchains-staged/clang-12.0.1-centos6-64/bin/../lib/libLLVM-12.so+0x168b4b8) #&#8203;8 0x00007f9947ff4299 llvm::AsmPrinter::doFinalization(llvm::Module&) (/mnt/share/toolchains/linux-x86_64/toolchains-staged/clang-12.0.1-centos6-64/bin/../lib/libLLVM-12.so+0x163a299) #&#8203;9 0x00007f99477f6b6d llvm::FPPassManager::doFinalization(llvm::Module&) (.localalias) (/mnt/share/toolchains/linux-x86_64/toolchains-staged/clang-12.0.1-centos6-64/bin/../lib/libLLVM-12.so+0xe3cb6d) #&#8203;10 0x00007f9947802bd0 llvm::legacy::PassManagerImpl::run(llvm::Module&) (/mnt/share/toolchains/linux-x86_64/toolchains-staged/clang-12.0.1-centos6-64/bin/../lib/libLLVM-12.so+0xe48bd0) #&#8203;11 0x00007f994f00e4af clang::EmitBackendOutput(clang::DiagnosticsEngine&, clang::HeaderSearchOptions const&, clang::CodeGenOptions const&, clang::TargetOptions const&, clang::LangOptions const&, llvm::DataLayout const&, llvm::Module*, clang::BackendAction, std::unique_ptr<llvm::raw_pwrite_stream, std::default_delete<llvm::raw_pwrite_stream> >) (/mnt/share/toolchains/linux-x86_64/toolchains-staged/clang-12.0.1-centos6-64/bin/../lib/libclang-cpp.so.12+0x19404af) #&#8203;12 0x00007f994f378a74 clang::BackendConsumer::HandleTranslationUnit(clang::ASTContext&) (/mnt/share/toolchains/linux-x86_64/toolchains-staged/clang-12.0.1-centos6-64/bin/../lib/libclang-cpp.so.12+0x1caaa74) #&#8203;13 0x00007f994e0b2949 clang::ParseAST(clang::Sema&, bool, bool) (/mnt/share/toolchains/linux-x86_64/toolchains-staged/clang-12.0.1-centos6-64/bin/../lib/libclang-cpp.so.12+0x9e4949) #&#8203;14 0x00007f994fae4139 clang::FrontendAction::Execute() (/mnt/share/toolchains/linux-x86_64/toolchains-staged/clang-12.0.1-centos6-64/bin/../lib/libclang-cpp.so.12+0x2416139) #&#8203;15 0x00007f994fa7c86b clang::CompilerInstance::ExecuteAction(clang::FrontendAction&) (/mnt/share/toolchains/linux-x86_64/toolchains-staged/clang-12.0.1-centos6-64/bin/../lib/libclang-cpp.so.12+0x23ae86b) #&#8203;16 0x00007f994fb5fd08 clang::ExecuteCompilerInvocation(clang::CompilerInstance*) (/mnt/share/toolchains/linux-x86_64/toolchains-staged/clang-12.0.1-centos6-64/bin/../lib/libclang-cpp.so.12+0x2491d08) #&#8203;17 0x0000555e1061417d cc1_main(llvm::ArrayRef<char const*>, char const*, void*) (/mnt/share/toolchains/linux-x86_64/clang/bin/clang+0x1417d) #&#8203;18 0x0000555e10611777 ExecuteCC1Tool(llvm::SmallVectorImpl<char const*>&) (/mnt/share/toolchains/linux-x86_64/clang/bin/clang+0x11777) #&#8203;19 0x00007f994f747d05 void llvm::function_ref<void ()>::callback_fn<clang::driver::CC1Command::Execute(llvm::ArrayRef<llvm::Optional<llvm::StringRef> >, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >*, bool*) const::'lambda'()>(long) (/mnt/share/toolchains/linux-x86_64/toolchains-staged/clang-12.0.1-centos6-64/bin/../lib/libclang-cpp.so.12+0x2079d05) #&#8203;20 0x00007f99475d62d3 llvm::CrashRecoveryContext::RunSafely(llvm::function_ref<void ()>) (/mnt/share/toolchains/linux-x86_64/toolchains-staged/clang-12.0.1-centos6-64/bin/../lib/libLLVM-12.so+0xc1c2d3) #&#8203;21 0x00007f994f748e55 clang::driver::CC1Command::Execute(llvm::ArrayRef<llvm::Optional<llvm::StringRef> >, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >*, bool*) const (.part.0) (/mnt/share/toolchains/linux-x86_64/toolchains-staged/clang-12.0.1-centos6-64/bin/../lib/libclang-cpp.so.12+0x207ae55) #&#8203;22 0x00007f994f71ca57 clang::driver::Compilation::ExecuteCommand(clang::driver::Command const&, clang::driver::Command const*&) const (/mnt/share/toolchains/linux-x86_64/toolchains-staged/clang-12.0.1-centos6-64/bin/../lib/libclang-cpp.so.12+0x204ea57) #&#8203;23 0x00007f994f71d449 clang::driver::Compilation::ExecuteJobs(clang::driver::JobList const&, llvm::SmallVectorImpl<std::pair<int, clang::driver::Command const*> >&) const (/mnt/share/toolchains/linux-x86_64/toolchains-staged/clang-12.0.1-centos6-64/bin/../lib/libclang-cpp.so.12+0x204f449) #&#8203;24 0x00007f994f72d129 clang::driver::Driver::ExecuteCompilation(clang::driver::Compilation&, llvm::SmallVectorImpl<std::pair<int, clang::driver::Command const*> >&) (/mnt/share/toolchains/linux-x86_64/toolchains-staged/clang-12.0.1-centos6-64/bin/../lib/libclang-cpp.so.12+0x205f129) #&#8203;25 0x0000555e1060f4d4 main (/mnt/share/toolchains/linux-x86_64/clang/bin/clang+0xf4d4) #&#8203;26 0x00007f99460f5555 __libc_start_main (/lib64/libc.so.6+0x22555) #&#8203;27 0x0000555e106110ad _start (/mnt/share/toolchains/linux-x86_64/clang/bin/clang+0x110ad) clang-12: error: clang frontend command failed with exit code 139 (use -v to see invocation) clang version 12.0.1 Target: x86_64-unknown-linux-gnu Thread model: posix InstalledDir: /mnt/share/toolchains/linux-x86_64/clang/bin clang-12: note: diagnostic msg: ******************** PLEASE ATTACH THE FOLLOWING FILES TO THE BUG REPORT: Preprocessed source(s) and associated run script(s) are located at: clang-12: note: diagnostic msg: /tmp/lsp-f48f4a.c clang-12: note: diagnostic msg: /tmp/lsp-f48f4a.sh clang-12: note: diagnostic msg:
non_priority
code generation failure and crash bugzilla link version os linux attachments reporter llvm bugzilla contributor cc aaronpuchert kamleshbhalui zygoloid extended description please submit a bug report to and include the crash backtrace preprocessed source and associated run script stack dump program arguments mnt share toolchains linux clang bin clang fheinous gnu extensions fstack check fstack protector all g fno omit frame pointer fsanitize memory undefined fsanitize memory track origins fsanitize memory use after dtor fno optimize sibling calls fsanitize recover all fsanitize blacklist mnt dev orthrus master src tools toolchain sanitizer inc ortsanitizer orthrus build clang sanitizer memory blacklist dhave config h i i mnt dev orthrus master build sanitizer clang memory build speex orthrus speex build speex speex libspeex i i mnt dev orthrus master build sanitizer clang memory build speex orthrus speex build speex speex include i include i i mnt dev orthrus master build sanitizer clang memory stage libogg include g fpic fvisibility hidden mt lsp lo md mp mf deps lsp tpo c mnt dev orthrus master build sanitizer clang memory build speex orthrus speex build speex speex libspeex lsp c parser at end of file code generation llvm sys printstacktrace llvm raw ostream int mnt share toolchains linux toolchains staged clang bin lib libllvm so llvm sys runsignalhandlers mnt share toolchains linux toolchains staged clang bin lib libllvm so crashrecoverysignalhandler int mnt share toolchains linux toolchains staged clang bin lib libllvm so restore rt libpthread so llvm die getunitdie const mnt share toolchains linux toolchains staged clang bin lib libllvm so llvm dwarfdebug finishentitydefinitions mnt share toolchains linux toolchains staged clang bin lib libllvm so llvm dwarfdebug finalizemoduleinfo mnt share toolchains linux toolchains staged clang bin lib libllvm so llvm dwarfdebug endmodule mnt share toolchains linux toolchains staged clang bin lib libllvm so llvm asmprinter dofinalization llvm module mnt share toolchains linux toolchains staged clang bin lib libllvm so llvm fppassmanager dofinalization llvm module localalias mnt share toolchains linux toolchains staged clang bin lib libllvm so llvm legacy passmanagerimpl run llvm module mnt share toolchains linux toolchains staged clang bin lib libllvm so clang emitbackendoutput clang diagnosticsengine clang headersearchoptions const clang codegenoptions const clang targetoptions const clang langoptions const llvm datalayout const llvm module clang backendaction std unique ptr mnt share toolchains linux toolchains staged clang bin lib libclang cpp so clang backendconsumer handletranslationunit clang astcontext mnt share toolchains linux toolchains staged clang bin lib libclang cpp so clang parseast clang sema bool bool mnt share toolchains linux toolchains staged clang bin lib libclang cpp so clang frontendaction execute mnt share toolchains linux toolchains staged clang bin lib libclang cpp so clang compilerinstance executeaction clang frontendaction mnt share toolchains linux toolchains staged clang bin lib libclang cpp so clang executecompilerinvocation clang compilerinstance mnt share toolchains linux toolchains staged clang bin lib libclang cpp so main llvm arrayref char const void mnt share toolchains linux clang bin clang llvm smallvectorimpl mnt share toolchains linux clang bin clang void llvm function ref callback fn std basic string std allocator bool const lambda long mnt share toolchains linux toolchains staged clang bin lib libclang cpp so llvm crashrecoverycontext runsafely llvm function ref mnt share toolchains linux toolchains staged clang bin lib libllvm so clang driver execute llvm arrayref std basic string std allocator bool const part mnt share toolchains linux toolchains staged clang bin lib libclang cpp so clang driver compilation executecommand clang driver command const clang driver command const const mnt share toolchains linux toolchains staged clang bin lib libclang cpp so clang driver compilation executejobs clang driver joblist const llvm smallvectorimpl const mnt share toolchains linux toolchains staged clang bin lib libclang cpp so clang driver driver executecompilation clang driver compilation llvm smallvectorimpl mnt share toolchains linux toolchains staged clang bin lib libclang cpp so main mnt share toolchains linux clang bin clang libc start main libc so start mnt share toolchains linux clang bin clang clang error clang frontend command failed with exit code use v to see invocation clang version target unknown linux gnu thread model posix installeddir mnt share toolchains linux clang bin clang note diagnostic msg please attach the following files to the bug report preprocessed source s and associated run script s are located at clang note diagnostic msg tmp lsp c clang note diagnostic msg tmp lsp sh clang note diagnostic msg
0
175,207
27,808,020,400
IssuesEvent
2023-03-17 22:17:48
flutter/flutter
https://api.github.com/repos/flutter/flutter
closed
Chip: add ability to put delete icon before label OR allow elements inside chip to accept gestures
new feature framework f: material design
## Use case I have a chip that, when tapped, changes its avatar to delete icon. I can neither make avatar tappable nor put the delete icon before the label. For now I'm stuck with having avatar after the label. Chip is great and has a lot of useful functionality, so I wouldn't like to build my own implementation just for the icon position. ## Proposal Add ability to put delete icon before label in chip OR allow elements inside chip to accept gestures
1.0
Chip: add ability to put delete icon before label OR allow elements inside chip to accept gestures - ## Use case I have a chip that, when tapped, changes its avatar to delete icon. I can neither make avatar tappable nor put the delete icon before the label. For now I'm stuck with having avatar after the label. Chip is great and has a lot of useful functionality, so I wouldn't like to build my own implementation just for the icon position. ## Proposal Add ability to put delete icon before label in chip OR allow elements inside chip to accept gestures
non_priority
chip add ability to put delete icon before label or allow elements inside chip to accept gestures use case i have a chip that when tapped changes its avatar to delete icon i can neither make avatar tappable nor put the delete icon before the label for now i m stuck with having avatar after the label chip is great and has a lot of useful functionality so i wouldn t like to build my own implementation just for the icon position proposal add ability to put delete icon before label in chip or allow elements inside chip to accept gestures
0
156,840
24,626,000,736
IssuesEvent
2022-10-16 14:27:12
dotnet/efcore
https://api.github.com/repos/dotnet/efcore
closed
EF generating invalid query - using pluralised table name, despite snapshot explicitly specifying (correctly)
closed-by-design customer-reported
``` System.Data.SqlClient.SqlException (0x80131904): Invalid object name 'Credentials'. at System.Data.SqlClient.SqlConnection.OnError(SqlException exception, Boolean breakConnection, Action`1 wrapCloseInAction) at System.Data.SqlClient.TdsParser.ThrowExceptionAndWarning(TdsParserStateObject stateObj, Boolean callerHasConnectionLock, Boolean asyncClose) at System.Data.SqlClient.TdsParser.TryRun(RunBehavior runBehavior, SqlCommand cmdHandler, SqlDataReader dataStream, BulkCopySimpleResultSet bulkCopyHandler, TdsParserStateObject stateObj, Boolean& dataReady) at System.Data.SqlClient.SqlDataReader.TryConsumeMetaData() at System.Data.SqlClient.SqlDataReader.get_MetaData() at System.Data.SqlClient.SqlCommand.FinishExecuteReader(SqlDataReader ds, RunBehavior runBehavior, String resetOptionsString) at System.Data.SqlClient.SqlCommand.RunExecuteReaderTds(CommandBehavior cmdBehavior, RunBehavior runBehavior, Boolean returnStream, Boolean async, Int32 timeout, Task& task, Boolean asyncWrite, SqlDataReader ds) at System.Data.SqlClient.SqlCommand.ExecuteReader(CommandBehavior behavior) at Microsoft.EntityFrameworkCore.Storage.Internal.RelationalCommand.Execute(IRelationalConnection connection, DbCommandMethod executeMethod, IReadOnlyDictionary`2 parameterValues) at Microsoft.EntityFrameworkCore.Storage.Internal.RelationalCommand.ExecuteReader(IRelationalConnection connection, IReadOnlyDictionary`2 parameterValues) at Microsoft.EntityFrameworkCore.Query.Internal.QueryingEnumerable`1.Enumerator.BufferlessMoveNext(DbContext _, Boolean buffer) at Microsoft.EntityFrameworkCore.SqlServer.Storage.Internal.SqlServerExecutionStrategy.Execute[TState,TResult](TState state, Func`3 operation, Func`3 verifySucceeded) at Microsoft.EntityFrameworkCore.Query.Internal.QueryingEnumerable`1.Enumerator.MoveNext() at System.Linq.Enumerable.SingleOrDefault[TSource](IEnumerable`1 source) at Microsoft.EntityFrameworkCore.Query.Internal.LinqOperatorProvider.ResultEnumerable`1.GetEnumerator() at Microsoft.EntityFrameworkCore.Query.Internal.LinqOperatorProvider.ExceptionInterceptor`1.EnumeratorExceptionInterceptor.MoveNext() at System.Linq.Enumerable.TryGetFirst[TSource](IEnumerable`1 source, Boolean& found) at System.Linq.Enumerable.First[TSource](IEnumerable`1 source) at Microsoft.EntityFrameworkCore.Query.Internal.QueryCompiler.<>c__DisplayClass15_1`1.<CompileQueryCore>b__0(QueryContext qc) at System.Linq.Queryable.SingleOrDefault[TSource](IQueryable`1 source) ``` ### Steps to reproduce Relevant part of snapshot: ```c# modelBuilder.Entity("REDACTED.Storage.Model.Credential", b => { b.Property<string>("Key") .ValueGeneratedOnAdd(); b.Property<string>("Json"); b.Property<Guid>("UserId"); b.HasKey("Key"); b.HasIndex("UserId"); b.ToTable("Credential"); }); ``` User code: ```c# var match = _context.Set<Credential>() .Where(c => c.Key == credentialKey) .Select(c => c.Json) .SingleOrDefault(); ``` Generated SQL: ```sql SELECT TOP(2) [c].[Json] FROM [Credentials] AS [c] WHERE [c].[Key] = @__credentialKey_0 ``` Note - the only reference to `"Credentials"` is the name of the navigation property pointing to the `Credential` entity: ```c# modelBuilder.Entity("REDACTED.Storage.Model.Credential", b => { b.HasOne("REDACTED.Storage.Model.User", "User") .WithMany("Credentials") .HasForeignKey("UserId") .OnDelete(DeleteBehavior.Cascade); }); ``` ### Further technical details EF Core version: `Microsoft.EntityFrameworkCore, Version=2.2.4.0, Culture=neutral, PublicKeyToken=adb9793829ddae60` Database Provider: `Microsoft.EntityFrameworkCore.SqlServer` Operating system: `Azure App Service` Weird things: - The table was created successfully via migration, with the correct name - This same process works fine locally (same code version, same deploy) - Other tables and queries work fine immediately prior to this one Is there anything I can do to diagnose?
1.0
EF generating invalid query - using pluralised table name, despite snapshot explicitly specifying (correctly) - ``` System.Data.SqlClient.SqlException (0x80131904): Invalid object name 'Credentials'. at System.Data.SqlClient.SqlConnection.OnError(SqlException exception, Boolean breakConnection, Action`1 wrapCloseInAction) at System.Data.SqlClient.TdsParser.ThrowExceptionAndWarning(TdsParserStateObject stateObj, Boolean callerHasConnectionLock, Boolean asyncClose) at System.Data.SqlClient.TdsParser.TryRun(RunBehavior runBehavior, SqlCommand cmdHandler, SqlDataReader dataStream, BulkCopySimpleResultSet bulkCopyHandler, TdsParserStateObject stateObj, Boolean& dataReady) at System.Data.SqlClient.SqlDataReader.TryConsumeMetaData() at System.Data.SqlClient.SqlDataReader.get_MetaData() at System.Data.SqlClient.SqlCommand.FinishExecuteReader(SqlDataReader ds, RunBehavior runBehavior, String resetOptionsString) at System.Data.SqlClient.SqlCommand.RunExecuteReaderTds(CommandBehavior cmdBehavior, RunBehavior runBehavior, Boolean returnStream, Boolean async, Int32 timeout, Task& task, Boolean asyncWrite, SqlDataReader ds) at System.Data.SqlClient.SqlCommand.ExecuteReader(CommandBehavior behavior) at Microsoft.EntityFrameworkCore.Storage.Internal.RelationalCommand.Execute(IRelationalConnection connection, DbCommandMethod executeMethod, IReadOnlyDictionary`2 parameterValues) at Microsoft.EntityFrameworkCore.Storage.Internal.RelationalCommand.ExecuteReader(IRelationalConnection connection, IReadOnlyDictionary`2 parameterValues) at Microsoft.EntityFrameworkCore.Query.Internal.QueryingEnumerable`1.Enumerator.BufferlessMoveNext(DbContext _, Boolean buffer) at Microsoft.EntityFrameworkCore.SqlServer.Storage.Internal.SqlServerExecutionStrategy.Execute[TState,TResult](TState state, Func`3 operation, Func`3 verifySucceeded) at Microsoft.EntityFrameworkCore.Query.Internal.QueryingEnumerable`1.Enumerator.MoveNext() at System.Linq.Enumerable.SingleOrDefault[TSource](IEnumerable`1 source) at Microsoft.EntityFrameworkCore.Query.Internal.LinqOperatorProvider.ResultEnumerable`1.GetEnumerator() at Microsoft.EntityFrameworkCore.Query.Internal.LinqOperatorProvider.ExceptionInterceptor`1.EnumeratorExceptionInterceptor.MoveNext() at System.Linq.Enumerable.TryGetFirst[TSource](IEnumerable`1 source, Boolean& found) at System.Linq.Enumerable.First[TSource](IEnumerable`1 source) at Microsoft.EntityFrameworkCore.Query.Internal.QueryCompiler.<>c__DisplayClass15_1`1.<CompileQueryCore>b__0(QueryContext qc) at System.Linq.Queryable.SingleOrDefault[TSource](IQueryable`1 source) ``` ### Steps to reproduce Relevant part of snapshot: ```c# modelBuilder.Entity("REDACTED.Storage.Model.Credential", b => { b.Property<string>("Key") .ValueGeneratedOnAdd(); b.Property<string>("Json"); b.Property<Guid>("UserId"); b.HasKey("Key"); b.HasIndex("UserId"); b.ToTable("Credential"); }); ``` User code: ```c# var match = _context.Set<Credential>() .Where(c => c.Key == credentialKey) .Select(c => c.Json) .SingleOrDefault(); ``` Generated SQL: ```sql SELECT TOP(2) [c].[Json] FROM [Credentials] AS [c] WHERE [c].[Key] = @__credentialKey_0 ``` Note - the only reference to `"Credentials"` is the name of the navigation property pointing to the `Credential` entity: ```c# modelBuilder.Entity("REDACTED.Storage.Model.Credential", b => { b.HasOne("REDACTED.Storage.Model.User", "User") .WithMany("Credentials") .HasForeignKey("UserId") .OnDelete(DeleteBehavior.Cascade); }); ``` ### Further technical details EF Core version: `Microsoft.EntityFrameworkCore, Version=2.2.4.0, Culture=neutral, PublicKeyToken=adb9793829ddae60` Database Provider: `Microsoft.EntityFrameworkCore.SqlServer` Operating system: `Azure App Service` Weird things: - The table was created successfully via migration, with the correct name - This same process works fine locally (same code version, same deploy) - Other tables and queries work fine immediately prior to this one Is there anything I can do to diagnose?
non_priority
ef generating invalid query using pluralised table name despite snapshot explicitly specifying correctly system data sqlclient sqlexception invalid object name credentials at system data sqlclient sqlconnection onerror sqlexception exception boolean breakconnection action wrapcloseinaction at system data sqlclient tdsparser throwexceptionandwarning tdsparserstateobject stateobj boolean callerhasconnectionlock boolean asyncclose at system data sqlclient tdsparser tryrun runbehavior runbehavior sqlcommand cmdhandler sqldatareader datastream bulkcopysimpleresultset bulkcopyhandler tdsparserstateobject stateobj boolean dataready at system data sqlclient sqldatareader tryconsumemetadata at system data sqlclient sqldatareader get metadata at system data sqlclient sqlcommand finishexecutereader sqldatareader ds runbehavior runbehavior string resetoptionsstring at system data sqlclient sqlcommand runexecutereadertds commandbehavior cmdbehavior runbehavior runbehavior boolean returnstream boolean async timeout task task boolean asyncwrite sqldatareader ds at system data sqlclient sqlcommand executereader commandbehavior behavior at microsoft entityframeworkcore storage internal relationalcommand execute irelationalconnection connection dbcommandmethod executemethod ireadonlydictionary parametervalues at microsoft entityframeworkcore storage internal relationalcommand executereader irelationalconnection connection ireadonlydictionary parametervalues at microsoft entityframeworkcore query internal queryingenumerable enumerator bufferlessmovenext dbcontext boolean buffer at microsoft entityframeworkcore sqlserver storage internal sqlserverexecutionstrategy execute tstate state func operation func verifysucceeded at microsoft entityframeworkcore query internal queryingenumerable enumerator movenext at system linq enumerable singleordefault ienumerable source at microsoft entityframeworkcore query internal linqoperatorprovider resultenumerable getenumerator at microsoft entityframeworkcore query internal linqoperatorprovider exceptioninterceptor enumeratorexceptioninterceptor movenext at system linq enumerable trygetfirst ienumerable source boolean found at system linq enumerable first ienumerable source at microsoft entityframeworkcore query internal querycompiler c b querycontext qc at system linq queryable singleordefault iqueryable source steps to reproduce relevant part of snapshot c modelbuilder entity redacted storage model credential b b property key valuegeneratedonadd b property json b property userid b haskey key b hasindex userid b totable credential user code c var match context set where c c key credentialkey select c c json singleordefault generated sql sql select top from as where credentialkey note the only reference to credentials is the name of the navigation property pointing to the credential entity c modelbuilder entity redacted storage model credential b b hasone redacted storage model user user withmany credentials hasforeignkey userid ondelete deletebehavior cascade further technical details ef core version microsoft entityframeworkcore version culture neutral publickeytoken database provider microsoft entityframeworkcore sqlserver operating system azure app service weird things the table was created successfully via migration with the correct name this same process works fine locally same code version same deploy other tables and queries work fine immediately prior to this one is there anything i can do to diagnose
0
55,473
7,989,003,329
IssuesEvent
2018-07-19 13:00:45
Hackerfleet/hfos
https://api.github.com/repos/Hackerfleet/hfos
opened
Add context sensitive help
documentation enhancement frontend
Add a state-contextual help or something to get detailed help. This should be a link to documentation relevant to what the user is currently doing. The link should be accessible via a small ? icon somewhere central (not the help menu, but maybe there as well ;) and keyboard shortcut (ctrl-f1) The documentation (stubs) might be autogenerated by inspecting module's frontend bits for easy development.
1.0
Add context sensitive help - Add a state-contextual help or something to get detailed help. This should be a link to documentation relevant to what the user is currently doing. The link should be accessible via a small ? icon somewhere central (not the help menu, but maybe there as well ;) and keyboard shortcut (ctrl-f1) The documentation (stubs) might be autogenerated by inspecting module's frontend bits for easy development.
non_priority
add context sensitive help add a state contextual help or something to get detailed help this should be a link to documentation relevant to what the user is currently doing the link should be accessible via a small icon somewhere central not the help menu but maybe there as well and keyboard shortcut ctrl the documentation stubs might be autogenerated by inspecting module s frontend bits for easy development
0
70,683
30,722,319,360
IssuesEvent
2023-07-27 16:50:03
hashicorp/terraform-provider-azurerm
https://api.github.com/repos/hashicorp/terraform-provider-azurerm
closed
Can't create read replica using terraform resource azurerm_cosmosdb_postgresql_cluster
bug service/cosmosdb v/3.x
### Is there an existing issue for this? - [X] I have searched the existing issues ### Community Note <!--- Please keep this note for the community ---> * Please vote on this issue by adding a :thumbsup: [reaction](https://blog.github.com/2016-03-10-add-reactions-to-pull-requests-issues-and-comments/) to the original issue to help the community and maintainers prioritize this request * Please do not leave "+1" or "me too" comments, they generate extra noise for issue followers and do not help prioritize the request * If you are interested in working on this issue or have submitted a pull request, please leave a comment and review the [contribution guide](https://github.com/hashicorp/terraform-provider-azurerm/blob/main/contributing/README.md) to help. <!--- Thank you for keeping this note for the community ---> ### Terraform Version 1.2.9 ### AzureRM Provider Version 3.63.0 ### Affected Resource(s)/Data Source(s) azurerm_cosmosdb_postgresql_cluster ### Terraform Configuration Files ```hcl terraform { required_providers { local = { source = "hashicorp/local" } azurerm = { source = "hashicorp/azurerm" version = "= 3.63.0" } random = { source = "hashicorp/random" version = "~> 3.4.3" } azapi = { source = "azure/azapi" version = ">= 0.6.0" } azuread = { source = "hashicorp/azuread" version = "~> 2.15.0" } ec = { source = "elastic/ec" version = "= 0.7.0" } external = { source = "hashicorp/external" version = "= 2.3.1" } elasticstack = { source = "elastic/elasticstack" version = "= 0.6.1" } } required_version = ">= 1.0" } ``` ### Debug Output/Panic Output ```shell Various errors: 1. ╷ │ Error: Missing required argument │ │ with azurerm_cosmosdb_postgresql_cluster.read_replica, │ on main.tf line 34, in resource "azurerm_cosmosdb_postgresql_cluster" "read_replica": │ 34: source_resource_id = azurerm_cosmosdb_postgresql_cluster.primary_replica.id │ │ "source_resource_id": all of `point_in_time_in_utc,source_location,source_resource_id` must be specified ╵ 2. ╷ │ Error: creating Server Groupsv 2 (Subscription: "aaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa" │ Resource Group Name: "peterli07102023" │ Server Groupsv 2 Name: "peterlitest0710secondary"): performing Create: clusters.ClustersClient#Create: Failure sending request: StatusCode=0 -- Original Error: Code="bad_request" Message="The source cluster is not ready for restore yet." │ │ with azurerm_cosmosdb_postgresql_cluster.read_replica, │ on main.tf line 23, in resource "azurerm_cosmosdb_postgresql_cluster" "read_replica": │ 23: resource "azurerm_cosmosdb_postgresql_cluster" "read_replica" { │ │ creating Server Groupsv 2 (Subscription: "aaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa" │ Resource Group Name: "peterli07102023" │ Server Groupsv 2 Name: "peterlitest0710secondary"): performing Create: clusters.ClustersClient#Create: Failure sending request: StatusCode=0 -- Original Error: Code="bad_request" │ Message="The source cluster is not ready for restore yet." ╵ 3. ╷ │ Error: creating Server Groupsv 2 (Subscription: "aaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa" │ Resource Group Name: "peterli07102023" │ Server Groupsv 2 Name: "peterlitest0710secondary"): performing Create: clusters.ClustersClient#Create: Failure sending request: StatusCode=0 -- Original Error: Code="bad_request" Message="pointInTimeUTC cannot be before 2023-07-10T19:43:44Z. If you need to restore your cluster to a point within last 35 days, open a support request." │ │ with azurerm_cosmosdb_postgresql_cluster.read_replica, │ on main.tf line 23, in resource "azurerm_cosmosdb_postgresql_cluster" "read_replica": │ 23: resource "azurerm_cosmosdb_postgresql_cluster" "read_replica" { │ │ creating Server Groupsv 2 (Subscription: "aaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa" │ Resource Group Name: "peterli07102023" │ Server Groupsv 2 Name: "peterlitest0710secondary"): performing Create: clusters.ClustersClient#Create: Failure sending request: StatusCode=0 -- Original Error: Code="bad_request" │ Message="pointInTimeUTC cannot be before 2023-07-10T19:43:44Z. If you need to restore your cluster to a point within last 35 days, open a support request." ╵ 4. ╷ │ Error: creating Server Groupsv 2 (Subscription: "aaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa" │ Resource Group Name: "peterli07102023" │ Server Groupsv 2 Name: "peterlitest0710secondary"): performing Create: clusters.ClustersClient#Create: Failure sending request: StatusCode=0 -- Original Error: Code="bad_request" Message="Restoring a new cluster from a source cluster in another location is not supported yet." │ │ with azurerm_cosmosdb_postgresql_cluster.read_replica, │ on main.tf line 23, in resource "azurerm_cosmosdb_postgresql_cluster" "read_replica": │ 23: resource "azurerm_cosmosdb_postgresql_cluster" "read_replica" { │ │ creating Server Groupsv 2 (Subscription: "aaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa" │ Resource Group Name: "peterli07102023" │ Server Groupsv 2 Name: "peterlitest0710secondary"): performing Create: clusters.ClustersClient#Create: Failure sending request: StatusCode=0 -- Original Error: Code="bad_request" │ Message="Restoring a new cluster from a source cluster in another location is not supported yet." 5. ╷ │ Error: creating Server Groupsv 2 (Subscription: "aaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa" │ Resource Group Name: "peterli07102023" │ Server Groupsv 2 Name: "peterlitest0710secondary"): performing Create: clusters.ClustersClient#Create: Failure sending request: StatusCode=0 -- Original Error: Code="bad_request" Message="pointInTimeUTC cannot be in the future." │ │ with azurerm_cosmosdb_postgresql_cluster.read_replica, │ on main.tf line 23, in resource "azurerm_cosmosdb_postgresql_cluster" "read_replica": │ 23: resource "azurerm_cosmosdb_postgresql_cluster" "read_replica" { │ │ creating Server Groupsv 2 (Subscription: "aaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa" │ Resource Group Name: "peterli07102023" │ Server Groupsv 2 Name: "peterlitest0710secondary"): performing Create: clusters.ClustersClient#Create: Failure sending request: StatusCode=0 -- Original Error: Code="bad_request" │ Message="pointInTimeUTC cannot be in the future." ╵ ``` ### Expected Behaviour Read replica should be created for the CosmosDB Postgresql cluster. I tried using the REST API instead and found it can work properly: [cosmosdb_postgresql_cluster](https://learn.microsoft.com/en-us/rest/api/postgresqlhsc/clusters/create?tabs=Python#create-a-new-cluster-as-a-read-replica) ### Actual Behaviour Failure with the various error messages mentioned in the debug output. ### Steps to Reproduce terraform plan -out main.tfplan -var-file="./postgre.tfvars" terraform apply "main.tfplan" ### Important Factoids N/A ### References _No response_
1.0
Can't create read replica using terraform resource azurerm_cosmosdb_postgresql_cluster - ### Is there an existing issue for this? - [X] I have searched the existing issues ### Community Note <!--- Please keep this note for the community ---> * Please vote on this issue by adding a :thumbsup: [reaction](https://blog.github.com/2016-03-10-add-reactions-to-pull-requests-issues-and-comments/) to the original issue to help the community and maintainers prioritize this request * Please do not leave "+1" or "me too" comments, they generate extra noise for issue followers and do not help prioritize the request * If you are interested in working on this issue or have submitted a pull request, please leave a comment and review the [contribution guide](https://github.com/hashicorp/terraform-provider-azurerm/blob/main/contributing/README.md) to help. <!--- Thank you for keeping this note for the community ---> ### Terraform Version 1.2.9 ### AzureRM Provider Version 3.63.0 ### Affected Resource(s)/Data Source(s) azurerm_cosmosdb_postgresql_cluster ### Terraform Configuration Files ```hcl terraform { required_providers { local = { source = "hashicorp/local" } azurerm = { source = "hashicorp/azurerm" version = "= 3.63.0" } random = { source = "hashicorp/random" version = "~> 3.4.3" } azapi = { source = "azure/azapi" version = ">= 0.6.0" } azuread = { source = "hashicorp/azuread" version = "~> 2.15.0" } ec = { source = "elastic/ec" version = "= 0.7.0" } external = { source = "hashicorp/external" version = "= 2.3.1" } elasticstack = { source = "elastic/elasticstack" version = "= 0.6.1" } } required_version = ">= 1.0" } ``` ### Debug Output/Panic Output ```shell Various errors: 1. ╷ │ Error: Missing required argument │ │ with azurerm_cosmosdb_postgresql_cluster.read_replica, │ on main.tf line 34, in resource "azurerm_cosmosdb_postgresql_cluster" "read_replica": │ 34: source_resource_id = azurerm_cosmosdb_postgresql_cluster.primary_replica.id │ │ "source_resource_id": all of `point_in_time_in_utc,source_location,source_resource_id` must be specified ╵ 2. ╷ │ Error: creating Server Groupsv 2 (Subscription: "aaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa" │ Resource Group Name: "peterli07102023" │ Server Groupsv 2 Name: "peterlitest0710secondary"): performing Create: clusters.ClustersClient#Create: Failure sending request: StatusCode=0 -- Original Error: Code="bad_request" Message="The source cluster is not ready for restore yet." │ │ with azurerm_cosmosdb_postgresql_cluster.read_replica, │ on main.tf line 23, in resource "azurerm_cosmosdb_postgresql_cluster" "read_replica": │ 23: resource "azurerm_cosmosdb_postgresql_cluster" "read_replica" { │ │ creating Server Groupsv 2 (Subscription: "aaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa" │ Resource Group Name: "peterli07102023" │ Server Groupsv 2 Name: "peterlitest0710secondary"): performing Create: clusters.ClustersClient#Create: Failure sending request: StatusCode=0 -- Original Error: Code="bad_request" │ Message="The source cluster is not ready for restore yet." ╵ 3. ╷ │ Error: creating Server Groupsv 2 (Subscription: "aaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa" │ Resource Group Name: "peterli07102023" │ Server Groupsv 2 Name: "peterlitest0710secondary"): performing Create: clusters.ClustersClient#Create: Failure sending request: StatusCode=0 -- Original Error: Code="bad_request" Message="pointInTimeUTC cannot be before 2023-07-10T19:43:44Z. If you need to restore your cluster to a point within last 35 days, open a support request." │ │ with azurerm_cosmosdb_postgresql_cluster.read_replica, │ on main.tf line 23, in resource "azurerm_cosmosdb_postgresql_cluster" "read_replica": │ 23: resource "azurerm_cosmosdb_postgresql_cluster" "read_replica" { │ │ creating Server Groupsv 2 (Subscription: "aaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa" │ Resource Group Name: "peterli07102023" │ Server Groupsv 2 Name: "peterlitest0710secondary"): performing Create: clusters.ClustersClient#Create: Failure sending request: StatusCode=0 -- Original Error: Code="bad_request" │ Message="pointInTimeUTC cannot be before 2023-07-10T19:43:44Z. If you need to restore your cluster to a point within last 35 days, open a support request." ╵ 4. ╷ │ Error: creating Server Groupsv 2 (Subscription: "aaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa" │ Resource Group Name: "peterli07102023" │ Server Groupsv 2 Name: "peterlitest0710secondary"): performing Create: clusters.ClustersClient#Create: Failure sending request: StatusCode=0 -- Original Error: Code="bad_request" Message="Restoring a new cluster from a source cluster in another location is not supported yet." │ │ with azurerm_cosmosdb_postgresql_cluster.read_replica, │ on main.tf line 23, in resource "azurerm_cosmosdb_postgresql_cluster" "read_replica": │ 23: resource "azurerm_cosmosdb_postgresql_cluster" "read_replica" { │ │ creating Server Groupsv 2 (Subscription: "aaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa" │ Resource Group Name: "peterli07102023" │ Server Groupsv 2 Name: "peterlitest0710secondary"): performing Create: clusters.ClustersClient#Create: Failure sending request: StatusCode=0 -- Original Error: Code="bad_request" │ Message="Restoring a new cluster from a source cluster in another location is not supported yet." 5. ╷ │ Error: creating Server Groupsv 2 (Subscription: "aaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa" │ Resource Group Name: "peterli07102023" │ Server Groupsv 2 Name: "peterlitest0710secondary"): performing Create: clusters.ClustersClient#Create: Failure sending request: StatusCode=0 -- Original Error: Code="bad_request" Message="pointInTimeUTC cannot be in the future." │ │ with azurerm_cosmosdb_postgresql_cluster.read_replica, │ on main.tf line 23, in resource "azurerm_cosmosdb_postgresql_cluster" "read_replica": │ 23: resource "azurerm_cosmosdb_postgresql_cluster" "read_replica" { │ │ creating Server Groupsv 2 (Subscription: "aaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa" │ Resource Group Name: "peterli07102023" │ Server Groupsv 2 Name: "peterlitest0710secondary"): performing Create: clusters.ClustersClient#Create: Failure sending request: StatusCode=0 -- Original Error: Code="bad_request" │ Message="pointInTimeUTC cannot be in the future." ╵ ``` ### Expected Behaviour Read replica should be created for the CosmosDB Postgresql cluster. I tried using the REST API instead and found it can work properly: [cosmosdb_postgresql_cluster](https://learn.microsoft.com/en-us/rest/api/postgresqlhsc/clusters/create?tabs=Python#create-a-new-cluster-as-a-read-replica) ### Actual Behaviour Failure with the various error messages mentioned in the debug output. ### Steps to Reproduce terraform plan -out main.tfplan -var-file="./postgre.tfvars" terraform apply "main.tfplan" ### Important Factoids N/A ### References _No response_
non_priority
can t create read replica using terraform resource azurerm cosmosdb postgresql cluster is there an existing issue for this i have searched the existing issues community note please vote on this issue by adding a thumbsup to the original issue to help the community and maintainers prioritize this request please do not leave or me too comments they generate extra noise for issue followers and do not help prioritize the request if you are interested in working on this issue or have submitted a pull request please leave a comment and review the to help terraform version azurerm provider version affected resource s data source s azurerm cosmosdb postgresql cluster terraform configuration files hcl terraform required providers local source hashicorp local azurerm source hashicorp azurerm version random source hashicorp random version azapi source azure azapi version azuread source hashicorp azuread version ec source elastic ec version external source hashicorp external version elasticstack source elastic elasticstack version required version debug output panic output shell various errors ╷ │ error missing required argument │ │ with azurerm cosmosdb postgresql cluster read replica │ on main tf line in resource azurerm cosmosdb postgresql cluster read replica │ source resource id azurerm cosmosdb postgresql cluster primary replica id │ │ source resource id all of point in time in utc source location source resource id must be specified ╵ ╷ │ error creating server groupsv subscription aaaaaaaa aaaa aaaa aaaa aaaaaaaaaaaa │ resource group name │ server groupsv name performing create clusters clustersclient create failure sending request statuscode original error code bad request message the source cluster is not ready for restore yet │ │ with azurerm cosmosdb postgresql cluster read replica │ on main tf line in resource azurerm cosmosdb postgresql cluster read replica │ resource azurerm cosmosdb postgresql cluster read replica │ │ creating server groupsv subscription aaaaaaaa aaaa aaaa aaaa aaaaaaaaaaaa │ resource group name │ server groupsv name performing create clusters clustersclient create failure sending request statuscode original error code bad request │ message the source cluster is not ready for restore yet ╵ ╷ │ error creating server groupsv subscription aaaaaaaa aaaa aaaa aaaa aaaaaaaaaaaa │ resource group name │ server groupsv name performing create clusters clustersclient create failure sending request statuscode original error code bad request message pointintimeutc cannot be before if you need to restore your cluster to a point within last days open a support request │ │ with azurerm cosmosdb postgresql cluster read replica │ on main tf line in resource azurerm cosmosdb postgresql cluster read replica │ resource azurerm cosmosdb postgresql cluster read replica │ │ creating server groupsv subscription aaaaaaaa aaaa aaaa aaaa aaaaaaaaaaaa │ resource group name │ server groupsv name performing create clusters clustersclient create failure sending request statuscode original error code bad request │ message pointintimeutc cannot be before if you need to restore your cluster to a point within last days open a support request ╵ ╷ │ error creating server groupsv subscription aaaaaaaa aaaa aaaa aaaa aaaaaaaaaaaa │ resource group name │ server groupsv name performing create clusters clustersclient create failure sending request statuscode original error code bad request message restoring a new cluster from a source cluster in another location is not supported yet │ │ with azurerm cosmosdb postgresql cluster read replica │ on main tf line in resource azurerm cosmosdb postgresql cluster read replica │ resource azurerm cosmosdb postgresql cluster read replica │ │ creating server groupsv subscription aaaaaaaa aaaa aaaa aaaa aaaaaaaaaaaa │ resource group name │ server groupsv name performing create clusters clustersclient create failure sending request statuscode original error code bad request │ message restoring a new cluster from a source cluster in another location is not supported yet ╷ │ error creating server groupsv subscription aaaaaaaa aaaa aaaa aaaa aaaaaaaaaaaa │ resource group name │ server groupsv name performing create clusters clustersclient create failure sending request statuscode original error code bad request message pointintimeutc cannot be in the future │ │ with azurerm cosmosdb postgresql cluster read replica │ on main tf line in resource azurerm cosmosdb postgresql cluster read replica │ resource azurerm cosmosdb postgresql cluster read replica │ │ creating server groupsv subscription aaaaaaaa aaaa aaaa aaaa aaaaaaaaaaaa │ resource group name │ server groupsv name performing create clusters clustersclient create failure sending request statuscode original error code bad request │ message pointintimeutc cannot be in the future ╵ expected behaviour read replica should be created for the cosmosdb postgresql cluster i tried using the rest api instead and found it can work properly actual behaviour failure with the various error messages mentioned in the debug output steps to reproduce terraform plan out main tfplan var file postgre tfvars terraform apply main tfplan important factoids n a references no response
0
20,557
4,567,727,448
IssuesEvent
2016-09-15 12:17:43
dwclark/http-builder-ng
https://api.github.com/repos/dwclark/http-builder-ng
closed
Java examples
documentation enhancement
All.the examples are for Groovy but the library should be usable from standard Java - add some documentation and examples of Java use.
1.0
Java examples - All.the examples are for Groovy but the library should be usable from standard Java - add some documentation and examples of Java use.
non_priority
java examples all the examples are for groovy but the library should be usable from standard java add some documentation and examples of java use
0
46,590
5,823,921,747
IssuesEvent
2017-05-07 07:36:24
FACN1/VolunteerApp
https://api.github.com/repos/FACN1/VolunteerApp
closed
user story not accomplished
user-testing
In the user stories, you have:: "Visit the home page and have a brief explanation about what the site is about" I personally don't feel that this was accomplished, an Arabic user would strongly get the impression that the site is about Earth day or something from the imagery and Arabic writing. Even if the site is supposed to be for general use of volunteering, it's not clear what exactly is going on, another user story says "Click on a button on the home page that shows me a list of organizations". Considering all the organizations are 1, I don't think this was accomplished. Are they number #1 at something? Do they represent several other organizations? Do they they represent the closest place for someone living in IndONEsia?...ok, maybe I tried too hard on that one, still, you're relying on volunteers, so you should take better care of considering your users, afterall, your site relies on being considerate of others
1.0
user story not accomplished - In the user stories, you have:: "Visit the home page and have a brief explanation about what the site is about" I personally don't feel that this was accomplished, an Arabic user would strongly get the impression that the site is about Earth day or something from the imagery and Arabic writing. Even if the site is supposed to be for general use of volunteering, it's not clear what exactly is going on, another user story says "Click on a button on the home page that shows me a list of organizations". Considering all the organizations are 1, I don't think this was accomplished. Are they number #1 at something? Do they represent several other organizations? Do they they represent the closest place for someone living in IndONEsia?...ok, maybe I tried too hard on that one, still, you're relying on volunteers, so you should take better care of considering your users, afterall, your site relies on being considerate of others
non_priority
user story not accomplished in the user stories you have visit the home page and have a brief explanation about what the site is about i personally don t feel that this was accomplished an arabic user would strongly get the impression that the site is about earth day or something from the imagery and arabic writing even if the site is supposed to be for general use of volunteering it s not clear what exactly is going on another user story says click on a button on the home page that shows me a list of organizations considering all the organizations are i don t think this was accomplished are they number at something do they represent several other organizations do they they represent the closest place for someone living in indonesia ok maybe i tried too hard on that one still you re relying on volunteers so you should take better care of considering your users afterall your site relies on being considerate of others
0
175,530
27,875,694,454
IssuesEvent
2023-03-21 15:56:06
ECE-458-Books/ece458books
https://api.github.com/repos/ECE-458-Books/ece458books
closed
Disable "Submit" button until something has been added to be able to submit
frontend ui/ux/visual design
Currently on the book add page for example, the submit button is clickable before any books have been added, and looking at the chrome console it does send a request to the backend with an empty number of books. Does not make sense to be sending unnecessary empty requests to the backend, so disable this submit button until a book has been added. This is on all the pages with a submit button
1.0
Disable "Submit" button until something has been added to be able to submit - Currently on the book add page for example, the submit button is clickable before any books have been added, and looking at the chrome console it does send a request to the backend with an empty number of books. Does not make sense to be sending unnecessary empty requests to the backend, so disable this submit button until a book has been added. This is on all the pages with a submit button
non_priority
disable submit button until something has been added to be able to submit currently on the book add page for example the submit button is clickable before any books have been added and looking at the chrome console it does send a request to the backend with an empty number of books does not make sense to be sending unnecessary empty requests to the backend so disable this submit button until a book has been added this is on all the pages with a submit button
0
30,453
8,551,805,694
IssuesEvent
2018-11-07 19:08:05
deltachat/deltachat-core
https://api.github.com/repos/deltachat/deltachat-core
closed
Consider building libsasl2 ourselves
build
Linking against the system version of `libsasl2` can sometimes be problematic. My current use case is simply trying to build `deltachat-core` on Travis, which we need in order to test `deltachat-node` properly. Apparently `libsasl2-dev` doesn't have a `.pc` file for Ubuntu 14.04 (which is what Travis uses) so resulting in problems when running `meson`: ![screenshot from 2018-07-25 14-14-20](https://user-images.githubusercontent.com/308049/43200224-1e5802a2-9015-11e8-806f-3816f04f24bf.png) Full log here: https://travis-ci.org/ralphtheninja/deltachat-node/builds/408001419 A solution would be to pull in `libsasl2` into our source tree via e.g. a git submodule.
1.0
Consider building libsasl2 ourselves - Linking against the system version of `libsasl2` can sometimes be problematic. My current use case is simply trying to build `deltachat-core` on Travis, which we need in order to test `deltachat-node` properly. Apparently `libsasl2-dev` doesn't have a `.pc` file for Ubuntu 14.04 (which is what Travis uses) so resulting in problems when running `meson`: ![screenshot from 2018-07-25 14-14-20](https://user-images.githubusercontent.com/308049/43200224-1e5802a2-9015-11e8-806f-3816f04f24bf.png) Full log here: https://travis-ci.org/ralphtheninja/deltachat-node/builds/408001419 A solution would be to pull in `libsasl2` into our source tree via e.g. a git submodule.
non_priority
consider building ourselves linking against the system version of can sometimes be problematic my current use case is simply trying to build deltachat core on travis which we need in order to test deltachat node properly apparently dev doesn t have a pc file for ubuntu which is what travis uses so resulting in problems when running meson full log here a solution would be to pull in into our source tree via e g a git submodule
0
133,868
18,977,189,451
IssuesEvent
2021-11-20 07:10:27
four-four-four/DAMOA-Frontend
https://api.github.com/repos/four-four-four/DAMOA-Frontend
opened
[디자인] Vue Bootstrap 템플릿 적용
Design 0xe82de
## Description > Vue Bootstrap 템플릿으로 기존 프로젝트를 대체합니다. 추후에는 템플릿 기반으로 기능을 개발합니다. ## Details - 템플릿 반영 후 정상적으로 적용되었는지 확인 ## Progress - [ ] 템플릿 선정 - [ ] 템플릿 적용 - [ ] 테스트
1.0
[디자인] Vue Bootstrap 템플릿 적용 - ## Description > Vue Bootstrap 템플릿으로 기존 프로젝트를 대체합니다. 추후에는 템플릿 기반으로 기능을 개발합니다. ## Details - 템플릿 반영 후 정상적으로 적용되었는지 확인 ## Progress - [ ] 템플릿 선정 - [ ] 템플릿 적용 - [ ] 테스트
non_priority
vue bootstrap 템플릿 적용 description vue bootstrap 템플릿으로 기존 프로젝트를 대체합니다 추후에는 템플릿 기반으로 기능을 개발합니다 details 템플릿 반영 후 정상적으로 적용되었는지 확인 progress 템플릿 선정 템플릿 적용 테스트
0
124,194
17,772,487,325
IssuesEvent
2021-08-30 15:07:32
kapseliboi/core
https://api.github.com/repos/kapseliboi/core
opened
CVE-2018-1000620 (High) detected in cryptiles-2.0.5.tgz, cryptiles-3.1.2.tgz
security vulnerability
## CVE-2018-1000620 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>cryptiles-2.0.5.tgz</b>, <b>cryptiles-3.1.2.tgz</b></p></summary> <p> <details><summary><b>cryptiles-2.0.5.tgz</b></p></summary> <p>General purpose crypto utilities</p> <p>Library home page: <a href="https://registry.npmjs.org/cryptiles/-/cryptiles-2.0.5.tgz">https://registry.npmjs.org/cryptiles/-/cryptiles-2.0.5.tgz</a></p> <p> Dependency Hierarchy: - coveralls-2.13.3.tgz (Root Library) - request-2.79.0.tgz - hawk-3.1.3.tgz - :x: **cryptiles-2.0.5.tgz** (Vulnerable Library) </details> <details><summary><b>cryptiles-3.1.2.tgz</b></p></summary> <p>General purpose crypto utilities</p> <p>Library home page: <a href="https://registry.npmjs.org/cryptiles/-/cryptiles-3.1.2.tgz">https://registry.npmjs.org/cryptiles/-/cryptiles-3.1.2.tgz</a></p> <p> Dependency Hierarchy: - request-2.83.0.tgz (Root Library) - hawk-6.0.2.tgz - :x: **cryptiles-3.1.2.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/kapseliboi/core/commit/e874360a594fee39a58bef623926d2a19086771d">e874360a594fee39a58bef623926d2a19086771d</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Eran Hammer cryptiles version 4.1.1 earlier contains a CWE-331: Insufficient Entropy vulnerability in randomDigits() method that can result in An attacker is more likely to be able to brute force something that was supposed to be random.. This attack appear to be exploitable via Depends upon the calling application.. This vulnerability appears to have been fixed in 4.1.2. <p>Publish Date: 2018-07-09 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-1000620>CVE-2018-1000620</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-1000620">http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-1000620</a></p> <p>Release Date: 2018-07-09</p> <p>Fix Resolution: v4.1.2</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2018-1000620 (High) detected in cryptiles-2.0.5.tgz, cryptiles-3.1.2.tgz - ## CVE-2018-1000620 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>cryptiles-2.0.5.tgz</b>, <b>cryptiles-3.1.2.tgz</b></p></summary> <p> <details><summary><b>cryptiles-2.0.5.tgz</b></p></summary> <p>General purpose crypto utilities</p> <p>Library home page: <a href="https://registry.npmjs.org/cryptiles/-/cryptiles-2.0.5.tgz">https://registry.npmjs.org/cryptiles/-/cryptiles-2.0.5.tgz</a></p> <p> Dependency Hierarchy: - coveralls-2.13.3.tgz (Root Library) - request-2.79.0.tgz - hawk-3.1.3.tgz - :x: **cryptiles-2.0.5.tgz** (Vulnerable Library) </details> <details><summary><b>cryptiles-3.1.2.tgz</b></p></summary> <p>General purpose crypto utilities</p> <p>Library home page: <a href="https://registry.npmjs.org/cryptiles/-/cryptiles-3.1.2.tgz">https://registry.npmjs.org/cryptiles/-/cryptiles-3.1.2.tgz</a></p> <p> Dependency Hierarchy: - request-2.83.0.tgz (Root Library) - hawk-6.0.2.tgz - :x: **cryptiles-3.1.2.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/kapseliboi/core/commit/e874360a594fee39a58bef623926d2a19086771d">e874360a594fee39a58bef623926d2a19086771d</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Eran Hammer cryptiles version 4.1.1 earlier contains a CWE-331: Insufficient Entropy vulnerability in randomDigits() method that can result in An attacker is more likely to be able to brute force something that was supposed to be random.. This attack appear to be exploitable via Depends upon the calling application.. This vulnerability appears to have been fixed in 4.1.2. <p>Publish Date: 2018-07-09 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-1000620>CVE-2018-1000620</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-1000620">http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-1000620</a></p> <p>Release Date: 2018-07-09</p> <p>Fix Resolution: v4.1.2</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in cryptiles tgz cryptiles tgz cve high severity vulnerability vulnerable libraries cryptiles tgz cryptiles tgz cryptiles tgz general purpose crypto utilities library home page a href dependency hierarchy coveralls tgz root library request tgz hawk tgz x cryptiles tgz vulnerable library cryptiles tgz general purpose crypto utilities library home page a href dependency hierarchy request tgz root library hawk tgz x cryptiles tgz vulnerable library found in head commit a href found in base branch master vulnerability details eran hammer cryptiles version earlier contains a cwe insufficient entropy vulnerability in randomdigits method that can result in an attacker is more likely to be able to brute force something that was supposed to be random this attack appear to be exploitable via depends upon the calling application this vulnerability appears to have been fixed in publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
0
65,072
8,786,965,569
IssuesEvent
2018-12-20 17:08:48
NeutrinosPlatform/cordova-plugin-document-scanner
https://api.github.com/repos/NeutrinosPlatform/cordova-plugin-document-scanner
closed
Android Crash
bug change documentation enhancement
document-scanner version 1.1.1 Crashing in an app with the following code: ``` scanDocument() { // scan document using document-scanner from the camera scan.scanDoc(1, (imgUri) => { this.claimDocImage.imagePath = normalizeURL(imgUri); }, (err) => { console.error(err); }); } ``` ``` --------- beginning of crash 05-08 14:01:23.852 28011-28011/com.eightysixdegrees.antellogistics E/AndroidRuntime: FATAL EXCEPTION: main Process: com.eightysixdegrees.antellogistics, PID: 28011 java.lang.UnsatisfiedLinkError: dalvik.system.PathClassLoader[DexPathList[[zip file "/data/app/com.eightysixdegrees.antellogistics-h9hhwnZVYDRxsfP_9H8p1g==/base.apk"],nativeLibraryDirectories=[/data/app/com.eightysixdegrees.antellogistics-h9hhwnZVYDRxsfP_9H8p1g==/lib/arm64, /data/app/com.eightysixdegrees.antellogistics-h9hhwnZVYDRxsfP_9H8p1g==/base.apk!/lib/arm64-v8a, /system/lib64]]] couldn't find "libopencv_java3.so" at java.lang.Runtime.loadLibrary0(Runtime.java:1011) at java.lang.System.loadLibrary(System.java:1657) at com.scanlibrary.Loader.load(Loader.java:14) at com.scanlibrary.ScanActivity.<clinit>(ScanActivity.java:125) at java.lang.Class.newInstance(Native Method) at android.app.Instrumentation.newActivity(Instrumentation.java:1174) at android.app.ActivityThread.performLaunchActivity(ActivityThread.java:2669) at android.app.ActivityThread.handleLaunchActivity(ActivityThread.java:2856) at android.app.ActivityThread.-wrap11(Unknown Source:0) at android.app.ActivityThread$H.handleMessage(ActivityThread.java:1589) at android.os.Handler.dispatchMessage(Handler.java:106) at android.os.Looper.loop(Looper.java:164) at android.app.ActivityThread.main(ActivityThread.java:6494) at java.lang.reflect.Method.invoke(Native Method) at com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run(RuntimeInit.java:438) at com.android.internal.os.ZygoteInit.main(ZygoteInit.java:807) ``` Info: ``` global packages: cordova (Cordova CLI) : 8.0.0 local packages: @ionic/app-scripts : 3.1.8 Cordova Platforms : android 7.1.0 ios 4.5.4 Ionic Framework : ionic-angular 3.9.2 System: ios-deploy : 1.9.2 ios-sim : 6.1.2 Node : v8.11.1 npm : 5.8.0 OS : macOS High Sierra Xcode : Xcode 9.3 Build version 9E145 ```
1.0
Android Crash - document-scanner version 1.1.1 Crashing in an app with the following code: ``` scanDocument() { // scan document using document-scanner from the camera scan.scanDoc(1, (imgUri) => { this.claimDocImage.imagePath = normalizeURL(imgUri); }, (err) => { console.error(err); }); } ``` ``` --------- beginning of crash 05-08 14:01:23.852 28011-28011/com.eightysixdegrees.antellogistics E/AndroidRuntime: FATAL EXCEPTION: main Process: com.eightysixdegrees.antellogistics, PID: 28011 java.lang.UnsatisfiedLinkError: dalvik.system.PathClassLoader[DexPathList[[zip file "/data/app/com.eightysixdegrees.antellogistics-h9hhwnZVYDRxsfP_9H8p1g==/base.apk"],nativeLibraryDirectories=[/data/app/com.eightysixdegrees.antellogistics-h9hhwnZVYDRxsfP_9H8p1g==/lib/arm64, /data/app/com.eightysixdegrees.antellogistics-h9hhwnZVYDRxsfP_9H8p1g==/base.apk!/lib/arm64-v8a, /system/lib64]]] couldn't find "libopencv_java3.so" at java.lang.Runtime.loadLibrary0(Runtime.java:1011) at java.lang.System.loadLibrary(System.java:1657) at com.scanlibrary.Loader.load(Loader.java:14) at com.scanlibrary.ScanActivity.<clinit>(ScanActivity.java:125) at java.lang.Class.newInstance(Native Method) at android.app.Instrumentation.newActivity(Instrumentation.java:1174) at android.app.ActivityThread.performLaunchActivity(ActivityThread.java:2669) at android.app.ActivityThread.handleLaunchActivity(ActivityThread.java:2856) at android.app.ActivityThread.-wrap11(Unknown Source:0) at android.app.ActivityThread$H.handleMessage(ActivityThread.java:1589) at android.os.Handler.dispatchMessage(Handler.java:106) at android.os.Looper.loop(Looper.java:164) at android.app.ActivityThread.main(ActivityThread.java:6494) at java.lang.reflect.Method.invoke(Native Method) at com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run(RuntimeInit.java:438) at com.android.internal.os.ZygoteInit.main(ZygoteInit.java:807) ``` Info: ``` global packages: cordova (Cordova CLI) : 8.0.0 local packages: @ionic/app-scripts : 3.1.8 Cordova Platforms : android 7.1.0 ios 4.5.4 Ionic Framework : ionic-angular 3.9.2 System: ios-deploy : 1.9.2 ios-sim : 6.1.2 Node : v8.11.1 npm : 5.8.0 OS : macOS High Sierra Xcode : Xcode 9.3 Build version 9E145 ```
non_priority
android crash document scanner version crashing in an app with the following code scandocument scan document using document scanner from the camera scan scandoc imguri this claimdocimage imagepath normalizeurl imguri err console error err beginning of crash com eightysixdegrees antellogistics e androidruntime fatal exception main process com eightysixdegrees antellogistics pid java lang unsatisfiedlinkerror dalvik system pathclassloader nativelibrarydirectories couldn t find libopencv so at java lang runtime runtime java at java lang system loadlibrary system java at com scanlibrary loader load loader java at com scanlibrary scanactivity scanactivity java at java lang class newinstance native method at android app instrumentation newactivity instrumentation java at android app activitythread performlaunchactivity activitythread java at android app activitythread handlelaunchactivity activitythread java at android app activitythread unknown source at android app activitythread h handlemessage activitythread java at android os handler dispatchmessage handler java at android os looper loop looper java at android app activitythread main activitythread java at java lang reflect method invoke native method at com android internal os runtimeinit methodandargscaller run runtimeinit java at com android internal os zygoteinit main zygoteinit java info global packages cordova cordova cli local packages ionic app scripts cordova platforms android ios ionic framework ionic angular system ios deploy ios sim node npm os macos high sierra xcode xcode build version
0
227,424
18,063,123,301
IssuesEvent
2021-09-20 15:56:10
kubernetes/kubernetes
https://api.github.com/repos/kubernetes/kubernetes
closed
Few of the kubernetes tests are failing due to build failures
sig/storage sig/apps kind/failing-test triage/accepted
<!-- Please only use this template for submitting reports about continuously failing tests or jobs in Kubernetes CI --> #### Which jobs are failing: Following kubernetes tests are failing make test WHAT=k8s.io/kubernetes/vendor/k8s.io/csi-translation-lib/plugins make test WHAT=k8s.io/kubernetes/pkg/controller/job #### Which test(s) are failing: Sample failure error trace ``` [root@karthik-workspace kubernetes]# make test WHAT=k8s.io/kubernetes/vendor/k8s.io/csi-translation-lib/plugins +++ [0917 10:23:04] Running tests without code coverage and with -race # k8s.io/kubernetes/vendor/k8s.io/csi-translation-lib/plugins vendor/k8s.io/csi-translation-lib/plugins/in_tree_volume_test.go:683:4: (*testing.common).Errorf does not support error-wrapping directive %w FAIL k8s.io/kubernetes/vendor/k8s.io/csi-translation-lib/plugins [build failed] FAIL make: *** [Makefile:184: test] Error 1 ``` Full Test report can be found [here](https://prow.ppc64le-cloud.org/view/gs/ppc64le-kubernetes/logs/periodic-kubernetes-containerd-conformance-test-ppc64le/1438805878072414208) #### Since when has it been failing: #### Testgrid link: #### Reason for failure: Incorrect format specifiers used in Errorf in test logging #### Anything else we need to know:
1.0
Few of the kubernetes tests are failing due to build failures - <!-- Please only use this template for submitting reports about continuously failing tests or jobs in Kubernetes CI --> #### Which jobs are failing: Following kubernetes tests are failing make test WHAT=k8s.io/kubernetes/vendor/k8s.io/csi-translation-lib/plugins make test WHAT=k8s.io/kubernetes/pkg/controller/job #### Which test(s) are failing: Sample failure error trace ``` [root@karthik-workspace kubernetes]# make test WHAT=k8s.io/kubernetes/vendor/k8s.io/csi-translation-lib/plugins +++ [0917 10:23:04] Running tests without code coverage and with -race # k8s.io/kubernetes/vendor/k8s.io/csi-translation-lib/plugins vendor/k8s.io/csi-translation-lib/plugins/in_tree_volume_test.go:683:4: (*testing.common).Errorf does not support error-wrapping directive %w FAIL k8s.io/kubernetes/vendor/k8s.io/csi-translation-lib/plugins [build failed] FAIL make: *** [Makefile:184: test] Error 1 ``` Full Test report can be found [here](https://prow.ppc64le-cloud.org/view/gs/ppc64le-kubernetes/logs/periodic-kubernetes-containerd-conformance-test-ppc64le/1438805878072414208) #### Since when has it been failing: #### Testgrid link: #### Reason for failure: Incorrect format specifiers used in Errorf in test logging #### Anything else we need to know:
non_priority
few of the kubernetes tests are failing due to build failures which jobs are failing following kubernetes tests are failing make test what io kubernetes vendor io csi translation lib plugins make test what io kubernetes pkg controller job which test s are failing sample failure error trace make test what io kubernetes vendor io csi translation lib plugins running tests without code coverage and with race io kubernetes vendor io csi translation lib plugins vendor io csi translation lib plugins in tree volume test go testing common errorf does not support error wrapping directive w fail io kubernetes vendor io csi translation lib plugins fail make error full test report can be found since when has it been failing testgrid link reason for failure incorrect format specifiers used in errorf in test logging anything else we need to know
0
35,080
7,548,704,257
IssuesEvent
2018-04-18 12:09:49
primefaces/primeng
https://api.github.com/repos/primefaces/primeng
closed
panel component animation 'collapsed model' driven bug
defect
Bug report code here: <p-panel [(collapsed)]="show"> show = false; **Current behavior** I use a variable to control the collapsed status of panel component, but the animation of unfolding has some problem: it completely unfolds at first and gradually unfolds again later, which appears that a line of border drop down after unfold. **Expected behavior** it should be like what the demo shows. **Minimal reproduction of the problem with instructions** <!-- If the current behavior is a bug or you can illustrate your feature request better with an example, please provide the *STEPS TO REPRODUCE* and if possible a *MINIMAL DEMO* of the problem via https://plnkr.co or similar (you can use this template as a starting point: http://plnkr.co/edit/tpl:AvJOMERrnz94ekVua0u5). --> **What is the motivation / use case for changing the behavior?** Collapsed status should be model driven. **Please tell us about your environment:** win7 * **Angular version:** 2.0.X 5.1.0 * **PrimeNG version:** 2.0.X 5.2.0 * **Browser:** [all | Chrome XX | Firefox XX | IE XX | Safari XX | Mobile Chrome XX | Android X.X Web Browser | iOS XX Safari | iOS XX UIWebView | iOS XX WKWebView ] all * **Language:** [all | TypeScript X.X | ES6/7 | ES5] TypeScript 2.5.3 * **Node (for AoT issues):** `node --version` = 8.9.3
1.0
panel component animation 'collapsed model' driven bug - Bug report code here: <p-panel [(collapsed)]="show"> show = false; **Current behavior** I use a variable to control the collapsed status of panel component, but the animation of unfolding has some problem: it completely unfolds at first and gradually unfolds again later, which appears that a line of border drop down after unfold. **Expected behavior** it should be like what the demo shows. **Minimal reproduction of the problem with instructions** <!-- If the current behavior is a bug or you can illustrate your feature request better with an example, please provide the *STEPS TO REPRODUCE* and if possible a *MINIMAL DEMO* of the problem via https://plnkr.co or similar (you can use this template as a starting point: http://plnkr.co/edit/tpl:AvJOMERrnz94ekVua0u5). --> **What is the motivation / use case for changing the behavior?** Collapsed status should be model driven. **Please tell us about your environment:** win7 * **Angular version:** 2.0.X 5.1.0 * **PrimeNG version:** 2.0.X 5.2.0 * **Browser:** [all | Chrome XX | Firefox XX | IE XX | Safari XX | Mobile Chrome XX | Android X.X Web Browser | iOS XX Safari | iOS XX UIWebView | iOS XX WKWebView ] all * **Language:** [all | TypeScript X.X | ES6/7 | ES5] TypeScript 2.5.3 * **Node (for AoT issues):** `node --version` = 8.9.3
non_priority
panel component animation collapsed model driven bug bug report code here show false current behavior i use a variable to control the collapsed status of panel component but the animation of unfolding has some problem it completely unfolds at first and gradually unfolds again later which appears that a line of border drop down after unfold expected behavior it should be like what the demo shows minimal reproduction of the problem with instructions if the current behavior is a bug or you can illustrate your feature request better with an example please provide the steps to reproduce and if possible a minimal demo of the problem via or similar you can use this template as a starting point what is the motivation use case for changing the behavior collapsed status should be model driven please tell us about your environment angular version x primeng version x browser all language typescript node for aot issues node version
0
140,392
18,901,290,588
IssuesEvent
2021-11-16 01:24:53
dmyers87/seeds-packets
https://api.github.com/repos/dmyers87/seeds-packets
opened
CVE-2021-3918 (High) detected in json-schema-0.2.3.tgz
security vulnerability
## CVE-2021-3918 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>json-schema-0.2.3.tgz</b></p></summary> <p>JSON Schema validation and specifications</p> <p>Library home page: <a href="https://registry.npmjs.org/json-schema/-/json-schema-0.2.3.tgz">https://registry.npmjs.org/json-schema/-/json-schema-0.2.3.tgz</a></p> <p>Path to dependency file: seeds-packets/package.json</p> <p>Path to vulnerable library: seeds-packets/node_modules/json-schema,seeds-packets/packets/seedlings/node_modules/json-schema</p> <p> Dependency Hierarchy: - node-sass-4.14.1.tgz (Root Library) - request-2.88.2.tgz - http-signature-1.2.0.tgz - jsprim-1.4.1.tgz - :x: **json-schema-0.2.3.tgz** (Vulnerable Library) <p>Found in base branch: <b>develop</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> json-schema is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') <p>Publish Date: 2021-11-13 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-3918>CVE-2021-3918</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"json-schema","packageVersion":"0.2.3","packageFilePaths":["/package.json","/packets/seedlings/package.json"],"isTransitiveDependency":true,"dependencyTree":"node-sass:4.14.1;request:2.88.2;http-signature:1.2.0;jsprim:1.4.1;json-schema:0.2.3","isMinimumFixVersionAvailable":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2021-3918","vulnerabilityDetails":"json-schema is vulnerable to Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-3918","cvss3Severity":"high","cvss3Score":"9.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> -->
True
CVE-2021-3918 (High) detected in json-schema-0.2.3.tgz - ## CVE-2021-3918 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>json-schema-0.2.3.tgz</b></p></summary> <p>JSON Schema validation and specifications</p> <p>Library home page: <a href="https://registry.npmjs.org/json-schema/-/json-schema-0.2.3.tgz">https://registry.npmjs.org/json-schema/-/json-schema-0.2.3.tgz</a></p> <p>Path to dependency file: seeds-packets/package.json</p> <p>Path to vulnerable library: seeds-packets/node_modules/json-schema,seeds-packets/packets/seedlings/node_modules/json-schema</p> <p> Dependency Hierarchy: - node-sass-4.14.1.tgz (Root Library) - request-2.88.2.tgz - http-signature-1.2.0.tgz - jsprim-1.4.1.tgz - :x: **json-schema-0.2.3.tgz** (Vulnerable Library) <p>Found in base branch: <b>develop</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> json-schema is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') <p>Publish Date: 2021-11-13 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-3918>CVE-2021-3918</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"json-schema","packageVersion":"0.2.3","packageFilePaths":["/package.json","/packets/seedlings/package.json"],"isTransitiveDependency":true,"dependencyTree":"node-sass:4.14.1;request:2.88.2;http-signature:1.2.0;jsprim:1.4.1;json-schema:0.2.3","isMinimumFixVersionAvailable":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2021-3918","vulnerabilityDetails":"json-schema is vulnerable to Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-3918","cvss3Severity":"high","cvss3Score":"9.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> -->
non_priority
cve high detected in json schema tgz cve high severity vulnerability vulnerable library json schema tgz json schema validation and specifications library home page a href path to dependency file seeds packets package json path to vulnerable library seeds packets node modules json schema seeds packets packets seedlings node modules json schema dependency hierarchy node sass tgz root library request tgz http signature tgz jsprim tgz x json schema tgz vulnerable library found in base branch develop vulnerability details json schema is vulnerable to improperly controlled modification of object prototype attributes prototype pollution publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href isopenpronvulnerability false ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree node sass request http signature jsprim json schema isminimumfixversionavailable false basebranches vulnerabilityidentifier cve vulnerabilitydetails json schema is vulnerable to improperly controlled modification of object prototype attributes pollution vulnerabilityurl
0
201,959
23,048,136,450
IssuesEvent
2022-07-24 08:00:01
ofirghc/easybuggy4django
https://api.github.com/repos/ofirghc/easybuggy4django
opened
requests-2.18.4-py2.py3-none-any.whl: 1 vulnerabilities (highest severity is: 5.0)
security vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>requests-2.18.4-py2.py3-none-any.whl</b></p></summary> <p>Python HTTP for Humans.</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/49/df/50aa1999ab9bde74656c2919d9c0c085fd2b3775fd3eca826012bef76d8c/requests-2.18.4-py2.py3-none-any.whl">https://files.pythonhosted.org/packages/49/df/50aa1999ab9bde74656c2919d9c0c085fd2b3775fd3eca826012bef76d8c/requests-2.18.4-py2.py3-none-any.whl</a></p> <p>Path to dependency file: /C:/Users/OfirNir/AppData/Local/Temp/ws-scm/easybuggy4django</p> <p>Path to vulnerable library: /C:/Users/OfirNir/AppData/Local/Temp/ws-scm/easybuggy4django,/requirements.txt</p> <p> <p>Found in HEAD commit: <a href="https://github.com/ofirghc/easybuggy4django/commit/acd9a84f150d1ed66178e1f4d333b905621e8082">acd9a84f150d1ed66178e1f4d333b905621e8082</a></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | --- | --- | | [CVE-2018-18074](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-18074) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.0 | requests-2.18.4-py2.py3-none-any.whl | Direct | Replace or update the following files: sessions.py, test_requests.py | &#10060; | ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2018-18074</summary> ### Vulnerable Library - <b>requests-2.18.4-py2.py3-none-any.whl</b></p> <p>Python HTTP for Humans.</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/49/df/50aa1999ab9bde74656c2919d9c0c085fd2b3775fd3eca826012bef76d8c/requests-2.18.4-py2.py3-none-any.whl">https://files.pythonhosted.org/packages/49/df/50aa1999ab9bde74656c2919d9c0c085fd2b3775fd3eca826012bef76d8c/requests-2.18.4-py2.py3-none-any.whl</a></p> <p>Path to dependency file: /C:/Users/OfirNir/AppData/Local/Temp/ws-scm/easybuggy4django</p> <p>Path to vulnerable library: /C:/Users/OfirNir/AppData/Local/Temp/ws-scm/easybuggy4django,/requirements.txt</p> <p> Dependency Hierarchy: - :x: **requests-2.18.4-py2.py3-none-any.whl** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/ofirghc/easybuggy4django/commit/acd9a84f150d1ed66178e1f4d333b905621e8082">acd9a84f150d1ed66178e1f4d333b905621e8082</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> The Requests package before 2.20.0 for Python sends an HTTP Authorization header to an http URI upon receiving a same-hostname https-to-http redirect, which makes it easier for remote attackers to discover credentials by sniffing the network. <p>Publish Date: 2018-10-09 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-18074>CVE-2018-18074</a></p> </p> <p></p> ### CVSS 2 Score Details (<b>5.0</b>) <p> Base Score Metrics not available</p> </p> <p></p> ### Suggested Fix <p> <p>Type: Change files</p> <p>Release Date: 2018-09-14</p> <p>Fix Resolution: Replace or update the following files: sessions.py, test_requests.py</p> </p> <p></p> </details>
True
requests-2.18.4-py2.py3-none-any.whl: 1 vulnerabilities (highest severity is: 5.0) - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>requests-2.18.4-py2.py3-none-any.whl</b></p></summary> <p>Python HTTP for Humans.</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/49/df/50aa1999ab9bde74656c2919d9c0c085fd2b3775fd3eca826012bef76d8c/requests-2.18.4-py2.py3-none-any.whl">https://files.pythonhosted.org/packages/49/df/50aa1999ab9bde74656c2919d9c0c085fd2b3775fd3eca826012bef76d8c/requests-2.18.4-py2.py3-none-any.whl</a></p> <p>Path to dependency file: /C:/Users/OfirNir/AppData/Local/Temp/ws-scm/easybuggy4django</p> <p>Path to vulnerable library: /C:/Users/OfirNir/AppData/Local/Temp/ws-scm/easybuggy4django,/requirements.txt</p> <p> <p>Found in HEAD commit: <a href="https://github.com/ofirghc/easybuggy4django/commit/acd9a84f150d1ed66178e1f4d333b905621e8082">acd9a84f150d1ed66178e1f4d333b905621e8082</a></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | --- | --- | | [CVE-2018-18074](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-18074) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.0 | requests-2.18.4-py2.py3-none-any.whl | Direct | Replace or update the following files: sessions.py, test_requests.py | &#10060; | ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2018-18074</summary> ### Vulnerable Library - <b>requests-2.18.4-py2.py3-none-any.whl</b></p> <p>Python HTTP for Humans.</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/49/df/50aa1999ab9bde74656c2919d9c0c085fd2b3775fd3eca826012bef76d8c/requests-2.18.4-py2.py3-none-any.whl">https://files.pythonhosted.org/packages/49/df/50aa1999ab9bde74656c2919d9c0c085fd2b3775fd3eca826012bef76d8c/requests-2.18.4-py2.py3-none-any.whl</a></p> <p>Path to dependency file: /C:/Users/OfirNir/AppData/Local/Temp/ws-scm/easybuggy4django</p> <p>Path to vulnerable library: /C:/Users/OfirNir/AppData/Local/Temp/ws-scm/easybuggy4django,/requirements.txt</p> <p> Dependency Hierarchy: - :x: **requests-2.18.4-py2.py3-none-any.whl** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/ofirghc/easybuggy4django/commit/acd9a84f150d1ed66178e1f4d333b905621e8082">acd9a84f150d1ed66178e1f4d333b905621e8082</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> The Requests package before 2.20.0 for Python sends an HTTP Authorization header to an http URI upon receiving a same-hostname https-to-http redirect, which makes it easier for remote attackers to discover credentials by sniffing the network. <p>Publish Date: 2018-10-09 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-18074>CVE-2018-18074</a></p> </p> <p></p> ### CVSS 2 Score Details (<b>5.0</b>) <p> Base Score Metrics not available</p> </p> <p></p> ### Suggested Fix <p> <p>Type: Change files</p> <p>Release Date: 2018-09-14</p> <p>Fix Resolution: Replace or update the following files: sessions.py, test_requests.py</p> </p> <p></p> </details>
non_priority
requests none any whl vulnerabilities highest severity is vulnerable library requests none any whl python http for humans library home page a href path to dependency file c users ofirnir appdata local temp ws scm path to vulnerable library c users ofirnir appdata local temp ws scm requirements txt found in head commit a href vulnerabilities cve severity cvss dependency type fixed in remediation available medium requests none any whl direct replace or update the following files sessions py test requests py details cve vulnerable library requests none any whl python http for humans library home page a href path to dependency file c users ofirnir appdata local temp ws scm path to vulnerable library c users ofirnir appdata local temp ws scm requirements txt dependency hierarchy x requests none any whl vulnerable library found in head commit a href found in base branch main vulnerability details the requests package before for python sends an http authorization header to an http uri upon receiving a same hostname https to http redirect which makes it easier for remote attackers to discover credentials by sniffing the network publish date url a href cvss score details base score metrics not available suggested fix type change files release date fix resolution replace or update the following files sessions py test requests py
0
12,801
15,074,801,811
IssuesEvent
2021-02-05 00:35:51
FoundationGames/Sandwichable
https://api.github.com/repos/FoundationGames/Sandwichable
closed
AppleSkin mod does not show the saturation that sandwiches can add
Fixed In Development compatibility
Hi there, I found AppleSkin mod does not show the saturation that sandwiches can add, so I cannot see clearly how much saturation the sandwiches I made is. Is it because the code doesn't define a prepared sandwich as food (so that AppleSkin mod cannot understand)?
True
AppleSkin mod does not show the saturation that sandwiches can add - Hi there, I found AppleSkin mod does not show the saturation that sandwiches can add, so I cannot see clearly how much saturation the sandwiches I made is. Is it because the code doesn't define a prepared sandwich as food (so that AppleSkin mod cannot understand)?
non_priority
appleskin mod does not show the saturation that sandwiches can add hi there i found appleskin mod does not show the saturation that sandwiches can add so i cannot see clearly how much saturation the sandwiches i made is is it because the code doesn t define a prepared sandwich as food so that appleskin mod cannot understand
0
27,668
13,348,809,448
IssuesEvent
2020-08-29 20:34:46
OpenRA/OpenRA
https://api.github.com/repos/OpenRA/OpenRA
closed
Instructing group of rocket soliders to hit inaccessible target causes game to slow significantly
Bug Performance
Instructing group of rocket soliders to hit inaccessible target causes game to slow significantly
True
Instructing group of rocket soliders to hit inaccessible target causes game to slow significantly - Instructing group of rocket soliders to hit inaccessible target causes game to slow significantly
non_priority
instructing group of rocket soliders to hit inaccessible target causes game to slow significantly instructing group of rocket soliders to hit inaccessible target causes game to slow significantly
0
18,833
24,736,608,632
IssuesEvent
2022-10-20 22:43:36
MPMG-DCC-UFMG/C01
https://api.github.com/repos/MPMG-DCC-UFMG/C01
closed
Tradução dos testes do módulo `step-by-step`
[1] Bug [0] Desenvolvimento [2] Média Prioridade [3] Processamento Dinâmico
## Comportamento Esperado Espera-se que os testes do módulo de passos com processamento dinâmico esteja usando Playwright ao invés de Pyppeteer. ## Comportamento Atual Os testes desse módulo usam a biblioteca Pyppeteer. Além disso, contam com a existência de casos de testes antigos que foram deletados do módulo step-by-step. ## Passos para reproduzir o erro Executar pytest tests e observar os erros gerados. ## Especificações da Coleta Não se aplica ## Sistema (caso necessário) - MP ou local: local - Branch específica: dev - Sistema diferente: sistema distribuído com playwright ## Screenshots (caso necessário) ![image](https://user-images.githubusercontent.com/48096245/194918265-cbeffc34-f504-4c0f-934b-557c6ac50ebe.png)
1.0
Tradução dos testes do módulo `step-by-step` - ## Comportamento Esperado Espera-se que os testes do módulo de passos com processamento dinâmico esteja usando Playwright ao invés de Pyppeteer. ## Comportamento Atual Os testes desse módulo usam a biblioteca Pyppeteer. Além disso, contam com a existência de casos de testes antigos que foram deletados do módulo step-by-step. ## Passos para reproduzir o erro Executar pytest tests e observar os erros gerados. ## Especificações da Coleta Não se aplica ## Sistema (caso necessário) - MP ou local: local - Branch específica: dev - Sistema diferente: sistema distribuído com playwright ## Screenshots (caso necessário) ![image](https://user-images.githubusercontent.com/48096245/194918265-cbeffc34-f504-4c0f-934b-557c6ac50ebe.png)
non_priority
tradução dos testes do módulo step by step comportamento esperado espera se que os testes do módulo de passos com processamento dinâmico esteja usando playwright ao invés de pyppeteer comportamento atual os testes desse módulo usam a biblioteca pyppeteer além disso contam com a existência de casos de testes antigos que foram deletados do módulo step by step passos para reproduzir o erro executar pytest tests e observar os erros gerados especificações da coleta não se aplica sistema caso necessário mp ou local local branch específica dev sistema diferente sistema distribuído com playwright screenshots caso necessário
0
122,622
12,156,509,122
IssuesEvent
2020-04-25 17:38:23
danielkelshaw/PyUAVSIM
https://api.github.com/repos/danielkelshaw/PyUAVSIM
closed
Improve Code Documentation
documentation
At the moment the code is very barebones in terms of documentation - it could be quite challenging for a third party to understand what is going on. It would be beneficial to improve the level of documentation throughout the code.
1.0
Improve Code Documentation - At the moment the code is very barebones in terms of documentation - it could be quite challenging for a third party to understand what is going on. It would be beneficial to improve the level of documentation throughout the code.
non_priority
improve code documentation at the moment the code is very barebones in terms of documentation it could be quite challenging for a third party to understand what is going on it would be beneficial to improve the level of documentation throughout the code
0
240,760
18,373,574,392
IssuesEvent
2021-10-11 05:06:02
jupyter/notebook
https://api.github.com/repos/jupyter/notebook
closed
[DOCS] Notebook examples not rendering properly
documentation
### Description Between version `v5.7.6` and the `stable`, the notebook examples section has become broken. For example: - [The working version on `v5.7.6`](https://jupyter-notebook.readthedocs.io/en/5.7.6/examples/Notebook/Notebook%20Basics.html) ![image](https://user-images.githubusercontent.com/1839645/136105978-af5b01f3-c312-4ec1-a189-0476a39a3ba4.png) - [The broken version on `stable`](https://jupyter-notebook.readthedocs.io/en/stable/examples/Notebook/Notebook%20Basics.html) ![image](https://user-images.githubusercontent.com/1839645/136106075-6366a342-81d0-4312-b7b6-f5b271af8248.png) It looks like the notebook `.ipynb` files are being parsed as raw text, rather than parsed properly by `nbsphinx`. I tried getting a dev environment set up to debug this, but `pip install .` wasn't working because I ran into the error `error: [Errno 2] No such file or directory: 'bower'`. So opening this issue to track it. The notebook examples are at the link below, and I suspect the fix will need to be somewhere around there, or in the Sphinx configuration: https://github.com/jupyter/notebook/tree/master/docs/source/examples/Notebook Originally reported in https://discourse.jupyter.org/t/error-in-jupyter-readthedocs-page-rendering/11038
1.0
[DOCS] Notebook examples not rendering properly - ### Description Between version `v5.7.6` and the `stable`, the notebook examples section has become broken. For example: - [The working version on `v5.7.6`](https://jupyter-notebook.readthedocs.io/en/5.7.6/examples/Notebook/Notebook%20Basics.html) ![image](https://user-images.githubusercontent.com/1839645/136105978-af5b01f3-c312-4ec1-a189-0476a39a3ba4.png) - [The broken version on `stable`](https://jupyter-notebook.readthedocs.io/en/stable/examples/Notebook/Notebook%20Basics.html) ![image](https://user-images.githubusercontent.com/1839645/136106075-6366a342-81d0-4312-b7b6-f5b271af8248.png) It looks like the notebook `.ipynb` files are being parsed as raw text, rather than parsed properly by `nbsphinx`. I tried getting a dev environment set up to debug this, but `pip install .` wasn't working because I ran into the error `error: [Errno 2] No such file or directory: 'bower'`. So opening this issue to track it. The notebook examples are at the link below, and I suspect the fix will need to be somewhere around there, or in the Sphinx configuration: https://github.com/jupyter/notebook/tree/master/docs/source/examples/Notebook Originally reported in https://discourse.jupyter.org/t/error-in-jupyter-readthedocs-page-rendering/11038
non_priority
notebook examples not rendering properly description between version and the stable the notebook examples section has become broken for example it looks like the notebook ipynb files are being parsed as raw text rather than parsed properly by nbsphinx i tried getting a dev environment set up to debug this but pip install wasn t working because i ran into the error error no such file or directory bower so opening this issue to track it the notebook examples are at the link below and i suspect the fix will need to be somewhere around there or in the sphinx configuration originally reported in
0
76,159
7,520,135,742
IssuesEvent
2018-04-12 13:43:57
arquillian/ike-prow-plugins
https://api.github.com/repos/arquillian/ike-prow-plugins
closed
Add soft matcher and additional custom assertion
type/test-suite
- [ ] implement soft matcher that will behave as a soft assertion in AssertJ - [ ] add a custom assertion for `PermissionStatus` object
1.0
Add soft matcher and additional custom assertion - - [ ] implement soft matcher that will behave as a soft assertion in AssertJ - [ ] add a custom assertion for `PermissionStatus` object
non_priority
add soft matcher and additional custom assertion implement soft matcher that will behave as a soft assertion in assertj add a custom assertion for permissionstatus object
0
285,168
24,646,994,068
IssuesEvent
2022-10-17 15:31:24
KinsonDigital/Velaptor
https://api.github.com/repos/KinsonDigital/Velaptor
opened
🧪QA Testing
🧪qa testing
### Complete The Item Below - [X] I have linked all issues that will be tested for this release. ### Version Being Tested asdf ### Issues To Test _No response_ ### Relevant Information QA Testing Application: - [VelaptorTesting-v1.0.0-preview.10.zip](https://github.com/KinsonDigital/Velaptor/files/9802135/VelaptorTesting-v1.0.0-preview.10.zip) ### QA Testing Dependencies _No response_ ### Code of Conduct - [X] I agree to follow this project's Code of Conduct
1.0
🧪QA Testing - ### Complete The Item Below - [X] I have linked all issues that will be tested for this release. ### Version Being Tested asdf ### Issues To Test _No response_ ### Relevant Information QA Testing Application: - [VelaptorTesting-v1.0.0-preview.10.zip](https://github.com/KinsonDigital/Velaptor/files/9802135/VelaptorTesting-v1.0.0-preview.10.zip) ### QA Testing Dependencies _No response_ ### Code of Conduct - [X] I agree to follow this project's Code of Conduct
non_priority
🧪qa testing complete the item below i have linked all issues that will be tested for this release version being tested asdf issues to test no response relevant information qa testing application qa testing dependencies no response code of conduct i agree to follow this project s code of conduct
0
72,709
24,251,796,334
IssuesEvent
2022-09-27 14:42:01
matrix-org/synapse
https://api.github.com/repos/matrix-org/synapse
closed
'Cropped' thumbnails undershoot rather than overshoot the requested size (SYN-505)
A-Media-Repository T-Defect
Submitted by @&#8203;matthew:matrix.org (Imported from https://matrix.org/jira/browse/SYN-505)
1.0
'Cropped' thumbnails undershoot rather than overshoot the requested size (SYN-505) - Submitted by @&#8203;matthew:matrix.org (Imported from https://matrix.org/jira/browse/SYN-505)
non_priority
cropped thumbnails undershoot rather than overshoot the requested size syn submitted by matthew matrix org imported from
0
249,076
26,884,614,931
IssuesEvent
2023-02-06 01:12:43
nidhi7598/linux-3.0.35_CVE-2018-13405
https://api.github.com/repos/nidhi7598/linux-3.0.35_CVE-2018-13405
opened
CVE-2021-45868 (Medium) detected in linux-stable-rtv3.8.6
security vulnerability
## CVE-2021-45868 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-stable-rtv3.8.6</b></p></summary> <p> <p>Julia Cartwright's fork of linux-stable-rt.git</p> <p>Library home page: <a href=https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git>https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (3)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/fs/quota/quota_tree.c</b> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/fs/quota/quota_tree.c</b> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/fs/quota/quota_tree.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In the Linux kernel before 5.15.3, fs/quota/quota_tree.c does not validate the block number in the quota tree (on disk). This can, for example, lead to a kernel/locking/rwsem.c use-after-free if there is a corrupted quota file. <p>Publish Date: 2022-03-18 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-45868>CVE-2021-45868</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.linuxkernelcves.com/cves/CVE-2021-45868">https://www.linuxkernelcves.com/cves/CVE-2021-45868</a></p> <p>Release Date: 2022-03-18</p> <p>Fix Resolution: v4.4.293,v4.9.291,v4.14.256,v4.19.218,v5.4.160,v5.10.80,v5.14.19,v5.15.3</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2021-45868 (Medium) detected in linux-stable-rtv3.8.6 - ## CVE-2021-45868 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-stable-rtv3.8.6</b></p></summary> <p> <p>Julia Cartwright's fork of linux-stable-rt.git</p> <p>Library home page: <a href=https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git>https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (3)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/fs/quota/quota_tree.c</b> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/fs/quota/quota_tree.c</b> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/fs/quota/quota_tree.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In the Linux kernel before 5.15.3, fs/quota/quota_tree.c does not validate the block number in the quota tree (on disk). This can, for example, lead to a kernel/locking/rwsem.c use-after-free if there is a corrupted quota file. <p>Publish Date: 2022-03-18 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-45868>CVE-2021-45868</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.linuxkernelcves.com/cves/CVE-2021-45868">https://www.linuxkernelcves.com/cves/CVE-2021-45868</a></p> <p>Release Date: 2022-03-18</p> <p>Fix Resolution: v4.4.293,v4.9.291,v4.14.256,v4.19.218,v5.4.160,v5.10.80,v5.14.19,v5.15.3</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in linux stable cve medium severity vulnerability vulnerable library linux stable julia cartwright s fork of linux stable rt git library home page a href found in base branch master vulnerable source files fs quota quota tree c fs quota quota tree c fs quota quota tree c vulnerability details in the linux kernel before fs quota quota tree c does not validate the block number in the quota tree on disk this can for example lead to a kernel locking rwsem c use after free if there is a corrupted quota file publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend
0
400,423
27,284,247,119
IssuesEvent
2023-02-23 12:22:06
tauri-apps/tauri-docs
https://api.github.com/repos/tauri-apps/tauri-docs
closed
[docs] Method for debugging in IntelliJ
type: documentation
I see in the documents there some method to debug with breakpoints in VSCode, however, I do not see anything regarding IntelliJ or CLion. Is there a well known method for running tauri in debug mode within IntelliJ using their configurations? I am at a point now where this is greatly needed over println everywhere.
1.0
[docs] Method for debugging in IntelliJ - I see in the documents there some method to debug with breakpoints in VSCode, however, I do not see anything regarding IntelliJ or CLion. Is there a well known method for running tauri in debug mode within IntelliJ using their configurations? I am at a point now where this is greatly needed over println everywhere.
non_priority
method for debugging in intellij i see in the documents there some method to debug with breakpoints in vscode however i do not see anything regarding intellij or clion is there a well known method for running tauri in debug mode within intellij using their configurations i am at a point now where this is greatly needed over println everywhere
0
83,185
7,867,662,022
IssuesEvent
2018-06-23 11:43:50
CodeWarriorsOrganization/CodeWarriorsFinalYearProject
https://api.github.com/repos/CodeWarriorsOrganization/CodeWarriorsFinalYearProject
closed
CW0013/T0013.5 - Create Test Cases (Priority 2)
test cases
### User Story : > AS a player, > I NEED the game to contain at least 3 players ### Task : > **Create Test Cases**
1.0
CW0013/T0013.5 - Create Test Cases (Priority 2) - ### User Story : > AS a player, > I NEED the game to contain at least 3 players ### Task : > **Create Test Cases**
non_priority
create test cases priority user story as a player i need the game to contain at least players task create test cases
0
55,162
6,890,326,526
IssuesEvent
2017-11-22 13:39:43
Microsoft/WSL
https://api.github.com/repos/Microsoft/WSL
closed
Unable to install extra packages on Bash
bydesign
I have been following this documentation in order to install Docker on Bash: https://docs.docker.com/engine/installation/linux/docker-ce/ubuntu/#uninstall-old-versions When I get to the step that asks me to install the extra packages: `sudo apt-get install linux-image-extra-$(uname -r) linux-image-extra-virtual` it says: ``` Reading package lists... Done Building dependency tree Reading state information... Done E: Unable to locate package linux-image-extra-4.4.0-43-Microsoft E: Couldn't find any package by regex 'linux-image-extra-4.4.0-43-Microsoft' ```
1.0
Unable to install extra packages on Bash - I have been following this documentation in order to install Docker on Bash: https://docs.docker.com/engine/installation/linux/docker-ce/ubuntu/#uninstall-old-versions When I get to the step that asks me to install the extra packages: `sudo apt-get install linux-image-extra-$(uname -r) linux-image-extra-virtual` it says: ``` Reading package lists... Done Building dependency tree Reading state information... Done E: Unable to locate package linux-image-extra-4.4.0-43-Microsoft E: Couldn't find any package by regex 'linux-image-extra-4.4.0-43-Microsoft' ```
non_priority
unable to install extra packages on bash i have been following this documentation in order to install docker on bash when i get to the step that asks me to install the extra packages sudo apt get install linux image extra uname r linux image extra virtual it says reading package lists done building dependency tree reading state information done e unable to locate package linux image extra microsoft e couldn t find any package by regex linux image extra microsoft
0
260,510
22,627,014,267
IssuesEvent
2022-06-30 11:36:52
mozilla-mobile/fenix
https://api.github.com/repos/mozilla-mobile/fenix
opened
Intermittent UI test failure - < BookmarksTest.multipleBookmarkDeletionsTest>
b:crash eng:intermittent-test eng:ui-test
### Firebase Test Run: [Firebase link](https://console.firebase.google.com/u/0/project/moz-fenix/testlab/histories/bh.66b7091e15d53d45/matrices/8385706074016920331/executions/bs.82e8a2f7d51fa3da/test-cases) ### Stacktrace: 06-29 11:14:58.920: I/ActivityManager(478): Process org.mozilla.fenix.debug:gpu (pid 12247) has died: fg BTOP 06-29 11:14:58.921: W/ActivityManager(478): Scheduling restart of crashed service org.mozilla.fenix.debug/org.mozilla.gecko.process.GeckoChildProcessServices$gpu in 1000ms for connection 06-29 11:14:58.923: I/libprocessgroup(478): Successfully killed process cgroup uid 10152 pid 12247 in 0ms 06-29 11:14:58.926: W/audio_hw_generic(1861): Hardware backing HAL too slow, could only write 0 of 661 frames 06-29 11:14:58.959: W/WindowManager(478): removeWindowToken: Attempted to remove non-existing token: android.os.Binder@406d831 06-29 11:14:58.959: I/WindowManager(478): WIN DEATH: Window{56c5020 u0 org.mozilla.fenix.debug/org.mozilla.fenix.HomeActivity} 06-29 11:14:58.941: I/chatty(1861): uid=1041(audioserver) writer identical 1 line 06-29 11:14:58.956: W/audio_hw_generic(1861): Hardware backing HAL too slow, could only write 0 of 661 frames 06-29 11:14:58.960: W/InputDispatcher(478): Attempted to unregister already unregistered input channel '56c5020 org.mozilla.fenix.debug/org.mozilla.fenix.HomeActivity (server)' 06-29 11:14:58.963: I/ActivityManager(478): Process org.mozilla.fenix.debug (pid 11601) has died: fg TOP 06-29 11:14:58.963: I/libprocessgroup(478): Successfully killed process cgroup uid 10152 pid 11601 in 0ms 06-29 11:14:58.971: W/audio_hw_generic(1861): Hardware backing HAL too slow, could only write 0 of 661 frames 06-29 11:14:58.976: W/ActivityTaskManager(478): Force removing ActivityRecord{7f41295 u0 org.mozilla.fenix.debug/org.mozilla.fenix.HomeActivity t9}: app died, no saved state 06-29 11:14:58.978: W/ActivityManager(478): Crash of app org.mozilla.fenix.debug running instrumentation ComponentInfo{org.mozilla.fenix.debug.test/androidx.test.runner.AndroidJUnitRunner} 06-29 11:14:58.983: I/ActivityManager(478): Force stopping org.mozilla.fenix.debug appid=10152 user=0: finished inst 06-29 11:14:58.984: I/ActivityManager(478): Killing 12032:org.mozilla.fenix.debug:tab20/u0a152 (adj 0): stop org.mozilla.fenix.debug due to finished inst 06-29 11:14:58.985: W/Binder(11539): Caught a RuntimeException from the binder stub implementation. 06-29 11:14:58.985: W/Binder(11539): java.lang.SecurityException: Calling from not trusted UID! 06-29 11:14:58.985: W/Binder(11539): at android.app.UiAutomationConnection.throwIfCalledByNotTrustedUidLocked(UiAutomationConnection.java:525) 06-29 11:14:58.985: W/Binder(11539): at android.app.UiAutomationConnection.shutdown(UiAutomationConnection.java:429) 06-29 11:14:58.985: W/Binder(11539): at android.app.IUiAutomationConnection$Stub.onTransact(IUiAutomationConnection.java:390) 06-29 11:14:58.985: W/Binder(11539): at android.os.Binder.execTransactInternal(Binder.java:1159) 06-29 11:14:58.985: W/Binder(11539): at android.os.Binder.execTransact(Binder.java:1123) 06-29 11:14:58.985: I/WindowManager(478): Force finishing activity ActivityRecord{7f41295 u0 org.mozilla.fenix.debug/org.mozilla.fenix.HomeActivity t9 f} isExiting} 06-29 11:14:58.985: W/ActivityTaskManager(478): Duplicate finish request for r=ActivityRecord{7f41295 u0 org.mozilla.fenix.debug/org.mozilla.fenix.HomeActivity t9 f} isExiting} 06-29 11:14:58.986: W/audio_hw_generic(1861): Hardware backing HAL too slow, could only write 0 of 661 frames 06-29 11:14:58.999: W/WindowManager(478): Cannot find window which accessibility connection is added to 06-29 11:14:59.007: W/ActivityManager(478): setHasOverlayUi called on unknown pid: 11601 06-29 11:14:59.001: W/audio_hw_generic(1861): Hardware backing HAL too slow, could only write 0 of 661 frames 06-29 11:14:59.013: I/BackdropActivity(10696): onResume() 06-29 11:14:59.015: I/ActivityTaskManager(478): Activity requesting to dismiss Keyguard: ActivityRecord{6711e55 u0 com.google.android.apps.mtaas.backdrop/.BackdropActivity t8} 06-29 11:14:59.016: W/audio_hw_generic(1861): Hardware backing HAL too slow, could only write 0 of 661 frames 06-29 11:14:59.019: D/AndroidRuntime(11539): Shutting down VM ### Build: 6/29 Main ### Notes: Similar with #24047
2.0
Intermittent UI test failure - < BookmarksTest.multipleBookmarkDeletionsTest> - ### Firebase Test Run: [Firebase link](https://console.firebase.google.com/u/0/project/moz-fenix/testlab/histories/bh.66b7091e15d53d45/matrices/8385706074016920331/executions/bs.82e8a2f7d51fa3da/test-cases) ### Stacktrace: 06-29 11:14:58.920: I/ActivityManager(478): Process org.mozilla.fenix.debug:gpu (pid 12247) has died: fg BTOP 06-29 11:14:58.921: W/ActivityManager(478): Scheduling restart of crashed service org.mozilla.fenix.debug/org.mozilla.gecko.process.GeckoChildProcessServices$gpu in 1000ms for connection 06-29 11:14:58.923: I/libprocessgroup(478): Successfully killed process cgroup uid 10152 pid 12247 in 0ms 06-29 11:14:58.926: W/audio_hw_generic(1861): Hardware backing HAL too slow, could only write 0 of 661 frames 06-29 11:14:58.959: W/WindowManager(478): removeWindowToken: Attempted to remove non-existing token: android.os.Binder@406d831 06-29 11:14:58.959: I/WindowManager(478): WIN DEATH: Window{56c5020 u0 org.mozilla.fenix.debug/org.mozilla.fenix.HomeActivity} 06-29 11:14:58.941: I/chatty(1861): uid=1041(audioserver) writer identical 1 line 06-29 11:14:58.956: W/audio_hw_generic(1861): Hardware backing HAL too slow, could only write 0 of 661 frames 06-29 11:14:58.960: W/InputDispatcher(478): Attempted to unregister already unregistered input channel '56c5020 org.mozilla.fenix.debug/org.mozilla.fenix.HomeActivity (server)' 06-29 11:14:58.963: I/ActivityManager(478): Process org.mozilla.fenix.debug (pid 11601) has died: fg TOP 06-29 11:14:58.963: I/libprocessgroup(478): Successfully killed process cgroup uid 10152 pid 11601 in 0ms 06-29 11:14:58.971: W/audio_hw_generic(1861): Hardware backing HAL too slow, could only write 0 of 661 frames 06-29 11:14:58.976: W/ActivityTaskManager(478): Force removing ActivityRecord{7f41295 u0 org.mozilla.fenix.debug/org.mozilla.fenix.HomeActivity t9}: app died, no saved state 06-29 11:14:58.978: W/ActivityManager(478): Crash of app org.mozilla.fenix.debug running instrumentation ComponentInfo{org.mozilla.fenix.debug.test/androidx.test.runner.AndroidJUnitRunner} 06-29 11:14:58.983: I/ActivityManager(478): Force stopping org.mozilla.fenix.debug appid=10152 user=0: finished inst 06-29 11:14:58.984: I/ActivityManager(478): Killing 12032:org.mozilla.fenix.debug:tab20/u0a152 (adj 0): stop org.mozilla.fenix.debug due to finished inst 06-29 11:14:58.985: W/Binder(11539): Caught a RuntimeException from the binder stub implementation. 06-29 11:14:58.985: W/Binder(11539): java.lang.SecurityException: Calling from not trusted UID! 06-29 11:14:58.985: W/Binder(11539): at android.app.UiAutomationConnection.throwIfCalledByNotTrustedUidLocked(UiAutomationConnection.java:525) 06-29 11:14:58.985: W/Binder(11539): at android.app.UiAutomationConnection.shutdown(UiAutomationConnection.java:429) 06-29 11:14:58.985: W/Binder(11539): at android.app.IUiAutomationConnection$Stub.onTransact(IUiAutomationConnection.java:390) 06-29 11:14:58.985: W/Binder(11539): at android.os.Binder.execTransactInternal(Binder.java:1159) 06-29 11:14:58.985: W/Binder(11539): at android.os.Binder.execTransact(Binder.java:1123) 06-29 11:14:58.985: I/WindowManager(478): Force finishing activity ActivityRecord{7f41295 u0 org.mozilla.fenix.debug/org.mozilla.fenix.HomeActivity t9 f} isExiting} 06-29 11:14:58.985: W/ActivityTaskManager(478): Duplicate finish request for r=ActivityRecord{7f41295 u0 org.mozilla.fenix.debug/org.mozilla.fenix.HomeActivity t9 f} isExiting} 06-29 11:14:58.986: W/audio_hw_generic(1861): Hardware backing HAL too slow, could only write 0 of 661 frames 06-29 11:14:58.999: W/WindowManager(478): Cannot find window which accessibility connection is added to 06-29 11:14:59.007: W/ActivityManager(478): setHasOverlayUi called on unknown pid: 11601 06-29 11:14:59.001: W/audio_hw_generic(1861): Hardware backing HAL too slow, could only write 0 of 661 frames 06-29 11:14:59.013: I/BackdropActivity(10696): onResume() 06-29 11:14:59.015: I/ActivityTaskManager(478): Activity requesting to dismiss Keyguard: ActivityRecord{6711e55 u0 com.google.android.apps.mtaas.backdrop/.BackdropActivity t8} 06-29 11:14:59.016: W/audio_hw_generic(1861): Hardware backing HAL too slow, could only write 0 of 661 frames 06-29 11:14:59.019: D/AndroidRuntime(11539): Shutting down VM ### Build: 6/29 Main ### Notes: Similar with #24047
non_priority
intermittent ui test failure firebase test run stacktrace i activitymanager process org mozilla fenix debug gpu pid has died fg btop w activitymanager scheduling restart of crashed service org mozilla fenix debug org mozilla gecko process geckochildprocessservices gpu in for connection i libprocessgroup successfully killed process cgroup uid pid in w audio hw generic hardware backing hal too slow could only write of frames w windowmanager removewindowtoken attempted to remove non existing token android os binder i windowmanager win death window org mozilla fenix debug org mozilla fenix homeactivity i chatty uid audioserver writer identical line w audio hw generic hardware backing hal too slow could only write of frames w inputdispatcher attempted to unregister already unregistered input channel org mozilla fenix debug org mozilla fenix homeactivity server i activitymanager process org mozilla fenix debug pid has died fg top i libprocessgroup successfully killed process cgroup uid pid in w audio hw generic hardware backing hal too slow could only write of frames w activitytaskmanager force removing activityrecord org mozilla fenix debug org mozilla fenix homeactivity app died no saved state w activitymanager crash of app org mozilla fenix debug running instrumentation componentinfo org mozilla fenix debug test androidx test runner androidjunitrunner i activitymanager force stopping org mozilla fenix debug appid user finished inst i activitymanager killing org mozilla fenix debug adj stop org mozilla fenix debug due to finished inst w binder caught a runtimeexception from the binder stub implementation w binder java lang securityexception calling from not trusted uid w binder at android app uiautomationconnection throwifcalledbynottrusteduidlocked uiautomationconnection java w binder at android app uiautomationconnection shutdown uiautomationconnection java w binder at android app iuiautomationconnection stub ontransact iuiautomationconnection java w binder at android os binder exectransactinternal binder java w binder at android os binder exectransact binder java i windowmanager force finishing activity activityrecord org mozilla fenix debug org mozilla fenix homeactivity f isexiting w activitytaskmanager duplicate finish request for r activityrecord org mozilla fenix debug org mozilla fenix homeactivity f isexiting w audio hw generic hardware backing hal too slow could only write of frames w windowmanager cannot find window which accessibility connection is added to w activitymanager sethasoverlayui called on unknown pid w audio hw generic hardware backing hal too slow could only write of frames i backdropactivity onresume i activitytaskmanager activity requesting to dismiss keyguard activityrecord com google android apps mtaas backdrop backdropactivity w audio hw generic hardware backing hal too slow could only write of frames d androidruntime shutting down vm build main notes similar with
0
64,831
18,943,027,011
IssuesEvent
2021-11-18 06:43:45
vector-im/element-web
https://api.github.com/repos/vector-im/element-web
closed
Composer keyboard focus is easily lost
T-Defect
### Steps to reproduce I've noticed that recently I start and try typing in element-desktop (not sure if that's any different in web :shrug: ) the cursor is never inside the composer when I expect it to. This probably happened about 100 times today. This is happening when clicking the "down to bottom"-arrow button, even when the composer was focused before. It's also happening when clicking on random non-clickable areas in the timeline. Some more notes here: * It seems like previously hitting any non-shortcut key would focus the composer: https://github.com/vector-im/element-web/issues/5775#issuecomment-613354924 This definitely isn't happening anymore * Trying to use tab to get the cursor back into the input field is not working. It keeps cycling through items in the timeline, potentially way offscreen where you last were, resetting your scroll-position. ### Outcome #### What did you expect? I would like to be able to type messages at pretty much all times. #### What happened instead? The cursor is almost never in the input field. ### Operating system Arch Linux ### Application version 1.9.4 ### How did you install the app? archlinux-package ### Homeserver bubu1.eu ### Will you send logs? No
1.0
Composer keyboard focus is easily lost - ### Steps to reproduce I've noticed that recently I start and try typing in element-desktop (not sure if that's any different in web :shrug: ) the cursor is never inside the composer when I expect it to. This probably happened about 100 times today. This is happening when clicking the "down to bottom"-arrow button, even when the composer was focused before. It's also happening when clicking on random non-clickable areas in the timeline. Some more notes here: * It seems like previously hitting any non-shortcut key would focus the composer: https://github.com/vector-im/element-web/issues/5775#issuecomment-613354924 This definitely isn't happening anymore * Trying to use tab to get the cursor back into the input field is not working. It keeps cycling through items in the timeline, potentially way offscreen where you last were, resetting your scroll-position. ### Outcome #### What did you expect? I would like to be able to type messages at pretty much all times. #### What happened instead? The cursor is almost never in the input field. ### Operating system Arch Linux ### Application version 1.9.4 ### How did you install the app? archlinux-package ### Homeserver bubu1.eu ### Will you send logs? No
non_priority
composer keyboard focus is easily lost steps to reproduce i ve noticed that recently i start and try typing in element desktop not sure if that s any different in web shrug the cursor is never inside the composer when i expect it to this probably happened about times today this is happening when clicking the down to bottom arrow button even when the composer was focused before it s also happening when clicking on random non clickable areas in the timeline some more notes here it seems like previously hitting any non shortcut key would focus the composer this definitely isn t happening anymore trying to use tab to get the cursor back into the input field is not working it keeps cycling through items in the timeline potentially way offscreen where you last were resetting your scroll position outcome what did you expect i would like to be able to type messages at pretty much all times what happened instead the cursor is almost never in the input field operating system arch linux application version how did you install the app archlinux package homeserver eu will you send logs no
0
314,426
23,521,470,617
IssuesEvent
2022-08-19 06:29:46
ETTSU-StarTail/shapeshifter
https://api.github.com/repos/ETTSU-StarTail/shapeshifter
opened
[TASK]: 移行プロジェクトの詳細実装
documentation enhancement
**タスクの意図** 移行プロジェクトの詳細表示を実装 **注意** ドキュメント作成なら documentation タグのみを、機能作成・追加・改修であるなら enhancement タグのみを付ける。
1.0
[TASK]: 移行プロジェクトの詳細実装 - **タスクの意図** 移行プロジェクトの詳細表示を実装 **注意** ドキュメント作成なら documentation タグのみを、機能作成・追加・改修であるなら enhancement タグのみを付ける。
non_priority
移行プロジェクトの詳細実装 タスクの意図 移行プロジェクトの詳細表示を実装 注意 ドキュメント作成なら documentation タグのみを、機能作成・追加・改修であるなら enhancement タグのみを付ける。
0
224,767
17,774,101,258
IssuesEvent
2021-08-30 16:54:49
ignitionrobotics/ign-gazebo
https://api.github.com/repos/ignitionrobotics/ign-gazebo
closed
New thermal camera test failure for Edifice
bug tests
<!-- If you're not sure whether your problem is a bug, please ask a question at http://answers.gazebosim.org instead.--> ## Environment * OS Version: Ubuntu 18.04 * Source or binary build? Source, commit https://github.com/ignitionrobotics/ign-gazebo/commit/6c91ff9e8e99e439307dfbd32607c5ab20f329d9 ## Description * Expected behavior: The `INTEGRATION_thermal_sensor_system` test (`ThermalSensorTest.ThermalSensorSystemInvalidConfig`) should pass * Actual behavior: The test fails ## Steps to reproduce <!-- Provide steps so we can try to reproduce this issue --> 1. Clone the repo: `git clone https://github.com/ignitionrobotics/ign-gazebo.git` 2. Complete the build so that tests are available: ``` cd ign-gazebo mkdir build cd build cmake .. make ``` 3. Run the thermal sensor integration test: ``` # the following steps assume you are already in the ign-rendering/build directory cd bin ./INTEGRATION_thermal_sensor_system ``` ## Output ``` [Msg] Setting ambient temperature to 310 Kelvin and gradient to -0.0065 K/m. The resulting temperature range is: 0.750384 Kelvin. [Wrn] [RenderUtil.cc:1048] Unable to set thermal camera temperature linear resolution. Value must be greater than 0. Using the default value: 3. [Wrn] [RenderUtil.cc:1061] Unable to set thermal camera temperature range.Max temperature must be greater or equal to min. Using the default values : [-inf, inf]. /home/addisu/ws/edifice/src/ign-gazebo/test/integration/thermal_sensor_system.cc:197: Failure Value of: received Actual: false Expected: true /home/addisu/ws/edifice/src/ign-gazebo/test/integration/thermal_sensor_system.cc:198: Failure Expected: (nullptr) != (g_image), actual: (nullptr) vs NULL [Dbg] [Sensors.cc:309] SensorsPrivate::Stop [Dbg] [Sensors.cc:295] SensorsPrivate::RenderThread stopped [Dbg] [SimulationRunner.cc:499] Exiting postupdate worker thread (1) [Dbg] [SimulationRunner.cc:499] Exiting postupdate worker thread (2) [Dbg] [SimulationRunner.cc:499] Exiting postupdate worker thread (0) [Dbg] [Sensors.cc:309] SensorsPrivate::Stop [ FAILED ] ThermalSensorTest.ThermalSensorSystemInvalidConfig (3176 ms) ```
1.0
New thermal camera test failure for Edifice - <!-- If you're not sure whether your problem is a bug, please ask a question at http://answers.gazebosim.org instead.--> ## Environment * OS Version: Ubuntu 18.04 * Source or binary build? Source, commit https://github.com/ignitionrobotics/ign-gazebo/commit/6c91ff9e8e99e439307dfbd32607c5ab20f329d9 ## Description * Expected behavior: The `INTEGRATION_thermal_sensor_system` test (`ThermalSensorTest.ThermalSensorSystemInvalidConfig`) should pass * Actual behavior: The test fails ## Steps to reproduce <!-- Provide steps so we can try to reproduce this issue --> 1. Clone the repo: `git clone https://github.com/ignitionrobotics/ign-gazebo.git` 2. Complete the build so that tests are available: ``` cd ign-gazebo mkdir build cd build cmake .. make ``` 3. Run the thermal sensor integration test: ``` # the following steps assume you are already in the ign-rendering/build directory cd bin ./INTEGRATION_thermal_sensor_system ``` ## Output ``` [Msg] Setting ambient temperature to 310 Kelvin and gradient to -0.0065 K/m. The resulting temperature range is: 0.750384 Kelvin. [Wrn] [RenderUtil.cc:1048] Unable to set thermal camera temperature linear resolution. Value must be greater than 0. Using the default value: 3. [Wrn] [RenderUtil.cc:1061] Unable to set thermal camera temperature range.Max temperature must be greater or equal to min. Using the default values : [-inf, inf]. /home/addisu/ws/edifice/src/ign-gazebo/test/integration/thermal_sensor_system.cc:197: Failure Value of: received Actual: false Expected: true /home/addisu/ws/edifice/src/ign-gazebo/test/integration/thermal_sensor_system.cc:198: Failure Expected: (nullptr) != (g_image), actual: (nullptr) vs NULL [Dbg] [Sensors.cc:309] SensorsPrivate::Stop [Dbg] [Sensors.cc:295] SensorsPrivate::RenderThread stopped [Dbg] [SimulationRunner.cc:499] Exiting postupdate worker thread (1) [Dbg] [SimulationRunner.cc:499] Exiting postupdate worker thread (2) [Dbg] [SimulationRunner.cc:499] Exiting postupdate worker thread (0) [Dbg] [Sensors.cc:309] SensorsPrivate::Stop [ FAILED ] ThermalSensorTest.ThermalSensorSystemInvalidConfig (3176 ms) ```
non_priority
new thermal camera test failure for edifice if you re not sure whether your problem is a bug please ask a question at instead environment os version ubuntu source or binary build source commit description expected behavior the integration thermal sensor system test thermalsensortest thermalsensorsysteminvalidconfig should pass actual behavior the test fails steps to reproduce clone the repo git clone complete the build so that tests are available cd ign gazebo mkdir build cd build cmake make run the thermal sensor integration test the following steps assume you are already in the ign rendering build directory cd bin integration thermal sensor system output setting ambient temperature to kelvin and gradient to k m the resulting temperature range is kelvin unable to set thermal camera temperature linear resolution value must be greater than using the default value unable to set thermal camera temperature range max temperature must be greater or equal to min using the default values home addisu ws edifice src ign gazebo test integration thermal sensor system cc failure value of received actual false expected true home addisu ws edifice src ign gazebo test integration thermal sensor system cc failure expected nullptr g image actual nullptr vs null sensorsprivate stop sensorsprivate renderthread stopped exiting postupdate worker thread exiting postupdate worker thread exiting postupdate worker thread sensorsprivate stop thermalsensortest thermalsensorsysteminvalidconfig ms
0
129,976
12,421,501,630
IssuesEvent
2020-05-23 17:09:59
WassimBenzarti/colab-ssh-connector
https://api.github.com/repos/WassimBenzarti/colab-ssh-connector
closed
Spurious IndexError
documentation
Occasionally I'm getting this IndexError when running `launch_ssh('<secret>', '<secret>') /usr/local/lib/python3.6/dist-packages/colab_ssh/launch_ssh.py in launch_ssh(token, password, publish) 47 publish_host(info[0].decode().strip()) 48 ---> 49 if info[0]: 50 # Extract the host and port 51 host_and_port = re.match(r'.*://(.*):(\d+)\n', info[0].decode()) IndexError: list index out of range
1.0
Spurious IndexError - Occasionally I'm getting this IndexError when running `launch_ssh('<secret>', '<secret>') /usr/local/lib/python3.6/dist-packages/colab_ssh/launch_ssh.py in launch_ssh(token, password, publish) 47 publish_host(info[0].decode().strip()) 48 ---> 49 if info[0]: 50 # Extract the host and port 51 host_and_port = re.match(r'.*://(.*):(\d+)\n', info[0].decode()) IndexError: list index out of range
non_priority
spurious indexerror occasionally i m getting this indexerror when running launch ssh usr local lib dist packages colab ssh launch ssh py in launch ssh token password publish publish host info decode strip if info extract the host and port host and port re match r d n info decode indexerror list index out of range
0
22,021
18,288,238,012
IssuesEvent
2021-10-05 12:45:35
maykinmedia/archiefvernietigingscomponent
https://api.github.com/repos/maykinmedia/archiefvernietigingscomponent
closed
Als proceseigenaar wil ik het controleren van de vernietigingslijst door een andere medewerker laten uitvoeren
proces en usability
De verwachting is dat de proceseigenaar niet zelf de controle van de te vernietigen zaken zal uitvoeren, maar dit zal willen laten doen door een medewerker van zijn afdeling/proces.
True
Als proceseigenaar wil ik het controleren van de vernietigingslijst door een andere medewerker laten uitvoeren - De verwachting is dat de proceseigenaar niet zelf de controle van de te vernietigen zaken zal uitvoeren, maar dit zal willen laten doen door een medewerker van zijn afdeling/proces.
non_priority
als proceseigenaar wil ik het controleren van de vernietigingslijst door een andere medewerker laten uitvoeren de verwachting is dat de proceseigenaar niet zelf de controle van de te vernietigen zaken zal uitvoeren maar dit zal willen laten doen door een medewerker van zijn afdeling proces
0
93,420
8,415,091,814
IssuesEvent
2018-10-13 10:50:06
sriyazahmed/fxLabsProd2UAT05Sep
https://api.github.com/repos/sriyazahmed/fxLabsProd2UAT05Sep
reopened
FxLabUATTest05sep : AccountsTC0O2CreateAccount
FxLabUATTest05sep
Project : FxLabUATTest05sep Job : UAT Env : UAT Region : FXLabs/US_WEST_1 Result : fail Status Code : 200 Headers : {X-Content-Type-Options=[nosniff], X-XSS-Protection=[1; mode=block], Cache-Control=[no-cache, no-store, max-age=0, must-revalidate], Pragma=[no-cache], Expires=[0], X-Frame-Options=[DENY], Set-Cookie=[SESSION=MDk5MGVmODAtY2JjMi00NmZlLTg4Y2MtNzM4ZjY1ZmExODJk; Path=/; HttpOnly], Content-Type=[application/json;charset=UTF-8], Transfer-Encoding=[chunked], Date=[Wed, 26 Sep 2018 10:47:17 GMT]} Endpoint : http://13.56.210.25/api/v1/accounts Request : { "org" : { }, "name" : "AccountsTC0O2CreateAccount+Johnston", "accountType" : "Git", "accessKey" : "AccountsTC0O2CreateAccount+Johnston", "secretKey" : "AccountsTC0O2CreateAccount+Johnston" } Response : { "requestId" : "None", "requestTime" : "2018-09-26T10:47:18.417+0000", "errors" : false, "messages" : [ ], "data" : { "id" : "8a808019661572000166157d809103c1", "createdBy" : "4028b881620688c001620689a3210010", "createdDate" : "2018-09-26T10:47:18.417+0000", "modifiedBy" : "4028b881620688c001620689a3210010", "modifiedDate" : "2018-09-26T10:47:18.417+0000", "version" : null, "inactive" : false, "name" : "AccountsTC0O2CreateAccount+Johnston", "region" : null, "accessKey" : "AccountsTC0O2CreateAccount+Johnston", "secretKey" : null, "org" : { "id" : "4028b881620688c001620689a3210000", "createdBy" : null, "createdDate" : null, "modifiedBy" : null, "modifiedDate" : null, "version" : null, "inactive" : false, "name" : null }, "accountType" : "Git", "prop1" : null, "prop2" : null, "prop3" : null, "allowedRegions" : null }, "totalPages" : 0, "totalElements" : 0 } Logs : Assertion [@Response.data.name == @Request.name] resolved-to [AccountsTC0O2CreateAccount+Johnston == AccountsTC0O2CreateAccount+Johnston] result [Passed]Assertion [@Response.errors == false] resolved-to [false == false] result [Passed]Assertion [@Response.data.account.id == @Request.account.id] resolved-to [ == ] result [Passed]Assertion [@Response.data.url == @Request.url] resolved-to [ == ] result [Passed]Assertion [@ResponseTime <= 1000] resolved-to [1406 <= 1000] result [Failed]Assertion [@ResponseSize <= 1024] resolved-to [767 <= 1024] result [Passed]Assertion [@StatusCode == 200] resolved-to [200 == 200] result [Passed] --- FX Bot ---
1.0
FxLabUATTest05sep : AccountsTC0O2CreateAccount - Project : FxLabUATTest05sep Job : UAT Env : UAT Region : FXLabs/US_WEST_1 Result : fail Status Code : 200 Headers : {X-Content-Type-Options=[nosniff], X-XSS-Protection=[1; mode=block], Cache-Control=[no-cache, no-store, max-age=0, must-revalidate], Pragma=[no-cache], Expires=[0], X-Frame-Options=[DENY], Set-Cookie=[SESSION=MDk5MGVmODAtY2JjMi00NmZlLTg4Y2MtNzM4ZjY1ZmExODJk; Path=/; HttpOnly], Content-Type=[application/json;charset=UTF-8], Transfer-Encoding=[chunked], Date=[Wed, 26 Sep 2018 10:47:17 GMT]} Endpoint : http://13.56.210.25/api/v1/accounts Request : { "org" : { }, "name" : "AccountsTC0O2CreateAccount+Johnston", "accountType" : "Git", "accessKey" : "AccountsTC0O2CreateAccount+Johnston", "secretKey" : "AccountsTC0O2CreateAccount+Johnston" } Response : { "requestId" : "None", "requestTime" : "2018-09-26T10:47:18.417+0000", "errors" : false, "messages" : [ ], "data" : { "id" : "8a808019661572000166157d809103c1", "createdBy" : "4028b881620688c001620689a3210010", "createdDate" : "2018-09-26T10:47:18.417+0000", "modifiedBy" : "4028b881620688c001620689a3210010", "modifiedDate" : "2018-09-26T10:47:18.417+0000", "version" : null, "inactive" : false, "name" : "AccountsTC0O2CreateAccount+Johnston", "region" : null, "accessKey" : "AccountsTC0O2CreateAccount+Johnston", "secretKey" : null, "org" : { "id" : "4028b881620688c001620689a3210000", "createdBy" : null, "createdDate" : null, "modifiedBy" : null, "modifiedDate" : null, "version" : null, "inactive" : false, "name" : null }, "accountType" : "Git", "prop1" : null, "prop2" : null, "prop3" : null, "allowedRegions" : null }, "totalPages" : 0, "totalElements" : 0 } Logs : Assertion [@Response.data.name == @Request.name] resolved-to [AccountsTC0O2CreateAccount+Johnston == AccountsTC0O2CreateAccount+Johnston] result [Passed]Assertion [@Response.errors == false] resolved-to [false == false] result [Passed]Assertion [@Response.data.account.id == @Request.account.id] resolved-to [ == ] result [Passed]Assertion [@Response.data.url == @Request.url] resolved-to [ == ] result [Passed]Assertion [@ResponseTime <= 1000] resolved-to [1406 <= 1000] result [Failed]Assertion [@ResponseSize <= 1024] resolved-to [767 <= 1024] result [Passed]Assertion [@StatusCode == 200] resolved-to [200 == 200] result [Passed] --- FX Bot ---
non_priority
project job uat env uat region fxlabs us west result fail status code headers x content type options x xss protection cache control pragma expires x frame options set cookie content type transfer encoding date endpoint request org name johnston accounttype git accesskey johnston secretkey johnston response requestid none requesttime errors false messages data id createdby createddate modifiedby modifieddate version null inactive false name johnston region null accesskey johnston secretkey null org id createdby null createddate null modifiedby null modifieddate null version null inactive false name null accounttype git null null null allowedregions null totalpages totalelements logs assertion resolved to result assertion resolved to result assertion resolved to result assertion resolved to result assertion resolved to result assertion resolved to result assertion resolved to result fx bot
0
97,381
8,653,074,581
IssuesEvent
2018-11-27 09:53:34
humera987/FXLabs-Test-Automation
https://api.github.com/repos/humera987/FXLabs-Test-Automation
reopened
new tested 27 : ApiV1JobsGetQueryParamPagesizeEmptyValue
new tested 27
Project : new tested 27 Job : UAT Env : UAT Region : US_WEST Result : fail Status Code : 404 Headers : {X-Content-Type-Options=[nosniff], X-XSS-Protection=[1; mode=block], Cache-Control=[no-cache, no-store, max-age=0, must-revalidate], Pragma=[no-cache], Expires=[0], X-Frame-Options=[DENY], Set-Cookie=[SESSION=YzA4YmE0M2EtOTBjNi00NzcxLWFmMjctZWI2MTEwMDM5OTM2; Path=/; HttpOnly], Content-Type=[application/json;charset=UTF-8], Transfer-Encoding=[chunked], Date=[Tue, 27 Nov 2018 09:50:59 GMT]} Endpoint : http://13.56.210.25/api/v1/api/v1/jobs?pageSize= Request : Response : { "timestamp" : "2018-11-27T09:50:59.858+0000", "status" : 404, "error" : "Not Found", "message" : "No message available", "path" : "/api/v1/api/v1/jobs" } Logs : Assertion [@StatusCode != 401] resolved-to [404 != 401] result [Passed]Assertion [@StatusCode != 500] resolved-to [404 != 500] result [Passed]Assertion [@StatusCode != 404] resolved-to [404 != 404] result [Failed]Assertion [@StatusCode != 200] resolved-to [404 != 200] result [Passed] --- FX Bot ---
1.0
new tested 27 : ApiV1JobsGetQueryParamPagesizeEmptyValue - Project : new tested 27 Job : UAT Env : UAT Region : US_WEST Result : fail Status Code : 404 Headers : {X-Content-Type-Options=[nosniff], X-XSS-Protection=[1; mode=block], Cache-Control=[no-cache, no-store, max-age=0, must-revalidate], Pragma=[no-cache], Expires=[0], X-Frame-Options=[DENY], Set-Cookie=[SESSION=YzA4YmE0M2EtOTBjNi00NzcxLWFmMjctZWI2MTEwMDM5OTM2; Path=/; HttpOnly], Content-Type=[application/json;charset=UTF-8], Transfer-Encoding=[chunked], Date=[Tue, 27 Nov 2018 09:50:59 GMT]} Endpoint : http://13.56.210.25/api/v1/api/v1/jobs?pageSize= Request : Response : { "timestamp" : "2018-11-27T09:50:59.858+0000", "status" : 404, "error" : "Not Found", "message" : "No message available", "path" : "/api/v1/api/v1/jobs" } Logs : Assertion [@StatusCode != 401] resolved-to [404 != 401] result [Passed]Assertion [@StatusCode != 500] resolved-to [404 != 500] result [Passed]Assertion [@StatusCode != 404] resolved-to [404 != 404] result [Failed]Assertion [@StatusCode != 200] resolved-to [404 != 200] result [Passed] --- FX Bot ---
non_priority
new tested project new tested job uat env uat region us west result fail status code headers x content type options x xss protection cache control pragma expires x frame options set cookie content type transfer encoding date endpoint request response timestamp status error not found message no message available path api api jobs logs assertion resolved to result assertion resolved to result assertion resolved to result assertion resolved to result fx bot
0
145,765
11,706,901,936
IssuesEvent
2020-03-08 01:46:23
QubesOS/updates-status
https://api.github.com/repos/QubesOS/updates-status
closed
linux-kernel v5.4.21-1 (r4.1)
r4.1-dom0-cur-test
Update of linux-kernel to v5.4.21-1 for Qubes r4.1, see comments below for details. Built from: https://github.com/QubesOS/qubes-linux-kernel/commit/ea8d8f46bb86ff6d4e4a24ff8cc0856bd765d13a [Changes since previous version](https://github.com/QubesOS/qubes-linux-kernel/compare/v4.19.100-1...v5.4.21-1): QubesOS/qubes-linux-kernel@ea8d8f4 Update to kernel-5.4.21 QubesOS/qubes-linux-kernel@d03bb55 Increase modules.img sparse size QubesOS/qubes-linux-kernel@a776d31 get-latest-config: use keys under builder-rpm QubesOS/qubes-linux-kernel@b065f33 Drop -latest suffix for LTS kernel QubesOS/qubes-linux-kernel@af7128d Update to kernel-5.4.5 QubesOS/qubes-linux-kernel@b5170f8 update WireGuard from 20191212 to 20191219 QubesOS/qubes-linux-kernel@1252f79 Update to kernel-5.4.3 QubesOS/qubes-linux-kernel@9f28598 update WireGuard from 20191127 to 20191212 QubesOS/qubes-linux-kernel@1554c07 Add BR: python3-devel for pathfix.py script QubesOS/qubes-linux-kernel@8ee5779 Update to kernel-5.4.2 QubesOS/qubes-linux-kernel@366e681 get latest config: exit with clean and disable getting rc by default QubesOS/qubes-linux-kernel@f841402 Merge remote-tracking branch 'origin/pr/128' QubesOS/qubes-linux-kernel@8aca753 (re-)sign all the modules after processing debuginfo QubesOS/qubes-linux-kernel@a5e7326 update WireGuard from 20191012 to 20191127 QubesOS/qubes-linux-kernel@5d68948 version 5.4.1-2 QubesOS/qubes-linux-kernel@1cc6951 config-qubes: allow signed modules as Fedora set it QubesOS/qubes-linux-kernel@22b6866 Update to version 5.4.1 QubesOS/qubes-linux-kernel@7b1c020 Update Fedora keys for config updater script (add 32, remove 30 and 31) QubesOS/qubes-linux-kernel@9fc4062 Merge remote-tracking branch 'origin/pr/119' QubesOS/qubes-linux-kernel@fb9b485 spec: mangle /usr/bin/python shebangs to /usr/bin/python3 QubesOS/qubes-linux-kernel@ddf7602 Update to kernel-5.3.12 QubesOS/qubes-linux-kernel@18d5d66 Update to kernel-5.3.11 QubesOS/qubes-linux-kernel@ea53bfe Merge remote-tracking branch 'origin/pr/113' QubesOS/qubes-linux-kernel@71964cd Update to kernel-5.3.9 QubesOS/qubes-linux-kernel@cddf334 update WireGuard from 20190913 to 20191012 QubesOS/qubes-linux-kernel@beccd92 Update to kernel-5.3.8 QubesOS/qubes-linux-kernel@17b7186 Make makefile and spec compatible with rc versions QubesOS/qubes-linux-kernel@24ee349 Add Linus's signing key QubesOS/qubes-linux-kernel@87ba67c Update to kernel-5.3.7 QubesOS/qubes-linux-kernel@9cf5108 Update to kernel-5.3.6 QubesOS/qubes-linux-kernel@8f82b34 Update to kernel-5.3.2 QubesOS/qubes-linux-kernel@383118a change WireGuard version from 20190702 to 20190913 QubesOS/qubes-linux-kernel@9a3ca00 Update to kernel-5.2.16 QubesOS/qubes-linux-kernel@c7cfdfe Merge remote-tracking branch 'origin/pr/91' QubesOS/qubes-linux-kernel@1d50db3 rpm: set default kernel version based on package flavor QubesOS/qubes-linux-kernel@9aac829 Update to kernel-5.2.14 QubesOS/qubes-linux-kernel@4e4cdf6 Update to kernel-5.2.13 QubesOS/qubes-linux-kernel@61485da Update to kernel-5.2.11 QubesOS/qubes-linux-kernel@c270f52 Update to kernel-5.2.9 QubesOS/qubes-linux-kernel@8b2aed9 version 5.2.7-1 QubesOS/qubes-linux-kernel@d9f5315 Drop AFTER_LINK patch QubesOS/qubes-linux-kernel@150288e Update to kernel-5.2.3 QubesOS/qubes-linux-kernel@9ec4071 Update WireGuard to 0.0.20190702 QubesOS/qubes-linux-kernel@a40377d Update to kernel-5.1.17 QubesOS/qubes-linux-kernel@bd26af6 Update to kernel-5.1.16 QubesOS/qubes-linux-kernel@11d6f25 Update to kernel-5.1.15 QubesOS/qubes-linux-kernel@1574118 Update to kernel-5.1.13 QubesOS/qubes-linux-kernel@5adbe65 Update to kernel-5.1.9 QubesOS/qubes-linux-kernel@4f870c8 version 5.1.7-2 QubesOS/qubes-linux-kernel@d48c5ba Update to kernel-5.1.7 QubesOS/qubes-linux-kernel@e3a3420 Disable GCC plugins for out of tree kernel modules QubesOS/qubes-linux-kernel@d1ad508 Update to kernel-5.1.6 QubesOS/qubes-linux-kernel@7108c83 Simplify WG_SIG_FILE set QubesOS/qubes-linux-kernel@c6e1265 gitignore: add WireGuard QubesOS/qubes-linux-kernel@7906851 build wireguard module (after gpg check) QubesOS/qubes-linux-kernel@ef094d5 version 5.1.2-1 QubesOS/qubes-linux-kernel@c4c75cb Fix setting default kernel for VM QubesOS/qubes-linux-kernel@98cd4d1 config: disable SELinux QubesOS/qubes-linux-kernel@c68ee34 Update to kernel-5.1.1 QubesOS/qubes-linux-kernel@732780e get-fedora-latest-config: sort result when repoquerying kernel-core QubesOS/qubes-linux-kernel@d08d1bf Update to kernel-5.0.11 QubesOS/qubes-linux-kernel@598d75d Update to kernel-5.0.9 QubesOS/qubes-linux-kernel@a48e051 get-fedora-latest-config: enable only fedora and fedora-updates when downloading the rpm QubesOS/qubes-linux-kernel@5a1a029 get-fedora-latest-config: download relatively to current directory QubesOS/qubes-linux-kernel@a5a4ae6 Support a build without u2mfn module QubesOS/qubes-linux-kernel@1ffeed9 Update to kernel-5.0.7 QubesOS/qubes-linux-kernel@62c107b Update to kernel-5.0.5 QubesOS/qubes-linux-kernel@b16cc10 get-fedora-latest-config: enable only Fedora repos QubesOS/qubes-linux-kernel@f2ddd7a Refactor: handle getting default latest stable Fedora QubesOS/qubes-linux-kernel@9290c06 Add Fedora 31 primary key QubesOS/qubes-linux-kernel@cfc9a4c version 5.0.2-1 QubesOS/qubes-linux-kernel@17bbb7d Merge remote-tracking branch 'origin/pr/28' QubesOS/qubes-linux-kernel@1fe8359 rpm: one more typo fix QubesOS/qubes-linux-kernel@047a30a version 4.20.16-2 QubesOS/qubes-linux-kernel@50b7baa rpm: typo fix QubesOS/qubes-linux-kernel@fd14ac9 rpm: build modules.img at package build time only on new system QubesOS/qubes-linux-kernel@1bedd11 Update patches QubesOS/qubes-linux-kernel@0643a07 Update config with respect to upstream QubesOS/qubes-linux-kernel@b935b16 get-fedora-latest-config: allow fetching config from rawhide repository QubesOS/qubes-linux-kernel@924b8ab get-fedora-latest-config: don't hardcode Fedora version in regex rpm QubesOS/qubes-linux-kernel@fe376be keys: add Fedora 30 primary key QubesOS/qubes-linux-kernel@80fa61e get-sources: handle kernel-5.x QubesOS/qubes-linux-kernel@00bbcc6 version 4.20.16-1 QubesOS/qubes-linux-kernel@c2a2c69 Merge remote-tracking branch 'origin/pr/27' QubesOS/qubes-linux-kernel@61b9336 plymouth: ignore serial console hvc0 in UEFI QubesOS/qubes-linux-kernel@a44160b Ensure the rebuild of grub.cfg with plymouth.ignore-serial-consoles QubesOS/qubes-linux-kernel@e69b02b plymouth-ignore-serial-consoles: adjusting the method from marmarek suggestion QubesOS/qubes-linux-kernel@af67412 plymouth: ignore serial console hvc0 QubesOS/qubes-linux-kernel@c8f70c1 Update to kernel-4.20.14 QubesOS/qubes-linux-kernel@9cfa9a9 Include default-kernelopts-common.txt with kernel-specific default options QubesOS/qubes-linux-kernel@43235dd Improve reproducibility of initramfs QubesOS/qubes-linux-kernel@eb4c9ed Build modules.img at module build time QubesOS/qubes-linux-kernel@c2f7109 version 4.20.3-1 QubesOS/qubes-linux-kernel@c168934 Update to kernel-4.20.3 and config from Fedora's config 4.19.15-300 Referenced issues: QubesOS/qubes-issues#4736 QubesOS/qubes-issues#4839 QubesOS/qubes-issues#3849 QubesOS/qubes-issues#4280 QubesOS/qubes-issues#5497 QubesOS/qubes-issues#2844 QubesOS/qubes-issues#5309 If you're release manager, you can issue GPG-inline signed command: * `Upload linux-kernel ea8d8f46bb86ff6d4e4a24ff8cc0856bd765d13a r4.1 current repo` (available 7 days from now) * `Upload linux-kernel ea8d8f46bb86ff6d4e4a24ff8cc0856bd765d13a r4.1 current (dists) repo`, you can choose subset of distributions, like `vm-fc24 vm-fc25` (available 7 days from now) * `Upload linux-kernel ea8d8f46bb86ff6d4e4a24ff8cc0856bd765d13a r4.1 security-testing repo` Above commands will work only if packages in current-testing repository were built from given commit (i.e. no new version superseded it).
1.0
linux-kernel v5.4.21-1 (r4.1) - Update of linux-kernel to v5.4.21-1 for Qubes r4.1, see comments below for details. Built from: https://github.com/QubesOS/qubes-linux-kernel/commit/ea8d8f46bb86ff6d4e4a24ff8cc0856bd765d13a [Changes since previous version](https://github.com/QubesOS/qubes-linux-kernel/compare/v4.19.100-1...v5.4.21-1): QubesOS/qubes-linux-kernel@ea8d8f4 Update to kernel-5.4.21 QubesOS/qubes-linux-kernel@d03bb55 Increase modules.img sparse size QubesOS/qubes-linux-kernel@a776d31 get-latest-config: use keys under builder-rpm QubesOS/qubes-linux-kernel@b065f33 Drop -latest suffix for LTS kernel QubesOS/qubes-linux-kernel@af7128d Update to kernel-5.4.5 QubesOS/qubes-linux-kernel@b5170f8 update WireGuard from 20191212 to 20191219 QubesOS/qubes-linux-kernel@1252f79 Update to kernel-5.4.3 QubesOS/qubes-linux-kernel@9f28598 update WireGuard from 20191127 to 20191212 QubesOS/qubes-linux-kernel@1554c07 Add BR: python3-devel for pathfix.py script QubesOS/qubes-linux-kernel@8ee5779 Update to kernel-5.4.2 QubesOS/qubes-linux-kernel@366e681 get latest config: exit with clean and disable getting rc by default QubesOS/qubes-linux-kernel@f841402 Merge remote-tracking branch 'origin/pr/128' QubesOS/qubes-linux-kernel@8aca753 (re-)sign all the modules after processing debuginfo QubesOS/qubes-linux-kernel@a5e7326 update WireGuard from 20191012 to 20191127 QubesOS/qubes-linux-kernel@5d68948 version 5.4.1-2 QubesOS/qubes-linux-kernel@1cc6951 config-qubes: allow signed modules as Fedora set it QubesOS/qubes-linux-kernel@22b6866 Update to version 5.4.1 QubesOS/qubes-linux-kernel@7b1c020 Update Fedora keys for config updater script (add 32, remove 30 and 31) QubesOS/qubes-linux-kernel@9fc4062 Merge remote-tracking branch 'origin/pr/119' QubesOS/qubes-linux-kernel@fb9b485 spec: mangle /usr/bin/python shebangs to /usr/bin/python3 QubesOS/qubes-linux-kernel@ddf7602 Update to kernel-5.3.12 QubesOS/qubes-linux-kernel@18d5d66 Update to kernel-5.3.11 QubesOS/qubes-linux-kernel@ea53bfe Merge remote-tracking branch 'origin/pr/113' QubesOS/qubes-linux-kernel@71964cd Update to kernel-5.3.9 QubesOS/qubes-linux-kernel@cddf334 update WireGuard from 20190913 to 20191012 QubesOS/qubes-linux-kernel@beccd92 Update to kernel-5.3.8 QubesOS/qubes-linux-kernel@17b7186 Make makefile and spec compatible with rc versions QubesOS/qubes-linux-kernel@24ee349 Add Linus's signing key QubesOS/qubes-linux-kernel@87ba67c Update to kernel-5.3.7 QubesOS/qubes-linux-kernel@9cf5108 Update to kernel-5.3.6 QubesOS/qubes-linux-kernel@8f82b34 Update to kernel-5.3.2 QubesOS/qubes-linux-kernel@383118a change WireGuard version from 20190702 to 20190913 QubesOS/qubes-linux-kernel@9a3ca00 Update to kernel-5.2.16 QubesOS/qubes-linux-kernel@c7cfdfe Merge remote-tracking branch 'origin/pr/91' QubesOS/qubes-linux-kernel@1d50db3 rpm: set default kernel version based on package flavor QubesOS/qubes-linux-kernel@9aac829 Update to kernel-5.2.14 QubesOS/qubes-linux-kernel@4e4cdf6 Update to kernel-5.2.13 QubesOS/qubes-linux-kernel@61485da Update to kernel-5.2.11 QubesOS/qubes-linux-kernel@c270f52 Update to kernel-5.2.9 QubesOS/qubes-linux-kernel@8b2aed9 version 5.2.7-1 QubesOS/qubes-linux-kernel@d9f5315 Drop AFTER_LINK patch QubesOS/qubes-linux-kernel@150288e Update to kernel-5.2.3 QubesOS/qubes-linux-kernel@9ec4071 Update WireGuard to 0.0.20190702 QubesOS/qubes-linux-kernel@a40377d Update to kernel-5.1.17 QubesOS/qubes-linux-kernel@bd26af6 Update to kernel-5.1.16 QubesOS/qubes-linux-kernel@11d6f25 Update to kernel-5.1.15 QubesOS/qubes-linux-kernel@1574118 Update to kernel-5.1.13 QubesOS/qubes-linux-kernel@5adbe65 Update to kernel-5.1.9 QubesOS/qubes-linux-kernel@4f870c8 version 5.1.7-2 QubesOS/qubes-linux-kernel@d48c5ba Update to kernel-5.1.7 QubesOS/qubes-linux-kernel@e3a3420 Disable GCC plugins for out of tree kernel modules QubesOS/qubes-linux-kernel@d1ad508 Update to kernel-5.1.6 QubesOS/qubes-linux-kernel@7108c83 Simplify WG_SIG_FILE set QubesOS/qubes-linux-kernel@c6e1265 gitignore: add WireGuard QubesOS/qubes-linux-kernel@7906851 build wireguard module (after gpg check) QubesOS/qubes-linux-kernel@ef094d5 version 5.1.2-1 QubesOS/qubes-linux-kernel@c4c75cb Fix setting default kernel for VM QubesOS/qubes-linux-kernel@98cd4d1 config: disable SELinux QubesOS/qubes-linux-kernel@c68ee34 Update to kernel-5.1.1 QubesOS/qubes-linux-kernel@732780e get-fedora-latest-config: sort result when repoquerying kernel-core QubesOS/qubes-linux-kernel@d08d1bf Update to kernel-5.0.11 QubesOS/qubes-linux-kernel@598d75d Update to kernel-5.0.9 QubesOS/qubes-linux-kernel@a48e051 get-fedora-latest-config: enable only fedora and fedora-updates when downloading the rpm QubesOS/qubes-linux-kernel@5a1a029 get-fedora-latest-config: download relatively to current directory QubesOS/qubes-linux-kernel@a5a4ae6 Support a build without u2mfn module QubesOS/qubes-linux-kernel@1ffeed9 Update to kernel-5.0.7 QubesOS/qubes-linux-kernel@62c107b Update to kernel-5.0.5 QubesOS/qubes-linux-kernel@b16cc10 get-fedora-latest-config: enable only Fedora repos QubesOS/qubes-linux-kernel@f2ddd7a Refactor: handle getting default latest stable Fedora QubesOS/qubes-linux-kernel@9290c06 Add Fedora 31 primary key QubesOS/qubes-linux-kernel@cfc9a4c version 5.0.2-1 QubesOS/qubes-linux-kernel@17bbb7d Merge remote-tracking branch 'origin/pr/28' QubesOS/qubes-linux-kernel@1fe8359 rpm: one more typo fix QubesOS/qubes-linux-kernel@047a30a version 4.20.16-2 QubesOS/qubes-linux-kernel@50b7baa rpm: typo fix QubesOS/qubes-linux-kernel@fd14ac9 rpm: build modules.img at package build time only on new system QubesOS/qubes-linux-kernel@1bedd11 Update patches QubesOS/qubes-linux-kernel@0643a07 Update config with respect to upstream QubesOS/qubes-linux-kernel@b935b16 get-fedora-latest-config: allow fetching config from rawhide repository QubesOS/qubes-linux-kernel@924b8ab get-fedora-latest-config: don't hardcode Fedora version in regex rpm QubesOS/qubes-linux-kernel@fe376be keys: add Fedora 30 primary key QubesOS/qubes-linux-kernel@80fa61e get-sources: handle kernel-5.x QubesOS/qubes-linux-kernel@00bbcc6 version 4.20.16-1 QubesOS/qubes-linux-kernel@c2a2c69 Merge remote-tracking branch 'origin/pr/27' QubesOS/qubes-linux-kernel@61b9336 plymouth: ignore serial console hvc0 in UEFI QubesOS/qubes-linux-kernel@a44160b Ensure the rebuild of grub.cfg with plymouth.ignore-serial-consoles QubesOS/qubes-linux-kernel@e69b02b plymouth-ignore-serial-consoles: adjusting the method from marmarek suggestion QubesOS/qubes-linux-kernel@af67412 plymouth: ignore serial console hvc0 QubesOS/qubes-linux-kernel@c8f70c1 Update to kernel-4.20.14 QubesOS/qubes-linux-kernel@9cfa9a9 Include default-kernelopts-common.txt with kernel-specific default options QubesOS/qubes-linux-kernel@43235dd Improve reproducibility of initramfs QubesOS/qubes-linux-kernel@eb4c9ed Build modules.img at module build time QubesOS/qubes-linux-kernel@c2f7109 version 4.20.3-1 QubesOS/qubes-linux-kernel@c168934 Update to kernel-4.20.3 and config from Fedora's config 4.19.15-300 Referenced issues: QubesOS/qubes-issues#4736 QubesOS/qubes-issues#4839 QubesOS/qubes-issues#3849 QubesOS/qubes-issues#4280 QubesOS/qubes-issues#5497 QubesOS/qubes-issues#2844 QubesOS/qubes-issues#5309 If you're release manager, you can issue GPG-inline signed command: * `Upload linux-kernel ea8d8f46bb86ff6d4e4a24ff8cc0856bd765d13a r4.1 current repo` (available 7 days from now) * `Upload linux-kernel ea8d8f46bb86ff6d4e4a24ff8cc0856bd765d13a r4.1 current (dists) repo`, you can choose subset of distributions, like `vm-fc24 vm-fc25` (available 7 days from now) * `Upload linux-kernel ea8d8f46bb86ff6d4e4a24ff8cc0856bd765d13a r4.1 security-testing repo` Above commands will work only if packages in current-testing repository were built from given commit (i.e. no new version superseded it).
non_priority
linux kernel update of linux kernel to for qubes see comments below for details built from qubesos qubes linux kernel update to kernel qubesos qubes linux kernel increase modules img sparse size qubesos qubes linux kernel get latest config use keys under builder rpm qubesos qubes linux kernel drop latest suffix for lts kernel qubesos qubes linux kernel update to kernel qubesos qubes linux kernel update wireguard from to qubesos qubes linux kernel update to kernel qubesos qubes linux kernel update wireguard from to qubesos qubes linux kernel add br devel for pathfix py script qubesos qubes linux kernel update to kernel qubesos qubes linux kernel get latest config exit with clean and disable getting rc by default qubesos qubes linux kernel merge remote tracking branch origin pr qubesos qubes linux kernel re sign all the modules after processing debuginfo qubesos qubes linux kernel update wireguard from to qubesos qubes linux kernel version qubesos qubes linux kernel config qubes allow signed modules as fedora set it qubesos qubes linux kernel update to version qubesos qubes linux kernel update fedora keys for config updater script add remove and qubesos qubes linux kernel merge remote tracking branch origin pr qubesos qubes linux kernel spec mangle usr bin python shebangs to usr bin qubesos qubes linux kernel update to kernel qubesos qubes linux kernel update to kernel qubesos qubes linux kernel merge remote tracking branch origin pr qubesos qubes linux kernel update to kernel qubesos qubes linux kernel update wireguard from to qubesos qubes linux kernel update to kernel qubesos qubes linux kernel make makefile and spec compatible with rc versions qubesos qubes linux kernel add linus s signing key qubesos qubes linux kernel update to kernel qubesos qubes linux kernel update to kernel qubesos qubes linux kernel update to kernel qubesos qubes linux kernel change wireguard version from to qubesos qubes linux kernel update to kernel qubesos qubes linux kernel merge remote tracking branch origin pr qubesos qubes linux kernel rpm set default kernel version based on package flavor qubesos qubes linux kernel update to kernel qubesos qubes linux kernel update to kernel qubesos qubes linux kernel update to kernel qubesos qubes linux kernel update to kernel qubesos qubes linux kernel version qubesos qubes linux kernel drop after link patch qubesos qubes linux kernel update to kernel qubesos qubes linux kernel update wireguard to qubesos qubes linux kernel update to kernel qubesos qubes linux kernel update to kernel qubesos qubes linux kernel update to kernel qubesos qubes linux kernel update to kernel qubesos qubes linux kernel update to kernel qubesos qubes linux kernel version qubesos qubes linux kernel update to kernel qubesos qubes linux kernel disable gcc plugins for out of tree kernel modules qubesos qubes linux kernel update to kernel qubesos qubes linux kernel simplify wg sig file set qubesos qubes linux kernel gitignore add wireguard qubesos qubes linux kernel build wireguard module after gpg check qubesos qubes linux kernel version qubesos qubes linux kernel fix setting default kernel for vm qubesos qubes linux kernel config disable selinux qubesos qubes linux kernel update to kernel qubesos qubes linux kernel get fedora latest config sort result when repoquerying kernel core qubesos qubes linux kernel update to kernel qubesos qubes linux kernel update to kernel qubesos qubes linux kernel get fedora latest config enable only fedora and fedora updates when downloading the rpm qubesos qubes linux kernel get fedora latest config download relatively to current directory qubesos qubes linux kernel support a build without module qubesos qubes linux kernel update to kernel qubesos qubes linux kernel update to kernel qubesos qubes linux kernel get fedora latest config enable only fedora repos qubesos qubes linux kernel refactor handle getting default latest stable fedora qubesos qubes linux kernel add fedora primary key qubesos qubes linux kernel version qubesos qubes linux kernel merge remote tracking branch origin pr qubesos qubes linux kernel rpm one more typo fix qubesos qubes linux kernel version qubesos qubes linux kernel rpm typo fix qubesos qubes linux kernel rpm build modules img at package build time only on new system qubesos qubes linux kernel update patches qubesos qubes linux kernel update config with respect to upstream qubesos qubes linux kernel get fedora latest config allow fetching config from rawhide repository qubesos qubes linux kernel get fedora latest config don t hardcode fedora version in regex rpm qubesos qubes linux kernel keys add fedora primary key qubesos qubes linux kernel get sources handle kernel x qubesos qubes linux kernel version qubesos qubes linux kernel merge remote tracking branch origin pr qubesos qubes linux kernel plymouth ignore serial console in uefi qubesos qubes linux kernel ensure the rebuild of grub cfg with plymouth ignore serial consoles qubesos qubes linux kernel plymouth ignore serial consoles adjusting the method from marmarek suggestion qubesos qubes linux kernel plymouth ignore serial console qubesos qubes linux kernel update to kernel qubesos qubes linux kernel include default kernelopts common txt with kernel specific default options qubesos qubes linux kernel improve reproducibility of initramfs qubesos qubes linux kernel build modules img at module build time qubesos qubes linux kernel version qubesos qubes linux kernel update to kernel and config from fedora s config referenced issues qubesos qubes issues qubesos qubes issues qubesos qubes issues qubesos qubes issues qubesos qubes issues qubesos qubes issues qubesos qubes issues if you re release manager you can issue gpg inline signed command upload linux kernel current repo available days from now upload linux kernel current dists repo you can choose subset of distributions like vm vm available days from now upload linux kernel security testing repo above commands will work only if packages in current testing repository were built from given commit i e no new version superseded it
0
214,877
24,121,685,784
IssuesEvent
2022-09-20 19:19:33
bitovi/bitops
https://api.github.com/repos/bitovi/bitops
opened
Docker image signing
enhancement feature security
Implement Docker image signing before uploading artifacts to Docker Hub so the users could validate that the images are coming from us. This would add to the software supply chain security. - [ ] Signing - [ ] CI/CD - [ ] Documentation ### Resources - https://docs.docker.com/engine/security/trust/ - https://www.howtogeek.com/devops/how-to-sign-your-docker-images-to-increase-trust/
True
Docker image signing - Implement Docker image signing before uploading artifacts to Docker Hub so the users could validate that the images are coming from us. This would add to the software supply chain security. - [ ] Signing - [ ] CI/CD - [ ] Documentation ### Resources - https://docs.docker.com/engine/security/trust/ - https://www.howtogeek.com/devops/how-to-sign-your-docker-images-to-increase-trust/
non_priority
docker image signing implement docker image signing before uploading artifacts to docker hub so the users could validate that the images are coming from us this would add to the software supply chain security signing ci cd documentation resources
0
134,210
19,098,217,847
IssuesEvent
2021-11-29 19:06:26
UnB-KnEDLe/viabilidade-tecnica
https://api.github.com/repos/UnB-KnEDLe/viabilidade-tecnica
closed
Adicionar campo default para campos não existentes
0 time: Designer
Otimizar os campos dos membros para aceitar itens genéricos.
1.0
Adicionar campo default para campos não existentes - Otimizar os campos dos membros para aceitar itens genéricos.
non_priority
adicionar campo default para campos não existentes otimizar os campos dos membros para aceitar itens genéricos
0
3,531
6,570,735,297
IssuesEvent
2017-09-10 03:37:37
Great-Hill-Corporation/quickBlocks
https://api.github.com/repos/Great-Hill-Corporation/quickBlocks
closed
Default files for ethprice and ethname
apps-ethPrice status-inprocess tools-ethName type-enhancement
It is probably better to copy in files to ethprice and ethName than create them on the fly. (1) faster, (2) easier to change
1.0
Default files for ethprice and ethname - It is probably better to copy in files to ethprice and ethName than create them on the fly. (1) faster, (2) easier to change
non_priority
default files for ethprice and ethname it is probably better to copy in files to ethprice and ethname than create them on the fly faster easier to change
0
26,599
20,272,285,069
IssuesEvent
2022-02-15 17:12:56
openfeatureflags/.github
https://api.github.com/repos/openfeatureflags/.github
closed
GitHub organization bootstrap
chore infrastructure
- [x] - Create GitHub organization - [x] - CoC, READMEs - [x] - Initial contributing guide - [x] - Specification repository - [x] - List of interested parties Detached - Governance document
1.0
GitHub organization bootstrap - - [x] - Create GitHub organization - [x] - CoC, READMEs - [x] - Initial contributing guide - [x] - Specification repository - [x] - List of interested parties Detached - Governance document
non_priority
github organization bootstrap create github organization coc readmes initial contributing guide specification repository list of interested parties detached governance document
0
234,822
19,270,355,333
IssuesEvent
2021-12-10 04:01:42
mattermost/focalboard
https://api.github.com/repos/mattermost/focalboard
closed
Write Focalboard E2E with Cypress: "MM-T4274 Create an Empty Board"
Help Wanted Area/E2E Tests Difficulty/1:Easy Tech/Automation
<article> <h1>MM-T4274 Create an Empty Board</h1> <div> <div> <h3>Steps #1</h3>Click on the "+" icon at the top of the sidebar<h3>Expected</h3>"Create a Board" screen opens in the center view with template options<hr><h3>Steps #2</h3>Click on "Start with an Empty Board"<h3>Expected</h3>Board titled "Untitled Board" is created and opened<hr><h3>Steps #3</h3>Click on "Untitled Board" and type "Testing" and hit Enter<h3>Expected</h3>Title of the board updates to "Testing"<hr> </div> </div> </article> **Test code arrangement:** ``` it('MM-T4274 Create an Empty Board', () => { // code }); ``` Note: 1. Use [queries from testing-library](https://testing-library.com/docs/dom-testing-library/api-queries) whenever possible. We share the same philosophy as the [testing-library](https://testing-library.com/) when doing UI automation like "Interact with your app the same way as your users" and so, please follow their guidelines especially when querying an element. If you're interested, please comment here and come [join our "Contributors" community channel](https://community.mattermost.com/core/channels/tickets) on our daily build server, where you can discuss questions with community members and the Mattermost core team. For technical advice or questions, please [join our "Focalboard" community channel](https://community.mattermost.com/core/channels/focalboard). For new contributors, please see our [guide](https://github.com/mattermost/focalboard#running-and-testing-the-server).
1.0
Write Focalboard E2E with Cypress: "MM-T4274 Create an Empty Board" - <article> <h1>MM-T4274 Create an Empty Board</h1> <div> <div> <h3>Steps #1</h3>Click on the "+" icon at the top of the sidebar<h3>Expected</h3>"Create a Board" screen opens in the center view with template options<hr><h3>Steps #2</h3>Click on "Start with an Empty Board"<h3>Expected</h3>Board titled "Untitled Board" is created and opened<hr><h3>Steps #3</h3>Click on "Untitled Board" and type "Testing" and hit Enter<h3>Expected</h3>Title of the board updates to "Testing"<hr> </div> </div> </article> **Test code arrangement:** ``` it('MM-T4274 Create an Empty Board', () => { // code }); ``` Note: 1. Use [queries from testing-library](https://testing-library.com/docs/dom-testing-library/api-queries) whenever possible. We share the same philosophy as the [testing-library](https://testing-library.com/) when doing UI automation like "Interact with your app the same way as your users" and so, please follow their guidelines especially when querying an element. If you're interested, please comment here and come [join our "Contributors" community channel](https://community.mattermost.com/core/channels/tickets) on our daily build server, where you can discuss questions with community members and the Mattermost core team. For technical advice or questions, please [join our "Focalboard" community channel](https://community.mattermost.com/core/channels/focalboard). For new contributors, please see our [guide](https://github.com/mattermost/focalboard#running-and-testing-the-server).
non_priority
write focalboard with cypress mm create an empty board mm create an empty board steps click on the icon at the top of the sidebar expected create a board screen opens in the center view with template options steps click on start with an empty board expected board titled untitled board is created and opened steps click on untitled board and type testing and hit enter expected title of the board updates to testing test code arrangement it mm create an empty board code note use whenever possible we share the same philosophy as the when doing ui automation like interact with your app the same way as your users and so please follow their guidelines especially when querying an element if you re interested please comment here and come on our daily build server where you can discuss questions with community members and the mattermost core team for technical advice or questions please for new contributors please see our
0
236,782
19,574,206,167
IssuesEvent
2022-01-04 13:41:38
chipsalliance/sv-tests
https://api.github.com/repos/chipsalliance/sv-tests
closed
Dashboard runner false-fail with NUL characters
bug tests
Many dozens of Verilator tests false-fail due to "NUL", indicating something wrong with the running system. (These all passed at one point). Maybe it's out of disk space? e.g. https://symbiflow.github.io/sv-tests-results/#Verilator|7.9.4|associative-arrays-first https://symbiflow.github.io/sv-tests-results/#Verilator|7.12.1|array-locator-methods-find ``` make[1]: Entering directory '/tmpfs/tmp/tmpl0s9xbp0/vbuild' Vtop.mk:13: warning: NUL character seen; rest of line ignored /home/runner/work/conda-eda/conda-eda/workdir/conda-env/conda-bld/verilator-uhdm_1625528243349/_build_env/bin/x86_64-conda-linux-gnu-c++ -fvisibility-inlines-hidden -std=c++17 -fmessage-length=0 -march=nocona -mtune=haswell -ftree-vectorize -fPIC -fstack-protector-strong -fno-plt -O2 -ffunction-sections -pipe -isystem /home/kbuilder/miniconda/envs/sv-test-env/include -DNDEBUG -D_FORTIFY_SOURCE=2 -O2 -isystem /home/kbuilder/miniconda/envs/sv-test-env/include -I. -MMD -I/home/kbuilder/miniconda/envs/sv-test-env/share/verilator/include -I/home/kbuilder/miniconda/envs/sv-test-env/share/verilator/include/vltstd -DVM_COVERAGE=0 -DVM_SC=0 -DVM_TRACE=0 -DVM_TRACE_FST=0 -faligned-new -fcf-protection=none -Wno-bool-operation -Wno-sign-compare -Wno-uninitialized -Wno-unused-but-set-variable -Wno-unused-parameter -Wno-unused-variable -Wno-shadow -std=gnu++14 -Os -c -o vmain.o ../vmain.cpp make[1]: /home/runner/work/conda-eda/conda-eda/workdir/conda-env/conda-bld/verilator-uhdm_1625528243349/_build_env/bin/x86_64-conda-linux-gnu-c++: Command not found Vtop.mk:59: recipe for target 'vmain.o' failed ```
1.0
Dashboard runner false-fail with NUL characters - Many dozens of Verilator tests false-fail due to "NUL", indicating something wrong with the running system. (These all passed at one point). Maybe it's out of disk space? e.g. https://symbiflow.github.io/sv-tests-results/#Verilator|7.9.4|associative-arrays-first https://symbiflow.github.io/sv-tests-results/#Verilator|7.12.1|array-locator-methods-find ``` make[1]: Entering directory '/tmpfs/tmp/tmpl0s9xbp0/vbuild' Vtop.mk:13: warning: NUL character seen; rest of line ignored /home/runner/work/conda-eda/conda-eda/workdir/conda-env/conda-bld/verilator-uhdm_1625528243349/_build_env/bin/x86_64-conda-linux-gnu-c++ -fvisibility-inlines-hidden -std=c++17 -fmessage-length=0 -march=nocona -mtune=haswell -ftree-vectorize -fPIC -fstack-protector-strong -fno-plt -O2 -ffunction-sections -pipe -isystem /home/kbuilder/miniconda/envs/sv-test-env/include -DNDEBUG -D_FORTIFY_SOURCE=2 -O2 -isystem /home/kbuilder/miniconda/envs/sv-test-env/include -I. -MMD -I/home/kbuilder/miniconda/envs/sv-test-env/share/verilator/include -I/home/kbuilder/miniconda/envs/sv-test-env/share/verilator/include/vltstd -DVM_COVERAGE=0 -DVM_SC=0 -DVM_TRACE=0 -DVM_TRACE_FST=0 -faligned-new -fcf-protection=none -Wno-bool-operation -Wno-sign-compare -Wno-uninitialized -Wno-unused-but-set-variable -Wno-unused-parameter -Wno-unused-variable -Wno-shadow -std=gnu++14 -Os -c -o vmain.o ../vmain.cpp make[1]: /home/runner/work/conda-eda/conda-eda/workdir/conda-env/conda-bld/verilator-uhdm_1625528243349/_build_env/bin/x86_64-conda-linux-gnu-c++: Command not found Vtop.mk:59: recipe for target 'vmain.o' failed ```
non_priority
dashboard runner false fail with nul characters many dozens of verilator tests false fail due to nul indicating something wrong with the running system these all passed at one point maybe it s out of disk space e g make entering directory tmpfs tmp vbuild vtop mk warning nul character seen rest of line ignored home runner work conda eda conda eda workdir conda env conda bld verilator uhdm build env bin conda linux gnu c fvisibility inlines hidden std c fmessage length march nocona mtune haswell ftree vectorize fpic fstack protector strong fno plt ffunction sections pipe isystem home kbuilder miniconda envs sv test env include dndebug d fortify source isystem home kbuilder miniconda envs sv test env include i mmd i home kbuilder miniconda envs sv test env share verilator include i home kbuilder miniconda envs sv test env share verilator include vltstd dvm coverage dvm sc dvm trace dvm trace fst faligned new fcf protection none wno bool operation wno sign compare wno uninitialized wno unused but set variable wno unused parameter wno unused variable wno shadow std gnu os c o vmain o vmain cpp make home runner work conda eda conda eda workdir conda env conda bld verilator uhdm build env bin conda linux gnu c command not found vtop mk recipe for target vmain o failed
0
198,419
22,640,564,896
IssuesEvent
2022-07-01 01:15:54
NCIOCPL/cgov-digital-platform
https://api.github.com/repos/NCIOCPL/cgov-digital-platform
closed
CSRF prevention on forms and page loads
Security
Several admin pages were flagged as being vulnerable to CSRF attacks. From what I've seen so far these were the standard content type admin pages. ## Scan Information **Description** CSRF is a very common vulnerability. It's an attack which forces a user to execute unwanted actions on a web application in which the user is currently authenticated. **Impact** Depending on the application, an attacker can mount any of the actions that can be done by the user such as adding a user, modifying content, deleting data. All the functionality that’s available to the victim can be used by the attacker. Only exception to this rule is a page that requires extra information that only the legitimate user can know (such as user’s password). **Remedy** Send additional information in each HTTP request that can be used to determine whether the request came from an authorized source. This "validation token" should be hard to guess for attacker who does not already have access to the user's account. If a request is missing a validation token or the token does not match the expected value, the server should reject the request. If you are posting form in ajax request, custom HTTP headers can be used to prevent CSRF because the browser prevents sites from sending custom HTTP headers to another site but allows sites to send custom HTTP headers to themselves using XMLHttpRequest. ## Links - [OWASP](https://owasp.org/www-community/attacks/csrf) - [Drupal](https://www.drupal.org/docs/8/api/routing-system/access-checking-on-routes/csrf-access-checking)
True
CSRF prevention on forms and page loads - Several admin pages were flagged as being vulnerable to CSRF attacks. From what I've seen so far these were the standard content type admin pages. ## Scan Information **Description** CSRF is a very common vulnerability. It's an attack which forces a user to execute unwanted actions on a web application in which the user is currently authenticated. **Impact** Depending on the application, an attacker can mount any of the actions that can be done by the user such as adding a user, modifying content, deleting data. All the functionality that’s available to the victim can be used by the attacker. Only exception to this rule is a page that requires extra information that only the legitimate user can know (such as user’s password). **Remedy** Send additional information in each HTTP request that can be used to determine whether the request came from an authorized source. This "validation token" should be hard to guess for attacker who does not already have access to the user's account. If a request is missing a validation token or the token does not match the expected value, the server should reject the request. If you are posting form in ajax request, custom HTTP headers can be used to prevent CSRF because the browser prevents sites from sending custom HTTP headers to another site but allows sites to send custom HTTP headers to themselves using XMLHttpRequest. ## Links - [OWASP](https://owasp.org/www-community/attacks/csrf) - [Drupal](https://www.drupal.org/docs/8/api/routing-system/access-checking-on-routes/csrf-access-checking)
non_priority
csrf prevention on forms and page loads several admin pages were flagged as being vulnerable to csrf attacks from what i ve seen so far these were the standard content type admin pages scan information description csrf is a very common vulnerability it s an attack which forces a user to execute unwanted actions on a web application in which the user is currently authenticated impact depending on the application an attacker can mount any of the actions that can be done by the user such as adding a user modifying content deleting data all the functionality that’s available to the victim can be used by the attacker only exception to this rule is a page that requires extra information that only the legitimate user can know such as user’s password remedy send additional information in each http request that can be used to determine whether the request came from an authorized source this validation token should be hard to guess for attacker who does not already have access to the user s account if a request is missing a validation token or the token does not match the expected value the server should reject the request if you are posting form in ajax request custom http headers can be used to prevent csrf because the browser prevents sites from sending custom http headers to another site but allows sites to send custom http headers to themselves using xmlhttprequest links
0
92,866
11,716,565,616
IssuesEvent
2020-03-09 15:50:17
phetsims/ph-scale
https://api.github.com/repos/phetsims/ph-scale
closed
instrumentation of microScreen.model.pHMeter
design:phet-io
Something I noticed while working on another issue... Instrumentation of the pH meter mode in _Macro_ screen looks like this: ``` -phScale -microScreen -model -pHMeter valueProperty -probe positionProperty ``` There are 3 problems here: - [ ] `valueProperty` is never updated, always `null` - [ ] this meter doesn't have a separate movable probe, so both `probe` and `positionProperty` are irrelevant I think the structure should look like this, where `*pHProperty` is a link to `solution.pHProperty`. ``` -phScale -microScreen -model -pHMeter *pHProperty ``` @arouinfar do you agree?
1.0
instrumentation of microScreen.model.pHMeter - Something I noticed while working on another issue... Instrumentation of the pH meter mode in _Macro_ screen looks like this: ``` -phScale -microScreen -model -pHMeter valueProperty -probe positionProperty ``` There are 3 problems here: - [ ] `valueProperty` is never updated, always `null` - [ ] this meter doesn't have a separate movable probe, so both `probe` and `positionProperty` are irrelevant I think the structure should look like this, where `*pHProperty` is a link to `solution.pHProperty`. ``` -phScale -microScreen -model -pHMeter *pHProperty ``` @arouinfar do you agree?
non_priority
instrumentation of microscreen model phmeter something i noticed while working on another issue instrumentation of the ph meter mode in macro screen looks like this phscale microscreen model phmeter valueproperty probe positionproperty there are problems here valueproperty is never updated always null this meter doesn t have a separate movable probe so both probe and positionproperty are irrelevant i think the structure should look like this where phproperty is a link to solution phproperty phscale microscreen model phmeter phproperty arouinfar do you agree
0
73,761
15,282,040,021
IssuesEvent
2021-02-23 09:01:54
hazelcast/hazelcast-jet
https://api.github.com/repos/hazelcast/hazelcast-jet
opened
Vulnerabilities in Apache Commons Compress used by Jet 4.3
security
Jet uses Apache Commons Compress `1.8.1` which includes following vulnerabilities: - CVE-2018-11771 - https://nvd.nist.gov/vuln/detail/CVE-2018-11771 (fixed in 1.18)
True
Vulnerabilities in Apache Commons Compress used by Jet 4.3 - Jet uses Apache Commons Compress `1.8.1` which includes following vulnerabilities: - CVE-2018-11771 - https://nvd.nist.gov/vuln/detail/CVE-2018-11771 (fixed in 1.18)
non_priority
vulnerabilities in apache commons compress used by jet jet uses apache commons compress which includes following vulnerabilities cve fixed in
0
317,704
27,258,807,583
IssuesEvent
2023-02-22 13:31:52
pymc-labs/pymc-marketing
https://api.github.com/repos/pymc-labs/pymc-marketing
opened
TestBetaGeo `setup_class` is too slow
CLV tests
The `setup_class` of TestBetaGeo is too slow as it performs MCMC sampling on a synthetic dataset. We should make this a fixture of tests that actually need it (if there's more than one), and possibly mark them with `@pytest.mark.slow` so that they are not ran locally by default. https://github.com/pymc-labs/pymc-marketing/blob/7ebc19465ad6daf62fbcb56d1b91fc40d09da7a0/tests/clv/models/test_beta_geo.py#L50 For other tests I have faked posterior draws by doing prior sampling with narrow priors around the "expected" values. This allows us to check the summary methods work as expected without doing slow mcmc sampling. CC @larryshamalama
1.0
TestBetaGeo `setup_class` is too slow - The `setup_class` of TestBetaGeo is too slow as it performs MCMC sampling on a synthetic dataset. We should make this a fixture of tests that actually need it (if there's more than one), and possibly mark them with `@pytest.mark.slow` so that they are not ran locally by default. https://github.com/pymc-labs/pymc-marketing/blob/7ebc19465ad6daf62fbcb56d1b91fc40d09da7a0/tests/clv/models/test_beta_geo.py#L50 For other tests I have faked posterior draws by doing prior sampling with narrow priors around the "expected" values. This allows us to check the summary methods work as expected without doing slow mcmc sampling. CC @larryshamalama
non_priority
testbetageo setup class is too slow the setup class of testbetageo is too slow as it performs mcmc sampling on a synthetic dataset we should make this a fixture of tests that actually need it if there s more than one and possibly mark them with pytest mark slow so that they are not ran locally by default for other tests i have faked posterior draws by doing prior sampling with narrow priors around the expected values this allows us to check the summary methods work as expected without doing slow mcmc sampling cc larryshamalama
0
69,084
17,568,884,249
IssuesEvent
2021-08-14 08:52:29
komascript/makelabels
https://api.github.com/repos/komascript/makelabels
closed
`l3build doc` failes because of missing `makefiles*-example.pdf`
build
There seem to be something wrong with the build process using `l3build doc`. The first try (after `l3build clean`) fails, because of missing `makefiles-example.pdf` and `makefiles-envlab-example.pdf`. Both files are generated but not copied to `build/doc`. Next run of `l3build doc` is successful, because it copies `makefiles-example.pdf` and `makefiles-envlab-example.pdf` from the working directory to `build/doc` before running LaTeX. If someone could explain, how to explain `l3build` to copy `makefiles-example.pdf` and `makefiles-envlab-example.pdf` after they have been typeset but before typesetting `makefiles.dtx`, I would be glad. I think, it is a small mistake, but currently I'm too tired to find it.
1.0
`l3build doc` failes because of missing `makefiles*-example.pdf` - There seem to be something wrong with the build process using `l3build doc`. The first try (after `l3build clean`) fails, because of missing `makefiles-example.pdf` and `makefiles-envlab-example.pdf`. Both files are generated but not copied to `build/doc`. Next run of `l3build doc` is successful, because it copies `makefiles-example.pdf` and `makefiles-envlab-example.pdf` from the working directory to `build/doc` before running LaTeX. If someone could explain, how to explain `l3build` to copy `makefiles-example.pdf` and `makefiles-envlab-example.pdf` after they have been typeset but before typesetting `makefiles.dtx`, I would be glad. I think, it is a small mistake, but currently I'm too tired to find it.
non_priority
doc failes because of missing makefiles example pdf there seem to be something wrong with the build process using doc the first try after clean fails because of missing makefiles example pdf and makefiles envlab example pdf both files are generated but not copied to build doc next run of doc is successful because it copies makefiles example pdf and makefiles envlab example pdf from the working directory to build doc before running latex if someone could explain how to explain to copy makefiles example pdf and makefiles envlab example pdf after they have been typeset but before typesetting makefiles dtx i would be glad i think it is a small mistake but currently i m too tired to find it
0
32,721
13,916,675,106
IssuesEvent
2020-10-21 04:00:27
MicrosoftDocs/azure-docs
https://api.github.com/repos/MicrosoftDocs/azure-docs
closed
Wrong description - Large (Nested Virtualization)
Pri2 awaiting-product-team-response cxp lab-services/svc product-question triaged
Large (Nested Virtualization) | 8 Cores 32 GB RAM ### Comments The vm is Large (Nested Virtualization) | 8 Cores 32 GB RAM instead of Large (Nested Virtualization) | 8 Cores 16 GB RAM I don't know with VM is associated with this configuration ![image](https://user-images.githubusercontent.com/17298854/96106743-d9d25900-0edb-11eb-9fac-67c2efeb8d96.png) --- #### Document Details ⚠ *Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.* * ID: 191dec24-ed36-2aea-3384-dfeb69c6d1c8 * Version Independent ID: c3cc622e-c92e-feb0-2835-551ddd601cf3 * Content: [Azure Lab Services - Administrator guide - Azure Lab Services](https://docs.microsoft.com/en-us/azure/lab-services/administrator-guide#vm-sizing) * Content Source: [articles/lab-services/administrator-guide.md](https://github.com/MicrosoftDocs/azure-docs/blob/master/articles/lab-services/administrator-guide.md) * Service: **lab-services** * GitHub Login: @Juliako * Microsoft Alias: **juliako**
1.0
Wrong description - Large (Nested Virtualization) - Large (Nested Virtualization) | 8 Cores 32 GB RAM ### Comments The vm is Large (Nested Virtualization) | 8 Cores 32 GB RAM instead of Large (Nested Virtualization) | 8 Cores 16 GB RAM I don't know with VM is associated with this configuration ![image](https://user-images.githubusercontent.com/17298854/96106743-d9d25900-0edb-11eb-9fac-67c2efeb8d96.png) --- #### Document Details ⚠ *Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.* * ID: 191dec24-ed36-2aea-3384-dfeb69c6d1c8 * Version Independent ID: c3cc622e-c92e-feb0-2835-551ddd601cf3 * Content: [Azure Lab Services - Administrator guide - Azure Lab Services](https://docs.microsoft.com/en-us/azure/lab-services/administrator-guide#vm-sizing) * Content Source: [articles/lab-services/administrator-guide.md](https://github.com/MicrosoftDocs/azure-docs/blob/master/articles/lab-services/administrator-guide.md) * Service: **lab-services** * GitHub Login: @Juliako * Microsoft Alias: **juliako**
non_priority
wrong description large nested virtualization large nested virtualization cores gb ram comments the vm is large nested virtualization cores gb ram instead of large nested virtualization cores gb ram i don t know with vm is associated with this configuration document details ⚠ do not edit this section it is required for docs microsoft com ➟ github issue linking id version independent id content content source service lab services github login juliako microsoft alias juliako
0
74,517
14,266,441,836
IssuesEvent
2020-11-20 18:42:45
joomla/joomla-cms
https://api.github.com/repos/joomla/joomla-cms
closed
ability to remove up/down arrows from a number field
No Code Attached Yet
### Is your feature request related to a problem? Please describe. Currently all rendered number fields have the up/down arrows on them. The arrows can be removed by CSS if needed but this is template/css based. **With Arrows** ![image](https://user-images.githubusercontent.com/319997/99833497-ff492700-2b59-11eb-882c-2957fa6f3d82.png) **Without arrows** ![image](https://user-images.githubusercontent.com/319997/99833534-0d974300-2b5a-11eb-93e5-52eb7039cf4e.png) ### Describe the solution you'd like I would like an option that you can configure in the field configuation so this option was not template/css dependant. Maybe call the new option `arrows="false"` ```xml <field name="id" type="number" label="JGLOBAL_FIELD_ID_LABEL" description="JGLOBAL_FIELD_ID_DESC" default="0" class="readonly" size="10" readonly="true" arrows="false" /> ``` ### Additional context You can use the following css to remove the arrows: ```css style="appearance: textfield" ``` There is not an option I have found https://docs.joomla.org/Number_form_field_type
1.0
ability to remove up/down arrows from a number field - ### Is your feature request related to a problem? Please describe. Currently all rendered number fields have the up/down arrows on them. The arrows can be removed by CSS if needed but this is template/css based. **With Arrows** ![image](https://user-images.githubusercontent.com/319997/99833497-ff492700-2b59-11eb-882c-2957fa6f3d82.png) **Without arrows** ![image](https://user-images.githubusercontent.com/319997/99833534-0d974300-2b5a-11eb-93e5-52eb7039cf4e.png) ### Describe the solution you'd like I would like an option that you can configure in the field configuation so this option was not template/css dependant. Maybe call the new option `arrows="false"` ```xml <field name="id" type="number" label="JGLOBAL_FIELD_ID_LABEL" description="JGLOBAL_FIELD_ID_DESC" default="0" class="readonly" size="10" readonly="true" arrows="false" /> ``` ### Additional context You can use the following css to remove the arrows: ```css style="appearance: textfield" ``` There is not an option I have found https://docs.joomla.org/Number_form_field_type
non_priority
ability to remove up down arrows from a number field is your feature request related to a problem please describe currently all rendered number fields have the up down arrows on them the arrows can be removed by css if needed but this is template css based with arrows without arrows describe the solution you d like i would like an option that you can configure in the field configuation so this option was not template css dependant maybe call the new option arrows false xml field name id type number label jglobal field id label description jglobal field id desc default class readonly size readonly true arrows false additional context you can use the following css to remove the arrows css style appearance textfield there is not an option i have found
0
326,183
24,074,806,153
IssuesEvent
2022-09-18 16:58:12
RobbieWagner/Snowstorm
https://api.github.com/repos/RobbieWagner/Snowstorm
closed
Display buttons for tutorials
documentation enhancement
Instead of a single tutorial that displays when the user starts doing certain tasks (interacting with things), have buttons display the keys to press/actions to perform
1.0
Display buttons for tutorials - Instead of a single tutorial that displays when the user starts doing certain tasks (interacting with things), have buttons display the keys to press/actions to perform
non_priority
display buttons for tutorials instead of a single tutorial that displays when the user starts doing certain tasks interacting with things have buttons display the keys to press actions to perform
0
446,979
31,565,582,930
IssuesEvent
2023-09-03 19:36:57
phren-ke/spa
https://api.github.com/repos/phren-ke/spa
closed
About us
documentation good first issue
### About Us Description Have a title saying "About Us" Write a captivating message about us that shows why the services are better than others. Describe in about 1 or 2 paragraphs
1.0
About us - ### About Us Description Have a title saying "About Us" Write a captivating message about us that shows why the services are better than others. Describe in about 1 or 2 paragraphs
non_priority
about us about us description have a title saying about us write a captivating message about us that shows why the services are better than others describe in about or paragraphs
0
380,509
26,422,664,447
IssuesEvent
2023-01-13 22:22:38
fga-eps-mds/2022-2-BOTO
https://api.github.com/repos/fga-eps-mds/2022-2-BOTO
opened
Documentação de como é feito o teste
documentation
#### Objetivo? Documentar como é feito o teste unitario e enviar as informações que a professora quer na issue que tem que marcar ela #### Tarefas // Criterios de aceitação - [ ] Documentar como é feito o teste - [ ] Criar a issue com a professora com as informações pedidas no telegram #### Comentários ----------------
1.0
Documentação de como é feito o teste - #### Objetivo? Documentar como é feito o teste unitario e enviar as informações que a professora quer na issue que tem que marcar ela #### Tarefas // Criterios de aceitação - [ ] Documentar como é feito o teste - [ ] Criar a issue com a professora com as informações pedidas no telegram #### Comentários ----------------
non_priority
documentação de como é feito o teste objetivo documentar como é feito o teste unitario e enviar as informações que a professora quer na issue que tem que marcar ela tarefas criterios de aceitação documentar como é feito o teste criar a issue com a professora com as informações pedidas no telegram comentários
0
311,976
23,412,265,609
IssuesEvent
2022-08-12 18:55:57
timoast/signac
https://api.github.com/repos/timoast/signac
closed
ATAC imputation?
documentation
Hello, I appreciate this wonderful tool! I am fairly new to scATACseq analysis, so forgive me if if my question is naive. I have 1 multiome dataset and 1 CITEseq dataset. I’d like to follow the steps on the “RNA imputation” part of this vignette: https://satijalab.org/signac/articles/integrate_atac.html#rna-imputation-1 , except I would like to impute ATAC for the CITEseq dataset. Below is the code I’ve tried, and while the data does transfer, I’m not able to do any downstream analysis with my newly added “predicted_ATAC” slot in the CITEseq dataset. Am I missing something or is this kind of imputation not possible? Thanks in advance for any insight. My code: ```` DefaultAssay(multiome) <- "RNA" DefaultAssay(cite) <- "RNA" multiome <- RunSPCA(multiome, assay = "RNA", graph = "wsnn") #Computing a cached neighbor index multiome <- FindNeighbors( object = multiome, reduction = "spca", dims = 1:50, graph.name = "spca.annoy.neighbors", k.param = 50, cache.index = TRUE, return.neighbor = TRUE, l2.norm = TRUE ) #Query dataset processing #Find anchors between the query and reference anchors <- list() anchors <- FindTransferAnchors( reference = multiome, query = cite, k.filter = NA, reference.reduction = "spca", reference.neighbors = "spca.annoy.neighbors", dims = 1:50 ) atac <- TransferData( anchorset = anchors, refdata = GetAssayData(multiome[["peaks"]], slot = "data"), weight.reduction = cite[["pca"]], dims = 1:50 ) cite[["predicted_ATAC"]] <- atac cite[["predicted_ATAC"]] <- as.ChromatinAssay(cite[["predicted_ATAC"]]) ````
1.0
ATAC imputation? - Hello, I appreciate this wonderful tool! I am fairly new to scATACseq analysis, so forgive me if if my question is naive. I have 1 multiome dataset and 1 CITEseq dataset. I’d like to follow the steps on the “RNA imputation” part of this vignette: https://satijalab.org/signac/articles/integrate_atac.html#rna-imputation-1 , except I would like to impute ATAC for the CITEseq dataset. Below is the code I’ve tried, and while the data does transfer, I’m not able to do any downstream analysis with my newly added “predicted_ATAC” slot in the CITEseq dataset. Am I missing something or is this kind of imputation not possible? Thanks in advance for any insight. My code: ```` DefaultAssay(multiome) <- "RNA" DefaultAssay(cite) <- "RNA" multiome <- RunSPCA(multiome, assay = "RNA", graph = "wsnn") #Computing a cached neighbor index multiome <- FindNeighbors( object = multiome, reduction = "spca", dims = 1:50, graph.name = "spca.annoy.neighbors", k.param = 50, cache.index = TRUE, return.neighbor = TRUE, l2.norm = TRUE ) #Query dataset processing #Find anchors between the query and reference anchors <- list() anchors <- FindTransferAnchors( reference = multiome, query = cite, k.filter = NA, reference.reduction = "spca", reference.neighbors = "spca.annoy.neighbors", dims = 1:50 ) atac <- TransferData( anchorset = anchors, refdata = GetAssayData(multiome[["peaks"]], slot = "data"), weight.reduction = cite[["pca"]], dims = 1:50 ) cite[["predicted_ATAC"]] <- atac cite[["predicted_ATAC"]] <- as.ChromatinAssay(cite[["predicted_ATAC"]]) ````
non_priority
atac imputation hello i appreciate this wonderful tool i am fairly new to scatacseq analysis so forgive me if if my question is naive i have multiome dataset and citeseq dataset i’d like to follow the steps on the “rna imputation” part of this vignette except i would like to impute atac for the citeseq dataset below is the code i’ve tried and while the data does transfer i’m not able to do any downstream analysis with my newly added “predicted atac” slot in the citeseq dataset am i missing something or is this kind of imputation not possible thanks in advance for any insight my code defaultassay multiome rna defaultassay cite rna multiome runspca multiome assay rna graph wsnn computing a cached neighbor index multiome findneighbors object multiome reduction spca dims graph name spca annoy neighbors k param cache index true return neighbor true norm true query dataset processing find anchors between the query and reference anchors list anchors findtransferanchors reference multiome query cite k filter na reference reduction spca reference neighbors spca annoy neighbors dims atac transferdata anchorset anchors refdata getassaydata multiome slot data weight reduction cite dims cite atac cite as chromatinassay cite
0
168,855
20,825,726,170
IssuesEvent
2022-03-18 20:35:54
vincenzodistasio97/main
https://api.github.com/repos/vincenzodistasio97/main
opened
pm2-4.2.3.tgz: 22 vulnerabilities (highest severity is: 9.8)
security vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>pm2-4.2.3.tgz</b></p></summary> <p></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/systeminformation/package.json</p> <p> <p>Found in HEAD commit: <a href="https://github.com/vincenzodistasio97/main/commit/ecb3574ba0c4685d9a34e0b4904ed81d76026f9b">ecb3574ba0c4685d9a34e0b4904ed81d76026f9b</a></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | --- | --- | | [CVE-2021-21388](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-21388) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | systeminformation-4.23.1.tgz | Transitive | 4.3.0 | &#10060; | | [CVE-2020-26245](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-26245) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | systeminformation-4.23.1.tgz | Transitive | 4.3.0 | &#10060; | | [CVE-2020-26300](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-26300) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | systeminformation-4.23.1.tgz | Transitive | 4.3.0 | &#10060; | | [CVE-2021-23406](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23406) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | multiple | Transitive | 5.0.0 | &#10060; | | [CVE-2021-28918](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-28918) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.1 | netmask-1.0.6.tgz | Transitive | 4.5.6 | &#10060; | | [CVE-2020-26274](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-26274) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | systeminformation-4.23.1.tgz | Transitive | 4.3.0 | &#10060; | | [CVE-2020-7752](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7752) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | systeminformation-4.23.1.tgz | Transitive | 4.3.0 | &#10060; | | [CVE-2021-21315](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-21315) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.8 | systeminformation-4.23.1.tgz | Transitive | 4.3.0 | &#10060; | | [CVE-2020-28469](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-28469) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | glob-parent-5.1.0.tgz | Transitive | 4.3.0 | &#10060; | | [CVE-2021-23343](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23343) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | path-parse-1.0.6.tgz | Transitive | 4.3.0 | &#10060; | | [CVE-2021-3749](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-3749) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | axios-0.19.2.tgz | Transitive | 4.4.0 | &#10060; | | [CVE-2020-8203](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-8203) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.4 | lodash-4.17.14.tgz | Transitive | 4.3.0 | &#10060; | | [CVE-2020-7778](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7778) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.3 | systeminformation-4.23.1.tgz | Transitive | 4.3.0 | &#10060; | | [CVE-2020-7788](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7788) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.3 | ini-1.3.5.tgz | Transitive | 4.3.0 | &#10060; | | [CVE-2021-23337](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23337) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.2 | lodash-4.17.14.tgz | Transitive | 4.3.0 | &#10060; | | [CVE-2022-0144](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-0144) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.1 | shelljs-0.8.3.tgz | Transitive | 4.4.0 | &#10060; | | [CVE-2022-0155](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-0155) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.5 | follow-redirects-1.5.10.tgz | Transitive | 4.4.0 | &#10060; | | [CVE-2022-0536](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-0536) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.9 | follow-redirects-1.5.10.tgz | Transitive | 4.4.0 | &#10060; | | [CVE-2020-28168](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-28168) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.9 | axios-0.19.2.tgz | Transitive | 4.4.0 | &#10060; | | [CVE-2020-28500](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-28500) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.3 | lodash-4.17.14.tgz | Transitive | 4.3.0 | &#10060; | | [CVE-2021-32640](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-32640) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.3 | multiple | Transitive | 4.3.0 | &#10060; | | [CVE-2021-29418](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-29418) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.3 | netmask-1.0.6.tgz | Transitive | 4.5.6 | &#10060; | ## Details > Partial details (15 vulnerabilities) are displayed below due to a content size limitation in GitHub. To view information on the remaining vulnerabilities, navigate to the WhiteSource Application.<br> <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-21388</summary> ### Vulnerable Library - <b>systeminformation-4.23.1.tgz</b></p> <p>Simple system and OS information library</p> <p>Library home page: <a href="https://registry.npmjs.org/systeminformation/-/systeminformation-4.23.1.tgz">https://registry.npmjs.org/systeminformation/-/systeminformation-4.23.1.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/systeminformation/package.json</p> <p> Dependency Hierarchy: - pm2-4.2.3.tgz (Root Library) - :x: **systeminformation-4.23.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/vincenzodistasio97/main/commit/ecb3574ba0c4685d9a34e0b4904ed81d76026f9b">ecb3574ba0c4685d9a34e0b4904ed81d76026f9b</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> systeminformation is an open source system and OS information library for node.js. A command injection vulnerability has been discovered in versions of systeminformation prior to 5.6.4. The issue has been fixed with a parameter check on user input. Please upgrade to version >= 5.6.4. If you cannot upgrade, be sure to check or sanitize service parameters that are passed to si.inetLatency(), si.inetChecksite(), si.services(), si.processLoad() and other commands. Only allow strings, reject any arrays. String sanitation works as expected. <p>Publish Date: 2021-04-29 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-21388>CVE-2021-21388</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/sebhildebrandt/systeminformation/pull/492">https://github.com/sebhildebrandt/systeminformation/pull/492</a></p> <p>Release Date: 2021-04-29</p> <p>Fix Resolution (systeminformation): 4.34.11</p> <p>Direct dependency fix Resolution (pm2): 4.3.0</p> </p> <p></p> Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-26245</summary> ### Vulnerable Library - <b>systeminformation-4.23.1.tgz</b></p> <p>Simple system and OS information library</p> <p>Library home page: <a href="https://registry.npmjs.org/systeminformation/-/systeminformation-4.23.1.tgz">https://registry.npmjs.org/systeminformation/-/systeminformation-4.23.1.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/systeminformation/package.json</p> <p> Dependency Hierarchy: - pm2-4.2.3.tgz (Root Library) - :x: **systeminformation-4.23.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/vincenzodistasio97/main/commit/ecb3574ba0c4685d9a34e0b4904ed81d76026f9b">ecb3574ba0c4685d9a34e0b4904ed81d76026f9b</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> npm package systeminformation before version 4.30.5 is vulnerable to Prototype Pollution leading to Command Injection. The issue was fixed with a rewrite of shell sanitations to avoid prototyper pollution problems. The issue is fixed in version 4.30.5. If you cannot upgrade, be sure to check or sanitize service parameter strings that are passed to si.inetChecksite(). <p>Publish Date: 2020-11-27 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-26245>CVE-2020-26245</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/sebhildebrandt/systeminformation/security/advisories/GHSA-4v2w-h9jm-mqjg">https://github.com/sebhildebrandt/systeminformation/security/advisories/GHSA-4v2w-h9jm-mqjg</a></p> <p>Release Date: 2020-11-27</p> <p>Fix Resolution (systeminformation): 4.30.5</p> <p>Direct dependency fix Resolution (pm2): 4.3.0</p> </p> <p></p> Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-26300</summary> ### Vulnerable Library - <b>systeminformation-4.23.1.tgz</b></p> <p>Simple system and OS information library</p> <p>Library home page: <a href="https://registry.npmjs.org/systeminformation/-/systeminformation-4.23.1.tgz">https://registry.npmjs.org/systeminformation/-/systeminformation-4.23.1.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/systeminformation/package.json</p> <p> Dependency Hierarchy: - pm2-4.2.3.tgz (Root Library) - :x: **systeminformation-4.23.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/vincenzodistasio97/main/commit/ecb3574ba0c4685d9a34e0b4904ed81d76026f9b">ecb3574ba0c4685d9a34e0b4904ed81d76026f9b</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> systeminformation is an npm package that provides system and OS information library for node.js. In systeminformation before version 4.26.2 there is a command injection vulnerability. Problem was fixed in version 4.26.2 with a shell string sanitation fix. <p>Publish Date: 2021-09-09 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-26300>CVE-2020-26300</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-fj59-f6c3-3vw4">https://github.com/advisories/GHSA-fj59-f6c3-3vw4</a></p> <p>Release Date: 2021-09-09</p> <p>Fix Resolution (systeminformation): 4.26.2</p> <p>Direct dependency fix Resolution (pm2): 4.3.0</p> </p> <p></p> Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-23406</summary> ### Vulnerable Libraries - <b>pac-resolver-3.0.0.tgz</b>, <b>degenerator-1.0.4.tgz</b></p> <p> ### <b>pac-resolver-3.0.0.tgz</b></p> <p>Generates an asynchronous resolver function from a PAC file</p> <p>Library home page: <a href="https://registry.npmjs.org/pac-resolver/-/pac-resolver-3.0.0.tgz">https://registry.npmjs.org/pac-resolver/-/pac-resolver-3.0.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/pac-resolver/package.json</p> <p> Dependency Hierarchy: - pm2-4.2.3.tgz (Root Library) - agent-0.5.26.tgz - proxy-agent-3.1.1.tgz - pac-proxy-agent-3.0.1.tgz - :x: **pac-resolver-3.0.0.tgz** (Vulnerable Library) ### <b>degenerator-1.0.4.tgz</b></p> <p>Turns sync functions into async generator functions</p> <p>Library home page: <a href="https://registry.npmjs.org/degenerator/-/degenerator-1.0.4.tgz">https://registry.npmjs.org/degenerator/-/degenerator-1.0.4.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/degenerator/package.json</p> <p> Dependency Hierarchy: - pm2-4.2.3.tgz (Root Library) - agent-0.5.26.tgz - proxy-agent-3.1.1.tgz - pac-proxy-agent-3.0.1.tgz - pac-resolver-3.0.0.tgz - :x: **degenerator-1.0.4.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/vincenzodistasio97/main/commit/ecb3574ba0c4685d9a34e0b4904ed81d76026f9b">ecb3574ba0c4685d9a34e0b4904ed81d76026f9b</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> This affects the package pac-resolver before 5.0.0. This can occur when used with untrusted input, due to unsafe PAC file handling. **NOTE:** The fix for this vulnerability is applied in the node-degenerator library, a dependency written by the same maintainer. <p>Publish Date: 2021-08-24 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23406>CVE-2021-23406</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-9j49-mfvp-vmhm">https://github.com/advisories/GHSA-9j49-mfvp-vmhm</a></p> <p>Release Date: 2021-08-24</p> <p>Fix Resolution (pac-resolver): 5.0.0</p> <p>Direct dependency fix Resolution (pm2): 5.0.0</p><p>Fix Resolution (degenerator): 3.0.1</p> <p>Direct dependency fix Resolution (pm2): 5.0.0</p> </p> <p></p> Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-28918</summary> ### Vulnerable Library - <b>netmask-1.0.6.tgz</b></p> <p>Parse and lookup IP network blocks</p> <p>Library home page: <a href="https://registry.npmjs.org/netmask/-/netmask-1.0.6.tgz">https://registry.npmjs.org/netmask/-/netmask-1.0.6.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/netmask/package.json</p> <p> Dependency Hierarchy: - pm2-4.2.3.tgz (Root Library) - agent-0.5.26.tgz - proxy-agent-3.1.1.tgz - pac-proxy-agent-3.0.1.tgz - pac-resolver-3.0.0.tgz - :x: **netmask-1.0.6.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/vincenzodistasio97/main/commit/ecb3574ba0c4685d9a34e0b4904ed81d76026f9b">ecb3574ba0c4685d9a34e0b4904ed81d76026f9b</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> Improper input validation of octal strings in netmask npm package v1.0.6 and below allows unauthenticated remote attackers to perform indeterminate SSRF, RFI, and LFI attacks on many of the dependent packages. A remote unauthenticated attacker can bypass packages relying on netmask to filter IPs and reach critical VPN or LAN hosts. <p>Publish Date: 2021-04-01 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-28918>CVE-2021-28918</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.1</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-pch5-whg9-qr2r">https://github.com/advisories/GHSA-pch5-whg9-qr2r</a></p> <p>Release Date: 2021-04-01</p> <p>Fix Resolution (netmask): 2.0.1</p> <p>Direct dependency fix Resolution (pm2): 4.5.6</p> </p> <p></p> Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-26274</summary> ### Vulnerable Library - <b>systeminformation-4.23.1.tgz</b></p> <p>Simple system and OS information library</p> <p>Library home page: <a href="https://registry.npmjs.org/systeminformation/-/systeminformation-4.23.1.tgz">https://registry.npmjs.org/systeminformation/-/systeminformation-4.23.1.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/systeminformation/package.json</p> <p> Dependency Hierarchy: - pm2-4.2.3.tgz (Root Library) - :x: **systeminformation-4.23.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/vincenzodistasio97/main/commit/ecb3574ba0c4685d9a34e0b4904ed81d76026f9b">ecb3574ba0c4685d9a34e0b4904ed81d76026f9b</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> In systeminformation (npm package) before version 4.31.1 there is a command injection vulnerability. The problem was fixed in version 4.31.1 with a shell string sanitation fix. <p>Publish Date: 2020-12-16 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-26274>CVE-2020-26274</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.npmjs.com/package/systeminformation/v/4.31.0">https://www.npmjs.com/package/systeminformation/v/4.31.0</a></p> <p>Release Date: 2020-12-16</p> <p>Fix Resolution (systeminformation): 4.31.1</p> <p>Direct dependency fix Resolution (pm2): 4.3.0</p> </p> <p></p> Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-7752</summary> ### Vulnerable Library - <b>systeminformation-4.23.1.tgz</b></p> <p>Simple system and OS information library</p> <p>Library home page: <a href="https://registry.npmjs.org/systeminformation/-/systeminformation-4.23.1.tgz">https://registry.npmjs.org/systeminformation/-/systeminformation-4.23.1.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/systeminformation/package.json</p> <p> Dependency Hierarchy: - pm2-4.2.3.tgz (Root Library) - :x: **systeminformation-4.23.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/vincenzodistasio97/main/commit/ecb3574ba0c4685d9a34e0b4904ed81d76026f9b">ecb3574ba0c4685d9a34e0b4904ed81d76026f9b</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> This affects the package systeminformation before 4.27.11. This package is vulnerable to Command Injection. The attacker can concatenate curl's parameters to overwrite Javascript files and then execute any OS commands. <p>Publish Date: 2020-10-26 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7752>CVE-2020-7752</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7752">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7752</a></p> <p>Release Date: 2020-10-26</p> <p>Fix Resolution (systeminformation): 4.27.11</p> <p>Direct dependency fix Resolution (pm2): 4.3.0</p> </p> <p></p> Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-21315</summary> ### Vulnerable Library - <b>systeminformation-4.23.1.tgz</b></p> <p>Simple system and OS information library</p> <p>Library home page: <a href="https://registry.npmjs.org/systeminformation/-/systeminformation-4.23.1.tgz">https://registry.npmjs.org/systeminformation/-/systeminformation-4.23.1.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/systeminformation/package.json</p> <p> Dependency Hierarchy: - pm2-4.2.3.tgz (Root Library) - :x: **systeminformation-4.23.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/vincenzodistasio97/main/commit/ecb3574ba0c4685d9a34e0b4904ed81d76026f9b">ecb3574ba0c4685d9a34e0b4904ed81d76026f9b</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> The System Information Library for Node.JS (npm package "systeminformation") is an open source collection of functions to retrieve detailed hardware, system and OS information. In systeminformation before version 5.3.1 there is a command injection vulnerability. Problem was fixed in version 5.3.1. As a workaround instead of upgrading, be sure to check or sanitize service parameters that are passed to si.inetLatency(), si.inetChecksite(), si.services(), si.processLoad() ... do only allow strings, reject any arrays. String sanitation works as expected. <p>Publish Date: 2021-02-16 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-21315>CVE-2021-21315</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/sebhildebrandt/systeminformation/security/advisories/GHSA-2m8v-572m-ff2v">https://github.com/sebhildebrandt/systeminformation/security/advisories/GHSA-2m8v-572m-ff2v</a></p> <p>Release Date: 2021-02-16</p> <p>Fix Resolution (systeminformation): 4.34.11</p> <p>Direct dependency fix Resolution (pm2): 4.3.0</p> </p> <p></p> Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-28469</summary> ### Vulnerable Library - <b>glob-parent-5.1.0.tgz</b></p> <p>Extract the non-magic parent path from a glob string.</p> <p>Library home page: <a href="https://registry.npmjs.org/glob-parent/-/glob-parent-5.1.0.tgz">https://registry.npmjs.org/glob-parent/-/glob-parent-5.1.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/glob-parent/package.json</p> <p> Dependency Hierarchy: - pm2-4.2.3.tgz (Root Library) - chokidar-3.3.1.tgz - :x: **glob-parent-5.1.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/vincenzodistasio97/main/commit/ecb3574ba0c4685d9a34e0b4904ed81d76026f9b">ecb3574ba0c4685d9a34e0b4904ed81d76026f9b</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> This affects the package glob-parent before 5.1.2. The enclosure regex used to check for strings ending in enclosure containing path separator. <p>Publish Date: 2021-06-03 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-28469>CVE-2020-28469</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28469">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28469</a></p> <p>Release Date: 2021-06-03</p> <p>Fix Resolution (glob-parent): 5.1.2</p> <p>Direct dependency fix Resolution (pm2): 4.3.0</p> </p> <p></p> Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-23343</summary> ### Vulnerable Library - <b>path-parse-1.0.6.tgz</b></p> <p>Node.js path.parse() ponyfill</p> <p>Library home page: <a href="https://registry.npmjs.org/path-parse/-/path-parse-1.0.6.tgz">https://registry.npmjs.org/path-parse/-/path-parse-1.0.6.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/path-parse/package.json</p> <p> Dependency Hierarchy: - pm2-4.2.3.tgz (Root Library) - shelljs-0.8.3.tgz - rechoir-0.6.2.tgz - resolve-1.15.1.tgz - :x: **path-parse-1.0.6.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/vincenzodistasio97/main/commit/ecb3574ba0c4685d9a34e0b4904ed81d76026f9b">ecb3574ba0c4685d9a34e0b4904ed81d76026f9b</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> All versions of package path-parse are vulnerable to Regular Expression Denial of Service (ReDoS) via splitDeviceRe, splitTailRe, and splitPathRe regular expressions. ReDoS exhibits polynomial worst-case time complexity. <p>Publish Date: 2021-05-04 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23343>CVE-2021-23343</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/jbgutierrez/path-parse/issues/8">https://github.com/jbgutierrez/path-parse/issues/8</a></p> <p>Release Date: 2021-05-04</p> <p>Fix Resolution (path-parse): 1.0.7</p> <p>Direct dependency fix Resolution (pm2): 4.3.0</p> </p> <p></p> Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-3749</summary> ### Vulnerable Library - <b>axios-0.19.2.tgz</b></p> <p>Promise based HTTP client for the browser and node.js</p> <p>Library home page: <a href="https://registry.npmjs.org/axios/-/axios-0.19.2.tgz">https://registry.npmjs.org/axios/-/axios-0.19.2.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/axios/package.json</p> <p> Dependency Hierarchy: - pm2-4.2.3.tgz (Root Library) - js-api-0.5.60.tgz - :x: **axios-0.19.2.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/vincenzodistasio97/main/commit/ecb3574ba0c4685d9a34e0b4904ed81d76026f9b">ecb3574ba0c4685d9a34e0b4904ed81d76026f9b</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> axios is vulnerable to Inefficient Regular Expression Complexity <p>Publish Date: 2021-08-31 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-3749>CVE-2021-3749</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/axios/axios/releases/tag/v0.21.2">https://github.com/axios/axios/releases/tag/v0.21.2</a></p> <p>Release Date: 2021-08-31</p> <p>Fix Resolution (axios): 0.20.0</p> <p>Direct dependency fix Resolution (pm2): 4.4.0</p> </p> <p></p> Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-8203</summary> ### Vulnerable Library - <b>lodash-4.17.14.tgz</b></p> <p>Lodash modular utilities.</p> <p>Library home page: <a href="https://registry.npmjs.org/lodash/-/lodash-4.17.14.tgz">https://registry.npmjs.org/lodash/-/lodash-4.17.14.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/pm2/node_modules/lodash/package.json</p> <p> Dependency Hierarchy: - pm2-4.2.3.tgz (Root Library) - :x: **lodash-4.17.14.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/vincenzodistasio97/main/commit/ecb3574ba0c4685d9a34e0b4904ed81d76026f9b">ecb3574ba0c4685d9a34e0b4904ed81d76026f9b</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> Prototype pollution attack when using _.zipObjectDeep in lodash before 4.17.20. <p>Publish Date: 2020-07-15 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-8203>CVE-2020-8203</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.4</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.npmjs.com/advisories/1523">https://www.npmjs.com/advisories/1523</a></p> <p>Release Date: 2020-07-15</p> <p>Fix Resolution (lodash): 4.17.19</p> <p>Direct dependency fix Resolution (pm2): 4.3.0</p> </p> <p></p> Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-7778</summary> ### Vulnerable Library - <b>systeminformation-4.23.1.tgz</b></p> <p>Simple system and OS information library</p> <p>Library home page: <a href="https://registry.npmjs.org/systeminformation/-/systeminformation-4.23.1.tgz">https://registry.npmjs.org/systeminformation/-/systeminformation-4.23.1.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/systeminformation/package.json</p> <p> Dependency Hierarchy: - pm2-4.2.3.tgz (Root Library) - :x: **systeminformation-4.23.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/vincenzodistasio97/main/commit/ecb3574ba0c4685d9a34e0b4904ed81d76026f9b">ecb3574ba0c4685d9a34e0b4904ed81d76026f9b</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> This affects the package systeminformation before 4.30.2. The attacker can overwrite the properties and functions of an object, which can lead to executing OS commands. <p>Publish Date: 2020-11-26 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7778>CVE-2020-7778</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.3</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/sebhildebrandt/systeminformation/releases/tag/v4.30.2">https://github.com/sebhildebrandt/systeminformation/releases/tag/v4.30.2</a></p> <p>Release Date: 2020-11-26</p> <p>Fix Resolution (systeminformation): 4.30.2</p> <p>Direct dependency fix Resolution (pm2): 4.3.0</p> </p> <p></p> Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-7788</summary> ### Vulnerable Library - <b>ini-1.3.5.tgz</b></p> <p>An ini encoder/decoder for node</p> <p>Library home page: <a href="https://registry.npmjs.org/ini/-/ini-1.3.5.tgz">https://registry.npmjs.org/ini/-/ini-1.3.5.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/ini/package.json</p> <p> Dependency Hierarchy: - pm2-4.2.3.tgz (Root Library) - vizion-2.0.2.tgz - :x: **ini-1.3.5.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/vincenzodistasio97/main/commit/ecb3574ba0c4685d9a34e0b4904ed81d76026f9b">ecb3574ba0c4685d9a34e0b4904ed81d76026f9b</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> This affects the package ini before 1.3.6. If an attacker submits a malicious INI file to an application that parses it with ini.parse, they will pollute the prototype on the application. This can be exploited further depending on the context. <p>Publish Date: 2020-12-11 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7788>CVE-2020-7788</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.3</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7788">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7788</a></p> <p>Release Date: 2020-12-11</p> <p>Fix Resolution (ini): 1.3.6</p> <p>Direct dependency fix Resolution (pm2): 4.3.0</p> </p> <p></p> Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-23337</summary> ### Vulnerable Library - <b>lodash-4.17.14.tgz</b></p> <p>Lodash modular utilities.</p> <p>Library home page: <a href="https://registry.npmjs.org/lodash/-/lodash-4.17.14.tgz">https://registry.npmjs.org/lodash/-/lodash-4.17.14.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/pm2/node_modules/lodash/package.json</p> <p> Dependency Hierarchy: - pm2-4.2.3.tgz (Root Library) - :x: **lodash-4.17.14.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/vincenzodistasio97/main/commit/ecb3574ba0c4685d9a34e0b4904ed81d76026f9b">ecb3574ba0c4685d9a34e0b4904ed81d76026f9b</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> Lodash versions prior to 4.17.21 are vulnerable to Command Injection via the template function. <p>Publish Date: 2021-02-15 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23337>CVE-2021-23337</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.2</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: High - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/lodash/lodash/commit/3469357cff396a26c363f8c1b5a91dde28ba4b1c">https://github.com/lodash/lodash/commit/3469357cff396a26c363f8c1b5a91dde28ba4b1c</a></p> <p>Release Date: 2021-02-15</p> <p>Fix Resolution (lodash): 4.17.21</p> <p>Direct dependency fix Resolution (pm2): 4.3.0</p> </p> <p></p> Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details> <!-- <REMEDIATE>[{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"pm2","packageVersion":"4.2.3","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"pm2:4.2.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"4.3.0","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2021-21388","vulnerabilityDetails":"systeminformation is an open source system and OS information library for node.js. A command injection vulnerability has been discovered in versions of systeminformation prior to 5.6.4. The issue has been fixed with a parameter check on user input. Please upgrade to version \u003e\u003d 5.6.4. If you cannot upgrade, be sure to check or sanitize service parameters that are passed to si.inetLatency(), si.inetChecksite(), si.services(), si.processLoad() and other commands. Only allow strings, reject any arrays. String sanitation works as expected.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-21388","cvss3Severity":"high","cvss3Score":"9.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"pm2","packageVersion":"4.2.3","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"pm2:4.2.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"4.3.0","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-26245","vulnerabilityDetails":"npm package systeminformation before version 4.30.5 is vulnerable to Prototype Pollution leading to Command Injection. The issue was fixed with a rewrite of shell sanitations to avoid prototyper pollution problems. The issue is fixed in version 4.30.5. If you cannot upgrade, be sure to check or sanitize service parameter strings that are passed to si.inetChecksite().","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-26245","cvss3Severity":"high","cvss3Score":"9.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"pm2","packageVersion":"4.2.3","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"pm2:4.2.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"4.3.0","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-26300","vulnerabilityDetails":"systeminformation is an npm package that provides system and OS information library for node.js. In systeminformation before version 4.26.2 there is a command injection vulnerability. Problem was fixed in version 4.26.2 with a shell string sanitation fix.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-26300","cvss3Severity":"high","cvss3Score":"9.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"pm2","packageVersion":"4.2.3","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"pm2:4.2.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"5.0.0","isBinary":false},{"packageType":"javascript/Node.js","packageName":"pm2","packageVersion":"4.2.3","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"pm2:4.2.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"5.0.0","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2021-23406","vulnerabilityDetails":"This affects the package pac-resolver before 5.0.0. This can occur when used with untrusted input, due to unsafe PAC file handling. **NOTE:** The fix for this vulnerability is applied in the node-degenerator library, a dependency written by the same maintainer.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23406","cvss3Severity":"high","cvss3Score":"9.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"pm2","packageVersion":"4.2.3","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"pm2:4.2.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"4.5.6","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2021-28918","vulnerabilityDetails":"Improper input validation of octal strings in netmask npm package v1.0.6 and below allows unauthenticated remote attackers to perform indeterminate SSRF, RFI, and LFI attacks on many of the dependent packages. A remote unauthenticated attacker can bypass packages relying on netmask to filter IPs and reach critical VPN or LAN hosts.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-28918","cvss3Severity":"high","cvss3Score":"9.1","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"pm2","packageVersion":"4.2.3","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"pm2:4.2.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"4.3.0","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-26274","vulnerabilityDetails":"In systeminformation (npm package) before version 4.31.1 there is a command injection vulnerability. The problem was fixed in version 4.31.1 with a shell string sanitation fix.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-26274","cvss3Severity":"high","cvss3Score":"8.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"Low","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"pm2","packageVersion":"4.2.3","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"pm2:4.2.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"4.3.0","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-7752","vulnerabilityDetails":"This affects the package systeminformation before 4.27.11. This package is vulnerable to Command Injection. The attacker can concatenate curl\u0027s parameters to overwrite Javascript files and then execute any OS commands.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7752","cvss3Severity":"high","cvss3Score":"8.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"Low","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"pm2","packageVersion":"4.2.3","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"pm2:4.2.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"4.3.0","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2021-21315","vulnerabilityDetails":"The System Information Library for Node.JS (npm package \"systeminformation\") is an open source collection of functions to retrieve detailed hardware, system and OS information. In systeminformation before version 5.3.1 there is a command injection vulnerability. Problem was fixed in version 5.3.1. As a workaround instead of upgrading, be sure to check or sanitize service parameters that are passed to si.inetLatency(), si.inetChecksite(), si.services(), si.processLoad() ... do only allow strings, reject any arrays. String sanitation works as expected.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-21315","cvss3Severity":"high","cvss3Score":"7.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"Low","S":"Unchanged","C":"High","UI":"None","AV":"Local","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"pm2","packageVersion":"4.2.3","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"pm2:4.2.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"4.3.0","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-28469","vulnerabilityDetails":"This affects the package glob-parent before 5.1.2. The enclosure regex used to check for strings ending in enclosure containing path separator.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-28469","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"pm2","packageVersion":"4.2.3","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"pm2:4.2.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"4.3.0","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2021-23343","vulnerabilityDetails":"All versions of package path-parse are vulnerable to Regular Expression Denial of Service (ReDoS) via splitDeviceRe, splitTailRe, and splitPathRe regular expressions. ReDoS exhibits polynomial worst-case time complexity.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23343","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"pm2","packageVersion":"4.2.3","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"pm2:4.2.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"4.4.0","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2021-3749","vulnerabilityDetails":"axios is vulnerable to Inefficient Regular Expression Complexity","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-3749","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"pm2","packageVersion":"4.2.3","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"pm2:4.2.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"4.3.0","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-8203","vulnerabilityDetails":"Prototype pollution attack when using _.zipObjectDeep in lodash before 4.17.20.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-8203","cvss3Severity":"high","cvss3Score":"7.4","cvss3Metrics":{"A":"High","AC":"High","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"pm2","packageVersion":"4.2.3","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"pm2:4.2.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"4.3.0","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-7778","vulnerabilityDetails":"This affects the package systeminformation before 4.30.2. The attacker can overwrite the properties and functions of an object, which can lead to executing OS commands.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7778","cvss3Severity":"high","cvss3Score":"7.3","cvss3Metrics":{"A":"Low","AC":"Low","PR":"None","S":"Unchanged","C":"Low","UI":"None","AV":"Network","I":"Low"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"pm2","packageVersion":"4.2.3","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"pm2:4.2.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"4.3.0","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-7788","vulnerabilityDetails":"This affects the package ini before 1.3.6. If an attacker submits a malicious INI file to an application that parses it with ini.parse, they will pollute the prototype on the application. This can be exploited further depending on the context.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7788","cvss3Severity":"high","cvss3Score":"7.3","cvss3Metrics":{"A":"Low","AC":"Low","PR":"None","S":"Unchanged","C":"Low","UI":"None","AV":"Network","I":"Low"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"pm2","packageVersion":"4.2.3","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"pm2:4.2.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"4.3.0","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2021-23337","vulnerabilityDetails":"Lodash versions prior to 4.17.21 are vulnerable to Command Injection via the template function.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23337","cvss3Severity":"high","cvss3Score":"7.2","cvss3Metrics":{"A":"High","AC":"Low","PR":"High","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"pm2","packageVersion":"4.2.3","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"pm2:4.2.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"4.4.0","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2022-0144","vulnerabilityDetails":"shelljs is vulnerable to Improper Privilege Management","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-0144","cvss3Severity":"high","cvss3Score":"7.1","cvss3Metrics":{"A":"High","AC":"Low","PR":"Low","S":"Unchanged","C":"High","UI":"None","AV":"Local","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"pm2","packageVersion":"4.2.3","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"pm2:4.2.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"4.4.0","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2022-0155","vulnerabilityDetails":"follow-redirects is vulnerable to Exposure of Private Personal Information to an Unauthorized Actor","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-0155","cvss3Severity":"medium","cvss3Score":"6.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"Required","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"pm2","packageVersion":"4.2.3","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"pm2:4.2.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"4.4.0","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2022-0536","vulnerabilityDetails":"Exposure of Sensitive Information to an Unauthorized Actor in NPM follow-redirects prior to 1.14.8.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-0536","cvss3Severity":"medium","cvss3Score":"5.9","cvss3Metrics":{"A":"None","AC":"High","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"pm2","packageVersion":"4.2.3","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"pm2:4.2.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"4.4.0","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-28168","vulnerabilityDetails":"Axios NPM package 0.21.0 contains a Server-Side Request Forgery (SSRF) vulnerability where an attacker is able to bypass a proxy by providing a URL that responds with a redirect to a restricted host or IP address.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-28168","cvss3Severity":"medium","cvss3Score":"5.9","cvss3Metrics":{"A":"None","AC":"High","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"pm2","packageVersion":"4.2.3","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"pm2:4.2.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"4.3.0","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-28500","vulnerabilityDetails":"Lodash versions prior to 4.17.21 are vulnerable to Regular Expression Denial of Service (ReDoS) via the toNumber, trim and trimEnd functions.\n WhiteSource Note: After conducting further research, WhiteSource has determined that CVE-2020-28500 only affects environments with versions 4.0.0 to 4.17.20 of Lodash.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-28500","cvss3Severity":"medium","cvss3Score":"5.3","cvss3Metrics":{"A":"Low","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"pm2","packageVersion":"4.2.3","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"pm2:4.2.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"4.3.0","isBinary":false},{"packageType":"javascript/Node.js","packageName":"pm2","packageVersion":"4.2.3","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"pm2:4.2.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"4.3.0","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2021-32640","vulnerabilityDetails":"ws is an open source WebSocket client and server library for Node.js. A specially crafted value of the `Sec-Websocket-Protocol` header can be used to significantly slow down a ws server. The vulnerability has been fixed in ws@7.4.6 (https://github.com/websockets/ws/commit/00c425ec77993773d823f018f64a5c44e17023ff). In vulnerable versions of ws, the issue can be mitigated by reducing the maximum allowed length of the request headers using the [`--max-http-header-size\u003dsize`](https://nodejs.org/api/cli.html#cli_max_http_header_size_size) and/or the [`maxHeaderSize`](https://nodejs.org/api/http.html#http_http_createserver_options_requestlistener) options.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-32640","cvss3Severity":"medium","cvss3Score":"5.3","cvss3Metrics":{"A":"Low","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"pm2","packageVersion":"4.2.3","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"pm2:4.2.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"4.5.6","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2021-29418","vulnerabilityDetails":"The netmask package before 2.0.1 for Node.js mishandles certain unexpected characters in an IP address string, such as an octal digit of 9. This (in some situations) allows attackers to bypass access control that is based on IP addresses. NOTE: this issue exists because of an incomplete fix for CVE-2021-28918.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-29418","cvss3Severity":"medium","cvss3Score":"5.3","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"Low"},"extraData":{}}]</REMEDIATE> -->
True
pm2-4.2.3.tgz: 22 vulnerabilities (highest severity is: 9.8) - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>pm2-4.2.3.tgz</b></p></summary> <p></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/systeminformation/package.json</p> <p> <p>Found in HEAD commit: <a href="https://github.com/vincenzodistasio97/main/commit/ecb3574ba0c4685d9a34e0b4904ed81d76026f9b">ecb3574ba0c4685d9a34e0b4904ed81d76026f9b</a></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | --- | --- | | [CVE-2021-21388](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-21388) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | systeminformation-4.23.1.tgz | Transitive | 4.3.0 | &#10060; | | [CVE-2020-26245](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-26245) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | systeminformation-4.23.1.tgz | Transitive | 4.3.0 | &#10060; | | [CVE-2020-26300](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-26300) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | systeminformation-4.23.1.tgz | Transitive | 4.3.0 | &#10060; | | [CVE-2021-23406](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23406) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | multiple | Transitive | 5.0.0 | &#10060; | | [CVE-2021-28918](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-28918) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.1 | netmask-1.0.6.tgz | Transitive | 4.5.6 | &#10060; | | [CVE-2020-26274](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-26274) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | systeminformation-4.23.1.tgz | Transitive | 4.3.0 | &#10060; | | [CVE-2020-7752](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7752) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | systeminformation-4.23.1.tgz | Transitive | 4.3.0 | &#10060; | | [CVE-2021-21315](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-21315) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.8 | systeminformation-4.23.1.tgz | Transitive | 4.3.0 | &#10060; | | [CVE-2020-28469](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-28469) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | glob-parent-5.1.0.tgz | Transitive | 4.3.0 | &#10060; | | [CVE-2021-23343](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23343) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | path-parse-1.0.6.tgz | Transitive | 4.3.0 | &#10060; | | [CVE-2021-3749](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-3749) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | axios-0.19.2.tgz | Transitive | 4.4.0 | &#10060; | | [CVE-2020-8203](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-8203) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.4 | lodash-4.17.14.tgz | Transitive | 4.3.0 | &#10060; | | [CVE-2020-7778](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7778) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.3 | systeminformation-4.23.1.tgz | Transitive | 4.3.0 | &#10060; | | [CVE-2020-7788](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7788) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.3 | ini-1.3.5.tgz | Transitive | 4.3.0 | &#10060; | | [CVE-2021-23337](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23337) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.2 | lodash-4.17.14.tgz | Transitive | 4.3.0 | &#10060; | | [CVE-2022-0144](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-0144) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.1 | shelljs-0.8.3.tgz | Transitive | 4.4.0 | &#10060; | | [CVE-2022-0155](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-0155) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.5 | follow-redirects-1.5.10.tgz | Transitive | 4.4.0 | &#10060; | | [CVE-2022-0536](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-0536) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.9 | follow-redirects-1.5.10.tgz | Transitive | 4.4.0 | &#10060; | | [CVE-2020-28168](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-28168) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.9 | axios-0.19.2.tgz | Transitive | 4.4.0 | &#10060; | | [CVE-2020-28500](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-28500) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.3 | lodash-4.17.14.tgz | Transitive | 4.3.0 | &#10060; | | [CVE-2021-32640](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-32640) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.3 | multiple | Transitive | 4.3.0 | &#10060; | | [CVE-2021-29418](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-29418) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.3 | netmask-1.0.6.tgz | Transitive | 4.5.6 | &#10060; | ## Details > Partial details (15 vulnerabilities) are displayed below due to a content size limitation in GitHub. To view information on the remaining vulnerabilities, navigate to the WhiteSource Application.<br> <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-21388</summary> ### Vulnerable Library - <b>systeminformation-4.23.1.tgz</b></p> <p>Simple system and OS information library</p> <p>Library home page: <a href="https://registry.npmjs.org/systeminformation/-/systeminformation-4.23.1.tgz">https://registry.npmjs.org/systeminformation/-/systeminformation-4.23.1.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/systeminformation/package.json</p> <p> Dependency Hierarchy: - pm2-4.2.3.tgz (Root Library) - :x: **systeminformation-4.23.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/vincenzodistasio97/main/commit/ecb3574ba0c4685d9a34e0b4904ed81d76026f9b">ecb3574ba0c4685d9a34e0b4904ed81d76026f9b</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> systeminformation is an open source system and OS information library for node.js. A command injection vulnerability has been discovered in versions of systeminformation prior to 5.6.4. The issue has been fixed with a parameter check on user input. Please upgrade to version >= 5.6.4. If you cannot upgrade, be sure to check or sanitize service parameters that are passed to si.inetLatency(), si.inetChecksite(), si.services(), si.processLoad() and other commands. Only allow strings, reject any arrays. String sanitation works as expected. <p>Publish Date: 2021-04-29 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-21388>CVE-2021-21388</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/sebhildebrandt/systeminformation/pull/492">https://github.com/sebhildebrandt/systeminformation/pull/492</a></p> <p>Release Date: 2021-04-29</p> <p>Fix Resolution (systeminformation): 4.34.11</p> <p>Direct dependency fix Resolution (pm2): 4.3.0</p> </p> <p></p> Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-26245</summary> ### Vulnerable Library - <b>systeminformation-4.23.1.tgz</b></p> <p>Simple system and OS information library</p> <p>Library home page: <a href="https://registry.npmjs.org/systeminformation/-/systeminformation-4.23.1.tgz">https://registry.npmjs.org/systeminformation/-/systeminformation-4.23.1.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/systeminformation/package.json</p> <p> Dependency Hierarchy: - pm2-4.2.3.tgz (Root Library) - :x: **systeminformation-4.23.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/vincenzodistasio97/main/commit/ecb3574ba0c4685d9a34e0b4904ed81d76026f9b">ecb3574ba0c4685d9a34e0b4904ed81d76026f9b</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> npm package systeminformation before version 4.30.5 is vulnerable to Prototype Pollution leading to Command Injection. The issue was fixed with a rewrite of shell sanitations to avoid prototyper pollution problems. The issue is fixed in version 4.30.5. If you cannot upgrade, be sure to check or sanitize service parameter strings that are passed to si.inetChecksite(). <p>Publish Date: 2020-11-27 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-26245>CVE-2020-26245</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/sebhildebrandt/systeminformation/security/advisories/GHSA-4v2w-h9jm-mqjg">https://github.com/sebhildebrandt/systeminformation/security/advisories/GHSA-4v2w-h9jm-mqjg</a></p> <p>Release Date: 2020-11-27</p> <p>Fix Resolution (systeminformation): 4.30.5</p> <p>Direct dependency fix Resolution (pm2): 4.3.0</p> </p> <p></p> Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-26300</summary> ### Vulnerable Library - <b>systeminformation-4.23.1.tgz</b></p> <p>Simple system and OS information library</p> <p>Library home page: <a href="https://registry.npmjs.org/systeminformation/-/systeminformation-4.23.1.tgz">https://registry.npmjs.org/systeminformation/-/systeminformation-4.23.1.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/systeminformation/package.json</p> <p> Dependency Hierarchy: - pm2-4.2.3.tgz (Root Library) - :x: **systeminformation-4.23.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/vincenzodistasio97/main/commit/ecb3574ba0c4685d9a34e0b4904ed81d76026f9b">ecb3574ba0c4685d9a34e0b4904ed81d76026f9b</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> systeminformation is an npm package that provides system and OS information library for node.js. In systeminformation before version 4.26.2 there is a command injection vulnerability. Problem was fixed in version 4.26.2 with a shell string sanitation fix. <p>Publish Date: 2021-09-09 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-26300>CVE-2020-26300</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-fj59-f6c3-3vw4">https://github.com/advisories/GHSA-fj59-f6c3-3vw4</a></p> <p>Release Date: 2021-09-09</p> <p>Fix Resolution (systeminformation): 4.26.2</p> <p>Direct dependency fix Resolution (pm2): 4.3.0</p> </p> <p></p> Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-23406</summary> ### Vulnerable Libraries - <b>pac-resolver-3.0.0.tgz</b>, <b>degenerator-1.0.4.tgz</b></p> <p> ### <b>pac-resolver-3.0.0.tgz</b></p> <p>Generates an asynchronous resolver function from a PAC file</p> <p>Library home page: <a href="https://registry.npmjs.org/pac-resolver/-/pac-resolver-3.0.0.tgz">https://registry.npmjs.org/pac-resolver/-/pac-resolver-3.0.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/pac-resolver/package.json</p> <p> Dependency Hierarchy: - pm2-4.2.3.tgz (Root Library) - agent-0.5.26.tgz - proxy-agent-3.1.1.tgz - pac-proxy-agent-3.0.1.tgz - :x: **pac-resolver-3.0.0.tgz** (Vulnerable Library) ### <b>degenerator-1.0.4.tgz</b></p> <p>Turns sync functions into async generator functions</p> <p>Library home page: <a href="https://registry.npmjs.org/degenerator/-/degenerator-1.0.4.tgz">https://registry.npmjs.org/degenerator/-/degenerator-1.0.4.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/degenerator/package.json</p> <p> Dependency Hierarchy: - pm2-4.2.3.tgz (Root Library) - agent-0.5.26.tgz - proxy-agent-3.1.1.tgz - pac-proxy-agent-3.0.1.tgz - pac-resolver-3.0.0.tgz - :x: **degenerator-1.0.4.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/vincenzodistasio97/main/commit/ecb3574ba0c4685d9a34e0b4904ed81d76026f9b">ecb3574ba0c4685d9a34e0b4904ed81d76026f9b</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> This affects the package pac-resolver before 5.0.0. This can occur when used with untrusted input, due to unsafe PAC file handling. **NOTE:** The fix for this vulnerability is applied in the node-degenerator library, a dependency written by the same maintainer. <p>Publish Date: 2021-08-24 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23406>CVE-2021-23406</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-9j49-mfvp-vmhm">https://github.com/advisories/GHSA-9j49-mfvp-vmhm</a></p> <p>Release Date: 2021-08-24</p> <p>Fix Resolution (pac-resolver): 5.0.0</p> <p>Direct dependency fix Resolution (pm2): 5.0.0</p><p>Fix Resolution (degenerator): 3.0.1</p> <p>Direct dependency fix Resolution (pm2): 5.0.0</p> </p> <p></p> Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-28918</summary> ### Vulnerable Library - <b>netmask-1.0.6.tgz</b></p> <p>Parse and lookup IP network blocks</p> <p>Library home page: <a href="https://registry.npmjs.org/netmask/-/netmask-1.0.6.tgz">https://registry.npmjs.org/netmask/-/netmask-1.0.6.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/netmask/package.json</p> <p> Dependency Hierarchy: - pm2-4.2.3.tgz (Root Library) - agent-0.5.26.tgz - proxy-agent-3.1.1.tgz - pac-proxy-agent-3.0.1.tgz - pac-resolver-3.0.0.tgz - :x: **netmask-1.0.6.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/vincenzodistasio97/main/commit/ecb3574ba0c4685d9a34e0b4904ed81d76026f9b">ecb3574ba0c4685d9a34e0b4904ed81d76026f9b</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> Improper input validation of octal strings in netmask npm package v1.0.6 and below allows unauthenticated remote attackers to perform indeterminate SSRF, RFI, and LFI attacks on many of the dependent packages. A remote unauthenticated attacker can bypass packages relying on netmask to filter IPs and reach critical VPN or LAN hosts. <p>Publish Date: 2021-04-01 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-28918>CVE-2021-28918</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.1</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-pch5-whg9-qr2r">https://github.com/advisories/GHSA-pch5-whg9-qr2r</a></p> <p>Release Date: 2021-04-01</p> <p>Fix Resolution (netmask): 2.0.1</p> <p>Direct dependency fix Resolution (pm2): 4.5.6</p> </p> <p></p> Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-26274</summary> ### Vulnerable Library - <b>systeminformation-4.23.1.tgz</b></p> <p>Simple system and OS information library</p> <p>Library home page: <a href="https://registry.npmjs.org/systeminformation/-/systeminformation-4.23.1.tgz">https://registry.npmjs.org/systeminformation/-/systeminformation-4.23.1.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/systeminformation/package.json</p> <p> Dependency Hierarchy: - pm2-4.2.3.tgz (Root Library) - :x: **systeminformation-4.23.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/vincenzodistasio97/main/commit/ecb3574ba0c4685d9a34e0b4904ed81d76026f9b">ecb3574ba0c4685d9a34e0b4904ed81d76026f9b</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> In systeminformation (npm package) before version 4.31.1 there is a command injection vulnerability. The problem was fixed in version 4.31.1 with a shell string sanitation fix. <p>Publish Date: 2020-12-16 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-26274>CVE-2020-26274</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.npmjs.com/package/systeminformation/v/4.31.0">https://www.npmjs.com/package/systeminformation/v/4.31.0</a></p> <p>Release Date: 2020-12-16</p> <p>Fix Resolution (systeminformation): 4.31.1</p> <p>Direct dependency fix Resolution (pm2): 4.3.0</p> </p> <p></p> Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-7752</summary> ### Vulnerable Library - <b>systeminformation-4.23.1.tgz</b></p> <p>Simple system and OS information library</p> <p>Library home page: <a href="https://registry.npmjs.org/systeminformation/-/systeminformation-4.23.1.tgz">https://registry.npmjs.org/systeminformation/-/systeminformation-4.23.1.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/systeminformation/package.json</p> <p> Dependency Hierarchy: - pm2-4.2.3.tgz (Root Library) - :x: **systeminformation-4.23.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/vincenzodistasio97/main/commit/ecb3574ba0c4685d9a34e0b4904ed81d76026f9b">ecb3574ba0c4685d9a34e0b4904ed81d76026f9b</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> This affects the package systeminformation before 4.27.11. This package is vulnerable to Command Injection. The attacker can concatenate curl's parameters to overwrite Javascript files and then execute any OS commands. <p>Publish Date: 2020-10-26 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7752>CVE-2020-7752</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7752">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7752</a></p> <p>Release Date: 2020-10-26</p> <p>Fix Resolution (systeminformation): 4.27.11</p> <p>Direct dependency fix Resolution (pm2): 4.3.0</p> </p> <p></p> Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-21315</summary> ### Vulnerable Library - <b>systeminformation-4.23.1.tgz</b></p> <p>Simple system and OS information library</p> <p>Library home page: <a href="https://registry.npmjs.org/systeminformation/-/systeminformation-4.23.1.tgz">https://registry.npmjs.org/systeminformation/-/systeminformation-4.23.1.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/systeminformation/package.json</p> <p> Dependency Hierarchy: - pm2-4.2.3.tgz (Root Library) - :x: **systeminformation-4.23.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/vincenzodistasio97/main/commit/ecb3574ba0c4685d9a34e0b4904ed81d76026f9b">ecb3574ba0c4685d9a34e0b4904ed81d76026f9b</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> The System Information Library for Node.JS (npm package "systeminformation") is an open source collection of functions to retrieve detailed hardware, system and OS information. In systeminformation before version 5.3.1 there is a command injection vulnerability. Problem was fixed in version 5.3.1. As a workaround instead of upgrading, be sure to check or sanitize service parameters that are passed to si.inetLatency(), si.inetChecksite(), si.services(), si.processLoad() ... do only allow strings, reject any arrays. String sanitation works as expected. <p>Publish Date: 2021-02-16 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-21315>CVE-2021-21315</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/sebhildebrandt/systeminformation/security/advisories/GHSA-2m8v-572m-ff2v">https://github.com/sebhildebrandt/systeminformation/security/advisories/GHSA-2m8v-572m-ff2v</a></p> <p>Release Date: 2021-02-16</p> <p>Fix Resolution (systeminformation): 4.34.11</p> <p>Direct dependency fix Resolution (pm2): 4.3.0</p> </p> <p></p> Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-28469</summary> ### Vulnerable Library - <b>glob-parent-5.1.0.tgz</b></p> <p>Extract the non-magic parent path from a glob string.</p> <p>Library home page: <a href="https://registry.npmjs.org/glob-parent/-/glob-parent-5.1.0.tgz">https://registry.npmjs.org/glob-parent/-/glob-parent-5.1.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/glob-parent/package.json</p> <p> Dependency Hierarchy: - pm2-4.2.3.tgz (Root Library) - chokidar-3.3.1.tgz - :x: **glob-parent-5.1.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/vincenzodistasio97/main/commit/ecb3574ba0c4685d9a34e0b4904ed81d76026f9b">ecb3574ba0c4685d9a34e0b4904ed81d76026f9b</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> This affects the package glob-parent before 5.1.2. The enclosure regex used to check for strings ending in enclosure containing path separator. <p>Publish Date: 2021-06-03 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-28469>CVE-2020-28469</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28469">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28469</a></p> <p>Release Date: 2021-06-03</p> <p>Fix Resolution (glob-parent): 5.1.2</p> <p>Direct dependency fix Resolution (pm2): 4.3.0</p> </p> <p></p> Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-23343</summary> ### Vulnerable Library - <b>path-parse-1.0.6.tgz</b></p> <p>Node.js path.parse() ponyfill</p> <p>Library home page: <a href="https://registry.npmjs.org/path-parse/-/path-parse-1.0.6.tgz">https://registry.npmjs.org/path-parse/-/path-parse-1.0.6.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/path-parse/package.json</p> <p> Dependency Hierarchy: - pm2-4.2.3.tgz (Root Library) - shelljs-0.8.3.tgz - rechoir-0.6.2.tgz - resolve-1.15.1.tgz - :x: **path-parse-1.0.6.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/vincenzodistasio97/main/commit/ecb3574ba0c4685d9a34e0b4904ed81d76026f9b">ecb3574ba0c4685d9a34e0b4904ed81d76026f9b</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> All versions of package path-parse are vulnerable to Regular Expression Denial of Service (ReDoS) via splitDeviceRe, splitTailRe, and splitPathRe regular expressions. ReDoS exhibits polynomial worst-case time complexity. <p>Publish Date: 2021-05-04 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23343>CVE-2021-23343</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/jbgutierrez/path-parse/issues/8">https://github.com/jbgutierrez/path-parse/issues/8</a></p> <p>Release Date: 2021-05-04</p> <p>Fix Resolution (path-parse): 1.0.7</p> <p>Direct dependency fix Resolution (pm2): 4.3.0</p> </p> <p></p> Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-3749</summary> ### Vulnerable Library - <b>axios-0.19.2.tgz</b></p> <p>Promise based HTTP client for the browser and node.js</p> <p>Library home page: <a href="https://registry.npmjs.org/axios/-/axios-0.19.2.tgz">https://registry.npmjs.org/axios/-/axios-0.19.2.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/axios/package.json</p> <p> Dependency Hierarchy: - pm2-4.2.3.tgz (Root Library) - js-api-0.5.60.tgz - :x: **axios-0.19.2.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/vincenzodistasio97/main/commit/ecb3574ba0c4685d9a34e0b4904ed81d76026f9b">ecb3574ba0c4685d9a34e0b4904ed81d76026f9b</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> axios is vulnerable to Inefficient Regular Expression Complexity <p>Publish Date: 2021-08-31 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-3749>CVE-2021-3749</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/axios/axios/releases/tag/v0.21.2">https://github.com/axios/axios/releases/tag/v0.21.2</a></p> <p>Release Date: 2021-08-31</p> <p>Fix Resolution (axios): 0.20.0</p> <p>Direct dependency fix Resolution (pm2): 4.4.0</p> </p> <p></p> Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-8203</summary> ### Vulnerable Library - <b>lodash-4.17.14.tgz</b></p> <p>Lodash modular utilities.</p> <p>Library home page: <a href="https://registry.npmjs.org/lodash/-/lodash-4.17.14.tgz">https://registry.npmjs.org/lodash/-/lodash-4.17.14.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/pm2/node_modules/lodash/package.json</p> <p> Dependency Hierarchy: - pm2-4.2.3.tgz (Root Library) - :x: **lodash-4.17.14.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/vincenzodistasio97/main/commit/ecb3574ba0c4685d9a34e0b4904ed81d76026f9b">ecb3574ba0c4685d9a34e0b4904ed81d76026f9b</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> Prototype pollution attack when using _.zipObjectDeep in lodash before 4.17.20. <p>Publish Date: 2020-07-15 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-8203>CVE-2020-8203</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.4</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.npmjs.com/advisories/1523">https://www.npmjs.com/advisories/1523</a></p> <p>Release Date: 2020-07-15</p> <p>Fix Resolution (lodash): 4.17.19</p> <p>Direct dependency fix Resolution (pm2): 4.3.0</p> </p> <p></p> Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-7778</summary> ### Vulnerable Library - <b>systeminformation-4.23.1.tgz</b></p> <p>Simple system and OS information library</p> <p>Library home page: <a href="https://registry.npmjs.org/systeminformation/-/systeminformation-4.23.1.tgz">https://registry.npmjs.org/systeminformation/-/systeminformation-4.23.1.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/systeminformation/package.json</p> <p> Dependency Hierarchy: - pm2-4.2.3.tgz (Root Library) - :x: **systeminformation-4.23.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/vincenzodistasio97/main/commit/ecb3574ba0c4685d9a34e0b4904ed81d76026f9b">ecb3574ba0c4685d9a34e0b4904ed81d76026f9b</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> This affects the package systeminformation before 4.30.2. The attacker can overwrite the properties and functions of an object, which can lead to executing OS commands. <p>Publish Date: 2020-11-26 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7778>CVE-2020-7778</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.3</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/sebhildebrandt/systeminformation/releases/tag/v4.30.2">https://github.com/sebhildebrandt/systeminformation/releases/tag/v4.30.2</a></p> <p>Release Date: 2020-11-26</p> <p>Fix Resolution (systeminformation): 4.30.2</p> <p>Direct dependency fix Resolution (pm2): 4.3.0</p> </p> <p></p> Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-7788</summary> ### Vulnerable Library - <b>ini-1.3.5.tgz</b></p> <p>An ini encoder/decoder for node</p> <p>Library home page: <a href="https://registry.npmjs.org/ini/-/ini-1.3.5.tgz">https://registry.npmjs.org/ini/-/ini-1.3.5.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/ini/package.json</p> <p> Dependency Hierarchy: - pm2-4.2.3.tgz (Root Library) - vizion-2.0.2.tgz - :x: **ini-1.3.5.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/vincenzodistasio97/main/commit/ecb3574ba0c4685d9a34e0b4904ed81d76026f9b">ecb3574ba0c4685d9a34e0b4904ed81d76026f9b</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> This affects the package ini before 1.3.6. If an attacker submits a malicious INI file to an application that parses it with ini.parse, they will pollute the prototype on the application. This can be exploited further depending on the context. <p>Publish Date: 2020-12-11 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7788>CVE-2020-7788</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.3</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7788">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7788</a></p> <p>Release Date: 2020-12-11</p> <p>Fix Resolution (ini): 1.3.6</p> <p>Direct dependency fix Resolution (pm2): 4.3.0</p> </p> <p></p> Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-23337</summary> ### Vulnerable Library - <b>lodash-4.17.14.tgz</b></p> <p>Lodash modular utilities.</p> <p>Library home page: <a href="https://registry.npmjs.org/lodash/-/lodash-4.17.14.tgz">https://registry.npmjs.org/lodash/-/lodash-4.17.14.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/pm2/node_modules/lodash/package.json</p> <p> Dependency Hierarchy: - pm2-4.2.3.tgz (Root Library) - :x: **lodash-4.17.14.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/vincenzodistasio97/main/commit/ecb3574ba0c4685d9a34e0b4904ed81d76026f9b">ecb3574ba0c4685d9a34e0b4904ed81d76026f9b</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> Lodash versions prior to 4.17.21 are vulnerable to Command Injection via the template function. <p>Publish Date: 2021-02-15 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23337>CVE-2021-23337</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.2</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: High - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/lodash/lodash/commit/3469357cff396a26c363f8c1b5a91dde28ba4b1c">https://github.com/lodash/lodash/commit/3469357cff396a26c363f8c1b5a91dde28ba4b1c</a></p> <p>Release Date: 2021-02-15</p> <p>Fix Resolution (lodash): 4.17.21</p> <p>Direct dependency fix Resolution (pm2): 4.3.0</p> </p> <p></p> Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details> <!-- <REMEDIATE>[{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"pm2","packageVersion":"4.2.3","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"pm2:4.2.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"4.3.0","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2021-21388","vulnerabilityDetails":"systeminformation is an open source system and OS information library for node.js. A command injection vulnerability has been discovered in versions of systeminformation prior to 5.6.4. The issue has been fixed with a parameter check on user input. Please upgrade to version \u003e\u003d 5.6.4. If you cannot upgrade, be sure to check or sanitize service parameters that are passed to si.inetLatency(), si.inetChecksite(), si.services(), si.processLoad() and other commands. Only allow strings, reject any arrays. String sanitation works as expected.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-21388","cvss3Severity":"high","cvss3Score":"9.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"pm2","packageVersion":"4.2.3","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"pm2:4.2.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"4.3.0","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-26245","vulnerabilityDetails":"npm package systeminformation before version 4.30.5 is vulnerable to Prototype Pollution leading to Command Injection. The issue was fixed with a rewrite of shell sanitations to avoid prototyper pollution problems. The issue is fixed in version 4.30.5. If you cannot upgrade, be sure to check or sanitize service parameter strings that are passed to si.inetChecksite().","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-26245","cvss3Severity":"high","cvss3Score":"9.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"pm2","packageVersion":"4.2.3","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"pm2:4.2.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"4.3.0","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-26300","vulnerabilityDetails":"systeminformation is an npm package that provides system and OS information library for node.js. In systeminformation before version 4.26.2 there is a command injection vulnerability. Problem was fixed in version 4.26.2 with a shell string sanitation fix.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-26300","cvss3Severity":"high","cvss3Score":"9.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"pm2","packageVersion":"4.2.3","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"pm2:4.2.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"5.0.0","isBinary":false},{"packageType":"javascript/Node.js","packageName":"pm2","packageVersion":"4.2.3","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"pm2:4.2.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"5.0.0","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2021-23406","vulnerabilityDetails":"This affects the package pac-resolver before 5.0.0. This can occur when used with untrusted input, due to unsafe PAC file handling. **NOTE:** The fix for this vulnerability is applied in the node-degenerator library, a dependency written by the same maintainer.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23406","cvss3Severity":"high","cvss3Score":"9.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"pm2","packageVersion":"4.2.3","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"pm2:4.2.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"4.5.6","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2021-28918","vulnerabilityDetails":"Improper input validation of octal strings in netmask npm package v1.0.6 and below allows unauthenticated remote attackers to perform indeterminate SSRF, RFI, and LFI attacks on many of the dependent packages. A remote unauthenticated attacker can bypass packages relying on netmask to filter IPs and reach critical VPN or LAN hosts.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-28918","cvss3Severity":"high","cvss3Score":"9.1","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"pm2","packageVersion":"4.2.3","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"pm2:4.2.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"4.3.0","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-26274","vulnerabilityDetails":"In systeminformation (npm package) before version 4.31.1 there is a command injection vulnerability. The problem was fixed in version 4.31.1 with a shell string sanitation fix.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-26274","cvss3Severity":"high","cvss3Score":"8.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"Low","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"pm2","packageVersion":"4.2.3","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"pm2:4.2.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"4.3.0","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-7752","vulnerabilityDetails":"This affects the package systeminformation before 4.27.11. This package is vulnerable to Command Injection. The attacker can concatenate curl\u0027s parameters to overwrite Javascript files and then execute any OS commands.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7752","cvss3Severity":"high","cvss3Score":"8.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"Low","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"pm2","packageVersion":"4.2.3","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"pm2:4.2.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"4.3.0","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2021-21315","vulnerabilityDetails":"The System Information Library for Node.JS (npm package \"systeminformation\") is an open source collection of functions to retrieve detailed hardware, system and OS information. In systeminformation before version 5.3.1 there is a command injection vulnerability. Problem was fixed in version 5.3.1. As a workaround instead of upgrading, be sure to check or sanitize service parameters that are passed to si.inetLatency(), si.inetChecksite(), si.services(), si.processLoad() ... do only allow strings, reject any arrays. String sanitation works as expected.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-21315","cvss3Severity":"high","cvss3Score":"7.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"Low","S":"Unchanged","C":"High","UI":"None","AV":"Local","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"pm2","packageVersion":"4.2.3","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"pm2:4.2.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"4.3.0","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-28469","vulnerabilityDetails":"This affects the package glob-parent before 5.1.2. The enclosure regex used to check for strings ending in enclosure containing path separator.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-28469","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"pm2","packageVersion":"4.2.3","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"pm2:4.2.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"4.3.0","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2021-23343","vulnerabilityDetails":"All versions of package path-parse are vulnerable to Regular Expression Denial of Service (ReDoS) via splitDeviceRe, splitTailRe, and splitPathRe regular expressions. ReDoS exhibits polynomial worst-case time complexity.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23343","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"pm2","packageVersion":"4.2.3","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"pm2:4.2.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"4.4.0","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2021-3749","vulnerabilityDetails":"axios is vulnerable to Inefficient Regular Expression Complexity","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-3749","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"pm2","packageVersion":"4.2.3","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"pm2:4.2.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"4.3.0","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-8203","vulnerabilityDetails":"Prototype pollution attack when using _.zipObjectDeep in lodash before 4.17.20.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-8203","cvss3Severity":"high","cvss3Score":"7.4","cvss3Metrics":{"A":"High","AC":"High","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"pm2","packageVersion":"4.2.3","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"pm2:4.2.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"4.3.0","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-7778","vulnerabilityDetails":"This affects the package systeminformation before 4.30.2. The attacker can overwrite the properties and functions of an object, which can lead to executing OS commands.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7778","cvss3Severity":"high","cvss3Score":"7.3","cvss3Metrics":{"A":"Low","AC":"Low","PR":"None","S":"Unchanged","C":"Low","UI":"None","AV":"Network","I":"Low"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"pm2","packageVersion":"4.2.3","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"pm2:4.2.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"4.3.0","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-7788","vulnerabilityDetails":"This affects the package ini before 1.3.6. If an attacker submits a malicious INI file to an application that parses it with ini.parse, they will pollute the prototype on the application. This can be exploited further depending on the context.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7788","cvss3Severity":"high","cvss3Score":"7.3","cvss3Metrics":{"A":"Low","AC":"Low","PR":"None","S":"Unchanged","C":"Low","UI":"None","AV":"Network","I":"Low"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"pm2","packageVersion":"4.2.3","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"pm2:4.2.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"4.3.0","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2021-23337","vulnerabilityDetails":"Lodash versions prior to 4.17.21 are vulnerable to Command Injection via the template function.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23337","cvss3Severity":"high","cvss3Score":"7.2","cvss3Metrics":{"A":"High","AC":"Low","PR":"High","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"pm2","packageVersion":"4.2.3","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"pm2:4.2.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"4.4.0","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2022-0144","vulnerabilityDetails":"shelljs is vulnerable to Improper Privilege Management","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-0144","cvss3Severity":"high","cvss3Score":"7.1","cvss3Metrics":{"A":"High","AC":"Low","PR":"Low","S":"Unchanged","C":"High","UI":"None","AV":"Local","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"pm2","packageVersion":"4.2.3","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"pm2:4.2.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"4.4.0","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2022-0155","vulnerabilityDetails":"follow-redirects is vulnerable to Exposure of Private Personal Information to an Unauthorized Actor","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-0155","cvss3Severity":"medium","cvss3Score":"6.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"Required","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"pm2","packageVersion":"4.2.3","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"pm2:4.2.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"4.4.0","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2022-0536","vulnerabilityDetails":"Exposure of Sensitive Information to an Unauthorized Actor in NPM follow-redirects prior to 1.14.8.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-0536","cvss3Severity":"medium","cvss3Score":"5.9","cvss3Metrics":{"A":"None","AC":"High","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"pm2","packageVersion":"4.2.3","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"pm2:4.2.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"4.4.0","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-28168","vulnerabilityDetails":"Axios NPM package 0.21.0 contains a Server-Side Request Forgery (SSRF) vulnerability where an attacker is able to bypass a proxy by providing a URL that responds with a redirect to a restricted host or IP address.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-28168","cvss3Severity":"medium","cvss3Score":"5.9","cvss3Metrics":{"A":"None","AC":"High","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"pm2","packageVersion":"4.2.3","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"pm2:4.2.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"4.3.0","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-28500","vulnerabilityDetails":"Lodash versions prior to 4.17.21 are vulnerable to Regular Expression Denial of Service (ReDoS) via the toNumber, trim and trimEnd functions.\n WhiteSource Note: After conducting further research, WhiteSource has determined that CVE-2020-28500 only affects environments with versions 4.0.0 to 4.17.20 of Lodash.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-28500","cvss3Severity":"medium","cvss3Score":"5.3","cvss3Metrics":{"A":"Low","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"pm2","packageVersion":"4.2.3","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"pm2:4.2.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"4.3.0","isBinary":false},{"packageType":"javascript/Node.js","packageName":"pm2","packageVersion":"4.2.3","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"pm2:4.2.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"4.3.0","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2021-32640","vulnerabilityDetails":"ws is an open source WebSocket client and server library for Node.js. A specially crafted value of the `Sec-Websocket-Protocol` header can be used to significantly slow down a ws server. The vulnerability has been fixed in ws@7.4.6 (https://github.com/websockets/ws/commit/00c425ec77993773d823f018f64a5c44e17023ff). In vulnerable versions of ws, the issue can be mitigated by reducing the maximum allowed length of the request headers using the [`--max-http-header-size\u003dsize`](https://nodejs.org/api/cli.html#cli_max_http_header_size_size) and/or the [`maxHeaderSize`](https://nodejs.org/api/http.html#http_http_createserver_options_requestlistener) options.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-32640","cvss3Severity":"medium","cvss3Score":"5.3","cvss3Metrics":{"A":"Low","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"pm2","packageVersion":"4.2.3","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"pm2:4.2.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"4.5.6","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2021-29418","vulnerabilityDetails":"The netmask package before 2.0.1 for Node.js mishandles certain unexpected characters in an IP address string, such as an octal digit of 9. This (in some situations) allows attackers to bypass access control that is based on IP addresses. NOTE: this issue exists because of an incomplete fix for CVE-2021-28918.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-29418","cvss3Severity":"medium","cvss3Score":"5.3","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"Low"},"extraData":{}}]</REMEDIATE> -->
non_priority
tgz vulnerabilities highest severity is vulnerable library tgz path to dependency file package json path to vulnerable library node modules systeminformation package json found in head commit a href vulnerabilities cve severity cvss dependency type fixed in remediation available high systeminformation tgz transitive high systeminformation tgz transitive high systeminformation tgz transitive high multiple transitive high netmask tgz transitive high systeminformation tgz transitive high systeminformation tgz transitive high systeminformation tgz transitive high glob parent tgz transitive high path parse tgz transitive high axios tgz transitive high lodash tgz transitive high systeminformation tgz transitive high ini tgz transitive high lodash tgz transitive high shelljs tgz transitive medium follow redirects tgz transitive medium follow redirects tgz transitive medium axios tgz transitive medium lodash tgz transitive medium multiple transitive medium netmask tgz transitive details partial details vulnerabilities are displayed below due to a content size limitation in github to view information on the remaining vulnerabilities navigate to the whitesource application cve vulnerable library systeminformation tgz simple system and os information library library home page a href path to dependency file package json path to vulnerable library node modules systeminformation package json dependency hierarchy tgz root library x systeminformation tgz vulnerable library found in head commit a href found in base branch master vulnerability details systeminformation is an open source system and os information library for node js a command injection vulnerability has been discovered in versions of systeminformation prior to the issue has been fixed with a parameter check on user input please upgrade to version if you cannot upgrade be sure to check or sanitize service parameters that are passed to si inetlatency si inetchecksite si services si processload and other commands only allow strings reject any arrays string sanitation works as expected publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution systeminformation direct dependency fix resolution step up your open source security game with whitesource cve vulnerable library systeminformation tgz simple system and os information library library home page a href path to dependency file package json path to vulnerable library node modules systeminformation package json dependency hierarchy tgz root library x systeminformation tgz vulnerable library found in head commit a href found in base branch master vulnerability details npm package systeminformation before version is vulnerable to prototype pollution leading to command injection the issue was fixed with a rewrite of shell sanitations to avoid prototyper pollution problems the issue is fixed in version if you cannot upgrade be sure to check or sanitize service parameter strings that are passed to si inetchecksite publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution systeminformation direct dependency fix resolution step up your open source security game with whitesource cve vulnerable library systeminformation tgz simple system and os information library library home page a href path to dependency file package json path to vulnerable library node modules systeminformation package json dependency hierarchy tgz root library x systeminformation tgz vulnerable library found in head commit a href found in base branch master vulnerability details systeminformation is an npm package that provides system and os information library for node js in systeminformation before version there is a command injection vulnerability problem was fixed in version with a shell string sanitation fix publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution systeminformation direct dependency fix resolution step up your open source security game with whitesource cve vulnerable libraries pac resolver tgz degenerator tgz pac resolver tgz generates an asynchronous resolver function from a pac file library home page a href path to dependency file package json path to vulnerable library node modules pac resolver package json dependency hierarchy tgz root library agent tgz proxy agent tgz pac proxy agent tgz x pac resolver tgz vulnerable library degenerator tgz turns sync functions into async generator functions library home page a href path to dependency file package json path to vulnerable library node modules degenerator package json dependency hierarchy tgz root library agent tgz proxy agent tgz pac proxy agent tgz pac resolver tgz x degenerator tgz vulnerable library found in head commit a href found in base branch master vulnerability details this affects the package pac resolver before this can occur when used with untrusted input due to unsafe pac file handling note the fix for this vulnerability is applied in the node degenerator library a dependency written by the same maintainer publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution pac resolver direct dependency fix resolution fix resolution degenerator direct dependency fix resolution step up your open source security game with whitesource cve vulnerable library netmask tgz parse and lookup ip network blocks library home page a href path to dependency file package json path to vulnerable library node modules netmask package json dependency hierarchy tgz root library agent tgz proxy agent tgz pac proxy agent tgz pac resolver tgz x netmask tgz vulnerable library found in head commit a href found in base branch master vulnerability details improper input validation of octal strings in netmask npm package and below allows unauthenticated remote attackers to perform indeterminate ssrf rfi and lfi attacks on many of the dependent packages a remote unauthenticated attacker can bypass packages relying on netmask to filter ips and reach critical vpn or lan hosts publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution netmask direct dependency fix resolution step up your open source security game with whitesource cve vulnerable library systeminformation tgz simple system and os information library library home page a href path to dependency file package json path to vulnerable library node modules systeminformation package json dependency hierarchy tgz root library x systeminformation tgz vulnerable library found in head commit a href found in base branch master vulnerability details in systeminformation npm package before version there is a command injection vulnerability the problem was fixed in version with a shell string sanitation fix publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution systeminformation direct dependency fix resolution step up your open source security game with whitesource cve vulnerable library systeminformation tgz simple system and os information library library home page a href path to dependency file package json path to vulnerable library node modules systeminformation package json dependency hierarchy tgz root library x systeminformation tgz vulnerable library found in head commit a href found in base branch master vulnerability details this affects the package systeminformation before this package is vulnerable to command injection the attacker can concatenate curl s parameters to overwrite javascript files and then execute any os commands publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution systeminformation direct dependency fix resolution step up your open source security game with whitesource cve vulnerable library systeminformation tgz simple system and os information library library home page a href path to dependency file package json path to vulnerable library node modules systeminformation package json dependency hierarchy tgz root library x systeminformation tgz vulnerable library found in head commit a href found in base branch master vulnerability details the system information library for node js npm package systeminformation is an open source collection of functions to retrieve detailed hardware system and os information in systeminformation before version there is a command injection vulnerability problem was fixed in version as a workaround instead of upgrading be sure to check or sanitize service parameters that are passed to si inetlatency si inetchecksite si services si processload do only allow strings reject any arrays string sanitation works as expected publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution systeminformation direct dependency fix resolution step up your open source security game with whitesource cve vulnerable library glob parent tgz extract the non magic parent path from a glob string library home page a href path to dependency file package json path to vulnerable library node modules glob parent package json dependency hierarchy tgz root library chokidar tgz x glob parent tgz vulnerable library found in head commit a href found in base branch master vulnerability details this affects the package glob parent before the enclosure regex used to check for strings ending in enclosure containing path separator publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution glob parent direct dependency fix resolution step up your open source security game with whitesource cve vulnerable library path parse tgz node js path parse ponyfill library home page a href path to dependency file package json path to vulnerable library node modules path parse package json dependency hierarchy tgz root library shelljs tgz rechoir tgz resolve tgz x path parse tgz vulnerable library found in head commit a href found in base branch master vulnerability details all versions of package path parse are vulnerable to regular expression denial of service redos via splitdevicere splittailre and splitpathre regular expressions redos exhibits polynomial worst case time complexity publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution path parse direct dependency fix resolution step up your open source security game with whitesource cve vulnerable library axios tgz promise based http client for the browser and node js library home page a href path to dependency file package json path to vulnerable library node modules axios package json dependency hierarchy tgz root library js api tgz x axios tgz vulnerable library found in head commit a href found in base branch master vulnerability details axios is vulnerable to inefficient regular expression complexity publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution axios direct dependency fix resolution step up your open source security game with whitesource cve vulnerable library lodash tgz lodash modular utilities library home page a href path to dependency file package json path to vulnerable library node modules node modules lodash package json dependency hierarchy tgz root library x lodash tgz vulnerable library found in head commit a href found in base branch master vulnerability details prototype pollution attack when using zipobjectdeep in lodash before publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution lodash direct dependency fix resolution step up your open source security game with whitesource cve vulnerable library systeminformation tgz simple system and os information library library home page a href path to dependency file package json path to vulnerable library node modules systeminformation package json dependency hierarchy tgz root library x systeminformation tgz vulnerable library found in head commit a href found in base branch master vulnerability details this affects the package systeminformation before the attacker can overwrite the properties and functions of an object which can lead to executing os commands publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact low availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution systeminformation direct dependency fix resolution step up your open source security game with whitesource cve vulnerable library ini tgz an ini encoder decoder for node library home page a href path to dependency file package json path to vulnerable library node modules ini package json dependency hierarchy tgz root library vizion tgz x ini tgz vulnerable library found in head commit a href found in base branch master vulnerability details this affects the package ini before if an attacker submits a malicious ini file to an application that parses it with ini parse they will pollute the prototype on the application this can be exploited further depending on the context publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact low availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution ini direct dependency fix resolution step up your open source security game with whitesource cve vulnerable library lodash tgz lodash modular utilities library home page a href path to dependency file package json path to vulnerable library node modules node modules lodash package json dependency hierarchy tgz root library x lodash tgz vulnerable library found in head commit a href found in base branch master vulnerability details lodash versions prior to are vulnerable to command injection via the template function publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required high user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution lodash direct dependency fix resolution step up your open source security game with whitesource istransitivedependency false dependencytree isminimumfixversionavailable true minimumfixversion isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails systeminformation is an open source system and os information library for node js a command injection vulnerability has been discovered in versions of systeminformation prior to the issue has been fixed with a parameter check on user input please upgrade to version if you cannot upgrade be sure to check or sanitize service parameters that are passed to si inetlatency si inetchecksite si services si processload and other commands only allow strings reject any arrays string sanitation works as expected vulnerabilityurl istransitivedependency false dependencytree isminimumfixversionavailable true minimumfixversion isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails npm package systeminformation before version is vulnerable to prototype pollution leading to command injection the issue was fixed with a rewrite of shell sanitations to avoid prototyper pollution problems the issue is fixed in version if you cannot upgrade be sure to check or sanitize service parameter strings that are passed to si inetchecksite vulnerabilityurl istransitivedependency false dependencytree isminimumfixversionavailable true minimumfixversion isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails systeminformation is an npm package that provides system and os information library for node js in systeminformation before version there is a command injection vulnerability problem was fixed in version with a shell string sanitation fix vulnerabilityurl istransitivedependency false dependencytree isminimumfixversionavailable true minimumfixversion isbinary false packagetype javascript node js packagename packageversion packagefilepaths istransitivedependency false dependencytree isminimumfixversionavailable true minimumfixversion isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails this affects the package pac resolver before this can occur when used with untrusted input due to unsafe pac file handling note the fix for this vulnerability is applied in the node degenerator library a dependency written by the same maintainer vulnerabilityurl istransitivedependency false dependencytree isminimumfixversionavailable true minimumfixversion isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails improper input validation of octal strings in netmask npm package and below allows unauthenticated remote attackers to perform indeterminate ssrf rfi and lfi attacks on many of the dependent packages a remote unauthenticated attacker can bypass packages relying on netmask to filter ips and reach critical vpn or lan hosts vulnerabilityurl istransitivedependency false dependencytree isminimumfixversionavailable true minimumfixversion isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails in systeminformation npm package before version there is a command injection vulnerability the problem was fixed in version with a shell string sanitation fix vulnerabilityurl istransitivedependency false dependencytree isminimumfixversionavailable true minimumfixversion isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails this affects the package systeminformation before this package is vulnerable to command injection the attacker can concatenate curl parameters to overwrite javascript files and then execute any os commands vulnerabilityurl istransitivedependency false dependencytree isminimumfixversionavailable true minimumfixversion isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails the system information library for node js npm package systeminformation is an open source collection of functions to retrieve detailed hardware system and os information in systeminformation before version there is a command injection vulnerability problem was fixed in version as a workaround instead of upgrading be sure to check or sanitize service parameters that are passed to si inetlatency si inetchecksite si services si processload do only allow strings reject any arrays string sanitation works as expected vulnerabilityurl istransitivedependency false dependencytree isminimumfixversionavailable true minimumfixversion isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails this affects the package glob parent before the enclosure regex used to check for strings ending in enclosure containing path separator vulnerabilityurl istransitivedependency false dependencytree isminimumfixversionavailable true minimumfixversion isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails all versions of package path parse are vulnerable to regular expression denial of service redos via splitdevicere splittailre and splitpathre regular expressions redos exhibits polynomial worst case time complexity vulnerabilityurl istransitivedependency false dependencytree isminimumfixversionavailable true minimumfixversion isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails axios is vulnerable to inefficient regular expression complexity vulnerabilityurl istransitivedependency false dependencytree isminimumfixversionavailable true minimumfixversion isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails prototype pollution attack when using zipobjectdeep in lodash before vulnerabilityurl istransitivedependency false dependencytree isminimumfixversionavailable true minimumfixversion isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails this affects the package systeminformation before the attacker can overwrite the properties and functions of an object which can lead to executing os commands vulnerabilityurl istransitivedependency false dependencytree isminimumfixversionavailable true minimumfixversion isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails this affects the package ini before if an attacker submits a malicious ini file to an application that parses it with ini parse they will pollute the prototype on the application this can be exploited further depending on the context vulnerabilityurl istransitivedependency false dependencytree isminimumfixversionavailable true minimumfixversion isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails lodash versions prior to are vulnerable to command injection via the template function vulnerabilityurl istransitivedependency false dependencytree isminimumfixversionavailable true minimumfixversion isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails shelljs is vulnerable to improper privilege management vulnerabilityurl istransitivedependency false dependencytree isminimumfixversionavailable true minimumfixversion isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails follow redirects is vulnerable to exposure of private personal information to an unauthorized actor vulnerabilityurl istransitivedependency false dependencytree isminimumfixversionavailable true minimumfixversion isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails exposure of sensitive information to an unauthorized actor in npm follow redirects prior to vulnerabilityurl istransitivedependency false dependencytree isminimumfixversionavailable true minimumfixversion isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails axios npm package contains a server side request forgery ssrf vulnerability where an attacker is able to bypass a proxy by providing a url that responds with a redirect to a restricted host or ip address vulnerabilityurl istransitivedependency false dependencytree isminimumfixversionavailable true minimumfixversion isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails lodash versions prior to are vulnerable to regular expression denial of service redos via the tonumber trim and trimend functions n whitesource note after conducting further research whitesource has determined that cve only affects environments with versions to of lodash vulnerabilityurl istransitivedependency false dependencytree isminimumfixversionavailable true minimumfixversion isbinary false packagetype javascript node js packagename packageversion packagefilepaths istransitivedependency false dependencytree isminimumfixversionavailable true minimumfixversion isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails ws is an open source websocket client and server library for node js a specially crafted value of the sec websocket protocol header can be used to significantly slow down a ws server the vulnerability has been fixed in ws in vulnerable versions of ws the issue can be mitigated by reducing the maximum allowed length of the request headers using the and or the options vulnerabilityurl istransitivedependency false dependencytree isminimumfixversionavailable true minimumfixversion isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails the netmask package before for node js mishandles certain unexpected characters in an ip address string such as an octal digit of this in some situations allows attackers to bypass access control that is based on ip addresses note this issue exists because of an incomplete fix for cve vulnerabilityurl
0