Unnamed: 0
int64
0
832k
id
float64
2.49B
32.1B
type
stringclasses
1 value
created_at
stringlengths
19
19
repo
stringlengths
5
112
repo_url
stringlengths
34
141
action
stringclasses
3 values
title
stringlengths
1
844
labels
stringlengths
4
721
body
stringlengths
1
261k
index
stringclasses
12 values
text_combine
stringlengths
96
261k
label
stringclasses
2 values
text
stringlengths
96
248k
binary_label
int64
0
1
17,246
4,152,245,789
IssuesEvent
2016-06-15 23:49:54
ambisonictoolkit/atk-sc3
https://api.github.com/repos/ambisonictoolkit/atk-sc3
opened
FoaEncoderKernel: SuperStereo, broken link in documentation
documentation
The link at: http://doc.sccode.org/Classes/FoaEncoderKernel.html#footnote_1 Currently points to: http://en.wikipedia.org/wiki/Ambisonics#Super_stereo Should point to: https://en.wikipedia.org/wiki/Ambisonic_UHJ_format#Super_stereo
1.0
FoaEncoderKernel: SuperStereo, broken link in documentation - The link at: http://doc.sccode.org/Classes/FoaEncoderKernel.html#footnote_1 Currently points to: http://en.wikipedia.org/wiki/Ambisonics#Super_stereo Should point to: https://en.wikipedia.org/wiki/Ambisonic_UHJ_format#Super_stereo
non_priority
foaencoderkernel superstereo broken link in documentation the link at currently points to should point to
0
135,481
12,685,168,241
IssuesEvent
2020-06-20 02:32:58
StefanoDepetris/DrinkTeam
https://api.github.com/repos/StefanoDepetris/DrinkTeam
closed
Falta
documentation
1- revisar tp1, requerimientos, matriz y casos de prueba 2- faltan diagramas de paquetes, de objetos 3-faltan pruebas unitarias automáticas y actualizar la matriz
1.0
Falta - 1- revisar tp1, requerimientos, matriz y casos de prueba 2- faltan diagramas de paquetes, de objetos 3-faltan pruebas unitarias automáticas y actualizar la matriz
non_priority
falta revisar requerimientos matriz y casos de prueba faltan diagramas de paquetes de objetos faltan pruebas unitarias automáticas y actualizar la matriz
0
211,386
23,812,128,537
IssuesEvent
2022-09-04 22:46:03
kube-tarian/sigrun
https://api.github.com/repos/kube-tarian/sigrun
closed
CVE-2022-24769 (Medium) detected in github.com/docker/docker-v20.10.7
security vulnerability no-issue-activity
## CVE-2022-24769 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>github.com/docker/docker-v20.10.7</b></p></summary> <p>Moby Project - a collaborative project for the container ecosystem to assemble container-based systems</p> <p> Dependency Hierarchy: - github.com/google/go-containerregistry-v0.6.0 (Root Library) - github.com/docker/cli-v20.10.7 - :x: **github.com/docker/docker-v20.10.7** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/kube-tarian/sigrun/commit/df1f7d3f67826e841793324e4796be4fbd91c00f">df1f7d3f67826e841793324e4796be4fbd91c00f</a></p> <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Moby is an open-source project created by Docker to enable and accelerate software containerization. A bug was found in Moby (Docker Engine) prior to version 20.10.14 where containers were incorrectly started with non-empty inheritable Linux process capabilities, creating an atypical Linux environment and enabling programs with inheritable file capabilities to elevate those capabilities to the permitted set during `execve(2)`. Normally, when executable programs have specified permitted file capabilities, otherwise unprivileged users and processes can execute those programs and gain the specified file capabilities up to the bounding set. Due to this bug, containers which included executable programs with inheritable file capabilities allowed otherwise unprivileged users and processes to additionally gain these inheritable file capabilities up to the container's bounding set. Containers which use Linux users and groups to perform privilege separation inside the container are most directly impacted. This bug did not affect the container security sandbox as the inheritable set never contained more capabilities than were included in the container's bounding set. This bug has been fixed in Moby (Docker Engine) 20.10.14. Running containers should be stopped, deleted, and recreated for the inheritable capabilities to be reset. This fix changes Moby (Docker Engine) behavior such that containers are started with a more typical Linux environment. As a workaround, the entry point of a container can be modified to use a utility like `capsh(1)` to drop inheritable capabilities prior to the primary process starting. <p>Publish Date: 2022-03-24 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-24769>CVE-2022-24769</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.9</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24769">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24769</a></p> <p>Release Date: 2022-03-24</p> <p>Fix Resolution: v20.10.14</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2022-24769 (Medium) detected in github.com/docker/docker-v20.10.7 - ## CVE-2022-24769 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>github.com/docker/docker-v20.10.7</b></p></summary> <p>Moby Project - a collaborative project for the container ecosystem to assemble container-based systems</p> <p> Dependency Hierarchy: - github.com/google/go-containerregistry-v0.6.0 (Root Library) - github.com/docker/cli-v20.10.7 - :x: **github.com/docker/docker-v20.10.7** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/kube-tarian/sigrun/commit/df1f7d3f67826e841793324e4796be4fbd91c00f">df1f7d3f67826e841793324e4796be4fbd91c00f</a></p> <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Moby is an open-source project created by Docker to enable and accelerate software containerization. A bug was found in Moby (Docker Engine) prior to version 20.10.14 where containers were incorrectly started with non-empty inheritable Linux process capabilities, creating an atypical Linux environment and enabling programs with inheritable file capabilities to elevate those capabilities to the permitted set during `execve(2)`. Normally, when executable programs have specified permitted file capabilities, otherwise unprivileged users and processes can execute those programs and gain the specified file capabilities up to the bounding set. Due to this bug, containers which included executable programs with inheritable file capabilities allowed otherwise unprivileged users and processes to additionally gain these inheritable file capabilities up to the container's bounding set. Containers which use Linux users and groups to perform privilege separation inside the container are most directly impacted. This bug did not affect the container security sandbox as the inheritable set never contained more capabilities than were included in the container's bounding set. This bug has been fixed in Moby (Docker Engine) 20.10.14. Running containers should be stopped, deleted, and recreated for the inheritable capabilities to be reset. This fix changes Moby (Docker Engine) behavior such that containers are started with a more typical Linux environment. As a workaround, the entry point of a container can be modified to use a utility like `capsh(1)` to drop inheritable capabilities prior to the primary process starting. <p>Publish Date: 2022-03-24 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-24769>CVE-2022-24769</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.9</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24769">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24769</a></p> <p>Release Date: 2022-03-24</p> <p>Fix Resolution: v20.10.14</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in github com docker docker cve medium severity vulnerability vulnerable library github com docker docker moby project a collaborative project for the container ecosystem to assemble container based systems dependency hierarchy github com google go containerregistry root library github com docker cli x github com docker docker vulnerable library found in head commit a href found in base branch main vulnerability details moby is an open source project created by docker to enable and accelerate software containerization a bug was found in moby docker engine prior to version where containers were incorrectly started with non empty inheritable linux process capabilities creating an atypical linux environment and enabling programs with inheritable file capabilities to elevate those capabilities to the permitted set during execve normally when executable programs have specified permitted file capabilities otherwise unprivileged users and processes can execute those programs and gain the specified file capabilities up to the bounding set due to this bug containers which included executable programs with inheritable file capabilities allowed otherwise unprivileged users and processes to additionally gain these inheritable file capabilities up to the container s bounding set containers which use linux users and groups to perform privilege separation inside the container are most directly impacted this bug did not affect the container security sandbox as the inheritable set never contained more capabilities than were included in the container s bounding set this bug has been fixed in moby docker engine running containers should be stopped deleted and recreated for the inheritable capabilities to be reset this fix changes moby docker engine behavior such that containers are started with a more typical linux environment as a workaround the entry point of a container can be modified to use a utility like capsh to drop inheritable capabilities prior to the primary process starting publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact low availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend
0
59,953
24,939,736,257
IssuesEvent
2022-10-31 17:53:04
Azure/azure-sdk-for-java
https://api.github.com/repos/Azure/azure-sdk-for-java
closed
[BUG] [AMQP] Websocket upgrade request's hostname must be the same as the HTTP connection host
Event Hubs Service Bus amqp
Today we use the Event Hubs (or Service Bus) FQDN as the "hostname" + "host header" for the HTTP GET upgrade request to switch the protocol to WebSocket on an existing HTTP connection. Such an upgrade request works if the existing HTTP connection had established to the FQDN of the Event Hubs. On the other hand, if the HTTP connection had established to the Custom Endpoint (front-ending Event Hubs or Service Bus), then an upgrade request using the FQDN of the Event Hubs as the "hostname" + "host-header" may fail. Instead, the "hostname" + "host-header" should be the custom endpoint host. For example, the server addressed by the Custom Endpoint may validate the "host-header" resulting 404 responses for the Upgrade request when the client expects a 101 response. Interestingly, not all custom endpoint host does the "host-header" validation; that's why we didn't encounter this before. For example, using App Gateway as a custom endpoint with multi-site setup kick off this validation; with basic-site setup, this validation is off. In a nutshell, the Websocket upgrade request's hostname must be the same as the HTTP connection host.
1.0
[BUG] [AMQP] Websocket upgrade request's hostname must be the same as the HTTP connection host - Today we use the Event Hubs (or Service Bus) FQDN as the "hostname" + "host header" for the HTTP GET upgrade request to switch the protocol to WebSocket on an existing HTTP connection. Such an upgrade request works if the existing HTTP connection had established to the FQDN of the Event Hubs. On the other hand, if the HTTP connection had established to the Custom Endpoint (front-ending Event Hubs or Service Bus), then an upgrade request using the FQDN of the Event Hubs as the "hostname" + "host-header" may fail. Instead, the "hostname" + "host-header" should be the custom endpoint host. For example, the server addressed by the Custom Endpoint may validate the "host-header" resulting 404 responses for the Upgrade request when the client expects a 101 response. Interestingly, not all custom endpoint host does the "host-header" validation; that's why we didn't encounter this before. For example, using App Gateway as a custom endpoint with multi-site setup kick off this validation; with basic-site setup, this validation is off. In a nutshell, the Websocket upgrade request's hostname must be the same as the HTTP connection host.
non_priority
websocket upgrade request s hostname must be the same as the http connection host today we use the event hubs or service bus fqdn as the hostname host header for the http get upgrade request to switch the protocol to websocket on an existing http connection such an upgrade request works if the existing http connection had established to the fqdn of the event hubs on the other hand if the http connection had established to the custom endpoint front ending event hubs or service bus then an upgrade request using the fqdn of the event hubs as the hostname host header may fail instead the hostname host header should be the custom endpoint host for example the server addressed by the custom endpoint may validate the host header resulting responses for the upgrade request when the client expects a response interestingly not all custom endpoint host does the host header validation that s why we didn t encounter this before for example using app gateway as a custom endpoint with multi site setup kick off this validation with basic site setup this validation is off in a nutshell the websocket upgrade request s hostname must be the same as the http connection host
0
90,664
26,162,850,573
IssuesEvent
2022-12-31 21:21:30
mfem/mfem
https://api.github.com/repos/mfem/mfem
closed
When mfem is linked with superlu-dist mfem installs an invalid MFEMConfig.cmake file
building linalg stale
It has the line: ``` set(MFEM_INCLUDE_DIRS "${PACKAGE_PREFIX_DIR}/include;/usr/local/include;/usr/local/include/superlu") ``` with the directory ```/usr/local/include/superlu``` that doesn't exist. mfem-4.4 superlu-dist-8.1.0 clang-14 FreeBSD 13.1
1.0
When mfem is linked with superlu-dist mfem installs an invalid MFEMConfig.cmake file - It has the line: ``` set(MFEM_INCLUDE_DIRS "${PACKAGE_PREFIX_DIR}/include;/usr/local/include;/usr/local/include/superlu") ``` with the directory ```/usr/local/include/superlu``` that doesn't exist. mfem-4.4 superlu-dist-8.1.0 clang-14 FreeBSD 13.1
non_priority
when mfem is linked with superlu dist mfem installs an invalid mfemconfig cmake file it has the line set mfem include dirs package prefix dir include usr local include usr local include superlu with the directory usr local include superlu that doesn t exist mfem superlu dist clang freebsd
0
305,945
26,423,190,352
IssuesEvent
2023-01-13 23:09:06
tarantool/vshard
https://api.github.com/repos/tarantool/vshard
closed
flaky tests: storage/storage and unit/util
qa flaky test
Something is going on with fibers: <details> <summary> storage/storage.test.lua</summary> ``` storage/storage.test.lua memtx [ fail ] Test failed! Result content mismatch: --- storage/storage.result Mon Dec 5 12:49:08 2022 +++ /home/runner/work/vshard/vshard/test/var/rejects/storage/storage.reject Mon Dec 5 12:53:05 2022 @@ -962,7 +962,7 @@ ... assert(not ok and err.message) --- -- fiber is cancelled +- error: assertion failed! ... -- -- Bucket_are_all_rw() registry function. ``` </details> <details> <summary> unit/util.test.lua</summary> ``` unit/util.test.lua [ fail ] Test failed! Result content mismatch: --- unit/util.result Mon Dec 5 12:49:08 2022 +++ /home/runner/work/vshard/vshard/test/var/rejects/unit/util.reject Mon Dec 5 12:53:21 2022 @@ -266,15 +266,16 @@ ... assert(not ok) --- -- true +- error: assertion failed! ... err.message --- -- fiber is cancelled +- error: '[string "return err.message "]:1: attempt to index global ''err'' (a nil + value)' ... assert(type(err) == 'table') --- -- true +- error: assertion failed! ... -- -- Exception-safe fiber cancel check. ``` </details> Reproduced on CI Tarantool 2.7 and 2.8. Cannot reproduced it locally
1.0
flaky tests: storage/storage and unit/util - Something is going on with fibers: <details> <summary> storage/storage.test.lua</summary> ``` storage/storage.test.lua memtx [ fail ] Test failed! Result content mismatch: --- storage/storage.result Mon Dec 5 12:49:08 2022 +++ /home/runner/work/vshard/vshard/test/var/rejects/storage/storage.reject Mon Dec 5 12:53:05 2022 @@ -962,7 +962,7 @@ ... assert(not ok and err.message) --- -- fiber is cancelled +- error: assertion failed! ... -- -- Bucket_are_all_rw() registry function. ``` </details> <details> <summary> unit/util.test.lua</summary> ``` unit/util.test.lua [ fail ] Test failed! Result content mismatch: --- unit/util.result Mon Dec 5 12:49:08 2022 +++ /home/runner/work/vshard/vshard/test/var/rejects/unit/util.reject Mon Dec 5 12:53:21 2022 @@ -266,15 +266,16 @@ ... assert(not ok) --- -- true +- error: assertion failed! ... err.message --- -- fiber is cancelled +- error: '[string "return err.message "]:1: attempt to index global ''err'' (a nil + value)' ... assert(type(err) == 'table') --- -- true +- error: assertion failed! ... -- -- Exception-safe fiber cancel check. ``` </details> Reproduced on CI Tarantool 2.7 and 2.8. Cannot reproduced it locally
non_priority
flaky tests storage storage and unit util something is going on with fibers storage storage test lua storage storage test lua memtx test failed result content mismatch storage storage result mon dec home runner work vshard vshard test var rejects storage storage reject mon dec assert not ok and err message fiber is cancelled error assertion failed bucket are all rw registry function unit util test lua unit util test lua test failed result content mismatch unit util result mon dec home runner work vshard vshard test var rejects unit util reject mon dec assert not ok true error assertion failed err message fiber is cancelled error attempt to index global err a nil value assert type err table true error assertion failed exception safe fiber cancel check reproduced on ci tarantool and cannot reproduced it locally
0
54,708
11,287,434,112
IssuesEvent
2020-01-16 04:28:20
happycube/ld-decode
https://api.github.com/repos/happycube/ld-decode
closed
Make ld-process-efm map against VBI
enhancement ld-decode-tools wontfix
On discs such as Domesday AIV the VBI contains a hint as to where data/audio is present (as an EFM track) on the disc. This could be used to help the tool determine if errors are due to corrupt data or simply missing EFM.
1.0
Make ld-process-efm map against VBI - On discs such as Domesday AIV the VBI contains a hint as to where data/audio is present (as an EFM track) on the disc. This could be used to help the tool determine if errors are due to corrupt data or simply missing EFM.
non_priority
make ld process efm map against vbi on discs such as domesday aiv the vbi contains a hint as to where data audio is present as an efm track on the disc this could be used to help the tool determine if errors are due to corrupt data or simply missing efm
0
276,017
20,964,614,428
IssuesEvent
2022-03-28 04:40:02
LukeShortCloud/winesapOS
https://api.github.com/repos/LukeShortCloud/winesapOS
closed
Update VERSION for stable release
documentation
The VERSION file should say "3.0.0". After that tagged release, we can move onto "3.1.0-dev".
1.0
Update VERSION for stable release - The VERSION file should say "3.0.0". After that tagged release, we can move onto "3.1.0-dev".
non_priority
update version for stable release the version file should say after that tagged release we can move onto dev
0
36,381
12,405,027,226
IssuesEvent
2020-05-21 16:32:12
wrbejar/Nova8JavaVulnerable
https://api.github.com/repos/wrbejar/Nova8JavaVulnerable
opened
CVE-2018-1000632 (High) detected in dom4j-1.6.1.jar
security vulnerability
## CVE-2018-1000632 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>dom4j-1.6.1.jar</b></p></summary> <p>dom4j: the flexible XML framework for Java</p> <p>Library home page: <a href="http://dom4j.org">http://dom4j.org</a></p> <p>Path to vulnerable library: /Nova8JavaVulnerable/target/JavaVulnerableLab/WEB-INF/lib/dom4j-1.6.1.jar,_depth_0/Nova8JavaVulnerable/target/JavaVulnerableLab/META-INF/maven/org.cysecurity/JavaVulnerableLab/target/JavaVulnerableLab/WEB-INF/lib/dom4j-1.6.1.jar,/root/.m2/repository/dom4j/dom4j/1.6.1/dom4j-1.6.1.jar,_depth_0/Nova8JavaVulnerable/target/JavaVulnerableLab/WEB-INF/lib/dom4j-1.6.1.jar,/root/.m2/repository/dom4j/dom4j/1.6.1/dom4j-1.6.1.jar</p> <p> Dependency Hierarchy: - :x: **dom4j-1.6.1.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/wrbejar/Nova8JavaVulnerable/commit/1387452ca7bf6063988c143381dd8c9938b0ab3f">1387452ca7bf6063988c143381dd8c9938b0ab3f</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> dom4j version prior to version 2.1.1 contains a CWE-91: XML Injection vulnerability in Class: Element. Methods: addElement, addAttribute that can result in an attacker tampering with XML documents through XML injection. This attack appear to be exploitable via an attacker specifying attributes or elements in the XML document. This vulnerability appears to have been fixed in 2.1.1 or later. <p>Publish Date: 2018-08-20 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-1000632>CVE-2018-1000632</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000632">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000632</a></p> <p>Release Date: 2018-08-20</p> <p>Fix Resolution: org.dom4j:dom4j:2.0.3</p> </p> </details> <p></p> *** :rescue_worker_helmet: Automatic Remediation is available for this issue <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"dom4j","packageName":"dom4j","packageVersion":"1.6.1","isTransitiveDependency":false,"dependencyTree":"dom4j:dom4j:1.6.1","isMinimumFixVersionAvailable":true,"minimumFixVersion":"org.dom4j:dom4j:2.0.3"}],"vulnerabilityIdentifier":"CVE-2018-1000632","vulnerabilityDetails":"dom4j version prior to version 2.1.1 contains a CWE-91: XML Injection vulnerability in Class: Element. Methods: addElement, addAttribute that can result in an attacker tampering with XML documents through XML injection. This attack appear to be exploitable via an attacker specifying attributes or elements in the XML document. This vulnerability appears to have been fixed in 2.1.1 or later.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-1000632","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> -->
True
CVE-2018-1000632 (High) detected in dom4j-1.6.1.jar - ## CVE-2018-1000632 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>dom4j-1.6.1.jar</b></p></summary> <p>dom4j: the flexible XML framework for Java</p> <p>Library home page: <a href="http://dom4j.org">http://dom4j.org</a></p> <p>Path to vulnerable library: /Nova8JavaVulnerable/target/JavaVulnerableLab/WEB-INF/lib/dom4j-1.6.1.jar,_depth_0/Nova8JavaVulnerable/target/JavaVulnerableLab/META-INF/maven/org.cysecurity/JavaVulnerableLab/target/JavaVulnerableLab/WEB-INF/lib/dom4j-1.6.1.jar,/root/.m2/repository/dom4j/dom4j/1.6.1/dom4j-1.6.1.jar,_depth_0/Nova8JavaVulnerable/target/JavaVulnerableLab/WEB-INF/lib/dom4j-1.6.1.jar,/root/.m2/repository/dom4j/dom4j/1.6.1/dom4j-1.6.1.jar</p> <p> Dependency Hierarchy: - :x: **dom4j-1.6.1.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/wrbejar/Nova8JavaVulnerable/commit/1387452ca7bf6063988c143381dd8c9938b0ab3f">1387452ca7bf6063988c143381dd8c9938b0ab3f</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> dom4j version prior to version 2.1.1 contains a CWE-91: XML Injection vulnerability in Class: Element. Methods: addElement, addAttribute that can result in an attacker tampering with XML documents through XML injection. This attack appear to be exploitable via an attacker specifying attributes or elements in the XML document. This vulnerability appears to have been fixed in 2.1.1 or later. <p>Publish Date: 2018-08-20 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-1000632>CVE-2018-1000632</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000632">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000632</a></p> <p>Release Date: 2018-08-20</p> <p>Fix Resolution: org.dom4j:dom4j:2.0.3</p> </p> </details> <p></p> *** :rescue_worker_helmet: Automatic Remediation is available for this issue <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"dom4j","packageName":"dom4j","packageVersion":"1.6.1","isTransitiveDependency":false,"dependencyTree":"dom4j:dom4j:1.6.1","isMinimumFixVersionAvailable":true,"minimumFixVersion":"org.dom4j:dom4j:2.0.3"}],"vulnerabilityIdentifier":"CVE-2018-1000632","vulnerabilityDetails":"dom4j version prior to version 2.1.1 contains a CWE-91: XML Injection vulnerability in Class: Element. Methods: addElement, addAttribute that can result in an attacker tampering with XML documents through XML injection. This attack appear to be exploitable via an attacker specifying attributes or elements in the XML document. This vulnerability appears to have been fixed in 2.1.1 or later.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-1000632","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> -->
non_priority
cve high detected in jar cve high severity vulnerability vulnerable library jar the flexible xml framework for java library home page a href path to vulnerable library target javavulnerablelab web inf lib jar depth target javavulnerablelab meta inf maven org cysecurity javavulnerablelab target javavulnerablelab web inf lib jar root repository jar depth target javavulnerablelab web inf lib jar root repository jar dependency hierarchy x jar vulnerable library found in head commit a href vulnerability details version prior to version contains a cwe xml injection vulnerability in class element methods addelement addattribute that can result in an attacker tampering with xml documents through xml injection this attack appear to be exploitable via an attacker specifying attributes or elements in the xml document this vulnerability appears to have been fixed in or later publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact high availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org rescue worker helmet automatic remediation is available for this issue isopenpronvulnerability true ispackagebased true isdefaultbranch true packages vulnerabilityidentifier cve vulnerabilitydetails version prior to version contains a cwe xml injection vulnerability in class element methods addelement addattribute that can result in an attacker tampering with xml documents through xml injection this attack appear to be exploitable via an attacker specifying attributes or elements in the xml document this vulnerability appears to have been fixed in or later vulnerabilityurl
0
189,691
14,518,019,831
IssuesEvent
2020-12-13 21:55:52
verilator/verilator
https://api.github.com/repos/verilator/verilator
closed
-faligned-new does not work under Travis with clang
area: tests effort: days resolution: abandoned
--- Author Name: **Todd Strader** (@toddstrader) Original Redmine Issue: 1478 from https://www.veripool.org --- It was discovered in # that the -faligned-new flag causes errors when compiling Verilated code under Travis CI using clang. This should have been detected and dealt with via a test for this behavior in configure, but configure did not observe the same behavior. For the time being, a band-aid has been applied to configure.ac turn off this flag when compiling with clang under Travis: ``` AS_IF([test "x$TRAVIS_COMPILER" != xclang], [_MY_CXX_CHECK_OPT(CFG_CXXFLAGS_NO_UNUSED,-faligned-new)]) ``` This resolves the Travis breakage but allows for the same issue to crop up on similar systems. Ultimately, we should understand why configure doesn't catch this behavior with Travis + clang so that the configure test can be improved and the band-aid can be removed.
1.0
-faligned-new does not work under Travis with clang - --- Author Name: **Todd Strader** (@toddstrader) Original Redmine Issue: 1478 from https://www.veripool.org --- It was discovered in # that the -faligned-new flag causes errors when compiling Verilated code under Travis CI using clang. This should have been detected and dealt with via a test for this behavior in configure, but configure did not observe the same behavior. For the time being, a band-aid has been applied to configure.ac turn off this flag when compiling with clang under Travis: ``` AS_IF([test "x$TRAVIS_COMPILER" != xclang], [_MY_CXX_CHECK_OPT(CFG_CXXFLAGS_NO_UNUSED,-faligned-new)]) ``` This resolves the Travis breakage but allows for the same issue to crop up on similar systems. Ultimately, we should understand why configure doesn't catch this behavior with Travis + clang so that the configure test can be improved and the band-aid can be removed.
non_priority
faligned new does not work under travis with clang author name todd strader toddstrader original redmine issue from it was discovered in  that the faligned new flag causes errors when compiling verilated code under travis ci using clang this should have been detected and dealt with via a test for this behavior in configure but configure did not observe the same behavior for the time being a band aid has been applied to configure ac turn off this flag when compiling with clang under travis as if this resolves the travis breakage but allows for the same issue to crop up on similar systems ultimately we should understand why configure doesn t catch this behavior with travis clang so that the configure test can be improved and the band aid can be removed
0
135,294
19,552,457,021
IssuesEvent
2022-01-03 00:54:48
redis/redis
https://api.github.com/repos/redis/redis
closed
Redis Cluster PubSub - Scalability Issues
state:needs-design class:feature
Edit: [full mailing list discussion](https://groups.google.com/forum/#!topic/redis-db/B0_fvfDWLGM) Hi all, I also posted this on the mailing list, but as I think it is a bug, I'll add it here, too. according to [1] and [2] PubSub works by broadcasting every publish to every other Redis Cluster node. This limits the PubSub throughput to the [bisection bandwidth](https://en.wikipedia.org/wiki/Bisection_bandwidth) of the underlying network infrastructure divided by the number of nodes times message size. So if a typical message has 1KB, the cluster has 10 nodes and bandwidth is 1 GBit/s, throughput is already limited to 12.5K RPS. If we increase the message size to 5 KB and the number of nodes to 50, we only get 500 RPS - much less than a single Redis instance could service (>100K RPS), while putting maximum pressure on the network. PubSub thus scales linearly wrt. to the cluster size, but in the the negative direction! This leads me to my question: why not just redirect clients to the node responsible for the PubSub channel's hash slot owner, similar to normal data operations? Cluster nodes would thus only have to publish and notify locally, similar to keyspace notifications [3], and PubSub would be perfectly scalable. Sure, this would break PSUBSCRIBE for the cluster, but PSUBSCRIBE could be limited to only allow patterns containing a {hash-tag}, meaning that the subscription only pertains to channels containing that hash tag + matching the pattern (i.e. one specific node). As PSUBSCRIBE is semantically a multi-key operation, this would make perfect sense and be consistent with the rest of Redis Cluster. In summary, I think the assumption that clients may publish and subscribe to any node is a dangerous guarantee that kills scalability. What do you think - could the above be the way to handle PubSub in Redis Cluster? Are there currently any workarounds to have PubSub scale in a Redis Cluster deployment? [1] https://github.com/antirez/redis/issues/1927 [2] http://redis.io/topics/cluster-spec [3] https://github.com/antirez/redis/issues/2541 P.S. Redis Cluster is a great project and highly value all the effort that goes into it!
1.0
Redis Cluster PubSub - Scalability Issues - Edit: [full mailing list discussion](https://groups.google.com/forum/#!topic/redis-db/B0_fvfDWLGM) Hi all, I also posted this on the mailing list, but as I think it is a bug, I'll add it here, too. according to [1] and [2] PubSub works by broadcasting every publish to every other Redis Cluster node. This limits the PubSub throughput to the [bisection bandwidth](https://en.wikipedia.org/wiki/Bisection_bandwidth) of the underlying network infrastructure divided by the number of nodes times message size. So if a typical message has 1KB, the cluster has 10 nodes and bandwidth is 1 GBit/s, throughput is already limited to 12.5K RPS. If we increase the message size to 5 KB and the number of nodes to 50, we only get 500 RPS - much less than a single Redis instance could service (>100K RPS), while putting maximum pressure on the network. PubSub thus scales linearly wrt. to the cluster size, but in the the negative direction! This leads me to my question: why not just redirect clients to the node responsible for the PubSub channel's hash slot owner, similar to normal data operations? Cluster nodes would thus only have to publish and notify locally, similar to keyspace notifications [3], and PubSub would be perfectly scalable. Sure, this would break PSUBSCRIBE for the cluster, but PSUBSCRIBE could be limited to only allow patterns containing a {hash-tag}, meaning that the subscription only pertains to channels containing that hash tag + matching the pattern (i.e. one specific node). As PSUBSCRIBE is semantically a multi-key operation, this would make perfect sense and be consistent with the rest of Redis Cluster. In summary, I think the assumption that clients may publish and subscribe to any node is a dangerous guarantee that kills scalability. What do you think - could the above be the way to handle PubSub in Redis Cluster? Are there currently any workarounds to have PubSub scale in a Redis Cluster deployment? [1] https://github.com/antirez/redis/issues/1927 [2] http://redis.io/topics/cluster-spec [3] https://github.com/antirez/redis/issues/2541 P.S. Redis Cluster is a great project and highly value all the effort that goes into it!
non_priority
redis cluster pubsub scalability issues edit hi all i also posted this on the mailing list but as i think it is a bug i ll add it here too according to and pubsub works by broadcasting every publish to every other redis cluster node this limits the pubsub throughput to the of the underlying network infrastructure divided by the number of nodes times message size so if a typical message has the cluster has nodes and bandwidth is gbit s throughput is already limited to rps if we increase the message size to kb and the number of nodes to we only get rps much less than a single redis instance could service rps while putting maximum pressure on the network pubsub thus scales linearly wrt to the cluster size but in the the negative direction this leads me to my question why not just redirect clients to the node responsible for the pubsub channel s hash slot owner similar to normal data operations cluster nodes would thus only have to publish and notify locally similar to keyspace notifications and pubsub would be perfectly scalable sure this would break psubscribe for the cluster but psubscribe could be limited to only allow patterns containing a hash tag meaning that the subscription only pertains to channels containing that hash tag matching the pattern i e one specific node as psubscribe is semantically a multi key operation this would make perfect sense and be consistent with the rest of redis cluster in summary i think the assumption that clients may publish and subscribe to any node is a dangerous guarantee that kills scalability what do you think could the above be the way to handle pubsub in redis cluster are there currently any workarounds to have pubsub scale in a redis cluster deployment p s redis cluster is a great project and highly value all the effort that goes into it
0
399,764
27,254,719,035
IssuesEvent
2023-02-22 10:38:33
hiubunho/blog
https://api.github.com/repos/hiubunho/blog
opened
This is my first blog.
documentation
This is my first blog. This is my first blog. This is my first blog. This is my first blog.
1.0
This is my first blog. - This is my first blog. This is my first blog. This is my first blog. This is my first blog.
non_priority
this is my first blog this is my first blog this is my first blog this is my first blog this is my first blog
0
265,529
23,175,046,109
IssuesEvent
2022-07-31 09:40:46
cockroachdb/cockroach
https://api.github.com/repos/cockroachdb/cockroach
opened
pkg/sql/sqlitelogictest/tests/local/local_test: TestSqlLiteLogic_testindexorderby_nosort1000slt_good_1_test failed
C-test-failure O-robot branch-master
pkg/sql/sqlitelogictest/tests/local/local_test.TestSqlLiteLogic_testindexorderby_nosort1000slt_good_1_test [failed](https://teamcity.cockroachdb.com/buildConfiguration/Cockroach_Nightlies_SQLiteLogicTestsBazel/5921538?buildTab=log) with [artifacts](https://teamcity.cockroachdb.com/buildConfiguration/Cockroach_Nightlies_SQLiteLogicTestsBazel/5921538?buildTab=artifacts#/) on master @ [0352fbee5e6933e8bca28aae4b136bcd495ab227](https://github.com/cockroachdb/cockroach/commits/0352fbee5e6933e8bca28aae4b136bcd495ab227): ``` [09:36:52] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5230 statements [09:36:55] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5231 statements [09:36:58] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5232 statements [09:37:01] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5233 statements [09:37:05] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5234 statements [09:37:09] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5235 statements [09:37:13] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5236 statements [09:37:18] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5237 statements [09:37:22] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5238 statements [09:37:26] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5239 statements [09:37:30] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5242 statements [09:37:34] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5245 statements [09:37:38] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5246 statements [09:37:43] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5247 statements [09:37:47] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5248 statements [09:37:51] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5249 statements [09:37:55] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5252 statements [09:37:59] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5254 statements [09:38:04] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5255 statements [09:38:08] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5256 statements [09:38:12] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5257 statements [09:38:16] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5258 statements [09:38:20] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5260 statements [09:38:24] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5261 statements [09:38:29] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5262 statements [09:38:33] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5263 statements [09:38:37] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5264 statements [09:38:41] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5265 statements [09:38:45] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5267 statements [09:38:50] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5268 statements [09:38:54] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5269 statements [09:38:58] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5271 statements [09:39:02] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5272 statements [09:39:06] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5274 statements [09:39:10] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5275 statements [09:39:15] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5276 statements [09:39:19] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5277 statements [09:39:23] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5278 statements [09:39:27] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5280 statements [09:39:31] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5281 statements [09:39:35] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5282 statements [09:39:40] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5283 statements logic.go:2542: pq: streamer budget: memory budget exceeded: 19263 bytes requested, 28672 currently allocated, 37632 bytes in budget [09:39:40] --- done: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test with config local: 5297 tests, 1 failures logic.go:3570: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test:23651: error while processing logic.go:3570: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test:23651: too many errors encountered, skipping the rest of the input panic.go:500: -- test log scope end -- --- FAIL: TestSqlLiteLogic_testindexorderby_nosort1000slt_good_1_test (2536.35s) ``` <details><summary>Help</summary> <p> See also: [How To Investigate a Go Test Failure \(internal\)](https://cockroachlabs.atlassian.net/l/c/HgfXfJgM) </p> </details> <sub> [This test on roachdash](https://roachdash.crdb.dev/?filter=status:open%20t:.*TestSqlLiteLogic_testindexorderby_nosort1000slt_good_1_test.*&sort=title+created&display=lastcommented+project) | [Improve this report!](https://github.com/cockroachdb/cockroach/tree/master/pkg/cmd/internal/issues) </sub>
1.0
pkg/sql/sqlitelogictest/tests/local/local_test: TestSqlLiteLogic_testindexorderby_nosort1000slt_good_1_test failed - pkg/sql/sqlitelogictest/tests/local/local_test.TestSqlLiteLogic_testindexorderby_nosort1000slt_good_1_test [failed](https://teamcity.cockroachdb.com/buildConfiguration/Cockroach_Nightlies_SQLiteLogicTestsBazel/5921538?buildTab=log) with [artifacts](https://teamcity.cockroachdb.com/buildConfiguration/Cockroach_Nightlies_SQLiteLogicTestsBazel/5921538?buildTab=artifacts#/) on master @ [0352fbee5e6933e8bca28aae4b136bcd495ab227](https://github.com/cockroachdb/cockroach/commits/0352fbee5e6933e8bca28aae4b136bcd495ab227): ``` [09:36:52] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5230 statements [09:36:55] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5231 statements [09:36:58] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5232 statements [09:37:01] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5233 statements [09:37:05] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5234 statements [09:37:09] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5235 statements [09:37:13] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5236 statements [09:37:18] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5237 statements [09:37:22] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5238 statements [09:37:26] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5239 statements [09:37:30] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5242 statements [09:37:34] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5245 statements [09:37:38] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5246 statements [09:37:43] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5247 statements [09:37:47] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5248 statements [09:37:51] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5249 statements [09:37:55] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5252 statements [09:37:59] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5254 statements [09:38:04] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5255 statements [09:38:08] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5256 statements [09:38:12] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5257 statements [09:38:16] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5258 statements [09:38:20] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5260 statements [09:38:24] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5261 statements [09:38:29] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5262 statements [09:38:33] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5263 statements [09:38:37] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5264 statements [09:38:41] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5265 statements [09:38:45] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5267 statements [09:38:50] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5268 statements [09:38:54] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5269 statements [09:38:58] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5271 statements [09:39:02] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5272 statements [09:39:06] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5274 statements [09:39:10] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5275 statements [09:39:15] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5276 statements [09:39:19] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5277 statements [09:39:23] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5278 statements [09:39:27] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5280 statements [09:39:31] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5281 statements [09:39:35] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5282 statements [09:39:40] --- progress: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test: 5283 statements logic.go:2542: pq: streamer budget: memory budget exceeded: 19263 bytes requested, 28672 currently allocated, 37632 bytes in budget [09:39:40] --- done: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test with config local: 5297 tests, 1 failures logic.go:3570: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test:23651: error while processing logic.go:3570: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/3411/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-dbg/bin/pkg/sql/sqlitelogictest/tests/local/local_test_/local_test.runfiles/com_github_cockroachdb_cockroach/external/com_github_cockroachdb_sqllogictest/test/index/orderby_nosort/1000/slt_good_1.test:23651: too many errors encountered, skipping the rest of the input panic.go:500: -- test log scope end -- --- FAIL: TestSqlLiteLogic_testindexorderby_nosort1000slt_good_1_test (2536.35s) ``` <details><summary>Help</summary> <p> See also: [How To Investigate a Go Test Failure \(internal\)](https://cockroachlabs.atlassian.net/l/c/HgfXfJgM) </p> </details> <sub> [This test on roachdash](https://roachdash.crdb.dev/?filter=status:open%20t:.*TestSqlLiteLogic_testindexorderby_nosort1000slt_good_1_test.*&sort=title+created&display=lastcommented+project) | [Improve this report!](https://github.com/cockroachdb/cockroach/tree/master/pkg/cmd/internal/issues) </sub>
non_priority
pkg sql sqlitelogictest tests local local test testsqllitelogic testindexorderby good test failed pkg sql sqlitelogictest tests local local test testsqllitelogic testindexorderby good test with on master progress home roach cache bazel bazel roach sandbox processwrapper sandbox execroot com github cockroachdb cockroach bazel out dbg bin pkg sql sqlitelogictest tests local local test local test runfiles com github cockroachdb cockroach external com github cockroachdb sqllogictest test index orderby nosort slt good test statements progress home roach cache bazel bazel roach sandbox processwrapper sandbox execroot com github cockroachdb cockroach bazel out dbg bin pkg sql sqlitelogictest tests local local test local test runfiles com github cockroachdb cockroach external com github cockroachdb sqllogictest test index orderby nosort slt good test statements progress home roach cache bazel bazel roach sandbox processwrapper sandbox execroot com github cockroachdb cockroach bazel out dbg bin pkg sql sqlitelogictest tests local local test local test runfiles com github cockroachdb cockroach external com github cockroachdb sqllogictest test index orderby nosort slt good test statements progress home roach cache bazel bazel roach sandbox processwrapper sandbox execroot com github cockroachdb cockroach bazel out dbg bin pkg sql sqlitelogictest tests local local test local test runfiles com github cockroachdb cockroach external com github cockroachdb sqllogictest test index orderby nosort slt good test statements progress home roach cache bazel bazel roach sandbox processwrapper sandbox execroot com github cockroachdb cockroach bazel out dbg bin pkg sql sqlitelogictest tests local local test local test runfiles com github cockroachdb cockroach external com github cockroachdb sqllogictest test index orderby nosort slt good test statements progress home roach cache bazel bazel roach sandbox processwrapper sandbox execroot com github cockroachdb cockroach bazel out dbg bin pkg sql sqlitelogictest tests local local test local test runfiles com github cockroachdb cockroach external com github cockroachdb sqllogictest test index orderby nosort slt good test statements progress home roach cache bazel bazel roach sandbox processwrapper sandbox execroot com github cockroachdb cockroach bazel out dbg bin pkg sql sqlitelogictest tests local local test local test runfiles com github cockroachdb cockroach external com github cockroachdb sqllogictest test index orderby nosort slt good test statements progress home roach cache bazel bazel roach sandbox processwrapper sandbox execroot com github cockroachdb cockroach bazel out dbg bin pkg sql sqlitelogictest tests local local test local test runfiles com github cockroachdb cockroach external com github cockroachdb sqllogictest test index orderby nosort slt good test statements progress home roach cache bazel bazel roach sandbox processwrapper sandbox execroot com github cockroachdb cockroach bazel out dbg bin pkg sql sqlitelogictest tests local local test local test runfiles com github cockroachdb cockroach external com github cockroachdb sqllogictest test index orderby nosort slt good test statements progress home roach cache bazel bazel roach sandbox processwrapper sandbox execroot com github cockroachdb cockroach bazel out dbg bin pkg sql sqlitelogictest tests local local test local test runfiles com github cockroachdb cockroach external com github cockroachdb sqllogictest test index orderby nosort slt good test statements progress home roach cache bazel bazel roach sandbox processwrapper sandbox execroot com github cockroachdb cockroach bazel out dbg bin pkg sql sqlitelogictest tests local local test local test runfiles com github cockroachdb cockroach external com github cockroachdb sqllogictest test index orderby nosort slt good test statements progress home roach cache bazel bazel roach sandbox processwrapper sandbox execroot com github cockroachdb cockroach bazel out dbg bin pkg sql sqlitelogictest tests local local test local test runfiles com github cockroachdb cockroach external com github cockroachdb sqllogictest test index orderby nosort slt good test statements progress home roach cache bazel bazel roach sandbox processwrapper sandbox execroot com github cockroachdb cockroach bazel out dbg bin pkg sql sqlitelogictest tests local local test local test runfiles com github cockroachdb cockroach external com github cockroachdb sqllogictest test index orderby nosort slt good test statements progress home roach cache bazel bazel roach sandbox processwrapper sandbox execroot com github cockroachdb cockroach bazel out dbg bin pkg sql sqlitelogictest tests local local test local test runfiles com github cockroachdb cockroach external com github cockroachdb sqllogictest test index orderby nosort slt good test statements progress home roach cache bazel bazel roach sandbox processwrapper sandbox execroot com github cockroachdb cockroach bazel out dbg bin pkg sql sqlitelogictest tests local local test local test runfiles com github cockroachdb cockroach external com github cockroachdb sqllogictest test index orderby nosort slt good test statements progress home roach cache bazel bazel roach sandbox processwrapper sandbox execroot com github cockroachdb cockroach bazel out dbg bin pkg sql sqlitelogictest tests local local test local test runfiles com github cockroachdb cockroach external com github cockroachdb sqllogictest test index orderby nosort slt good test statements progress home roach cache bazel bazel roach sandbox processwrapper sandbox execroot com github cockroachdb cockroach bazel out dbg bin pkg sql sqlitelogictest tests local local test local test runfiles com github cockroachdb cockroach external com github cockroachdb sqllogictest test index orderby nosort slt good test statements progress home roach cache bazel bazel roach sandbox processwrapper sandbox execroot com github cockroachdb cockroach bazel out dbg bin pkg sql sqlitelogictest tests local local test local test runfiles com github cockroachdb cockroach external com github cockroachdb sqllogictest test index orderby nosort slt good test statements progress home roach cache bazel bazel roach sandbox processwrapper sandbox execroot com github cockroachdb cockroach bazel out dbg bin pkg sql sqlitelogictest tests local local test local test runfiles com github cockroachdb cockroach external com github cockroachdb sqllogictest test index orderby nosort slt good test statements progress home roach cache bazel bazel roach sandbox processwrapper sandbox execroot com github cockroachdb cockroach bazel out dbg bin pkg sql sqlitelogictest tests local local test local test runfiles com github cockroachdb cockroach external com github cockroachdb sqllogictest test index orderby nosort slt good test statements progress home roach cache bazel bazel roach sandbox processwrapper sandbox execroot com github cockroachdb cockroach bazel out dbg bin pkg sql sqlitelogictest tests local local test local test runfiles com github cockroachdb cockroach external com github cockroachdb sqllogictest test index orderby nosort slt good test statements progress home roach cache bazel bazel roach sandbox processwrapper sandbox execroot com github cockroachdb cockroach bazel out dbg bin pkg sql sqlitelogictest tests local local test local test runfiles com github cockroachdb cockroach external com github cockroachdb sqllogictest test index orderby nosort slt good test statements progress home roach cache bazel bazel roach sandbox processwrapper sandbox execroot com github cockroachdb cockroach bazel out dbg bin pkg sql sqlitelogictest tests local local test local test runfiles com github cockroachdb cockroach external com github cockroachdb sqllogictest test index orderby nosort slt good test statements progress home roach cache bazel bazel roach sandbox processwrapper sandbox execroot com github cockroachdb cockroach bazel out dbg bin pkg sql sqlitelogictest tests local local test local test runfiles com github cockroachdb cockroach external com github cockroachdb sqllogictest test index orderby nosort slt good test statements progress home roach cache bazel bazel roach sandbox processwrapper sandbox execroot com github cockroachdb cockroach bazel out dbg bin pkg sql sqlitelogictest tests local local test local test runfiles com github cockroachdb cockroach external com github cockroachdb sqllogictest test index orderby nosort slt good test statements progress home roach cache bazel bazel roach sandbox processwrapper sandbox execroot com github cockroachdb cockroach bazel out dbg bin pkg sql sqlitelogictest tests local local test local test runfiles com github cockroachdb cockroach external com github cockroachdb sqllogictest test index orderby nosort slt good test statements progress home roach cache bazel bazel roach sandbox processwrapper sandbox execroot com github cockroachdb cockroach bazel out dbg bin pkg sql sqlitelogictest tests local local test local test runfiles com github cockroachdb cockroach external com github cockroachdb sqllogictest test index orderby nosort slt good test statements progress home roach cache bazel bazel roach sandbox processwrapper sandbox execroot com github cockroachdb cockroach bazel out dbg bin pkg sql sqlitelogictest tests local local test local test runfiles com github cockroachdb cockroach external com github cockroachdb sqllogictest test index orderby nosort slt good test statements progress home roach cache bazel bazel roach sandbox processwrapper sandbox execroot com github cockroachdb cockroach bazel out dbg bin pkg sql sqlitelogictest tests local local test local test runfiles com github cockroachdb cockroach external com github cockroachdb sqllogictest test index orderby nosort slt good test statements progress home roach cache bazel bazel roach sandbox processwrapper sandbox execroot com github cockroachdb cockroach bazel out dbg bin pkg sql sqlitelogictest tests local local test local test runfiles com github cockroachdb cockroach external com github cockroachdb sqllogictest test index orderby nosort slt good test statements progress home roach cache bazel bazel roach sandbox processwrapper sandbox execroot com github cockroachdb cockroach bazel out dbg bin pkg sql sqlitelogictest tests local local test local test runfiles com github cockroachdb cockroach external com github cockroachdb sqllogictest test index orderby nosort slt good test statements progress home roach cache bazel bazel roach sandbox processwrapper sandbox execroot com github cockroachdb cockroach bazel out dbg bin pkg sql sqlitelogictest tests local local test local test runfiles com github cockroachdb cockroach external com github cockroachdb sqllogictest test index orderby nosort slt good test statements progress home roach cache bazel bazel roach sandbox processwrapper sandbox execroot com github cockroachdb cockroach bazel out dbg bin pkg sql sqlitelogictest tests local local test local test runfiles com github cockroachdb cockroach external com github cockroachdb sqllogictest test index orderby nosort slt good test statements progress home roach cache bazel bazel roach sandbox processwrapper sandbox execroot com github cockroachdb cockroach bazel out dbg bin pkg sql sqlitelogictest tests local local test local test runfiles com github cockroachdb cockroach external com github cockroachdb sqllogictest test index orderby nosort slt good test statements progress home roach cache bazel bazel roach sandbox processwrapper sandbox execroot com github cockroachdb cockroach bazel out dbg bin pkg sql sqlitelogictest tests local local test local test runfiles com github cockroachdb cockroach external com github cockroachdb sqllogictest test index orderby nosort slt good test statements progress home roach cache bazel bazel roach sandbox processwrapper sandbox execroot com github cockroachdb cockroach bazel out dbg bin pkg sql sqlitelogictest tests local local test local test runfiles com github cockroachdb cockroach external com github cockroachdb sqllogictest test index orderby nosort slt good test statements progress home roach cache bazel bazel roach sandbox processwrapper sandbox execroot com github cockroachdb cockroach bazel out dbg bin pkg sql sqlitelogictest tests local local test local test runfiles com github cockroachdb cockroach external com github cockroachdb sqllogictest test index orderby nosort slt good test statements progress home roach cache bazel bazel roach sandbox processwrapper sandbox execroot com github cockroachdb cockroach bazel out dbg bin pkg sql sqlitelogictest tests local local test local test runfiles com github cockroachdb cockroach external com github cockroachdb sqllogictest test index orderby nosort slt good test statements progress home roach cache bazel bazel roach sandbox processwrapper sandbox execroot com github cockroachdb cockroach bazel out dbg bin pkg sql sqlitelogictest tests local local test local test runfiles com github cockroachdb cockroach external com github cockroachdb sqllogictest test index orderby nosort slt good test statements progress home roach cache bazel bazel roach sandbox processwrapper sandbox execroot com github cockroachdb cockroach bazel out dbg bin pkg sql sqlitelogictest tests local local test local test runfiles com github cockroachdb cockroach external com github cockroachdb sqllogictest test index orderby nosort slt good test statements progress home roach cache bazel bazel roach sandbox processwrapper sandbox execroot com github cockroachdb cockroach bazel out dbg bin pkg sql sqlitelogictest tests local local test local test runfiles com github cockroachdb cockroach external com github cockroachdb sqllogictest test index orderby nosort slt good test statements progress home roach cache bazel bazel roach sandbox processwrapper sandbox execroot com github cockroachdb cockroach bazel out dbg bin pkg sql sqlitelogictest tests local local test local test runfiles com github cockroachdb cockroach external com github cockroachdb sqllogictest test index orderby nosort slt good test statements logic go pq streamer budget memory budget exceeded bytes requested currently allocated bytes in budget done home roach cache bazel bazel roach sandbox processwrapper sandbox execroot com github cockroachdb cockroach bazel out dbg bin pkg sql sqlitelogictest tests local local test local test runfiles com github cockroachdb cockroach external com github cockroachdb sqllogictest test index orderby nosort slt good test with config local tests failures logic go home roach cache bazel bazel roach sandbox processwrapper sandbox execroot com github cockroachdb cockroach bazel out dbg bin pkg sql sqlitelogictest tests local local test local test runfiles com github cockroachdb cockroach external com github cockroachdb sqllogictest test index orderby nosort slt good test error while processing logic go home roach cache bazel bazel roach sandbox processwrapper sandbox execroot com github cockroachdb cockroach bazel out dbg bin pkg sql sqlitelogictest tests local local test local test runfiles com github cockroachdb cockroach external com github cockroachdb sqllogictest test index orderby nosort slt good test too many errors encountered skipping the rest of the input panic go test log scope end fail testsqllitelogic testindexorderby good test help see also
0
121,071
25,921,734,077
IssuesEvent
2022-12-15 22:45:46
ni/nimi-python
https://api.github.com/repos/ni/nimi-python
closed
Codegen only the attribute classes that are used
enhancement wontfix codegen
### Description of issue Currently, the generator generates all the Attribute classes in `_attributes.py.mako` for all drivers even if some of them are not used. We should make the generator smarter so that only the Attribute classes that are used get generated. Kindly refer to https://github.com/ni/nimi-python/pull/1738#discussion_r904141387 for more details.
1.0
Codegen only the attribute classes that are used - ### Description of issue Currently, the generator generates all the Attribute classes in `_attributes.py.mako` for all drivers even if some of them are not used. We should make the generator smarter so that only the Attribute classes that are used get generated. Kindly refer to https://github.com/ni/nimi-python/pull/1738#discussion_r904141387 for more details.
non_priority
codegen only the attribute classes that are used description of issue currently the generator generates all the attribute classes in attributes py mako for all drivers even if some of them are not used we should make the generator smarter so that only the attribute classes that are used get generated kindly refer to for more details
0
110,570
23,957,815,994
IssuesEvent
2022-09-12 16:18:09
appsmithorg/appsmith
https://api.github.com/repos/appsmithorg/appsmith
closed
[Bug]: pagination fields are too smal
Bug Needs Triaging BE Coders Pod GraphQL Plugin Integrations Pod
### Is there an existing issue for this? - [X] I have searched the existing issues ### Description 1. go here: http://3.111.33.176/applications 2. open app in edit mode 3. go to page GitHub 4. open query GetSixIssues 5. go to the pagination tab Under cursor based pagination, these fields on the right are too small - the input is showing trucated ![Screenshot 2022-09-05 at 17 24 41](https://user-images.githubusercontent.com/94514895/188460881-03147dc7-60d1-41a0-adb2-867498412817.png) ![Uploading Screenshot 2022-09-05 at 17.24.41.png…]() ### Steps To Reproduce - ### Public Sample App _No response_ ### Version cloud
1.0
[Bug]: pagination fields are too smal - ### Is there an existing issue for this? - [X] I have searched the existing issues ### Description 1. go here: http://3.111.33.176/applications 2. open app in edit mode 3. go to page GitHub 4. open query GetSixIssues 5. go to the pagination tab Under cursor based pagination, these fields on the right are too small - the input is showing trucated ![Screenshot 2022-09-05 at 17 24 41](https://user-images.githubusercontent.com/94514895/188460881-03147dc7-60d1-41a0-adb2-867498412817.png) ![Uploading Screenshot 2022-09-05 at 17.24.41.png…]() ### Steps To Reproduce - ### Public Sample App _No response_ ### Version cloud
non_priority
pagination fields are too smal is there an existing issue for this i have searched the existing issues description go here open app in edit mode go to page github open query getsixissues go to the pagination tab under cursor based pagination these fields on the right are too small the input is showing trucated steps to reproduce public sample app no response version cloud
0
31,115
14,861,292,533
IssuesEvent
2021-01-18 22:28:26
dotnet/project-system
https://api.github.com/repos/dotnet/project-system
closed
Delay initializing BuildUpToDateCheck and PackageRestoreProgressTracker for inactive project configurations
Bug Bash Performance-Scenario-Solution-Open Tenet-Performance Triage-Approved
Current, inactive project configurations can be loaded in various conditions, either because the mismatching solution configurations, or when an extension or the developer access configured level properties (like appDesigner). AutoLoadComponents, especially dynamic loaded components are triggered in those configurations, which initializes dataflows, especially DT build dataflow, which is not essential until the configuration is activated. If we can delay initialize some of the auto load components until the configuration is activated/implicitly activated, it will reduce some of those initialization/overhead. BuildUpToDateCheck and PackageRestoreProgressTracker are two of those components inside ML project system, which can be delayed to establish dataflow subscription, until the configuration is activated.
True
Delay initializing BuildUpToDateCheck and PackageRestoreProgressTracker for inactive project configurations - Current, inactive project configurations can be loaded in various conditions, either because the mismatching solution configurations, or when an extension or the developer access configured level properties (like appDesigner). AutoLoadComponents, especially dynamic loaded components are triggered in those configurations, which initializes dataflows, especially DT build dataflow, which is not essential until the configuration is activated. If we can delay initialize some of the auto load components until the configuration is activated/implicitly activated, it will reduce some of those initialization/overhead. BuildUpToDateCheck and PackageRestoreProgressTracker are two of those components inside ML project system, which can be delayed to establish dataflow subscription, until the configuration is activated.
non_priority
delay initializing builduptodatecheck and packagerestoreprogresstracker for inactive project configurations current inactive project configurations can be loaded in various conditions either because the mismatching solution configurations or when an extension or the developer access configured level properties like appdesigner autoloadcomponents especially dynamic loaded components are triggered in those configurations which initializes dataflows especially dt build dataflow which is not essential until the configuration is activated if we can delay initialize some of the auto load components until the configuration is activated implicitly activated it will reduce some of those initialization overhead builduptodatecheck and packagerestoreprogresstracker are two of those components inside ml project system which can be delayed to establish dataflow subscription until the configuration is activated
0
225,387
24,828,517,025
IssuesEvent
2022-10-25 23:39:36
samq-ghdemo/SEARCH-NCJIS-nibrs
https://api.github.com/repos/samq-ghdemo/SEARCH-NCJIS-nibrs
reopened
CVE-2022-40153 (High) detected in woodstox-core-5.0.3.jar
security vulnerability
## CVE-2022-40153 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>woodstox-core-5.0.3.jar</b></p></summary> <p>Woodstox is a high-performance XML processor that implements Stax (JSR-173), SAX2 and Stax2 APIs</p> <p>Library home page: <a href="https://github.com/FasterXML/woodstox">https://github.com/FasterXML/woodstox</a></p> <p>Path to dependency file: /web/nibrs-web/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/woodstox/woodstox-core/5.0.3/woodstox-core-5.0.3.jar,/web/nibrs-web/target/nibrs-web/WEB-INF/lib/woodstox-core-5.0.3.jar,/home/wss-scanner/.m2/repository/com/fasterxml/woodstox/woodstox-core/5.0.3/woodstox-core-5.0.3.jar,/home/wss-scanner/.m2/repository/com/fasterxml/woodstox/woodstox-core/5.0.3/woodstox-core-5.0.3.jar</p> <p> Dependency Hierarchy: - :x: **woodstox-core-5.0.3.jar** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Those using Xstream to seralize XML data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack. <p>Publish Date: 2022-09-16 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-40153>CVE-2022-40153</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Release Date: 2022-09-16</p> <p>Fix Resolution: woodstox-core-5.4.0,woodstox-core-6.4.0</p> </p> </details> <p></p> *** <!-- REMEDIATE-OPEN-PR-START --> - [ ] Check this box to open an automated fix PR <!-- REMEDIATE-OPEN-PR-END -->
True
CVE-2022-40153 (High) detected in woodstox-core-5.0.3.jar - ## CVE-2022-40153 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>woodstox-core-5.0.3.jar</b></p></summary> <p>Woodstox is a high-performance XML processor that implements Stax (JSR-173), SAX2 and Stax2 APIs</p> <p>Library home page: <a href="https://github.com/FasterXML/woodstox">https://github.com/FasterXML/woodstox</a></p> <p>Path to dependency file: /web/nibrs-web/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/woodstox/woodstox-core/5.0.3/woodstox-core-5.0.3.jar,/web/nibrs-web/target/nibrs-web/WEB-INF/lib/woodstox-core-5.0.3.jar,/home/wss-scanner/.m2/repository/com/fasterxml/woodstox/woodstox-core/5.0.3/woodstox-core-5.0.3.jar,/home/wss-scanner/.m2/repository/com/fasterxml/woodstox/woodstox-core/5.0.3/woodstox-core-5.0.3.jar</p> <p> Dependency Hierarchy: - :x: **woodstox-core-5.0.3.jar** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Those using Xstream to seralize XML data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack. <p>Publish Date: 2022-09-16 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-40153>CVE-2022-40153</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Release Date: 2022-09-16</p> <p>Fix Resolution: woodstox-core-5.4.0,woodstox-core-6.4.0</p> </p> </details> <p></p> *** <!-- REMEDIATE-OPEN-PR-START --> - [ ] Check this box to open an automated fix PR <!-- REMEDIATE-OPEN-PR-END -->
non_priority
cve high detected in woodstox core jar cve high severity vulnerability vulnerable library woodstox core jar woodstox is a high performance xml processor that implements stax jsr and apis library home page a href path to dependency file web nibrs web pom xml path to vulnerable library home wss scanner repository com fasterxml woodstox woodstox core woodstox core jar web nibrs web target nibrs web web inf lib woodstox core jar home wss scanner repository com fasterxml woodstox woodstox core woodstox core jar home wss scanner repository com fasterxml woodstox woodstox core woodstox core jar dependency hierarchy x woodstox core jar vulnerable library found in base branch master vulnerability details those using xstream to seralize xml data may be vulnerable to denial of service attacks dos if the parser is running on user supplied input an attacker may supply content that causes the parser to crash by stackoverflow this effect may support a denial of service attack publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version release date fix resolution woodstox core woodstox core check this box to open an automated fix pr
0
18,658
4,290,620,314
IssuesEvent
2016-07-18 10:30:51
Microsoft/visualfsharp
https://api.github.com/repos/Microsoft/visualfsharp
closed
DocBug at MSDN: not all keywords reserved for future use are listed
Documentation
At [Keywords](https://msdn.microsoft.com/en-us/library/dd233249.aspx) MSDN page there is a section about tokens that are reserved as keywords for future expansion of the F# language. The table do not contain some of the keywords defined in both language specifications [F# 3.0](http://fsharp.org/specs/language-spec/3.0/FSharpSpec-3.0-final.pdf) and [F# 3.1](http://fsharp.org/specs/language-spec/3.1/FSharpSpec-3.1-working.docx) * fori * measure * params * recursive There are some entries in the table not reserved in the language specification: * event * external Those also do not produce "The identifier '%s' is reserved for future use by F#" warning.
1.0
DocBug at MSDN: not all keywords reserved for future use are listed - At [Keywords](https://msdn.microsoft.com/en-us/library/dd233249.aspx) MSDN page there is a section about tokens that are reserved as keywords for future expansion of the F# language. The table do not contain some of the keywords defined in both language specifications [F# 3.0](http://fsharp.org/specs/language-spec/3.0/FSharpSpec-3.0-final.pdf) and [F# 3.1](http://fsharp.org/specs/language-spec/3.1/FSharpSpec-3.1-working.docx) * fori * measure * params * recursive There are some entries in the table not reserved in the language specification: * event * external Those also do not produce "The identifier '%s' is reserved for future use by F#" warning.
non_priority
docbug at msdn not all keywords reserved for future use are listed at msdn page there is a section about tokens that are reserved as keywords for future expansion of the f language the table do not contain some of the keywords defined in both language specifications and fori measure params recursive there are some entries in the table not reserved in the language specification event external those also do not produce the identifier s is reserved for future use by f warning
0
12,137
19,028,904,242
IssuesEvent
2021-11-24 08:32:49
listen1/listen1_chrome_extension
https://api.github.com/repos/listen1/listen1_chrome_extension
closed
feat: myplaylist crud support
requirement
myplaylist - [x] create - [x] read - [x] update - [x] delete - [ ] reorder -> wait for drag drop pr favorite playlist - [x] create - [x] read - [x] update - [x] delete - [ ] reorder-> wait for drag drop pr tracks in playlist - [x] create - [x] read - [x] update - [x] delete - [ ] reorder-> wait for drag drop pr
1.0
feat: myplaylist crud support - myplaylist - [x] create - [x] read - [x] update - [x] delete - [ ] reorder -> wait for drag drop pr favorite playlist - [x] create - [x] read - [x] update - [x] delete - [ ] reorder-> wait for drag drop pr tracks in playlist - [x] create - [x] read - [x] update - [x] delete - [ ] reorder-> wait for drag drop pr
non_priority
feat myplaylist crud support myplaylist create read update delete reorder wait for drag drop pr favorite playlist create read update delete reorder wait for drag drop pr tracks in playlist create read update delete reorder wait for drag drop pr
0
4,043
2,713,874,864
IssuesEvent
2015-04-09 21:53:14
cgeo/cgeo
https://api.github.com/repos/cgeo/cgeo
closed
Log type field to small when logging a GK
Frontend Design GK low
I attended an opencaching event today and presented the upcoming GK feature. While the feature is considered as really great from the audience some of them suggested to have a better logging view. Due to the fact, that there is a new field for the time in the first row, the log type field became rather small, so that only a few letters are visisble. The proposal was to somehow rearrange the view to give more room for the log type. I currently do not have any great idea how this could look like. Maybe we can move the date and time to a separate row below the log type?
1.0
Log type field to small when logging a GK - I attended an opencaching event today and presented the upcoming GK feature. While the feature is considered as really great from the audience some of them suggested to have a better logging view. Due to the fact, that there is a new field for the time in the first row, the log type field became rather small, so that only a few letters are visisble. The proposal was to somehow rearrange the view to give more room for the log type. I currently do not have any great idea how this could look like. Maybe we can move the date and time to a separate row below the log type?
non_priority
log type field to small when logging a gk i attended an opencaching event today and presented the upcoming gk feature while the feature is considered as really great from the audience some of them suggested to have a better logging view due to the fact that there is a new field for the time in the first row the log type field became rather small so that only a few letters are visisble the proposal was to somehow rearrange the view to give more room for the log type i currently do not have any great idea how this could look like maybe we can move the date and time to a separate row below the log type
0
146,867
23,135,081,787
IssuesEvent
2022-07-28 13:44:22
carbon-design-system/carbon-platform
https://api.github.com/repos/carbon-design-system/carbon-platform
closed
MdxSanitizer - Contents Not Found + Scripts tags UI/UX
type: enhancement 💡 role: design 🎨
**Summary** 1 - If the application fails to retrieve the contents of a given github mdx page, what should happen in the UI? (this is a full page error). - this can just be a page not found Example: supplied github route doesn't exist, requested resource is not allowed (authentication error...) 2 - If a remote mdx contains a script tag, we cannot allow that script for security concerns reasons, what should the feedback to the user be? Options: - Remove script tag - Replace with inline notification error, what should that say? - Full page error - some other UX? Example: ```mdx # Hi <div>Hello</div> <script>alert(Date.now());</script> ``` Replace this with an inline notification : (Replace import with script) <img width="1020" alt="image" src="https://user-images.githubusercontent.com/40550942/179086629-4905f9d6-7b3b-4415-8dbc-9a8e0ce225ab.png"> <img width="1055" alt="image" src="https://user-images.githubusercontent.com/40550942/179087080-bd6290b3-e32c-4348-8b8b-711a285587f3.png"> **Job stories** What value will this deliver? 1. When my remote mdx content has some type of error or defect, I want the app to handle it gracefully, so I can have the best user experience. **Acceptance criteria** What requirements must be met to complete this request? 1. Design specs for detailed cases
1.0
MdxSanitizer - Contents Not Found + Scripts tags UI/UX - **Summary** 1 - If the application fails to retrieve the contents of a given github mdx page, what should happen in the UI? (this is a full page error). - this can just be a page not found Example: supplied github route doesn't exist, requested resource is not allowed (authentication error...) 2 - If a remote mdx contains a script tag, we cannot allow that script for security concerns reasons, what should the feedback to the user be? Options: - Remove script tag - Replace with inline notification error, what should that say? - Full page error - some other UX? Example: ```mdx # Hi <div>Hello</div> <script>alert(Date.now());</script> ``` Replace this with an inline notification : (Replace import with script) <img width="1020" alt="image" src="https://user-images.githubusercontent.com/40550942/179086629-4905f9d6-7b3b-4415-8dbc-9a8e0ce225ab.png"> <img width="1055" alt="image" src="https://user-images.githubusercontent.com/40550942/179087080-bd6290b3-e32c-4348-8b8b-711a285587f3.png"> **Job stories** What value will this deliver? 1. When my remote mdx content has some type of error or defect, I want the app to handle it gracefully, so I can have the best user experience. **Acceptance criteria** What requirements must be met to complete this request? 1. Design specs for detailed cases
non_priority
mdxsanitizer contents not found scripts tags ui ux summary if the application fails to retrieve the contents of a given github mdx page what should happen in the ui this is a full page error this can just be a page not found example supplied github route doesn t exist requested resource is not allowed authentication error if a remote mdx contains a script tag we cannot allow that script for security concerns reasons what should the feedback to the user be options remove script tag replace with inline notification error what should that say full page error some other ux example mdx hi hello alert date now replace this with an inline notification replace import with script img width alt image src img width alt image src job stories what value will this deliver when my remote mdx content has some type of error or defect i want the app to handle it gracefully so i can have the best user experience acceptance criteria what requirements must be met to complete this request design specs for detailed cases
0
20,287
4,534,841,881
IssuesEvent
2016-09-08 15:37:50
matplotlib/matplotlib
https://api.github.com/repos/matplotlib/matplotlib
closed
It is getting increasingly difficult to build the matplotlib documentation
Difficulty: Easy Documentation
I've had to build the matplotlib documentation several times in the past couple of months, and everytime, it is getting increasingly difficult to build the documentation. The number of packages required has drastically increased in the past year or so, including packages where the installation instruction is pretty much missing (http://matplotlib.org/basemap/users/installing.html) Having had to set up a new computer recently, I am running in many problems that I believe many core devs are not aware. This unfortunately increases the level required for new contributors to do documentation changes. I would consider removing a bunch of dependencies… Note that the doc/README.txt only mentions that sphinx is required, and the documentation then crashes after 5 minutes of build. Here is an uncomplete list of packages required to build the documentation: numpydoc, basemap, colorspacious, mock, ipython (!!!!)
1.0
It is getting increasingly difficult to build the matplotlib documentation - I've had to build the matplotlib documentation several times in the past couple of months, and everytime, it is getting increasingly difficult to build the documentation. The number of packages required has drastically increased in the past year or so, including packages where the installation instruction is pretty much missing (http://matplotlib.org/basemap/users/installing.html) Having had to set up a new computer recently, I am running in many problems that I believe many core devs are not aware. This unfortunately increases the level required for new contributors to do documentation changes. I would consider removing a bunch of dependencies… Note that the doc/README.txt only mentions that sphinx is required, and the documentation then crashes after 5 minutes of build. Here is an uncomplete list of packages required to build the documentation: numpydoc, basemap, colorspacious, mock, ipython (!!!!)
non_priority
it is getting increasingly difficult to build the matplotlib documentation i ve had to build the matplotlib documentation several times in the past couple of months and everytime it is getting increasingly difficult to build the documentation the number of packages required has drastically increased in the past year or so including packages where the installation instruction is pretty much missing having had to set up a new computer recently i am running in many problems that i believe many core devs are not aware this unfortunately increases the level required for new contributors to do documentation changes i would consider removing a bunch of dependencies… note that the doc readme txt only mentions that sphinx is required and the documentation then crashes after minutes of build here is an uncomplete list of packages required to build the documentation numpydoc basemap colorspacious mock ipython
0
26,073
26,375,560,150
IssuesEvent
2023-01-12 01:55:42
MAAP-Project/ZenHub
https://api.github.com/repos/MAAP-Project/ZenHub
opened
Jobs UI: table-view needs some sort of affordance to indicate that you click a row to show the Details Panel
Usability
some affordances we could try: - mouseover color - mouseover icon shows up
True
Jobs UI: table-view needs some sort of affordance to indicate that you click a row to show the Details Panel - some affordances we could try: - mouseover color - mouseover icon shows up
non_priority
jobs ui table view needs some sort of affordance to indicate that you click a row to show the details panel some affordances we could try mouseover color mouseover icon shows up
0
52,123
6,219,911,963
IssuesEvent
2017-07-09 17:55:43
publiclab/plotsbot
https://api.github.com/repos/publiclab/plotsbot
closed
Integrate Coveralls
enhancement help wanted testing
Coveralls integration is something very platform / CI / testing library specific. Figure out a way to make it work.
1.0
Integrate Coveralls - Coveralls integration is something very platform / CI / testing library specific. Figure out a way to make it work.
non_priority
integrate coveralls coveralls integration is something very platform ci testing library specific figure out a way to make it work
0
101,354
16,504,109,199
IssuesEvent
2021-05-25 17:06:16
sharethrough/mikro-orm
https://api.github.com/repos/sharethrough/mikro-orm
opened
CVE-2021-23386 (High) detected in dns-packet-1.3.1.tgz
security vulnerability
## CVE-2021-23386 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>dns-packet-1.3.1.tgz</b></p></summary> <p>An abstract-encoding compliant module for encoding / decoding DNS packets</p> <p>Library home page: <a href="https://registry.npmjs.org/dns-packet/-/dns-packet-1.3.1.tgz">https://registry.npmjs.org/dns-packet/-/dns-packet-1.3.1.tgz</a></p> <p>Path to dependency file: mikro-orm/docs/package.json</p> <p>Path to vulnerable library: mikro-orm/docs/node_modules/dns-packet</p> <p> Dependency Hierarchy: - core-2.0.0-beta.0.tgz (Root Library) - webpack-dev-server-3.11.2.tgz - bonjour-3.5.0.tgz - multicast-dns-6.2.3.tgz - :x: **dns-packet-1.3.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sharethrough/mikro-orm/commit/efde88fb861a10bc5c38b3a93138e8ea2b29e972">efde88fb861a10bc5c38b3a93138e8ea2b29e972</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> This affects the package dns-packet before 5.2.2. It creates buffers with allocUnsafe and does not always fill them before forming network packets. This can expose internal application memory over unencrypted network when querying crafted invalid domain names. <p>Publish Date: 2021-05-20 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23386>CVE-2021-23386</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.7</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Changed - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: Low - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23386">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23386</a></p> <p>Release Date: 2021-05-20</p> <p>Fix Resolution: dns-packet - 5.2.2</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"dns-packet","packageVersion":"1.3.1","packageFilePaths":["/docs/package.json"],"isTransitiveDependency":true,"dependencyTree":"@docusaurus/core:2.0.0-beta.0;webpack-dev-server:3.11.2;bonjour:3.5.0;multicast-dns:6.2.3;dns-packet:1.3.1","isMinimumFixVersionAvailable":true,"minimumFixVersion":"dns-packet - 5.2.2"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2021-23386","vulnerabilityDetails":"This affects the package dns-packet before 5.2.2. It creates buffers with allocUnsafe and does not always fill them before forming network packets. This can expose internal application memory over unencrypted network when querying crafted invalid domain names.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23386","cvss3Severity":"high","cvss3Score":"7.7","cvss3Metrics":{"A":"Low","AC":"High","PR":"Low","S":"Changed","C":"High","UI":"None","AV":"Network","I":"Low"},"extraData":{}}</REMEDIATE> -->
True
CVE-2021-23386 (High) detected in dns-packet-1.3.1.tgz - ## CVE-2021-23386 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>dns-packet-1.3.1.tgz</b></p></summary> <p>An abstract-encoding compliant module for encoding / decoding DNS packets</p> <p>Library home page: <a href="https://registry.npmjs.org/dns-packet/-/dns-packet-1.3.1.tgz">https://registry.npmjs.org/dns-packet/-/dns-packet-1.3.1.tgz</a></p> <p>Path to dependency file: mikro-orm/docs/package.json</p> <p>Path to vulnerable library: mikro-orm/docs/node_modules/dns-packet</p> <p> Dependency Hierarchy: - core-2.0.0-beta.0.tgz (Root Library) - webpack-dev-server-3.11.2.tgz - bonjour-3.5.0.tgz - multicast-dns-6.2.3.tgz - :x: **dns-packet-1.3.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sharethrough/mikro-orm/commit/efde88fb861a10bc5c38b3a93138e8ea2b29e972">efde88fb861a10bc5c38b3a93138e8ea2b29e972</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> This affects the package dns-packet before 5.2.2. It creates buffers with allocUnsafe and does not always fill them before forming network packets. This can expose internal application memory over unencrypted network when querying crafted invalid domain names. <p>Publish Date: 2021-05-20 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23386>CVE-2021-23386</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.7</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Changed - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: Low - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23386">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23386</a></p> <p>Release Date: 2021-05-20</p> <p>Fix Resolution: dns-packet - 5.2.2</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"dns-packet","packageVersion":"1.3.1","packageFilePaths":["/docs/package.json"],"isTransitiveDependency":true,"dependencyTree":"@docusaurus/core:2.0.0-beta.0;webpack-dev-server:3.11.2;bonjour:3.5.0;multicast-dns:6.2.3;dns-packet:1.3.1","isMinimumFixVersionAvailable":true,"minimumFixVersion":"dns-packet - 5.2.2"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2021-23386","vulnerabilityDetails":"This affects the package dns-packet before 5.2.2. It creates buffers with allocUnsafe and does not always fill them before forming network packets. This can expose internal application memory over unencrypted network when querying crafted invalid domain names.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23386","cvss3Severity":"high","cvss3Score":"7.7","cvss3Metrics":{"A":"Low","AC":"High","PR":"Low","S":"Changed","C":"High","UI":"None","AV":"Network","I":"Low"},"extraData":{}}</REMEDIATE> -->
non_priority
cve high detected in dns packet tgz cve high severity vulnerability vulnerable library dns packet tgz an abstract encoding compliant module for encoding decoding dns packets library home page a href path to dependency file mikro orm docs package json path to vulnerable library mikro orm docs node modules dns packet dependency hierarchy core beta tgz root library webpack dev server tgz bonjour tgz multicast dns tgz x dns packet tgz vulnerable library found in head commit a href found in base branch master vulnerability details this affects the package dns packet before it creates buffers with allocunsafe and does not always fill them before forming network packets this can expose internal application memory over unencrypted network when querying crafted invalid domain names publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required low user interaction none scope changed impact metrics confidentiality impact high integrity impact low availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution dns packet isopenpronvulnerability false ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree docusaurus core beta webpack dev server bonjour multicast dns dns packet isminimumfixversionavailable true minimumfixversion dns packet basebranches vulnerabilityidentifier cve vulnerabilitydetails this affects the package dns packet before it creates buffers with allocunsafe and does not always fill them before forming network packets this can expose internal application memory over unencrypted network when querying crafted invalid domain names vulnerabilityurl
0
15,557
8,957,393,647
IssuesEvent
2019-01-27 03:02:03
simerplaha/SwayDB
https://api.github.com/repos/simerplaha/SwayDB
closed
Performance improvement for forward & backward iterators when there are too many dead updates within the current Level's iteration
Performance
Iterators can be slower if there are too many dead updates between two keys. Put checkpoint can be added or something similar to help iterators skip dead updates entirely jump to the next valid key instantly. A test case would be: Suppose there are 100,000 keys. Keys 1 & 100,000 are valid keys and updates were submitted for keys 2 to 99,999 that do not exist. This effects iterator performance when reading from key 1 to 100,000.
True
Performance improvement for forward & backward iterators when there are too many dead updates within the current Level's iteration - Iterators can be slower if there are too many dead updates between two keys. Put checkpoint can be added or something similar to help iterators skip dead updates entirely jump to the next valid key instantly. A test case would be: Suppose there are 100,000 keys. Keys 1 & 100,000 are valid keys and updates were submitted for keys 2 to 99,999 that do not exist. This effects iterator performance when reading from key 1 to 100,000.
non_priority
performance improvement for forward backward iterators when there are too many dead updates within the current level s iteration iterators can be slower if there are too many dead updates between two keys put checkpoint can be added or something similar to help iterators skip dead updates entirely jump to the next valid key instantly a test case would be suppose there are keys keys are valid keys and updates were submitted for keys to that do not exist this effects iterator performance when reading from key to
0
292,620
25,226,616,498
IssuesEvent
2022-11-14 16:24:32
hasura/graphql-engine
https://api.github.com/repos/hasura/graphql-engine
closed
server/tests: port pytests to hspec integration test suite
c/tests 🧪
Relates to https://github.com/hasura/graphql-engine/issues/7760 This is a placeholder for now, for related tests as we think of them. But we might use this to coordinate work to gradually port pytests to hspecs, now that the [POC integration test suite](https://github.com/hasura/graphql-engine/issues/7760) is done. In rough priority order: - [x] https://github.com/hasura/graphql-engine/issues/8433#issue-1214623537 - [x] [server/tests: organise hspec integration tests to mirror product architecture](https://github.com/hasura/graphql-engine-mono/issues/4757) - [x] https://github.com/hasura/graphql-engine/issues/8172 - [ ] #8891 - [ ] [BigQuery schema, queries](https://github.com/hasura/graphql-engine-mono/issues/4758) - [ ] Citus schema, queries, mutations, subscriptions - [ ] SQL Server schema, queries, mutations, subscriptions - [ ] remove duplicate Postgres pytests (the goal is _not_ to port over all Postgres pytests, only those testing common backend features) - [ ] [run hspec tests on ARM](https://github.com/hasura/graphql-engine-mono/issues/3511) - [ ] [support multitenant tests](https://github.com/hasura/graphql-engine-mono/issues/3680) - [ ] parallelise test execution (or check it) - [ ] DB healthcheck - [ ] [server/bigquery: investigate bigquery API performance improvements](https://github.com/hasura/graphql-engine-mono/issues/3683)
1.0
server/tests: port pytests to hspec integration test suite - Relates to https://github.com/hasura/graphql-engine/issues/7760 This is a placeholder for now, for related tests as we think of them. But we might use this to coordinate work to gradually port pytests to hspecs, now that the [POC integration test suite](https://github.com/hasura/graphql-engine/issues/7760) is done. In rough priority order: - [x] https://github.com/hasura/graphql-engine/issues/8433#issue-1214623537 - [x] [server/tests: organise hspec integration tests to mirror product architecture](https://github.com/hasura/graphql-engine-mono/issues/4757) - [x] https://github.com/hasura/graphql-engine/issues/8172 - [ ] #8891 - [ ] [BigQuery schema, queries](https://github.com/hasura/graphql-engine-mono/issues/4758) - [ ] Citus schema, queries, mutations, subscriptions - [ ] SQL Server schema, queries, mutations, subscriptions - [ ] remove duplicate Postgres pytests (the goal is _not_ to port over all Postgres pytests, only those testing common backend features) - [ ] [run hspec tests on ARM](https://github.com/hasura/graphql-engine-mono/issues/3511) - [ ] [support multitenant tests](https://github.com/hasura/graphql-engine-mono/issues/3680) - [ ] parallelise test execution (or check it) - [ ] DB healthcheck - [ ] [server/bigquery: investigate bigquery API performance improvements](https://github.com/hasura/graphql-engine-mono/issues/3683)
non_priority
server tests port pytests to hspec integration test suite relates to this is a placeholder for now for related tests as we think of them but we might use this to coordinate work to gradually port pytests to hspecs now that the is done in rough priority order citus schema queries mutations subscriptions sql server schema queries mutations subscriptions remove duplicate postgres pytests the goal is not to port over all postgres pytests only those testing common backend features parallelise test execution or check it db healthcheck
0
2,982
2,787,845,266
IssuesEvent
2015-05-08 09:24:54
HGustavs/LenaSYS
https://api.github.com/repos/HGustavs/LenaSYS
closed
Additional fix for #1300
bug CodeViewer
The regex was not written correctly so lines like "<br> text" lead to some unexpected behavior.
1.0
Additional fix for #1300 - The regex was not written correctly so lines like "<br> text" lead to some unexpected behavior.
non_priority
additional fix for the regex was not written correctly so lines like text lead to some unexpected behavior
0
124,069
16,569,286,138
IssuesEvent
2021-05-30 03:58:27
RafaGomezGlez/WebVisualization
https://api.github.com/repos/RafaGomezGlez/WebVisualization
opened
Sorting Algorithms Visualisation Page
Design
Upgrade UX Design. - [ ] Adobe XD Design - [ ] HTML/CSS Implementation
1.0
Sorting Algorithms Visualisation Page - Upgrade UX Design. - [ ] Adobe XD Design - [ ] HTML/CSS Implementation
non_priority
sorting algorithms visualisation page upgrade ux design adobe xd design html css implementation
0
8,132
2,963,948,080
IssuesEvent
2015-07-10 14:05:18
PropelVentures/GenericPlatform
https://api.github.com/repos/PropelVentures/GenericPlatform
closed
Lists - Box Format
Fix Applied - Test Not Working to Spec
- Need Initial Box format to display fields like genericveryold - with the Image field very prominent. - It is OK if the Box style function has a requirement that the first field in the field list, is the image field.
1.0
Lists - Box Format - - Need Initial Box format to display fields like genericveryold - with the Image field very prominent. - It is OK if the Box style function has a requirement that the first field in the field list, is the image field.
non_priority
lists box format need initial box format to display fields like genericveryold with the image field very prominent it is ok if the box style function has a requirement that the first field in the field list is the image field
0
258,659
27,570,704,163
IssuesEvent
2023-03-08 09:03:50
ghc-dev/8060538_2339
https://api.github.com/repos/ghc-dev/8060538_2339
closed
guava-28.1-jre.jar: 1 vulnerabilities (highest severity is: 3.3) - autoclosed
Mend: dependency security vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>guava-28.1-jre.jar</b></p></summary> <p>Guava is a suite of core and expanded libraries that include utility classes, google's collections, io classes, and much much more.</p> <p>Library home page: <a href="https://github.com/google/guava">https://github.com/google/guava</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/google/guava/guava/28.1-jre/guava-28.1-jre.jar</p> <p> <p>Found in HEAD commit: <a href="https://github.com/ghc-dev/8060538_2339/commit/38b50fba3ac6f33c817f3c7a50a222ce6f91c4bc">38b50fba3ac6f33c817f3c7a50a222ce6f91c4bc</a></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (guava version) | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | ------------- | --- | | [CVE-2020-8908](https://www.mend.io/vulnerability-database/CVE-2020-8908) | <img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> Low | 3.3 | guava-28.1-jre.jar | Direct | 30.0-android | &#9989; | ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> CVE-2020-8908</summary> ### Vulnerable Library - <b>guava-28.1-jre.jar</b></p> <p>Guava is a suite of core and expanded libraries that include utility classes, google's collections, io classes, and much much more.</p> <p>Library home page: <a href="https://github.com/google/guava">https://github.com/google/guava</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/google/guava/guava/28.1-jre/guava-28.1-jre.jar</p> <p> Dependency Hierarchy: - :x: **guava-28.1-jre.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/ghc-dev/8060538_2339/commit/38b50fba3ac6f33c817f3c7a50a222ce6f91c4bc">38b50fba3ac6f33c817f3c7a50a222ce6f91c4bc</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> A temp directory creation vulnerability exists in all versions of Guava, allowing an attacker with access to the machine to potentially access data in a temporary directory created by the Guava API com.google.common.io.Files.createTempDir(). By default, on unix-like systems, the created directory is world-readable (readable by an attacker with access to the system). The method in question has been marked @Deprecated in versions 30.0 and later and should not be used. For Android developers, we recommend choosing a temporary directory API provided by Android, such as context.getCacheDir(). For other Java developers, we recommend migrating to the Java 7 API java.nio.file.Files.createTempDirectory() which explicitly configures permissions of 700, or configuring the Java runtime's java.io.tmpdir system property to point to a location whose permissions are appropriately configured. <p>Publish Date: 2020-12-10 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-8908>CVE-2020-8908</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>3.3</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8908">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8908</a></p> <p>Release Date: 2020-12-10</p> <p>Fix Resolution: 30.0-android</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details> *** <p>:rescue_worker_helmet: Automatic Remediation is available for this issue.</p>
True
guava-28.1-jre.jar: 1 vulnerabilities (highest severity is: 3.3) - autoclosed - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>guava-28.1-jre.jar</b></p></summary> <p>Guava is a suite of core and expanded libraries that include utility classes, google's collections, io classes, and much much more.</p> <p>Library home page: <a href="https://github.com/google/guava">https://github.com/google/guava</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/google/guava/guava/28.1-jre/guava-28.1-jre.jar</p> <p> <p>Found in HEAD commit: <a href="https://github.com/ghc-dev/8060538_2339/commit/38b50fba3ac6f33c817f3c7a50a222ce6f91c4bc">38b50fba3ac6f33c817f3c7a50a222ce6f91c4bc</a></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (guava version) | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | ------------- | --- | | [CVE-2020-8908](https://www.mend.io/vulnerability-database/CVE-2020-8908) | <img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> Low | 3.3 | guava-28.1-jre.jar | Direct | 30.0-android | &#9989; | ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> CVE-2020-8908</summary> ### Vulnerable Library - <b>guava-28.1-jre.jar</b></p> <p>Guava is a suite of core and expanded libraries that include utility classes, google's collections, io classes, and much much more.</p> <p>Library home page: <a href="https://github.com/google/guava">https://github.com/google/guava</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/google/guava/guava/28.1-jre/guava-28.1-jre.jar</p> <p> Dependency Hierarchy: - :x: **guava-28.1-jre.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/ghc-dev/8060538_2339/commit/38b50fba3ac6f33c817f3c7a50a222ce6f91c4bc">38b50fba3ac6f33c817f3c7a50a222ce6f91c4bc</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> A temp directory creation vulnerability exists in all versions of Guava, allowing an attacker with access to the machine to potentially access data in a temporary directory created by the Guava API com.google.common.io.Files.createTempDir(). By default, on unix-like systems, the created directory is world-readable (readable by an attacker with access to the system). The method in question has been marked @Deprecated in versions 30.0 and later and should not be used. For Android developers, we recommend choosing a temporary directory API provided by Android, such as context.getCacheDir(). For other Java developers, we recommend migrating to the Java 7 API java.nio.file.Files.createTempDirectory() which explicitly configures permissions of 700, or configuring the Java runtime's java.io.tmpdir system property to point to a location whose permissions are appropriately configured. <p>Publish Date: 2020-12-10 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-8908>CVE-2020-8908</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>3.3</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8908">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8908</a></p> <p>Release Date: 2020-12-10</p> <p>Fix Resolution: 30.0-android</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details> *** <p>:rescue_worker_helmet: Automatic Remediation is available for this issue.</p>
non_priority
guava jre jar vulnerabilities highest severity is autoclosed vulnerable library guava jre jar guava is a suite of core and expanded libraries that include utility classes google s collections io classes and much much more library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository com google guava guava jre guava jre jar found in head commit a href vulnerabilities cve severity cvss dependency type fixed in guava version remediation available low guava jre jar direct android details cve vulnerable library guava jre jar guava is a suite of core and expanded libraries that include utility classes google s collections io classes and much much more library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository com google guava guava jre guava jre jar dependency hierarchy x guava jre jar vulnerable library found in head commit a href found in base branch main vulnerability details a temp directory creation vulnerability exists in all versions of guava allowing an attacker with access to the machine to potentially access data in a temporary directory created by the guava api com google common io files createtempdir by default on unix like systems the created directory is world readable readable by an attacker with access to the system the method in question has been marked deprecated in versions and later and should not be used for android developers we recommend choosing a temporary directory api provided by android such as context getcachedir for other java developers we recommend migrating to the java api java nio file files createtempdirectory which explicitly configures permissions of or configuring the java runtime s java io tmpdir system property to point to a location whose permissions are appropriately configured publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact low integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution android rescue worker helmet automatic remediation is available for this issue rescue worker helmet automatic remediation is available for this issue
0
45,312
11,628,565,910
IssuesEvent
2020-02-27 18:35:27
csf-dev/CSF.ORM
https://api.github.com/repos/csf-dev/CSF.ORM
opened
NuGet packages for NHibernate should not permit incorrect versions
build/deployment enhancement
Currently, the package dependency between the ORM NHibernate packages and the NHibernate library specify only a minimum version. They should also specify a maximum.
1.0
NuGet packages for NHibernate should not permit incorrect versions - Currently, the package dependency between the ORM NHibernate packages and the NHibernate library specify only a minimum version. They should also specify a maximum.
non_priority
nuget packages for nhibernate should not permit incorrect versions currently the package dependency between the orm nhibernate packages and the nhibernate library specify only a minimum version they should also specify a maximum
0
236,225
19,522,996,959
IssuesEvent
2021-12-29 22:56:30
jubishop/smalldemocracy
https://api.github.com/repos/jubishop/smalldemocracy
closed
Rack testing changes
testing 0pri
Let's create an expect slim.render(template).with_params(params) Let's always expect either the slim template or exact error reply, along with http status. Also test all links take us where we want. Then capybara apparition tests for actual views.
1.0
Rack testing changes - Let's create an expect slim.render(template).with_params(params) Let's always expect either the slim template or exact error reply, along with http status. Also test all links take us where we want. Then capybara apparition tests for actual views.
non_priority
rack testing changes let s create an expect slim render template with params params let s always expect either the slim template or exact error reply along with http status also test all links take us where we want then capybara apparition tests for actual views
0
113,038
11,785,977,668
IssuesEvent
2020-03-17 11:20:35
SE701ProjectGroup4/Flatmate-Management-System
https://api.github.com/repos/SE701ProjectGroup4/Flatmate-Management-System
closed
Document justification for custom labels
approved documentation
**Describe the change** As per the assignment brief, a justification for our choice of our custom issue labels should be documented in the team wiki. **Why is this happening** Though our choice of labels are relatively mainstream, a quick justification of why we chose this subset of labels ensures the entire team has a shared understanding of the decision.
1.0
Document justification for custom labels - **Describe the change** As per the assignment brief, a justification for our choice of our custom issue labels should be documented in the team wiki. **Why is this happening** Though our choice of labels are relatively mainstream, a quick justification of why we chose this subset of labels ensures the entire team has a shared understanding of the decision.
non_priority
document justification for custom labels describe the change as per the assignment brief a justification for our choice of our custom issue labels should be documented in the team wiki why is this happening though our choice of labels are relatively mainstream a quick justification of why we chose this subset of labels ensures the entire team has a shared understanding of the decision
0
100,039
16,481,179,740
IssuesEvent
2021-05-24 11:53:03
AlexRogalskiy/github-action-issue-commenter
https://api.github.com/repos/AlexRogalskiy/github-action-issue-commenter
opened
CVE-2021-23343 (High) detected in path-parse-1.0.6.tgz
security vulnerability
## CVE-2021-23343 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>path-parse-1.0.6.tgz</b></p></summary> <p>Node.js path.parse() ponyfill</p> <p>Library home page: <a href="https://registry.npmjs.org/path-parse/-/path-parse-1.0.6.tgz">https://registry.npmjs.org/path-parse/-/path-parse-1.0.6.tgz</a></p> <p>Path to dependency file: github-action-issue-commenter/package.json</p> <p>Path to vulnerable library: github-action-issue-commenter/node_modules/path-parse/package.json</p> <p> Dependency Hierarchy: - eslint-import-resolver-typescript-2.4.0.tgz (Root Library) - resolve-1.20.0.tgz - :x: **path-parse-1.0.6.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/AlexRogalskiy/github-action-issue-commenter/commit/ffad54a6758fa01d530393d50aea5e6f298a4a37">ffad54a6758fa01d530393d50aea5e6f298a4a37</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> All versions of package path-parse are vulnerable to Regular Expression Denial of Service (ReDoS) via splitDeviceRe, splitTailRe, and splitPathRe regular expressions. ReDoS exhibits polynomial worst-case time complexity. <p>Publish Date: 2021-05-04 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23343>CVE-2021-23343</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2021-23343 (High) detected in path-parse-1.0.6.tgz - ## CVE-2021-23343 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>path-parse-1.0.6.tgz</b></p></summary> <p>Node.js path.parse() ponyfill</p> <p>Library home page: <a href="https://registry.npmjs.org/path-parse/-/path-parse-1.0.6.tgz">https://registry.npmjs.org/path-parse/-/path-parse-1.0.6.tgz</a></p> <p>Path to dependency file: github-action-issue-commenter/package.json</p> <p>Path to vulnerable library: github-action-issue-commenter/node_modules/path-parse/package.json</p> <p> Dependency Hierarchy: - eslint-import-resolver-typescript-2.4.0.tgz (Root Library) - resolve-1.20.0.tgz - :x: **path-parse-1.0.6.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/AlexRogalskiy/github-action-issue-commenter/commit/ffad54a6758fa01d530393d50aea5e6f298a4a37">ffad54a6758fa01d530393d50aea5e6f298a4a37</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> All versions of package path-parse are vulnerable to Regular Expression Denial of Service (ReDoS) via splitDeviceRe, splitTailRe, and splitPathRe regular expressions. ReDoS exhibits polynomial worst-case time complexity. <p>Publish Date: 2021-05-04 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23343>CVE-2021-23343</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in path parse tgz cve high severity vulnerability vulnerable library path parse tgz node js path parse ponyfill library home page a href path to dependency file github action issue commenter package json path to vulnerable library github action issue commenter node modules path parse package json dependency hierarchy eslint import resolver typescript tgz root library resolve tgz x path parse tgz vulnerable library found in head commit a href found in base branch master vulnerability details all versions of package path parse are vulnerable to regular expression denial of service redos via splitdevicere splittailre and splitpathre regular expressions redos exhibits polynomial worst case time complexity publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href step up your open source security game with whitesource
0
97,334
12,227,967,350
IssuesEvent
2020-05-03 17:23:51
readthedocs/sphinx_rtd_theme
https://api.github.com/repos/readthedocs/sphinx_rtd_theme
opened
Use unique identifier to avoid caching
Accepted Needed: design decision
I enabled the RTD PR builder for this project, however CSS and JS get cached at the CDN now, making PR review of built documentation not very helpful -- these assets will get cached and any updates to CSS/JS on the PR won't show. We can avoid this by using a query string to avoid the caching and would have a few things to decide on: * What string to use? We surface `{{ commit }}` for most builds, we could conditionally add that on the end of js/css requests: `{% if commit %}?{{ commit }}{% endif %}`. Is there a better string? * Is there a more generalized solution to this? Sphinx extension that does this for us? * Do we want this on just development/PR builds? On the base theme `layout.html` and all projects that use our theme? Perhaps start by making this a configuration variable and work towards making it the default? My vote is to use `commit`, and use a configuration variable to enable the addition to URLs.
1.0
Use unique identifier to avoid caching - I enabled the RTD PR builder for this project, however CSS and JS get cached at the CDN now, making PR review of built documentation not very helpful -- these assets will get cached and any updates to CSS/JS on the PR won't show. We can avoid this by using a query string to avoid the caching and would have a few things to decide on: * What string to use? We surface `{{ commit }}` for most builds, we could conditionally add that on the end of js/css requests: `{% if commit %}?{{ commit }}{% endif %}`. Is there a better string? * Is there a more generalized solution to this? Sphinx extension that does this for us? * Do we want this on just development/PR builds? On the base theme `layout.html` and all projects that use our theme? Perhaps start by making this a configuration variable and work towards making it the default? My vote is to use `commit`, and use a configuration variable to enable the addition to URLs.
non_priority
use unique identifier to avoid caching i enabled the rtd pr builder for this project however css and js get cached at the cdn now making pr review of built documentation not very helpful these assets will get cached and any updates to css js on the pr won t show we can avoid this by using a query string to avoid the caching and would have a few things to decide on what string to use we surface commit for most builds we could conditionally add that on the end of js css requests if commit commit endif is there a better string is there a more generalized solution to this sphinx extension that does this for us do we want this on just development pr builds on the base theme layout html and all projects that use our theme perhaps start by making this a configuration variable and work towards making it the default my vote is to use commit and use a configuration variable to enable the addition to urls
0
2,849
2,718,320,415
IssuesEvent
2015-04-12 06:01:02
fritzy/SleekXMPP
https://api.github.com/repos/fritzy/SleekXMPP
opened
Create CHANGELOG file and backfill history
Documentation
from the mailing list: On Sunday, April 12, 2015 at 1:38:19 AM UTC-4, Alexander Artemenko wrote: By the way, you could restore some historical data for a changelog from here: http://allmychanges.com/p/python/sleekxmpp/
1.0
Create CHANGELOG file and backfill history - from the mailing list: On Sunday, April 12, 2015 at 1:38:19 AM UTC-4, Alexander Artemenko wrote: By the way, you could restore some historical data for a changelog from here: http://allmychanges.com/p/python/sleekxmpp/
non_priority
create changelog file and backfill history from the mailing list on sunday april at am utc alexander artemenko wrote by the way you could restore some historical data for a changelog from here
0
32,389
4,769,150,250
IssuesEvent
2016-10-26 11:34:24
linkedpipes/etl
https://api.github.com/repos/linkedpipes/etl
closed
Import of pipeline with template fails
bug test
I tried to import this <a href="http://fit1.opendata.cz:8090/resources/pipelines/created-1475676896625">pipeline</a> into my localhost instance and I got a "missing template" error.
1.0
Import of pipeline with template fails - I tried to import this <a href="http://fit1.opendata.cz:8090/resources/pipelines/created-1475676896625">pipeline</a> into my localhost instance and I got a "missing template" error.
non_priority
import of pipeline with template fails i tried to import this a href into my localhost instance and i got a missing template error
0
144,410
19,286,226,719
IssuesEvent
2021-12-11 02:05:07
Alanwang2015/XBot
https://api.github.com/repos/Alanwang2015/XBot
opened
CVE-2020-36187 (High) detected in jackson-databind-2.9.10.jar
security vulnerability
## CVE-2020-36187 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.9.10.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: XBot/pom.xml</p> <p>Path to vulnerable library: canner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.10/jackson-databind-2.9.10.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.9.10.jar** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource. <p>Publish Date: 2021-01-06 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36187>CVE-2020-36187</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/FasterXML/jackson-databind/issues/2997">https://github.com/FasterXML/jackson-databind/issues/2997</a></p> <p>Release Date: 2021-01-06</p> <p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.9.10.8</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2020-36187 (High) detected in jackson-databind-2.9.10.jar - ## CVE-2020-36187 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.9.10.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: XBot/pom.xml</p> <p>Path to vulnerable library: canner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.10/jackson-databind-2.9.10.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.9.10.jar** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource. <p>Publish Date: 2021-01-06 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36187>CVE-2020-36187</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/FasterXML/jackson-databind/issues/2997">https://github.com/FasterXML/jackson-databind/issues/2997</a></p> <p>Release Date: 2021-01-06</p> <p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.9.10.8</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in jackson databind jar cve high severity vulnerability vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file xbot pom xml path to vulnerable library canner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy x jackson databind jar vulnerable library found in base branch master vulnerability details fasterxml jackson databind x before mishandles the interaction between serialization gadgets and typing related to org apache tomcat dbcp dbcp datasources sharedpooldatasource publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson core jackson databind step up your open source security game with whitesource
0
257,931
27,563,834,151
IssuesEvent
2023-03-08 01:09:50
jtimberlake/pacbot
https://api.github.com/repos/jtimberlake/pacbot
opened
CVE-2019-11358 (Medium) detected in jquery-1.10.1.min.js, jquery-1.11.1.jar
security vulnerability
## CVE-2019-11358 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>jquery-1.10.1.min.js</b>, <b>jquery-1.11.1.jar</b></p></summary> <p> <details><summary><b>jquery-1.10.1.min.js</b></p></summary> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.10.1/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/1.10.1/jquery.min.js</a></p> <p>Path to dependency file: /webapp/node_modules/offline-js/docs/welcome/index.html</p> <p>Path to vulnerable library: /webapp/node_modules/offline-js/docs/welcome/index.html</p> <p> Dependency Hierarchy: - :x: **jquery-1.10.1.min.js** (Vulnerable Library) </details> <details><summary><b>jquery-1.11.1.jar</b></p></summary> <p>WebJar for jQuery</p> <p>Library home page: <a href="http://webjars.org">http://webjars.org</a></p> <p>Path to dependency file: /api/pacman-api-auth/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/webjars/jquery/1.11.1/jquery-1.11.1.jar</p> <p> Dependency Hierarchy: - bootstrap-3.3.2.jar (Root Library) - :x: **jquery-1.11.1.jar** (Vulnerable Library) </details> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype. <p>Publish Date: 2019-04-20 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-11358>CVE-2019-11358</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11358">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11358</a></p> <p>Release Date: 2019-04-20</p> <p>Fix Resolution (org.webjars:jquery): 3.4.0</p> <p>Direct dependency fix Resolution (org.webjars:bootstrap): 4.4.1-1</p> </p> </details> <p></p> *** <!-- REMEDIATE-OPEN-PR-START --> - [ ] Check this box to open an automated fix PR <!-- REMEDIATE-OPEN-PR-END -->
True
CVE-2019-11358 (Medium) detected in jquery-1.10.1.min.js, jquery-1.11.1.jar - ## CVE-2019-11358 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>jquery-1.10.1.min.js</b>, <b>jquery-1.11.1.jar</b></p></summary> <p> <details><summary><b>jquery-1.10.1.min.js</b></p></summary> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.10.1/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/1.10.1/jquery.min.js</a></p> <p>Path to dependency file: /webapp/node_modules/offline-js/docs/welcome/index.html</p> <p>Path to vulnerable library: /webapp/node_modules/offline-js/docs/welcome/index.html</p> <p> Dependency Hierarchy: - :x: **jquery-1.10.1.min.js** (Vulnerable Library) </details> <details><summary><b>jquery-1.11.1.jar</b></p></summary> <p>WebJar for jQuery</p> <p>Library home page: <a href="http://webjars.org">http://webjars.org</a></p> <p>Path to dependency file: /api/pacman-api-auth/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/webjars/jquery/1.11.1/jquery-1.11.1.jar</p> <p> Dependency Hierarchy: - bootstrap-3.3.2.jar (Root Library) - :x: **jquery-1.11.1.jar** (Vulnerable Library) </details> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype. <p>Publish Date: 2019-04-20 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-11358>CVE-2019-11358</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11358">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11358</a></p> <p>Release Date: 2019-04-20</p> <p>Fix Resolution (org.webjars:jquery): 3.4.0</p> <p>Direct dependency fix Resolution (org.webjars:bootstrap): 4.4.1-1</p> </p> </details> <p></p> *** <!-- REMEDIATE-OPEN-PR-START --> - [ ] Check this box to open an automated fix PR <!-- REMEDIATE-OPEN-PR-END -->
non_priority
cve medium detected in jquery min js jquery jar cve medium severity vulnerability vulnerable libraries jquery min js jquery jar jquery min js javascript library for dom operations library home page a href path to dependency file webapp node modules offline js docs welcome index html path to vulnerable library webapp node modules offline js docs welcome index html dependency hierarchy x jquery min js vulnerable library jquery jar webjar for jquery library home page a href path to dependency file api pacman api auth pom xml path to vulnerable library home wss scanner repository org webjars jquery jquery jar dependency hierarchy bootstrap jar root library x jquery jar vulnerable library found in base branch master vulnerability details jquery before as used in drupal backdrop cms and other products mishandles jquery extend true because of object prototype pollution if an unsanitized source object contained an enumerable proto property it could extend the native object prototype publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org webjars jquery direct dependency fix resolution org webjars bootstrap check this box to open an automated fix pr
0
372,695
26,014,702,184
IssuesEvent
2022-12-21 07:13:08
Dapp-Learning-DAO/Dapp-Learning
https://api.github.com/repos/Dapp-Learning-DAO/Dapp-Learning
closed
Re-order the tasks' sequence of the basic part
documentation
Title: Re-order the tasks' sequence of the basic part. Description: The tasks are randomly added by contributors, while the current list is not suitable for fresh guys. We need to pay some effort to re-order those tasks to make sure these courses can be helpful to learners.
1.0
Re-order the tasks' sequence of the basic part - Title: Re-order the tasks' sequence of the basic part. Description: The tasks are randomly added by contributors, while the current list is not suitable for fresh guys. We need to pay some effort to re-order those tasks to make sure these courses can be helpful to learners.
non_priority
re order the tasks sequence of the basic part title re order the tasks sequence of the basic part description the tasks are randomly added by contributors while the current list is not suitable for fresh guys we need to pay some effort to re order those tasks to make sure these courses can be helpful to learners
0
109,281
11,631,649,970
IssuesEvent
2020-02-28 02:07:08
StewartThomson/Gotify-Ext
https://api.github.com/repos/StewartThomson/Gotify-Ext
opened
Add development guide
documentation
In the readme, I need to put what's necessary to dev this... might set up a docker-compose to make it easier.
1.0
Add development guide - In the readme, I need to put what's necessary to dev this... might set up a docker-compose to make it easier.
non_priority
add development guide in the readme i need to put what s necessary to dev this might set up a docker compose to make it easier
0
140,922
21,302,148,683
IssuesEvent
2022-04-15 05:41:56
cardano-indonesia/community-web-portal-in-bahasa
https://api.github.com/repos/cardano-indonesia/community-web-portal-in-bahasa
closed
Web Design
design web development
Web Design - @Rollies77 - [x] Prepare web design for review on 15/3 @Rollies77 - [x] Logo - 3 alternative @Rollies77 - [x] 2nd revision web design on 30 March @Rollies77 - [x] final revision web design by 6 April @Rollies77
1.0
Web Design - Web Design - @Rollies77 - [x] Prepare web design for review on 15/3 @Rollies77 - [x] Logo - 3 alternative @Rollies77 - [x] 2nd revision web design on 30 March @Rollies77 - [x] final revision web design by 6 April @Rollies77
non_priority
web design web design prepare web design for review on logo alternative revision web design on march final revision web design by april
0
67,774
17,067,807,849
IssuesEvent
2021-07-07 09:30:31
dotnet/runtime
https://api.github.com/repos/dotnet/runtime
closed
Remove MONO_CORLIB_VERSION
area-Build-mono in pr
This is no longer as useful with .NET 6, since we are much less likely to end up in a scenario where the runtime and corelib are out of sync. We haven't been good about bumping it with icall changes and it hasn't been a problem, so it should be safe to just remove. cc: @akoeplinger @lambdageek
1.0
Remove MONO_CORLIB_VERSION - This is no longer as useful with .NET 6, since we are much less likely to end up in a scenario where the runtime and corelib are out of sync. We haven't been good about bumping it with icall changes and it hasn't been a problem, so it should be safe to just remove. cc: @akoeplinger @lambdageek
non_priority
remove mono corlib version this is no longer as useful with net since we are much less likely to end up in a scenario where the runtime and corelib are out of sync we haven t been good about bumping it with icall changes and it hasn t been a problem so it should be safe to just remove cc akoeplinger lambdageek
0
19,048
3,414,190,189
IssuesEvent
2015-12-07 03:54:29
marekr/kicad-issue-test
https://api.github.com/repos/marekr/kicad-issue-test
opened
Delete wire/delete node not intuitive
eeschema eeschema-redesign Triaged Wishlist
The whole delete wire/delete node operation isn't really clear. The most useful thing to do for a DEL keypress is to delete till the end or a junction not the WHOLE wire (and not even always the whole, it depends on how it was drawn to begin with). Example: A 1 B 2 C 3 D ---*---*---*--- (wire with junction) Pressing DEL on the A segment should delete only A, not the whole ABCD, or ABC, or AB. Also the junction cleanup could be improved, often some 'corner' junction remain or even some 'floating' ones.
1.0
Delete wire/delete node not intuitive - The whole delete wire/delete node operation isn't really clear. The most useful thing to do for a DEL keypress is to delete till the end or a junction not the WHOLE wire (and not even always the whole, it depends on how it was drawn to begin with). Example: A 1 B 2 C 3 D ---*---*---*--- (wire with junction) Pressing DEL on the A segment should delete only A, not the whole ABCD, or ABC, or AB. Also the junction cleanup could be improved, often some 'corner' junction remain or even some 'floating' ones.
non_priority
delete wire delete node not intuitive the whole delete wire delete node operation isn t really clear the most useful thing to do for a del keypress is to delete till the end or a junction not the whole wire and not even always the whole it depends on how it was drawn to begin with example a b c d wire with junction pressing del on the a segment should delete only a not the whole abcd or abc or ab also the junction cleanup could be improved often some corner junction remain or even some floating ones
0
33,054
7,647,098,420
IssuesEvent
2018-05-09 01:52:30
EOSIO/eos
https://api.github.com/repos/EOSIO/eos
closed
Fix access control for context-aware vs context-free APIs
HARDFORK bug code review
Changes needed: - `softfloat_api` and `compiler_builtins` are currently not available to context-free actions when they should be. - The exposed methods of `apply_context` are currently available to context-free actions when they should not be. - `check_auth` should be moved from `context_free_transaction_api` (which is available to context-free actions) to `permission_api` (which is only available to context-aware actions). - Determine whether `now()` should be available to context-free actions. If not, then: * `now()` should be moved out of the `system_api` (which is available to both context-free and context-aware actions) to an API that is only available to context-aware actions. * We should figure out if `action_api::publication_time()` needs to be dealt with in a similar way. It wouldn't be a problem for a deferred transaction, but it may be for an immediately-executing input transaction. - Determine whether `context_free_transaction_api::get_action` needs to be split into multiple functions: one that only gets actions in the original transaction and is available to both context-free and context-aware actions; and another one that can get all the actions in the current implicit transaction (including ones dispatched during execution of previously executed actions). Related to issues #2356 and #2386. ATC: - Unittests test all the api categories for access via context free actions.
1.0
Fix access control for context-aware vs context-free APIs - Changes needed: - `softfloat_api` and `compiler_builtins` are currently not available to context-free actions when they should be. - The exposed methods of `apply_context` are currently available to context-free actions when they should not be. - `check_auth` should be moved from `context_free_transaction_api` (which is available to context-free actions) to `permission_api` (which is only available to context-aware actions). - Determine whether `now()` should be available to context-free actions. If not, then: * `now()` should be moved out of the `system_api` (which is available to both context-free and context-aware actions) to an API that is only available to context-aware actions. * We should figure out if `action_api::publication_time()` needs to be dealt with in a similar way. It wouldn't be a problem for a deferred transaction, but it may be for an immediately-executing input transaction. - Determine whether `context_free_transaction_api::get_action` needs to be split into multiple functions: one that only gets actions in the original transaction and is available to both context-free and context-aware actions; and another one that can get all the actions in the current implicit transaction (including ones dispatched during execution of previously executed actions). Related to issues #2356 and #2386. ATC: - Unittests test all the api categories for access via context free actions.
non_priority
fix access control for context aware vs context free apis changes needed softfloat api and compiler builtins are currently not available to context free actions when they should be the exposed methods of apply context are currently available to context free actions when they should not be check auth should be moved from context free transaction api which is available to context free actions to permission api which is only available to context aware actions determine whether now should be available to context free actions if not then now should be moved out of the system api which is available to both context free and context aware actions to an api that is only available to context aware actions we should figure out if action api publication time needs to be dealt with in a similar way it wouldn t be a problem for a deferred transaction but it may be for an immediately executing input transaction determine whether context free transaction api get action needs to be split into multiple functions one that only gets actions in the original transaction and is available to both context free and context aware actions and another one that can get all the actions in the current implicit transaction including ones dispatched during execution of previously executed actions related to issues and atc unittests test all the api categories for access via context free actions
0
60,270
25,069,922,849
IssuesEvent
2022-11-07 11:16:48
ministryofjustice/modernisation-platform
https://api.github.com/repos/ministryofjustice/modernisation-platform
closed
Instance Scheduler can't start some EC2s
bug sustainability self-service
When invoking the Instance Scheduler lambda manually through the AWS web console in core-shared-services account. The `sprinkler-db-mgmt-server` is stopped through the lambda, but cannot be started. The lambda logs are not reporting any error because the message to start the instance is successful. However, the EC2 reports the following errors after some time: ``` State transition reason: Server.InternalError State transition message: Client.InternalError: Client error on launch ``` This behaviour only seems to apply to `sprinkler-db-mgmt-server` whereas a temporal instance I created did not have the same issue. The following PR unfortunately did not resolve the issue and might have to be reverted: [Add "kms:CreateGrant" to instance scheduler role to try fixing the issue](https://github.com/ministryofjustice/modernisation-platform/pull/2536)
1.0
Instance Scheduler can't start some EC2s - When invoking the Instance Scheduler lambda manually through the AWS web console in core-shared-services account. The `sprinkler-db-mgmt-server` is stopped through the lambda, but cannot be started. The lambda logs are not reporting any error because the message to start the instance is successful. However, the EC2 reports the following errors after some time: ``` State transition reason: Server.InternalError State transition message: Client.InternalError: Client error on launch ``` This behaviour only seems to apply to `sprinkler-db-mgmt-server` whereas a temporal instance I created did not have the same issue. The following PR unfortunately did not resolve the issue and might have to be reverted: [Add "kms:CreateGrant" to instance scheduler role to try fixing the issue](https://github.com/ministryofjustice/modernisation-platform/pull/2536)
non_priority
instance scheduler can t start some when invoking the instance scheduler lambda manually through the aws web console in core shared services account the sprinkler db mgmt server is stopped through the lambda but cannot be started the lambda logs are not reporting any error because the message to start the instance is successful however the reports the following errors after some time state transition reason server internalerror state transition message client internalerror client error on launch this behaviour only seems to apply to sprinkler db mgmt server whereas a temporal instance i created did not have the same issue the following pr unfortunately did not resolve the issue and might have to be reverted
0
161,368
12,541,934,597
IssuesEvent
2020-06-05 13:14:35
SAP/spartacus
https://api.github.com/repos/SAP/spartacus
closed
Regression testing for 2.0 release
MUST release-testing team/gladiators
**Test against 1905** Can use: - https://dev-com-3.accdemo.b2c.ydev.hybris.com:4200/electronics-spa/en/USD/ -https://dev-com-10.accdemo.b2c.ydev.hybris.com:4200/electronics-spa/en/USD/ - [x] **Run all the E2E tests** on the nightly branch on jenkins (Marcin) - covered in https://github.com/SAP/spartacus/issues/7799 Note: Make sure that ALL the tests are being run (about 90 tests, including the flaky tests). OR run them from your computer, pointing to dev17 server. **Manually test the features that are failing:** - [x] to come from release masters - Marcin - covered in https://github.com/SAP/spartacus/issues/7799 **Do a smoke test of these features manually**, since there's no E2E tests for them yet or they are flaky: ~~Cancel/Return~~ - Jimmy (Imported impex, but cancel/returns not enabled on 1905) - [x] Smartedit (Wei lead, but get someone else to do it) - Kate - [x] Qualtrics - Brian - [x] Coupons - GC - [x] Broken tabbing order (related to e2e accessibility? kacper fixing?) - Kate - [x] Accessibility (checkout with keyboard nav on all 3 browsers) - Kate - [x] Checkout as a persistent user **Do a smoke test (happy path) on these browsers:** - [x] safari - Kate: https://github.com/SAP/spartacus/issues/7817 - [x] firefox - Kate - [ ] Edge Windows - Farzin - ... more! mobile phones, tablet, etc. (GC -> Ipad Pro) **Test against 2005** - http://dev-com-2.accdemo.b2c.ydev.hybris.com:4200/electronics-spa/en/USD/ - https://dev-com-8.accdemo.b2c.ydev.hybris.com:4200/electronics-spa/en/USD/ - [x] Run the e2e tests pointing to dev7 server as backend (there's already a jenkins job for it) - Brian - [x] Retest manually failing tests (make list of differences of failures between 1905 and 2005) - Brian Redo manual set (cancel/return etc.) against 2005 as well - [x] Cancel/Return - Jimmy - [x] Smartedit (Wei lead, but get someone else to do it) - Kate - [x] Qualtrics - Brian - [x] Coupons (GC) - [x] Broken tabbing order (related to e2e accessibility? kacper fixing?) - Kate - [x] Accessibility (checkout with keyboard nav on all 3 browsers) - Kate - [x] Checkout as a persistent user - Kate Don't do for 2005: smoketest browsers The 2005 goal is to see if we see any differences at all... in the future **Manually test the features that are failing against 2005 backend:** - [x] regression/cart.e2e-spec.ts #7841 - Kate: couldn't test apparel. and couldn't test out of stock product because backoffice isn't working for 2005. Can't go to products in backoffice, we get an error "cannot execute search". - [x] smoke/checkout-flow.e2e-spec.ts #7842 - Kate - [x] smoke/currency.e2e-spec.ts #7846 - Kate - [x] smoke/language.e2e-spec.ts #7848 - Kate - [x] smoke/product-search.e2e-spec.ts #7849 - Kate
1.0
Regression testing for 2.0 release - **Test against 1905** Can use: - https://dev-com-3.accdemo.b2c.ydev.hybris.com:4200/electronics-spa/en/USD/ -https://dev-com-10.accdemo.b2c.ydev.hybris.com:4200/electronics-spa/en/USD/ - [x] **Run all the E2E tests** on the nightly branch on jenkins (Marcin) - covered in https://github.com/SAP/spartacus/issues/7799 Note: Make sure that ALL the tests are being run (about 90 tests, including the flaky tests). OR run them from your computer, pointing to dev17 server. **Manually test the features that are failing:** - [x] to come from release masters - Marcin - covered in https://github.com/SAP/spartacus/issues/7799 **Do a smoke test of these features manually**, since there's no E2E tests for them yet or they are flaky: ~~Cancel/Return~~ - Jimmy (Imported impex, but cancel/returns not enabled on 1905) - [x] Smartedit (Wei lead, but get someone else to do it) - Kate - [x] Qualtrics - Brian - [x] Coupons - GC - [x] Broken tabbing order (related to e2e accessibility? kacper fixing?) - Kate - [x] Accessibility (checkout with keyboard nav on all 3 browsers) - Kate - [x] Checkout as a persistent user **Do a smoke test (happy path) on these browsers:** - [x] safari - Kate: https://github.com/SAP/spartacus/issues/7817 - [x] firefox - Kate - [ ] Edge Windows - Farzin - ... more! mobile phones, tablet, etc. (GC -> Ipad Pro) **Test against 2005** - http://dev-com-2.accdemo.b2c.ydev.hybris.com:4200/electronics-spa/en/USD/ - https://dev-com-8.accdemo.b2c.ydev.hybris.com:4200/electronics-spa/en/USD/ - [x] Run the e2e tests pointing to dev7 server as backend (there's already a jenkins job for it) - Brian - [x] Retest manually failing tests (make list of differences of failures between 1905 and 2005) - Brian Redo manual set (cancel/return etc.) against 2005 as well - [x] Cancel/Return - Jimmy - [x] Smartedit (Wei lead, but get someone else to do it) - Kate - [x] Qualtrics - Brian - [x] Coupons (GC) - [x] Broken tabbing order (related to e2e accessibility? kacper fixing?) - Kate - [x] Accessibility (checkout with keyboard nav on all 3 browsers) - Kate - [x] Checkout as a persistent user - Kate Don't do for 2005: smoketest browsers The 2005 goal is to see if we see any differences at all... in the future **Manually test the features that are failing against 2005 backend:** - [x] regression/cart.e2e-spec.ts #7841 - Kate: couldn't test apparel. and couldn't test out of stock product because backoffice isn't working for 2005. Can't go to products in backoffice, we get an error "cannot execute search". - [x] smoke/checkout-flow.e2e-spec.ts #7842 - Kate - [x] smoke/currency.e2e-spec.ts #7846 - Kate - [x] smoke/language.e2e-spec.ts #7848 - Kate - [x] smoke/product-search.e2e-spec.ts #7849 - Kate
non_priority
regression testing for release test against can use run all the tests on the nightly branch on jenkins marcin covered in note make sure that all the tests are being run about tests including the flaky tests or run them from your computer pointing to server manually test the features that are failing to come from release masters marcin covered in do a smoke test of these features manually since there s no tests for them yet or they are flaky cancel return jimmy imported impex but cancel returns not enabled on smartedit wei lead but get someone else to do it kate qualtrics brian coupons gc broken tabbing order related to accessibility kacper fixing kate accessibility checkout with keyboard nav on all browsers kate checkout as a persistent user do a smoke test happy path on these browsers safari kate firefox kate edge windows farzin more mobile phones tablet etc gc ipad pro test against run the tests pointing to server as backend there s already a jenkins job for it brian retest manually failing tests make list of differences of failures between and brian redo manual set cancel return etc against as well cancel return jimmy smartedit wei lead but get someone else to do it kate qualtrics brian coupons gc broken tabbing order related to accessibility kacper fixing kate accessibility checkout with keyboard nav on all browsers kate checkout as a persistent user kate don t do for smoketest browsers the goal is to see if we see any differences at all in the future manually test the features that are failing against backend regression cart spec ts kate couldn t test apparel and couldn t test out of stock product because backoffice isn t working for can t go to products in backoffice we get an error cannot execute search smoke checkout flow spec ts kate smoke currency spec ts kate smoke language spec ts kate smoke product search spec ts kate
0
280,940
21,315,285,712
IssuesEvent
2022-04-16 06:53:58
punnyhuimin/pe
https://api.github.com/repos/punnyhuimin/pe
opened
Unclear annotated image of resulting contact in list
type.DocumentationBug severity.Low
![Screenshot 2022-04-16 at 2.50.13 PM.png](https://raw.githubusercontent.com/punnyhuimin/pe/main/files/7e5b1369-c12e-4a7f-8dd8-f864ed730c69.png) The annotation of the image takes some time for the user to decipher and does not necessarily provide the best information on what the user should be expected to see. Usage of arrows or boxes to point out the exact place where the annotation is referring to would be best so that the users can easily decipher the annotation. Additionally, a more striking color (e.g. purple or red) can stand out better instead of using black, which may mislead users to think this is part of what they should see in the application. <!--session: 1650089275146-ebf8047c-ce41-4646-b3cf-7b9c56b8d494--> <!--Version: Web v3.4.2-->
1.0
Unclear annotated image of resulting contact in list - ![Screenshot 2022-04-16 at 2.50.13 PM.png](https://raw.githubusercontent.com/punnyhuimin/pe/main/files/7e5b1369-c12e-4a7f-8dd8-f864ed730c69.png) The annotation of the image takes some time for the user to decipher and does not necessarily provide the best information on what the user should be expected to see. Usage of arrows or boxes to point out the exact place where the annotation is referring to would be best so that the users can easily decipher the annotation. Additionally, a more striking color (e.g. purple or red) can stand out better instead of using black, which may mislead users to think this is part of what they should see in the application. <!--session: 1650089275146-ebf8047c-ce41-4646-b3cf-7b9c56b8d494--> <!--Version: Web v3.4.2-->
non_priority
unclear annotated image of resulting contact in list the annotation of the image takes some time for the user to decipher and does not necessarily provide the best information on what the user should be expected to see usage of arrows or boxes to point out the exact place where the annotation is referring to would be best so that the users can easily decipher the annotation additionally a more striking color e g purple or red can stand out better instead of using black which may mislead users to think this is part of what they should see in the application
0
89,246
8,198,552,451
IssuesEvent
2018-08-31 16:48:25
ValveSoftware/steam-for-linux
https://api.github.com/repos/ValveSoftware/steam-for-linux
closed
Dota 2 blog and Store pages don't load.
Need Retest Steam client reviewed
The bug was originally reported on the Dota 2 issue tracker at [bug #1735](https://github.com/ValveSoftware/Dota-2/issues/1735) Downgrading Steam to stable from the Beta branch fixes the issue.
1.0
Dota 2 blog and Store pages don't load. - The bug was originally reported on the Dota 2 issue tracker at [bug #1735](https://github.com/ValveSoftware/Dota-2/issues/1735) Downgrading Steam to stable from the Beta branch fixes the issue.
non_priority
dota blog and store pages don t load the bug was originally reported on the dota issue tracker at downgrading steam to stable from the beta branch fixes the issue
0
4,079
10,555,664,904
IssuesEvent
2019-10-03 22:35:21
fga-eps-mds/2019.2-Gymnasteg-Wiki
https://api.github.com/repos/fga-eps-mds/2019.2-Gymnasteg-Wiki
closed
Elaborar Documento de Arquitetura
Architecture MDS documentation
## Descrição Documentar funcionamento da arquitetura do sistema parra melhor compreensão do time. ## Terafas - [ ] Introdução - [ ] Representação da Arquitetura - [ ] Metas e Restrições da Arquitetura - [ ] Visão de Casos de Uso - [ ] Visão Lógica - [ ] Visão de Dados **Um template para o a realização desse documento pode ser encontrado [aqui](https://github.com/DroidFoundry/DroidMetronome/wiki/TEMPLATE-Documento-de-Arquitetura-de-Software)**
1.0
Elaborar Documento de Arquitetura - ## Descrição Documentar funcionamento da arquitetura do sistema parra melhor compreensão do time. ## Terafas - [ ] Introdução - [ ] Representação da Arquitetura - [ ] Metas e Restrições da Arquitetura - [ ] Visão de Casos de Uso - [ ] Visão Lógica - [ ] Visão de Dados **Um template para o a realização desse documento pode ser encontrado [aqui](https://github.com/DroidFoundry/DroidMetronome/wiki/TEMPLATE-Documento-de-Arquitetura-de-Software)**
non_priority
elaborar documento de arquitetura descrição documentar funcionamento da arquitetura do sistema parra melhor compreensão do time terafas introdução representação da arquitetura metas e restrições da arquitetura visão de casos de uso visão lógica visão de dados um template para o a realização desse documento pode ser encontrado
0
113,296
17,117,949,469
IssuesEvent
2021-07-11 18:52:42
turkdevops/design-language-website
https://api.github.com/repos/turkdevops/design-language-website
opened
CVE-2021-23337 (High) detected in lodash-4.17.20.tgz, lodash-4.17.19.tgz
security vulnerability
## CVE-2021-23337 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>lodash-4.17.20.tgz</b>, <b>lodash-4.17.19.tgz</b></p></summary> <p> <details><summary><b>lodash-4.17.20.tgz</b></p></summary> <p>Lodash modular utilities.</p> <p>Library home page: <a href="https://registry.npmjs.org/lodash/-/lodash-4.17.20.tgz">https://registry.npmjs.org/lodash/-/lodash-4.17.20.tgz</a></p> <p>Path to dependency file: design-language-website/package.json</p> <p>Path to vulnerable library: design-language-website/node_modules/lodash</p> <p> Dependency Hierarchy: - core-7.13.15.tgz (Root Library) - types-7.13.14.tgz - :x: **lodash-4.17.20.tgz** (Vulnerable Library) </details> <details><summary><b>lodash-4.17.19.tgz</b></p></summary> <p>Lodash modular utilities.</p> <p>Library home page: <a href="https://registry.npmjs.org/lodash/-/lodash-4.17.19.tgz">https://registry.npmjs.org/lodash/-/lodash-4.17.19.tgz</a></p> <p>Path to dependency file: design-language-website/package.json</p> <p>Path to vulnerable library: design-language-website/node_modules/lodash</p> <p> Dependency Hierarchy: - babel-eslint-10.1.0.tgz (Root Library) - types-7.10.4.tgz - :x: **lodash-4.17.19.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/turkdevops/design-language-website/commit/187b6c70cc572cc46890f19fe80fcaddc53857c4">187b6c70cc572cc46890f19fe80fcaddc53857c4</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Lodash versions prior to 4.17.21 are vulnerable to Command Injection via the template function. <p>Publish Date: 2021-02-15 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23337>CVE-2021-23337</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.2</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: High - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/lodash/lodash/commit/3469357cff396a26c363f8c1b5a91dde28ba4b1c">https://github.com/lodash/lodash/commit/3469357cff396a26c363f8c1b5a91dde28ba4b1c</a></p> <p>Release Date: 2021-02-15</p> <p>Fix Resolution: lodash - 4.17.21</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2021-23337 (High) detected in lodash-4.17.20.tgz, lodash-4.17.19.tgz - ## CVE-2021-23337 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>lodash-4.17.20.tgz</b>, <b>lodash-4.17.19.tgz</b></p></summary> <p> <details><summary><b>lodash-4.17.20.tgz</b></p></summary> <p>Lodash modular utilities.</p> <p>Library home page: <a href="https://registry.npmjs.org/lodash/-/lodash-4.17.20.tgz">https://registry.npmjs.org/lodash/-/lodash-4.17.20.tgz</a></p> <p>Path to dependency file: design-language-website/package.json</p> <p>Path to vulnerable library: design-language-website/node_modules/lodash</p> <p> Dependency Hierarchy: - core-7.13.15.tgz (Root Library) - types-7.13.14.tgz - :x: **lodash-4.17.20.tgz** (Vulnerable Library) </details> <details><summary><b>lodash-4.17.19.tgz</b></p></summary> <p>Lodash modular utilities.</p> <p>Library home page: <a href="https://registry.npmjs.org/lodash/-/lodash-4.17.19.tgz">https://registry.npmjs.org/lodash/-/lodash-4.17.19.tgz</a></p> <p>Path to dependency file: design-language-website/package.json</p> <p>Path to vulnerable library: design-language-website/node_modules/lodash</p> <p> Dependency Hierarchy: - babel-eslint-10.1.0.tgz (Root Library) - types-7.10.4.tgz - :x: **lodash-4.17.19.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/turkdevops/design-language-website/commit/187b6c70cc572cc46890f19fe80fcaddc53857c4">187b6c70cc572cc46890f19fe80fcaddc53857c4</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Lodash versions prior to 4.17.21 are vulnerable to Command Injection via the template function. <p>Publish Date: 2021-02-15 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23337>CVE-2021-23337</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.2</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: High - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/lodash/lodash/commit/3469357cff396a26c363f8c1b5a91dde28ba4b1c">https://github.com/lodash/lodash/commit/3469357cff396a26c363f8c1b5a91dde28ba4b1c</a></p> <p>Release Date: 2021-02-15</p> <p>Fix Resolution: lodash - 4.17.21</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in lodash tgz lodash tgz cve high severity vulnerability vulnerable libraries lodash tgz lodash tgz lodash tgz lodash modular utilities library home page a href path to dependency file design language website package json path to vulnerable library design language website node modules lodash dependency hierarchy core tgz root library types tgz x lodash tgz vulnerable library lodash tgz lodash modular utilities library home page a href path to dependency file design language website package json path to vulnerable library design language website node modules lodash dependency hierarchy babel eslint tgz root library types tgz x lodash tgz vulnerable library found in head commit a href found in base branch master vulnerability details lodash versions prior to are vulnerable to command injection via the template function publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required high user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution lodash step up your open source security game with whitesource
0
205,627
15,650,902,325
IssuesEvent
2021-03-23 09:33:42
pravega/pravega
https://api.github.com/repos/pravega/pravega
opened
Sporadic failure in WatermarkingTest.watermarkTest
area/integration tag/flakeyTest
**Describe the bug** Found a sporadic failure in test `WatermarkingTest.watermarkTest`: https://github.com/pravega/pravega/runs/2173677972 ``` io.pravega.test.integration.WatermarkingTest > watermarkTest FAILED java.lang.AssertionError at org.junit.Assert.fail(Assert.java:86) at org.junit.Assert.assertTrue(Assert.java:41) at org.junit.Assert.assertNotNull(Assert.java:712) at org.junit.Assert.assertNotNull(Assert.java:722) at io.pravega.test.integration.WatermarkingTest.watermarkTest(WatermarkingTest.java:189) ``` I don't know if this is related to a recent change to speed up this test: #5836. **To Reproduce** The issue occurs sporadically in Git Actions when executing `./gradlew build` **Expected behavior** Test should pass consistently. **Screenshots** n/a **Additional context** n/a
1.0
Sporadic failure in WatermarkingTest.watermarkTest - **Describe the bug** Found a sporadic failure in test `WatermarkingTest.watermarkTest`: https://github.com/pravega/pravega/runs/2173677972 ``` io.pravega.test.integration.WatermarkingTest > watermarkTest FAILED java.lang.AssertionError at org.junit.Assert.fail(Assert.java:86) at org.junit.Assert.assertTrue(Assert.java:41) at org.junit.Assert.assertNotNull(Assert.java:712) at org.junit.Assert.assertNotNull(Assert.java:722) at io.pravega.test.integration.WatermarkingTest.watermarkTest(WatermarkingTest.java:189) ``` I don't know if this is related to a recent change to speed up this test: #5836. **To Reproduce** The issue occurs sporadically in Git Actions when executing `./gradlew build` **Expected behavior** Test should pass consistently. **Screenshots** n/a **Additional context** n/a
non_priority
sporadic failure in watermarkingtest watermarktest describe the bug found a sporadic failure in test watermarkingtest watermarktest io pravega test integration watermarkingtest watermarktest failed java lang assertionerror at org junit assert fail assert java at org junit assert asserttrue assert java at org junit assert assertnotnull assert java at org junit assert assertnotnull assert java at io pravega test integration watermarkingtest watermarktest watermarkingtest java i don t know if this is related to a recent change to speed up this test to reproduce the issue occurs sporadically in git actions when executing gradlew build expected behavior test should pass consistently screenshots n a additional context n a
0
32,031
6,026,055,332
IssuesEvent
2017-06-08 10:14:14
restic/restic
https://api.github.com/repos/restic/restic
closed
Cannot find docs for b2 backend
documentation question
I came to restic because of the amazing feature set and the support for b2, but I'm having trouble finding the docs for b2 - I found s3 under the latest documentation at https://restic.readthedocs.io/en/latest/tutorials.html
1.0
Cannot find docs for b2 backend - I came to restic because of the amazing feature set and the support for b2, but I'm having trouble finding the docs for b2 - I found s3 under the latest documentation at https://restic.readthedocs.io/en/latest/tutorials.html
non_priority
cannot find docs for backend i came to restic because of the amazing feature set and the support for but i m having trouble finding the docs for i found under the latest documentation at
0
18,046
3,372,065,640
IssuesEvent
2015-11-23 21:49:59
aspnet/Hosting
https://api.github.com/repos/aspnet/Hosting
closed
dnx command line weblistener/kestrel
needs design
_From @grahamehorner on September 16, 2015 10:47_ I'm not sure if I'm missing something or if it's possible to even do this; but how would you pass command line parameters to the startup method of a web application? does dnx pass the command line parameters to weblistner/kestrel which then get forwarded to the startup? or are they encapsulated in an object that is accessible like IHostingEnvironment, IApplicationEnvironment or IRuntimeEnvironment? _Copied from original issue: aspnet/Home#928_
1.0
dnx command line weblistener/kestrel - _From @grahamehorner on September 16, 2015 10:47_ I'm not sure if I'm missing something or if it's possible to even do this; but how would you pass command line parameters to the startup method of a web application? does dnx pass the command line parameters to weblistner/kestrel which then get forwarded to the startup? or are they encapsulated in an object that is accessible like IHostingEnvironment, IApplicationEnvironment or IRuntimeEnvironment? _Copied from original issue: aspnet/Home#928_
non_priority
dnx command line weblistener kestrel from grahamehorner on september i m not sure if i m missing something or if it s possible to even do this but how would you pass command line parameters to the startup method of a web application does dnx pass the command line parameters to weblistner kestrel which then get forwarded to the startup or are they encapsulated in an object that is accessible like ihostingenvironment iapplicationenvironment or iruntimeenvironment copied from original issue aspnet home
0
89,439
11,222,933,719
IssuesEvent
2020-01-07 21:22:48
ember-learn/ember-website
https://api.github.com/repos/ember-learn/ember-website
closed
[redesign] Fix relative link code for header and footer
Website Redesign RFC bug help wanted
We have an implementation of custom `@links` code that is supposed to work with ember-href to make sure that any internal links on the website are treated as `<LinkTo />` This is particularly annoying when developing the new website because any time you click on an internal link you are brought to the production website https://emberjs.com
1.0
[redesign] Fix relative link code for header and footer - We have an implementation of custom `@links` code that is supposed to work with ember-href to make sure that any internal links on the website are treated as `<LinkTo />` This is particularly annoying when developing the new website because any time you click on an internal link you are brought to the production website https://emberjs.com
non_priority
fix relative link code for header and footer we have an implementation of custom links code that is supposed to work with ember href to make sure that any internal links on the website are treated as this is particularly annoying when developing the new website because any time you click on an internal link you are brought to the production website
0
983
3,268,677,975
IssuesEvent
2015-10-23 12:55:33
mesosphere/marathon
https://api.github.com/repos/mesosphere/marathon
closed
Using docker w/ application groups
docs service
About this page: https://mesosphere.github.io/marathon/docs/application-groups.html Does this work with docker containers? @swartzrock would like to have a group of 2 docker containers which are scheduled at the same time. Can you do this now? Please add docs that show in detail how to do this! https://mesosphere.atlassian.net/browse/MARATHON-318
1.0
Using docker w/ application groups - About this page: https://mesosphere.github.io/marathon/docs/application-groups.html Does this work with docker containers? @swartzrock would like to have a group of 2 docker containers which are scheduled at the same time. Can you do this now? Please add docs that show in detail how to do this! https://mesosphere.atlassian.net/browse/MARATHON-318
non_priority
using docker w application groups about this page does this work with docker containers swartzrock would like to have a group of docker containers which are scheduled at the same time can you do this now please add docs that show in detail how to do this
0
346,193
30,872,548,265
IssuesEvent
2023-08-03 12:22:29
containers/podman-desktop
https://api.github.com/repos/containers/podman-desktop
opened
Implement Troubleshooting page object model representation
kind/enhancement ✨ area/tests 🚦
### Is your enhancement related to a problem? Please describe We would make use of troubleshooting page in e2e tests - for various purposes - testing it and as a way to make tests more robust. ### Describe the solution you'd like Simple e2e tests for troubleshooting page, and its representation in page object model. Also add various function so we know that image/containers/and other stores are fully loaded. ### Describe alternatives you've considered _No response_ ### Additional context _No response_
1.0
Implement Troubleshooting page object model representation - ### Is your enhancement related to a problem? Please describe We would make use of troubleshooting page in e2e tests - for various purposes - testing it and as a way to make tests more robust. ### Describe the solution you'd like Simple e2e tests for troubleshooting page, and its representation in page object model. Also add various function so we know that image/containers/and other stores are fully loaded. ### Describe alternatives you've considered _No response_ ### Additional context _No response_
non_priority
implement troubleshooting page object model representation is your enhancement related to a problem please describe we would make use of troubleshooting page in tests for various purposes testing it and as a way to make tests more robust describe the solution you d like simple tests for troubleshooting page and its representation in page object model also add various function so we know that image containers and other stores are fully loaded describe alternatives you ve considered no response additional context no response
0
216,929
16,824,144,112
IssuesEvent
2021-06-17 16:15:46
Realm667/WolfenDoom
https://api.github.com/repos/Realm667/WolfenDoom
closed
C1M3 unwanted nasty scrolling floors/ceilings plus
mapping playtesting
C1M3 ... a) Floors and ceilings of sectors 1023, 1029, 1030 and 1037 have unwanted scroll. And the first four sectors scroll the sidedef textures, not the flat. Somehow linked to the 3D floor and the tag ? b) While at it, the ceiling of sector 1703 should have a brightness of 128. c) Texture on lines 6845 and 13667 should be the same. Can be clearly noticed when using the elevator at sectors 1330/1314.
1.0
C1M3 unwanted nasty scrolling floors/ceilings plus - C1M3 ... a) Floors and ceilings of sectors 1023, 1029, 1030 and 1037 have unwanted scroll. And the first four sectors scroll the sidedef textures, not the flat. Somehow linked to the 3D floor and the tag ? b) While at it, the ceiling of sector 1703 should have a brightness of 128. c) Texture on lines 6845 and 13667 should be the same. Can be clearly noticed when using the elevator at sectors 1330/1314.
non_priority
unwanted nasty scrolling floors ceilings plus a floors and ceilings of sectors and have unwanted scroll and the first four sectors scroll the sidedef textures not the flat somehow linked to the floor and the tag b while at it the ceiling of sector should have a brightness of c texture on lines and should be the same can be clearly noticed when using the elevator at sectors
0
52,886
13,772,603,173
IssuesEvent
2020-10-08 01:02:30
RG4421/wp-calypso
https://api.github.com/repos/RG4421/wp-calypso
opened
CVE-2020-15174 (High) detected in electron-8.3.0.tgz
security vulnerability
## CVE-2020-15174 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>electron-8.3.0.tgz</b></p></summary> <p>Build cross platform desktop apps with JavaScript, HTML, and CSS</p> <p>Library home page: <a href="https://registry.npmjs.org/electron/-/electron-8.3.0.tgz">https://registry.npmjs.org/electron/-/electron-8.3.0.tgz</a></p> <p>Path to dependency file: wp-calypso/desktop/yarn.lock</p> <p>Path to vulnerable library: wp-calypso/desktop/yarn.lock</p> <p> Dependency Hierarchy: - :x: **electron-8.3.0.tgz** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In Electron before versions 11.0.0-beta.1, 10.0.1, 9.3.0 or 8.5.1 the `will-navigate` event that apps use to prevent navigations to unexpected destinations as per our security recommendations can be bypassed when a sub-frame performs a top-frame navigation across sites. The issue is patched in versions 11.0.0-beta.1, 10.0.1, 9.3.0 or 8.5.1 As a workaround sandbox all your iframes using the sandbox attribute. This will prevent them creating top-frame navigations and is good practice anyway. <p>Publish Date: 2020-07-21 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-15174>CVE-2020-15174</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Changed - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/electron/electron/security/advisories/GHSA-2q4g-w47c-4674">https://github.com/electron/electron/security/advisories/GHSA-2q4g-w47c-4674</a></p> <p>Release Date: 2020-07-21</p> <p>Fix Resolution: v8.5.1, v9.3.0, v10.0.1, v11.0.0-beta.1</p> </p> </details> <p></p> *** :rescue_worker_helmet: Automatic Remediation is available for this issue <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"electron","packageVersion":"8.3.0","isTransitiveDependency":false,"dependencyTree":"electron:8.3.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"v8.5.1, v9.3.0, v10.0.1, v11.0.0-beta.1"}],"vulnerabilityIdentifier":"CVE-2020-15174","vulnerabilityDetails":"In Electron before versions 11.0.0-beta.1, 10.0.1, 9.3.0 or 8.5.1 the `will-navigate` event that apps use to prevent navigations to unexpected destinations as per our security recommendations can be bypassed when a sub-frame performs a top-frame navigation across sites. The issue is patched in versions 11.0.0-beta.1, 10.0.1, 9.3.0 or 8.5.1 As a workaround sandbox all your iframes using the sandbox attribute. This will prevent them creating top-frame navigations and is good practice anyway.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-15174","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"Low","AC":"High","PR":"None","S":"Changed","C":"None","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> -->
True
CVE-2020-15174 (High) detected in electron-8.3.0.tgz - ## CVE-2020-15174 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>electron-8.3.0.tgz</b></p></summary> <p>Build cross platform desktop apps with JavaScript, HTML, and CSS</p> <p>Library home page: <a href="https://registry.npmjs.org/electron/-/electron-8.3.0.tgz">https://registry.npmjs.org/electron/-/electron-8.3.0.tgz</a></p> <p>Path to dependency file: wp-calypso/desktop/yarn.lock</p> <p>Path to vulnerable library: wp-calypso/desktop/yarn.lock</p> <p> Dependency Hierarchy: - :x: **electron-8.3.0.tgz** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In Electron before versions 11.0.0-beta.1, 10.0.1, 9.3.0 or 8.5.1 the `will-navigate` event that apps use to prevent navigations to unexpected destinations as per our security recommendations can be bypassed when a sub-frame performs a top-frame navigation across sites. The issue is patched in versions 11.0.0-beta.1, 10.0.1, 9.3.0 or 8.5.1 As a workaround sandbox all your iframes using the sandbox attribute. This will prevent them creating top-frame navigations and is good practice anyway. <p>Publish Date: 2020-07-21 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-15174>CVE-2020-15174</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Changed - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/electron/electron/security/advisories/GHSA-2q4g-w47c-4674">https://github.com/electron/electron/security/advisories/GHSA-2q4g-w47c-4674</a></p> <p>Release Date: 2020-07-21</p> <p>Fix Resolution: v8.5.1, v9.3.0, v10.0.1, v11.0.0-beta.1</p> </p> </details> <p></p> *** :rescue_worker_helmet: Automatic Remediation is available for this issue <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"electron","packageVersion":"8.3.0","isTransitiveDependency":false,"dependencyTree":"electron:8.3.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"v8.5.1, v9.3.0, v10.0.1, v11.0.0-beta.1"}],"vulnerabilityIdentifier":"CVE-2020-15174","vulnerabilityDetails":"In Electron before versions 11.0.0-beta.1, 10.0.1, 9.3.0 or 8.5.1 the `will-navigate` event that apps use to prevent navigations to unexpected destinations as per our security recommendations can be bypassed when a sub-frame performs a top-frame navigation across sites. The issue is patched in versions 11.0.0-beta.1, 10.0.1, 9.3.0 or 8.5.1 As a workaround sandbox all your iframes using the sandbox attribute. This will prevent them creating top-frame navigations and is good practice anyway.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-15174","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"Low","AC":"High","PR":"None","S":"Changed","C":"None","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> -->
non_priority
cve high detected in electron tgz cve high severity vulnerability vulnerable library electron tgz build cross platform desktop apps with javascript html and css library home page a href path to dependency file wp calypso desktop yarn lock path to vulnerable library wp calypso desktop yarn lock dependency hierarchy x electron tgz vulnerable library found in base branch master vulnerability details in electron before versions beta or the will navigate event that apps use to prevent navigations to unexpected destinations as per our security recommendations can be bypassed when a sub frame performs a top frame navigation across sites the issue is patched in versions beta or as a workaround sandbox all your iframes using the sandbox attribute this will prevent them creating top frame navigations and is good practice anyway publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope changed impact metrics confidentiality impact none integrity impact high availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution beta rescue worker helmet automatic remediation is available for this issue isopenpronvulnerability true ispackagebased true isdefaultbranch true packages vulnerabilityidentifier cve vulnerabilitydetails in electron before versions beta or the will navigate event that apps use to prevent navigations to unexpected destinations as per our security recommendations can be bypassed when a sub frame performs a top frame navigation across sites the issue is patched in versions beta or as a workaround sandbox all your iframes using the sandbox attribute this will prevent them creating top frame navigations and is good practice anyway vulnerabilityurl
0
302,850
26,167,937,009
IssuesEvent
2023-01-01 14:31:35
appium/appium
https://api.github.com/repos/appium/appium
closed
Popup blocker still occurs even when setting 'safariAllowPopups' capability
Bug XCUITest P1
## The problem When running a simple script that is supposed to open a new window in safari browser, I can't get through the popup blocker. The capabilities that are supposed to disable to popup blocker seem to not work for me. ## Environment * Appium version that exhibits the issue: 1.6.3 * Desktop OS/version used to run Appium: iOS 10.0 * Mobile platform/version under test: iPhone 6 simulator * Real device or emulator/simulator: simulator * Here is a link to the sauceLabs session https://saucelabs.com/beta/tests/459caa2ffb0941558c2429e8b7a057da/commands#5 ## Code To Reproduce Issue ``` var webdriver = require('selenium-webdriver'), By = webdriver.By, username = 'u', accessKey = 'k', driver; var caps = { "browserName": "Safari", "appiumVersion": "1.6.3", "deviceName": "iPhone 6 Simulator", "deviceOrientation": "portrait", "platformVersion": "10.0", "platformName": "iOS", "safariAllowPopups": true, "safariOpenLinksInBackground": true, "autoAcceptAlerts": true, "unexpectedAlertBehaviour": "accept" } caps['username'] = username; caps['accessKey'] = accessKey; driver = new webdriver.Builder(). withCapabilities(caps). usingServer("http://" + username + ":" + accessKey + "@ondemand.saucelabs.com:80/wd/hub"). build(); var url = "http://the-internet.herokuapp.com/redirector" driver.get(url); driver.findElement(By.css("[target='_blank']")).click(); driver.quit(); ```
1.0
Popup blocker still occurs even when setting 'safariAllowPopups' capability - ## The problem When running a simple script that is supposed to open a new window in safari browser, I can't get through the popup blocker. The capabilities that are supposed to disable to popup blocker seem to not work for me. ## Environment * Appium version that exhibits the issue: 1.6.3 * Desktop OS/version used to run Appium: iOS 10.0 * Mobile platform/version under test: iPhone 6 simulator * Real device or emulator/simulator: simulator * Here is a link to the sauceLabs session https://saucelabs.com/beta/tests/459caa2ffb0941558c2429e8b7a057da/commands#5 ## Code To Reproduce Issue ``` var webdriver = require('selenium-webdriver'), By = webdriver.By, username = 'u', accessKey = 'k', driver; var caps = { "browserName": "Safari", "appiumVersion": "1.6.3", "deviceName": "iPhone 6 Simulator", "deviceOrientation": "portrait", "platformVersion": "10.0", "platformName": "iOS", "safariAllowPopups": true, "safariOpenLinksInBackground": true, "autoAcceptAlerts": true, "unexpectedAlertBehaviour": "accept" } caps['username'] = username; caps['accessKey'] = accessKey; driver = new webdriver.Builder(). withCapabilities(caps). usingServer("http://" + username + ":" + accessKey + "@ondemand.saucelabs.com:80/wd/hub"). build(); var url = "http://the-internet.herokuapp.com/redirector" driver.get(url); driver.findElement(By.css("[target='_blank']")).click(); driver.quit(); ```
non_priority
popup blocker still occurs even when setting safariallowpopups capability the problem when running a simple script that is supposed to open a new window in safari browser i can t get through the popup blocker the capabilities that are supposed to disable to popup blocker seem to not work for me environment appium version that exhibits the issue desktop os version used to run appium ios mobile platform version under test iphone simulator real device or emulator simulator simulator here is a link to the saucelabs session code to reproduce issue var webdriver require selenium webdriver by webdriver by username u accesskey k driver var caps browsername safari appiumversion devicename iphone simulator deviceorientation portrait platformversion platformname ios safariallowpopups true safariopenlinksinbackground true autoacceptalerts true unexpectedalertbehaviour accept caps username caps accesskey driver new webdriver builder withcapabilities caps usingserver username accesskey ondemand saucelabs com wd hub build var url driver get url driver findelement by css click driver quit
0
31,531
8,708,131,429
IssuesEvent
2018-12-06 10:01:46
open-contracting/infrastructure
https://api.github.com/repos/open-contracting/infrastructure
closed
Build process
build process
I've updated and simplified the default build process for OCDS documentation. However, when trying to write a PR for this repo, I'm confused that requirements.in uses an unpinned version of Sphinx, and a version of recommonmark that is incompatible with the rest of our tooling. Is requirements.in in use, and if not can it be deleted? The repository also omits Babel configuration files, which are required to support the translation of codelists and schema. I assume this omission isn't deliberate? If my assumptions are correct, I'm happy to proceed with a PR.
1.0
Build process - I've updated and simplified the default build process for OCDS documentation. However, when trying to write a PR for this repo, I'm confused that requirements.in uses an unpinned version of Sphinx, and a version of recommonmark that is incompatible with the rest of our tooling. Is requirements.in in use, and if not can it be deleted? The repository also omits Babel configuration files, which are required to support the translation of codelists and schema. I assume this omission isn't deliberate? If my assumptions are correct, I'm happy to proceed with a PR.
non_priority
build process i ve updated and simplified the default build process for ocds documentation however when trying to write a pr for this repo i m confused that requirements in uses an unpinned version of sphinx and a version of recommonmark that is incompatible with the rest of our tooling is requirements in in use and if not can it be deleted the repository also omits babel configuration files which are required to support the translation of codelists and schema i assume this omission isn t deliberate if my assumptions are correct i m happy to proceed with a pr
0
63,660
7,736,365,727
IssuesEvent
2018-05-28 01:40:15
PHPfox-Official/phpfox-v4-issues
https://api.github.com/repos/PHPfox-Official/phpfox-v4-issues
closed
Expand Cron To Detect Last Run
Working as Designed
# Important! Please follow this template! ---------------------------------------- ## What happened? ... The cron area of settings currently only detects the file path. It does not show when the last cron was run. It also doesn't give you the complete cron command, which it should based on detected Linux environmental variables. ## Steps to reproduce: 1. Go to Admin CP 2. Go to Settings > Cron 3. This is where the magic happens. ## What is expected? ... Cron provide last run time. Also full in page documentation to be provided instead of a link to the help article for on site access. ## Browsers and Devices tested (Example: Chrome on iPhone X, Safari on Macbook, Miscrosoft Edge on Windown 10, Firefox on Ubuntu 16.04, ...) N/A server issue - Chrome Firefox tested windows 10 ## Server information (Example: CentOS 7, php 7.1 apache) Centos 7 Linux php7.2 Apache2 ... ## phpFox version (Example: phpFox 4.6.0) v4.6.2B3 ... ## Screenshots ... ![phpfox_cron](https://user-images.githubusercontent.com/12810222/40580082-49b72408-60ec-11e8-9d83-9d87aad349b2.png)
1.0
Expand Cron To Detect Last Run - # Important! Please follow this template! ---------------------------------------- ## What happened? ... The cron area of settings currently only detects the file path. It does not show when the last cron was run. It also doesn't give you the complete cron command, which it should based on detected Linux environmental variables. ## Steps to reproduce: 1. Go to Admin CP 2. Go to Settings > Cron 3. This is where the magic happens. ## What is expected? ... Cron provide last run time. Also full in page documentation to be provided instead of a link to the help article for on site access. ## Browsers and Devices tested (Example: Chrome on iPhone X, Safari on Macbook, Miscrosoft Edge on Windown 10, Firefox on Ubuntu 16.04, ...) N/A server issue - Chrome Firefox tested windows 10 ## Server information (Example: CentOS 7, php 7.1 apache) Centos 7 Linux php7.2 Apache2 ... ## phpFox version (Example: phpFox 4.6.0) v4.6.2B3 ... ## Screenshots ... ![phpfox_cron](https://user-images.githubusercontent.com/12810222/40580082-49b72408-60ec-11e8-9d83-9d87aad349b2.png)
non_priority
expand cron to detect last run important please follow this template what happened the cron area of settings currently only detects the file path it does not show when the last cron was run it also doesn t give you the complete cron command which it should based on detected linux environmental variables steps to reproduce go to admin cp go to settings cron this is where the magic happens what is expected cron provide last run time also full in page documentation to be provided instead of a link to the help article for on site access browsers and devices tested example chrome on iphone x safari on macbook miscrosoft edge on windown firefox on ubuntu n a server issue chrome firefox tested windows server information example centos php apache centos linux phpfox version example phpfox screenshots
0
89,141
15,823,758,781
IssuesEvent
2021-04-06 01:34:47
bsbtd/Teste
https://api.github.com/repos/bsbtd/Teste
opened
CVE-2021-26707 (Medium) detected in merge-deep-3.0.2.tgz
security vulnerability
## CVE-2021-26707 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>merge-deep-3.0.2.tgz</b></p></summary> <p>Recursively merge values in a javascript object.</p> <p>Library home page: <a href="https://registry.npmjs.org/merge-deep/-/merge-deep-3.0.2.tgz">https://registry.npmjs.org/merge-deep/-/merge-deep-3.0.2.tgz</a></p> <p>Path to dependency file: Teste/pro-table/package.json</p> <p>Path to vulnerable library: Teste/pro-table/node_modules/merge-deep/package.json</p> <p> Dependency Hierarchy: - babel-preset-umi-3.1.2.tgz (Root Library) - webpack-4.3.3.tgz - plugin-svgo-4.3.1.tgz - :x: **merge-deep-3.0.2.tgz** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A flaw was found in merge-deep before 3.0.3. A prototype pollution issue of Object.prototype via a constructor payload may lead to denial of service and other consequences. <p>Publish Date: 2021-02-05 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-26707>CVE-2021-26707</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://bugzilla.redhat.com/show_bug.cgi?id=1922259">https://bugzilla.redhat.com/show_bug.cgi?id=1922259</a></p> <p>Release Date: 2021-02-05</p> <p>Fix Resolution: 3.0.3</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2021-26707 (Medium) detected in merge-deep-3.0.2.tgz - ## CVE-2021-26707 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>merge-deep-3.0.2.tgz</b></p></summary> <p>Recursively merge values in a javascript object.</p> <p>Library home page: <a href="https://registry.npmjs.org/merge-deep/-/merge-deep-3.0.2.tgz">https://registry.npmjs.org/merge-deep/-/merge-deep-3.0.2.tgz</a></p> <p>Path to dependency file: Teste/pro-table/package.json</p> <p>Path to vulnerable library: Teste/pro-table/node_modules/merge-deep/package.json</p> <p> Dependency Hierarchy: - babel-preset-umi-3.1.2.tgz (Root Library) - webpack-4.3.3.tgz - plugin-svgo-4.3.1.tgz - :x: **merge-deep-3.0.2.tgz** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A flaw was found in merge-deep before 3.0.3. A prototype pollution issue of Object.prototype via a constructor payload may lead to denial of service and other consequences. <p>Publish Date: 2021-02-05 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-26707>CVE-2021-26707</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://bugzilla.redhat.com/show_bug.cgi?id=1922259">https://bugzilla.redhat.com/show_bug.cgi?id=1922259</a></p> <p>Release Date: 2021-02-05</p> <p>Fix Resolution: 3.0.3</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in merge deep tgz cve medium severity vulnerability vulnerable library merge deep tgz recursively merge values in a javascript object library home page a href path to dependency file teste pro table package json path to vulnerable library teste pro table node modules merge deep package json dependency hierarchy babel preset umi tgz root library webpack tgz plugin svgo tgz x merge deep tgz vulnerable library vulnerability details a flaw was found in merge deep before a prototype pollution issue of object prototype via a constructor payload may lead to denial of service and other consequences publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
0
66,182
7,968,756,197
IssuesEvent
2018-07-16 05:49:43
maxmagee/chick-fil-a
https://api.github.com/repos/maxmagee/chick-fil-a
opened
Implement Generalized Help Screen
design enhancement
Each of the icons on the Get Help screen open a page that has an image at the top along with article titles and paragraphs for each article. Instead of implementing 6 different pages, we should generalize this out to a screen component that can accept an image and article objects. In addition to this, I need to research how to render expandable views (think accordion-like) when the article title is pressed. - [ ] Design screen in Sketch - [ ] Research how to do expandable views - [ ] Implement generalized screen
1.0
Implement Generalized Help Screen - Each of the icons on the Get Help screen open a page that has an image at the top along with article titles and paragraphs for each article. Instead of implementing 6 different pages, we should generalize this out to a screen component that can accept an image and article objects. In addition to this, I need to research how to render expandable views (think accordion-like) when the article title is pressed. - [ ] Design screen in Sketch - [ ] Research how to do expandable views - [ ] Implement generalized screen
non_priority
implement generalized help screen each of the icons on the get help screen open a page that has an image at the top along with article titles and paragraphs for each article instead of implementing different pages we should generalize this out to a screen component that can accept an image and article objects in addition to this i need to research how to render expandable views think accordion like when the article title is pressed design screen in sketch research how to do expandable views implement generalized screen
0
343,680
24,777,512,513
IssuesEvent
2022-10-23 22:36:00
Easy1089/Proyecto-Fullstack-ISPC-G1
https://api.github.com/repos/Easy1089/Proyecto-Fullstack-ISPC-G1
closed
#TK08 Creacion de wiki para registro de daily, retro, etc. relacionado con el proyecto.
documentation
Creacion de wiki del proyecto: Clone this wiki locally: https://github.com/Easy1089/Proyecto-Fullstack-ISPC-G1.wiki.git
1.0
#TK08 Creacion de wiki para registro de daily, retro, etc. relacionado con el proyecto. - Creacion de wiki del proyecto: Clone this wiki locally: https://github.com/Easy1089/Proyecto-Fullstack-ISPC-G1.wiki.git
non_priority
creacion de wiki para registro de daily retro etc relacionado con el proyecto creacion de wiki del proyecto clone this wiki locally
0
28,684
7,017,169,779
IssuesEvent
2017-12-21 08:32:15
jOOQ/jOOQ
https://api.github.com/repos/jOOQ/jOOQ
opened
Add a way to specify what object type a <forcedType/> should match
C: Code Generation P: Medium T: Enhancement
Currently, `<forcedType/>` configurations simply match everything that matches their `<expression/>` and `<types/>` patterns. This can be a bit annoying when several objects have similar names, e.g. when matching: ```xml <expression>.*?\.ID</expression> ``` This will match all `ID` columns, attributes, parameters, sequences, etc. Even when qualifying the expression, it could be ambiguous in the case of table valued functions, which can have both an `ID` parameter and an `ID` return column. In that case, it would be great to be able to specify: ```xml <expression>.*?\.ID</expression> <objectType>PARAMETER</objectType> ```
1.0
Add a way to specify what object type a <forcedType/> should match - Currently, `<forcedType/>` configurations simply match everything that matches their `<expression/>` and `<types/>` patterns. This can be a bit annoying when several objects have similar names, e.g. when matching: ```xml <expression>.*?\.ID</expression> ``` This will match all `ID` columns, attributes, parameters, sequences, etc. Even when qualifying the expression, it could be ambiguous in the case of table valued functions, which can have both an `ID` parameter and an `ID` return column. In that case, it would be great to be able to specify: ```xml <expression>.*?\.ID</expression> <objectType>PARAMETER</objectType> ```
non_priority
add a way to specify what object type a should match currently configurations simply match everything that matches their and patterns this can be a bit annoying when several objects have similar names e g when matching xml id this will match all id columns attributes parameters sequences etc even when qualifying the expression it could be ambiguous in the case of table valued functions which can have both an id parameter and an id return column in that case it would be great to be able to specify xml id parameter
0
941
2,666,406,014
IssuesEvent
2015-03-21 14:56:23
jmxtrans/jmxtrans2
https://api.github.com/repos/jmxtrans/jmxtrans2
closed
Time- related tests failure
build
2 tests are failing for me: logLineContainsAllRequiredInformation and logLineContainsException: java.lang.AssertionError: Expecting: "1969.12.31 16:16:40.000 - DEBUG - testLogger - testMessage " to match pattern: ".*1970\.01\.01 ..:16:40\.000.*" at org.jmxtrans.core.log.PrintWriterLoggerTest.logLineContainsAllRequiredInformation(PrintWriterLoggerTest.java:122) Seems it is related to me being in UTC+7 timezone.
1.0
Time- related tests failure - 2 tests are failing for me: logLineContainsAllRequiredInformation and logLineContainsException: java.lang.AssertionError: Expecting: "1969.12.31 16:16:40.000 - DEBUG - testLogger - testMessage " to match pattern: ".*1970\.01\.01 ..:16:40\.000.*" at org.jmxtrans.core.log.PrintWriterLoggerTest.logLineContainsAllRequiredInformation(PrintWriterLoggerTest.java:122) Seems it is related to me being in UTC+7 timezone.
non_priority
time related tests failure tests are failing for me loglinecontainsallrequiredinformation and loglinecontainsexception java lang assertionerror expecting debug testlogger testmessage to match pattern at org jmxtrans core log printwriterloggertest loglinecontainsallrequiredinformation printwriterloggertest java seems it is related to me being in utc timezone
0
162,297
20,178,650,461
IssuesEvent
2022-02-10 16:26:18
vital-ws/empty
https://api.github.com/repos/vital-ws/empty
opened
WS-2022-0071 (Medium) detected in tensorflow-2.5.2-cp37-cp37m-manylinux2010_x86_64.whl
security vulnerability
## WS-2022-0071 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>tensorflow-2.5.2-cp37-cp37m-manylinux2010_x86_64.whl</b></p></summary> <p>TensorFlow is an open source machine learning framework for everyone.</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/5f/4d/b675803c25feca2e1a896c2c38380db4d9477d8ce4bd58ea103837793527/tensorflow-2.5.2-cp37-cp37m-manylinux2010_x86_64.whl">https://files.pythonhosted.org/packages/5f/4d/b675803c25feca2e1a896c2c38380db4d9477d8ce4bd58ea103837793527/tensorflow-2.5.2-cp37-cp37m-manylinux2010_x86_64.whl</a></p> <p>Path to dependency file: /requirements.txt</p> <p>Path to vulnerable library: /requirements.txt</p> <p> Dependency Hierarchy: - :x: **tensorflow-2.5.2-cp37-cp37m-manylinux2010_x86_64.whl** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/vital-ws/empty/commit/a22b0de94d5c4e9c141f2b7c59bdf4ec92aee8b5">a22b0de94d5c4e9c141f2b7c59bdf4ec92aee8b5</a></p> <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Integer Overflow or Wraparound in TensorFlow <p>Publish Date: 2022-02-10 <p>URL: <a href=https://github.com/tensorflow/tensorflow/commit/be7b286d40bc68cb0b56f702186cc4837d508058>WS-2022-0071</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-wcv5-vrvr-3rx2">https://github.com/advisories/GHSA-wcv5-vrvr-3rx2</a></p> <p>Release Date: 2022-02-10</p> <p>Fix Resolution: tensorflow - 2.5.3,2.6.3,2.7.1,2.8.0;tensorflow-cpu - 2.5.3,2.6.3,2.7.1,2.8.0;tensorflow-gpu - 2.5.3,2.6.3,2.7.1,2.8.0</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Python","packageName":"tensorflow","packageVersion":"2.5.2","packageFilePaths":["/requirements.txt"],"isTransitiveDependency":false,"dependencyTree":"tensorflow:2.5.2","isMinimumFixVersionAvailable":true,"minimumFixVersion":"tensorflow - 2.5.3,2.6.3,2.7.1,2.8.0;tensorflow-cpu - 2.5.3,2.6.3,2.7.1,2.8.0;tensorflow-gpu - 2.5.3,2.6.3,2.7.1,2.8.0","isBinary":false}],"baseBranches":["main"],"vulnerabilityIdentifier":"WS-2022-0071","vulnerabilityDetails":"Integer Overflow or Wraparound in TensorFlow","vulnerabilityUrl":"https://github.com/tensorflow/tensorflow/commit/be7b286d40bc68cb0b56f702186cc4837d508058","cvss3Severity":"medium","cvss3Score":"5.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"Required","AV":"Local","I":"None"},"extraData":{}}</REMEDIATE> -->
True
WS-2022-0071 (Medium) detected in tensorflow-2.5.2-cp37-cp37m-manylinux2010_x86_64.whl - ## WS-2022-0071 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>tensorflow-2.5.2-cp37-cp37m-manylinux2010_x86_64.whl</b></p></summary> <p>TensorFlow is an open source machine learning framework for everyone.</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/5f/4d/b675803c25feca2e1a896c2c38380db4d9477d8ce4bd58ea103837793527/tensorflow-2.5.2-cp37-cp37m-manylinux2010_x86_64.whl">https://files.pythonhosted.org/packages/5f/4d/b675803c25feca2e1a896c2c38380db4d9477d8ce4bd58ea103837793527/tensorflow-2.5.2-cp37-cp37m-manylinux2010_x86_64.whl</a></p> <p>Path to dependency file: /requirements.txt</p> <p>Path to vulnerable library: /requirements.txt</p> <p> Dependency Hierarchy: - :x: **tensorflow-2.5.2-cp37-cp37m-manylinux2010_x86_64.whl** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/vital-ws/empty/commit/a22b0de94d5c4e9c141f2b7c59bdf4ec92aee8b5">a22b0de94d5c4e9c141f2b7c59bdf4ec92aee8b5</a></p> <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Integer Overflow or Wraparound in TensorFlow <p>Publish Date: 2022-02-10 <p>URL: <a href=https://github.com/tensorflow/tensorflow/commit/be7b286d40bc68cb0b56f702186cc4837d508058>WS-2022-0071</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-wcv5-vrvr-3rx2">https://github.com/advisories/GHSA-wcv5-vrvr-3rx2</a></p> <p>Release Date: 2022-02-10</p> <p>Fix Resolution: tensorflow - 2.5.3,2.6.3,2.7.1,2.8.0;tensorflow-cpu - 2.5.3,2.6.3,2.7.1,2.8.0;tensorflow-gpu - 2.5.3,2.6.3,2.7.1,2.8.0</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Python","packageName":"tensorflow","packageVersion":"2.5.2","packageFilePaths":["/requirements.txt"],"isTransitiveDependency":false,"dependencyTree":"tensorflow:2.5.2","isMinimumFixVersionAvailable":true,"minimumFixVersion":"tensorflow - 2.5.3,2.6.3,2.7.1,2.8.0;tensorflow-cpu - 2.5.3,2.6.3,2.7.1,2.8.0;tensorflow-gpu - 2.5.3,2.6.3,2.7.1,2.8.0","isBinary":false}],"baseBranches":["main"],"vulnerabilityIdentifier":"WS-2022-0071","vulnerabilityDetails":"Integer Overflow or Wraparound in TensorFlow","vulnerabilityUrl":"https://github.com/tensorflow/tensorflow/commit/be7b286d40bc68cb0b56f702186cc4837d508058","cvss3Severity":"medium","cvss3Score":"5.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"Required","AV":"Local","I":"None"},"extraData":{}}</REMEDIATE> -->
non_priority
ws medium detected in tensorflow whl ws medium severity vulnerability vulnerable library tensorflow whl tensorflow is an open source machine learning framework for everyone library home page a href path to dependency file requirements txt path to vulnerable library requirements txt dependency hierarchy x tensorflow whl vulnerable library found in head commit a href found in base branch main vulnerability details integer overflow or wraparound in tensorflow publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution tensorflow tensorflow cpu tensorflow gpu isopenpronvulnerability false ispackagebased true isdefaultbranch true packages istransitivedependency false dependencytree tensorflow isminimumfixversionavailable true minimumfixversion tensorflow tensorflow cpu tensorflow gpu isbinary false basebranches vulnerabilityidentifier ws vulnerabilitydetails integer overflow or wraparound in tensorflow vulnerabilityurl
0
197,462
14,925,825,869
IssuesEvent
2021-01-24 08:33:05
apache/apisix-dashboard
https://api.github.com/repos/apache/apisix-dashboard
closed
after editing a Service, the upstream info will be lost.
bug frontend testcase
# Bug report ## Describe the bug ![image](https://user-images.githubusercontent.com/2106987/104589683-36910b80-56a5-11eb-92f2-17d224a6ba66.png) ## How to Reproduce 1. Go to Service List; 2. Find a Service and click on Edit; 3. Update Upstream configuration; 4. Submit; 5. Edit again but without upstream configuration. ## System information - Version: master branch
1.0
after editing a Service, the upstream info will be lost. - # Bug report ## Describe the bug ![image](https://user-images.githubusercontent.com/2106987/104589683-36910b80-56a5-11eb-92f2-17d224a6ba66.png) ## How to Reproduce 1. Go to Service List; 2. Find a Service and click on Edit; 3. Update Upstream configuration; 4. Submit; 5. Edit again but without upstream configuration. ## System information - Version: master branch
non_priority
after editing a service the upstream info will be lost bug report describe the bug how to reproduce go to service list find a service and click on edit update upstream configuration submit edit again but without upstream configuration system information version master branch
0
210,494
23,754,801,910
IssuesEvent
2022-09-01 01:17:31
turkdevops/sourcegraph
https://api.github.com/repos/turkdevops/sourcegraph
closed
CVE-2020-8116 (High) detected in dot-prop-4.2.0.tgz - autoclosed
security vulnerability
## CVE-2020-8116 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>dot-prop-4.2.0.tgz</b></p></summary> <p>Get, set, or delete a property from a nested object using a dot path</p> <p>Library home page: <a href="https://registry.npmjs.org/dot-prop/-/dot-prop-4.2.0.tgz">https://registry.npmjs.org/dot-prop/-/dot-prop-4.2.0.tgz</a></p> <p> Dependency Hierarchy: - open-color-1.7.0.tgz (Root Library) - npm-6.13.4.tgz - update-notifier-2.5.0.tgz - configstore-3.1.2.tgz - :x: **dot-prop-4.2.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/turkdevops/sourcegraph/commit/5a4a7def9ddff6354e22069c494feb0f30196e36">5a4a7def9ddff6354e22069c494feb0f30196e36</a></p> <p>Found in base branch: <b>dev/seed-tool</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Prototype pollution vulnerability in dot-prop npm package versions before 4.2.1 and versions 5.x before 5.1.1 allows an attacker to add arbitrary properties to JavaScript language constructs such as objects. <p>Publish Date: 2020-02-04 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-8116>CVE-2020-8116</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8116">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8116</a></p> <p>Release Date: 2020-02-04</p> <p>Fix Resolution (dot-prop): 4.2.1</p> <p>Direct dependency fix Resolution (open-color): 1.8.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2020-8116 (High) detected in dot-prop-4.2.0.tgz - autoclosed - ## CVE-2020-8116 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>dot-prop-4.2.0.tgz</b></p></summary> <p>Get, set, or delete a property from a nested object using a dot path</p> <p>Library home page: <a href="https://registry.npmjs.org/dot-prop/-/dot-prop-4.2.0.tgz">https://registry.npmjs.org/dot-prop/-/dot-prop-4.2.0.tgz</a></p> <p> Dependency Hierarchy: - open-color-1.7.0.tgz (Root Library) - npm-6.13.4.tgz - update-notifier-2.5.0.tgz - configstore-3.1.2.tgz - :x: **dot-prop-4.2.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/turkdevops/sourcegraph/commit/5a4a7def9ddff6354e22069c494feb0f30196e36">5a4a7def9ddff6354e22069c494feb0f30196e36</a></p> <p>Found in base branch: <b>dev/seed-tool</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Prototype pollution vulnerability in dot-prop npm package versions before 4.2.1 and versions 5.x before 5.1.1 allows an attacker to add arbitrary properties to JavaScript language constructs such as objects. <p>Publish Date: 2020-02-04 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-8116>CVE-2020-8116</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8116">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8116</a></p> <p>Release Date: 2020-02-04</p> <p>Fix Resolution (dot-prop): 4.2.1</p> <p>Direct dependency fix Resolution (open-color): 1.8.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in dot prop tgz autoclosed cve high severity vulnerability vulnerable library dot prop tgz get set or delete a property from a nested object using a dot path library home page a href dependency hierarchy open color tgz root library npm tgz update notifier tgz configstore tgz x dot prop tgz vulnerable library found in head commit a href found in base branch dev seed tool vulnerability details prototype pollution vulnerability in dot prop npm package versions before and versions x before allows an attacker to add arbitrary properties to javascript language constructs such as objects publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact low availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution dot prop direct dependency fix resolution open color step up your open source security game with mend
0
55,104
13,964,072,254
IssuesEvent
2020-10-25 16:39:49
PrideInLondon/pride-london-new-app
https://api.github.com/repos/PrideInLondon/pride-london-new-app
closed
Dependabot couldn't find the branch master
Security
Dependabot was set up to create pull requests against the branch `master`, but couldn't find it. If the branch has been permanently deleted you can update Dependabot's target branch in the `.dependabot/config.yml` file in this repo. [View the update logs](https://app.dependabot.com/accounts/PrideInLondon/update-logs/52144517).
True
Dependabot couldn't find the branch master - Dependabot was set up to create pull requests against the branch `master`, but couldn't find it. If the branch has been permanently deleted you can update Dependabot's target branch in the `.dependabot/config.yml` file in this repo. [View the update logs](https://app.dependabot.com/accounts/PrideInLondon/update-logs/52144517).
non_priority
dependabot couldn t find the branch master dependabot was set up to create pull requests against the branch master but couldn t find it if the branch has been permanently deleted you can update dependabot s target branch in the dependabot config yml file in this repo
0
286,005
24,712,858,510
IssuesEvent
2022-10-20 03:17:11
microsoft/playwright
https://api.github.com/repos/microsoft/playwright
closed
[Feature]: Allow `describe` to be called in files other than test
P3-collecting-feedback feature-test-runner
### Feature request Currently, for our framework using Protractor, Jasmine, and Typescript, I have an override for the jasmine describe function with my own custom function. This allows me to do something like this in the test file: ``` login.loginDescribe( My highest level describe description ', [BackendService.REALAPI, BackendService.MOCKAPI], // this test will now run twice, once hitting a static deployed environment and again against a localhost for the mock end point. Local, // can also pass "Saucelabs" then it will automatically take in sauce labs configs and run the test in the sauce labs platform [InvitedAs.OWNER], // this and the remaining two other arguments allow us to read the username and password from a secrets file for login credentials. personA, TenantA, () => {.............. ``` I tried to do something similar with Playwright but got this error: "Error: describe() can only be called in a test file" The error makes sense too since I am calling `test.describe` in a ts class file that has the `loginDescribe` method and not a test file. The request is for the test.describe to be allowed to be called in other files as well. Is this possible?
1.0
[Feature]: Allow `describe` to be called in files other than test - ### Feature request Currently, for our framework using Protractor, Jasmine, and Typescript, I have an override for the jasmine describe function with my own custom function. This allows me to do something like this in the test file: ``` login.loginDescribe( My highest level describe description ', [BackendService.REALAPI, BackendService.MOCKAPI], // this test will now run twice, once hitting a static deployed environment and again against a localhost for the mock end point. Local, // can also pass "Saucelabs" then it will automatically take in sauce labs configs and run the test in the sauce labs platform [InvitedAs.OWNER], // this and the remaining two other arguments allow us to read the username and password from a secrets file for login credentials. personA, TenantA, () => {.............. ``` I tried to do something similar with Playwright but got this error: "Error: describe() can only be called in a test file" The error makes sense too since I am calling `test.describe` in a ts class file that has the `loginDescribe` method and not a test file. The request is for the test.describe to be allowed to be called in other files as well. Is this possible?
non_priority
allow describe to be called in files other than test feature request currently for our framework using protractor jasmine and typescript i have an override for the jasmine describe function with my own custom function this allows me to do something like this in the test file login logindescribe my highest level describe description this test will now run twice once hitting a static deployed environment and again against a localhost for the mock end point local can also pass saucelabs then it will automatically take in sauce labs configs and run the test in the sauce labs platform this and the remaining two other arguments allow us to read the username and password from a secrets file for login credentials persona tenanta i tried to do something similar with playwright but got this error error describe can only be called in a test file the error makes sense too since i am calling test describe in a ts class file that has the logindescribe method and not a test file the request is for the test describe to be allowed to be called in other files as well is this possible
0
159,626
20,085,865,145
IssuesEvent
2022-02-05 01:03:25
doc-ai/tensorflow-ios-framework
https://api.github.com/repos/doc-ai/tensorflow-ios-framework
opened
CVE-2021-29585 (High) detected in tensorflowv2.0.2
security vulnerability
## CVE-2021-29585 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>tensorflowv2.0.2</b></p></summary> <p> <p>An Open Source Machine Learning Framework for Everyone</p> <p>Library home page: <a href=https://github.com/tensorflow/tensorflow.git>https://github.com/tensorflow/tensorflow.git</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (0)</summary> <p></p> <p> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> TensorFlow is an end-to-end open source platform for machine learning. The TFLite computation for size of output after padding, `ComputeOutSize`(https://github.com/tensorflow/tensorflow/blob/0c9692ae7b1671c983569e5d3de5565843d500cf/tensorflow/lite/kernels/padding.h#L43-L55), does not check that the `stride` argument is not 0 before doing the division. Users can craft special models such that `ComputeOutSize` is called with `stride` set to 0. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. <p>Publish Date: 2021-05-14 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-29585>CVE-2021-29585</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/tensorflow/tensorflow/security/advisories/GHSA-mv78-g7wq-mhp4">https://github.com/tensorflow/tensorflow/security/advisories/GHSA-mv78-g7wq-mhp4</a></p> <p>Release Date: 2021-05-14</p> <p>Fix Resolution: org.tensorflow:tensorflow-lite:2.5.0</p> </p> </details> <p></p>
True
CVE-2021-29585 (High) detected in tensorflowv2.0.2 - ## CVE-2021-29585 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>tensorflowv2.0.2</b></p></summary> <p> <p>An Open Source Machine Learning Framework for Everyone</p> <p>Library home page: <a href=https://github.com/tensorflow/tensorflow.git>https://github.com/tensorflow/tensorflow.git</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (0)</summary> <p></p> <p> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> TensorFlow is an end-to-end open source platform for machine learning. The TFLite computation for size of output after padding, `ComputeOutSize`(https://github.com/tensorflow/tensorflow/blob/0c9692ae7b1671c983569e5d3de5565843d500cf/tensorflow/lite/kernels/padding.h#L43-L55), does not check that the `stride` argument is not 0 before doing the division. Users can craft special models such that `ComputeOutSize` is called with `stride` set to 0. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. <p>Publish Date: 2021-05-14 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-29585>CVE-2021-29585</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/tensorflow/tensorflow/security/advisories/GHSA-mv78-g7wq-mhp4">https://github.com/tensorflow/tensorflow/security/advisories/GHSA-mv78-g7wq-mhp4</a></p> <p>Release Date: 2021-05-14</p> <p>Fix Resolution: org.tensorflow:tensorflow-lite:2.5.0</p> </p> </details> <p></p>
non_priority
cve high detected in cve high severity vulnerability vulnerable library an open source machine learning framework for everyone library home page a href found in base branch master vulnerable source files vulnerability details tensorflow is an end to end open source platform for machine learning the tflite computation for size of output after padding computeoutsize does not check that the stride argument is not before doing the division users can craft special models such that computeoutsize is called with stride set to the fix will be included in tensorflow we will also cherrypick this commit on tensorflow tensorflow tensorflow and tensorflow as these are also affected and still in supported range publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org tensorflow tensorflow lite
0
82,400
15,646,555,667
IssuesEvent
2021-03-23 01:11:58
jgeraigery/redux
https://api.github.com/repos/jgeraigery/redux
closed
WS-2019-0063 (High) detected in js-yaml-3.4.5.tgz - autoclosed
security vulnerability
## WS-2019-0063 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>js-yaml-3.4.5.tgz</b></p></summary> <p>YAML 1.2 parser and serializer</p> <p>Library home page: <a href="https://registry.npmjs.org/js-yaml/-/js-yaml-3.4.5.tgz">https://registry.npmjs.org/js-yaml/-/js-yaml-3.4.5.tgz</a></p> <p>Path to dependency file: redux/package.json</p> <p>Path to vulnerable library: redux/node_modules/js-yaml/package.json</p> <p> Dependency Hierarchy: - eslint-1.10.3.tgz (Root Library) - :x: **js-yaml-3.4.5.tgz** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Js-yaml prior to 3.13.1 are vulnerable to Code Injection. The load() function may execute arbitrary code injected through a malicious YAML file. <p>Publish Date: 2019-04-05 <p>URL: <a href=https://github.com/nodeca/js-yaml/pull/480>WS-2019-0063</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>8.0</b>)</summary> <p> Base Score Metrics not available</p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.npmjs.com/advisories/813">https://www.npmjs.com/advisories/813</a></p> <p>Release Date: 2019-04-05</p> <p>Fix Resolution: js-yaml - 3.13.1</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"js-yaml","packageVersion":"3.4.5","isTransitiveDependency":true,"dependencyTree":"eslint:1.10.3;js-yaml:3.4.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"js-yaml - 3.13.1"}],"vulnerabilityIdentifier":"WS-2019-0063","vulnerabilityDetails":"Js-yaml prior to 3.13.1 are vulnerable to Code Injection. The load() function may execute arbitrary code injected through a malicious YAML file.","vulnerabilityUrl":"https://github.com/nodeca/js-yaml/pull/480","cvss2Severity":"high","cvss2Score":"8.0","extraData":{}}</REMEDIATE> -->
True
WS-2019-0063 (High) detected in js-yaml-3.4.5.tgz - autoclosed - ## WS-2019-0063 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>js-yaml-3.4.5.tgz</b></p></summary> <p>YAML 1.2 parser and serializer</p> <p>Library home page: <a href="https://registry.npmjs.org/js-yaml/-/js-yaml-3.4.5.tgz">https://registry.npmjs.org/js-yaml/-/js-yaml-3.4.5.tgz</a></p> <p>Path to dependency file: redux/package.json</p> <p>Path to vulnerable library: redux/node_modules/js-yaml/package.json</p> <p> Dependency Hierarchy: - eslint-1.10.3.tgz (Root Library) - :x: **js-yaml-3.4.5.tgz** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Js-yaml prior to 3.13.1 are vulnerable to Code Injection. The load() function may execute arbitrary code injected through a malicious YAML file. <p>Publish Date: 2019-04-05 <p>URL: <a href=https://github.com/nodeca/js-yaml/pull/480>WS-2019-0063</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>8.0</b>)</summary> <p> Base Score Metrics not available</p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.npmjs.com/advisories/813">https://www.npmjs.com/advisories/813</a></p> <p>Release Date: 2019-04-05</p> <p>Fix Resolution: js-yaml - 3.13.1</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"js-yaml","packageVersion":"3.4.5","isTransitiveDependency":true,"dependencyTree":"eslint:1.10.3;js-yaml:3.4.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"js-yaml - 3.13.1"}],"vulnerabilityIdentifier":"WS-2019-0063","vulnerabilityDetails":"Js-yaml prior to 3.13.1 are vulnerable to Code Injection. The load() function may execute arbitrary code injected through a malicious YAML file.","vulnerabilityUrl":"https://github.com/nodeca/js-yaml/pull/480","cvss2Severity":"high","cvss2Score":"8.0","extraData":{}}</REMEDIATE> -->
non_priority
ws high detected in js yaml tgz autoclosed ws high severity vulnerability vulnerable library js yaml tgz yaml parser and serializer library home page a href path to dependency file redux package json path to vulnerable library redux node modules js yaml package json dependency hierarchy eslint tgz root library x js yaml tgz vulnerable library vulnerability details js yaml prior to are vulnerable to code injection the load function may execute arbitrary code injected through a malicious yaml file publish date url a href cvss score details base score metrics not available suggested fix type upgrade version origin a href release date fix resolution js yaml isopenpronvulnerability true ispackagebased true isdefaultbranch true packages vulnerabilityidentifier ws vulnerabilitydetails js yaml prior to are vulnerable to code injection the load function may execute arbitrary code injected through a malicious yaml file vulnerabilityurl
0
250,730
21,331,832,474
IssuesEvent
2022-04-18 09:25:14
fkk-cz/noire_vehicles
https://api.github.com/repos/fkk-cz/noire_vehicles
closed
92 Q4 Tipping Problem
performance issue requires testing
The recent 92 Alfa Romeo Q4 put in has a tipping problem if it takes turns at certain speeds without brakes. That’s the only thing happening, everything else seems fine besides little things here and there that’s tolerable.
1.0
92 Q4 Tipping Problem - The recent 92 Alfa Romeo Q4 put in has a tipping problem if it takes turns at certain speeds without brakes. That’s the only thing happening, everything else seems fine besides little things here and there that’s tolerable.
non_priority
tipping problem the recent alfa romeo put in has a tipping problem if it takes turns at certain speeds without brakes that’s the only thing happening everything else seems fine besides little things here and there that’s tolerable
0
242,908
26,277,868,431
IssuesEvent
2023-01-07 01:22:15
lnuon/EmpirEqual
https://api.github.com/repos/lnuon/EmpirEqual
opened
CVE-2021-23382 (High) detected in postcss-6.0.22.tgz
security vulnerability
## CVE-2021-23382 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>postcss-6.0.22.tgz</b></p></summary> <p>Tool for transforming styles with JS plugins</p> <p>Library home page: <a href="https://registry.npmjs.org/postcss/-/postcss-6.0.22.tgz">https://registry.npmjs.org/postcss/-/postcss-6.0.22.tgz</a></p> <p>Path to dependency file: /EmpirEqual/src/frontend/package.json</p> <p>Path to vulnerable library: /src/frontend/node_modules/react-scripts/node_modules/postcss/package.json,/src/frontend/node_modules/react-scripts/node_modules/postcss/package.json</p> <p> Dependency Hierarchy: - react-scripts-1.1.4.tgz (Root Library) - autoprefixer-7.1.6.tgz - :x: **postcss-6.0.22.tgz** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The package postcss before 8.2.13 are vulnerable to Regular Expression Denial of Service (ReDoS) via getAnnotationURL() and loadAnnotation() in lib/previous-map.js. The vulnerable regexes are caused mainly by the sub-pattern \/\*\s* sourceMappingURL=(.*). <p>Publish Date: 2021-04-26 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-23382>CVE-2021-23382</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23382">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23382</a></p> <p>Release Date: 2021-04-26</p> <p>Fix Resolution (postcss): 7.0.36</p> <p>Direct dependency fix Resolution (react-scripts): 3.0.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2021-23382 (High) detected in postcss-6.0.22.tgz - ## CVE-2021-23382 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>postcss-6.0.22.tgz</b></p></summary> <p>Tool for transforming styles with JS plugins</p> <p>Library home page: <a href="https://registry.npmjs.org/postcss/-/postcss-6.0.22.tgz">https://registry.npmjs.org/postcss/-/postcss-6.0.22.tgz</a></p> <p>Path to dependency file: /EmpirEqual/src/frontend/package.json</p> <p>Path to vulnerable library: /src/frontend/node_modules/react-scripts/node_modules/postcss/package.json,/src/frontend/node_modules/react-scripts/node_modules/postcss/package.json</p> <p> Dependency Hierarchy: - react-scripts-1.1.4.tgz (Root Library) - autoprefixer-7.1.6.tgz - :x: **postcss-6.0.22.tgz** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The package postcss before 8.2.13 are vulnerable to Regular Expression Denial of Service (ReDoS) via getAnnotationURL() and loadAnnotation() in lib/previous-map.js. The vulnerable regexes are caused mainly by the sub-pattern \/\*\s* sourceMappingURL=(.*). <p>Publish Date: 2021-04-26 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-23382>CVE-2021-23382</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23382">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23382</a></p> <p>Release Date: 2021-04-26</p> <p>Fix Resolution (postcss): 7.0.36</p> <p>Direct dependency fix Resolution (react-scripts): 3.0.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in postcss tgz cve high severity vulnerability vulnerable library postcss tgz tool for transforming styles with js plugins library home page a href path to dependency file empirequal src frontend package json path to vulnerable library src frontend node modules react scripts node modules postcss package json src frontend node modules react scripts node modules postcss package json dependency hierarchy react scripts tgz root library autoprefixer tgz x postcss tgz vulnerable library vulnerability details the package postcss before are vulnerable to regular expression denial of service redos via getannotationurl and loadannotation in lib previous map js the vulnerable regexes are caused mainly by the sub pattern s sourcemappingurl publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution postcss direct dependency fix resolution react scripts step up your open source security game with mend
0
271,322
20,628,410,745
IssuesEvent
2022-03-08 02:23:10
fga-eps-mds/2021.2-INDICAA
https://api.github.com/repos/fga-eps-mds/2021.2-INDICAA
closed
Vídeo de apresentação do grupo 03.
documentation Grupo 3
# Tarefas - [x] Definir roteiro. - [x] Gravação do vídeo (E edição, caso necessário). - [x] Postagem do vídeo para que outras pessoas consigam ver (Postar no YouTube, Drive, etc...). - [x] Postagem de um comentário com o link do vídeo na [issue criada pela professora](https://github.com/fga-eps-mds/Qualifying-Software-Engineers-Undergraduates-in-DevOps/issues/33). # Critérios de aceitação - [x] O vídeo deve possuir boa qualidade de som e imagem. - [x] O vídeo deve seguir o template proposto na [issue criada pela professora](https://github.com/fga-eps-mds/Qualifying-Software-Engineers-Undergraduates-in-DevOps/issues/33). - [x] Todos os tópicos definidos devem ter sido abordados. - [x] O projeto deve ter sido explicado sucintamente no vídeo. - [x] O vídeo deve ter sido postado em plataforma pública. - [x] O link para o vídeo deve ter sido disponibilizado na [issue criada pela professora](https://github.com/fga-eps-mds/Qualifying-Software-Engineers-Undergraduates-in-DevOps/issues/33).
1.0
Vídeo de apresentação do grupo 03. - # Tarefas - [x] Definir roteiro. - [x] Gravação do vídeo (E edição, caso necessário). - [x] Postagem do vídeo para que outras pessoas consigam ver (Postar no YouTube, Drive, etc...). - [x] Postagem de um comentário com o link do vídeo na [issue criada pela professora](https://github.com/fga-eps-mds/Qualifying-Software-Engineers-Undergraduates-in-DevOps/issues/33). # Critérios de aceitação - [x] O vídeo deve possuir boa qualidade de som e imagem. - [x] O vídeo deve seguir o template proposto na [issue criada pela professora](https://github.com/fga-eps-mds/Qualifying-Software-Engineers-Undergraduates-in-DevOps/issues/33). - [x] Todos os tópicos definidos devem ter sido abordados. - [x] O projeto deve ter sido explicado sucintamente no vídeo. - [x] O vídeo deve ter sido postado em plataforma pública. - [x] O link para o vídeo deve ter sido disponibilizado na [issue criada pela professora](https://github.com/fga-eps-mds/Qualifying-Software-Engineers-Undergraduates-in-DevOps/issues/33).
non_priority
vídeo de apresentação do grupo tarefas definir roteiro gravação do vídeo e edição caso necessário postagem do vídeo para que outras pessoas consigam ver postar no youtube drive etc postagem de um comentário com o link do vídeo na critérios de aceitação o vídeo deve possuir boa qualidade de som e imagem o vídeo deve seguir o template proposto na todos os tópicos definidos devem ter sido abordados o projeto deve ter sido explicado sucintamente no vídeo o vídeo deve ter sido postado em plataforma pública o link para o vídeo deve ter sido disponibilizado na
0
33,821
16,135,123,869
IssuesEvent
2021-04-29 10:46:50
KratosMultiphysics/Kratos
https://api.github.com/repos/KratosMultiphysics/Kratos
closed
[Core][External library][Discussion] Replace python depence for mathematical expressions
Discussion Enhancement External library Performance Python
**Description** Currently, in order to parse the mathematical functions we consider the pybind11 python callback, see: https://github.com/KratosMultiphysics/Kratos/blob/master/kratos/utilities/python_function_callback_utility.h Looking for another project a way to parse a mathematical function without requiring this dependence (and also improving performance, as the performance of the function evaluation is python performance) I found this MIT library: [exprtk](https://www.partow.net/programming/exprtk/index.html) I would like to discuss if it could be interesting to replace this python callback for this library.
True
[Core][External library][Discussion] Replace python depence for mathematical expressions - **Description** Currently, in order to parse the mathematical functions we consider the pybind11 python callback, see: https://github.com/KratosMultiphysics/Kratos/blob/master/kratos/utilities/python_function_callback_utility.h Looking for another project a way to parse a mathematical function without requiring this dependence (and also improving performance, as the performance of the function evaluation is python performance) I found this MIT library: [exprtk](https://www.partow.net/programming/exprtk/index.html) I would like to discuss if it could be interesting to replace this python callback for this library.
non_priority
replace python depence for mathematical expressions description currently in order to parse the mathematical functions we consider the python callback see looking for another project a way to parse a mathematical function without requiring this dependence and also improving performance as the performance of the function evaluation is python performance i found this mit library i would like to discuss if it could be interesting to replace this python callback for this library
0
80,031
7,737,094,355
IssuesEvent
2018-05-28 06:52:30
celery/celery
https://api.github.com/repos/celery/celery
closed
Tasks with expires fail with AttributeError("'str' object has no attribute 'isoformat'",)
Issue Type: Bug Status: Has Testcase ✔
## Checklist - [x] I have included the output of ``celery -A proj report`` in the issue. (if you are not able to do this, then at least specify the Celery version affected). ``` software -> celery:4.0.2 (latentcall) kombu:4.0.2 py:3.6.1 billiard:3.5.0.2 py-amqp:2.1.4 platform -> system:Darwin arch:64bit imp:CPython loader -> celery.loaders.default.Loader settings -> transport:amqp results:disabled ``` ## Steps to reproduce 1. Create a task that retries via raise `self.retry()` 1. Call the task with `send_task` and set `expires` ## Expected behavior The task should retry until the expires time is hit or the max_retries value is hit ## Actual behavior ``` Traceback (most recent call last): File "/usr/lib/python3.6/site-packages/celery/app/task.py", line 684, in retry S.apply_async() File "/usr/lib/python3.6/site-packages/celery/canvas.py", line 221, in apply_async return _apply(args, kwargs, **options) File "/usr/lib/python3.6/site-packages/celery/app/task.py", line 535, in apply_async **options File "/usr/lib/python3.6/site-packages/celery/app/base.py", line 729, in send_task root_id, parent_id, shadow, chain, File "/usr/lib/python3.6/site-packages/celery/app/amqp.py", line 334, in as_task_v2 expires = expires and expires.isoformat() AttributeError: 'str' object has no attribute 'isoformat' ```
1.0
Tasks with expires fail with AttributeError("'str' object has no attribute 'isoformat'",) - ## Checklist - [x] I have included the output of ``celery -A proj report`` in the issue. (if you are not able to do this, then at least specify the Celery version affected). ``` software -> celery:4.0.2 (latentcall) kombu:4.0.2 py:3.6.1 billiard:3.5.0.2 py-amqp:2.1.4 platform -> system:Darwin arch:64bit imp:CPython loader -> celery.loaders.default.Loader settings -> transport:amqp results:disabled ``` ## Steps to reproduce 1. Create a task that retries via raise `self.retry()` 1. Call the task with `send_task` and set `expires` ## Expected behavior The task should retry until the expires time is hit or the max_retries value is hit ## Actual behavior ``` Traceback (most recent call last): File "/usr/lib/python3.6/site-packages/celery/app/task.py", line 684, in retry S.apply_async() File "/usr/lib/python3.6/site-packages/celery/canvas.py", line 221, in apply_async return _apply(args, kwargs, **options) File "/usr/lib/python3.6/site-packages/celery/app/task.py", line 535, in apply_async **options File "/usr/lib/python3.6/site-packages/celery/app/base.py", line 729, in send_task root_id, parent_id, shadow, chain, File "/usr/lib/python3.6/site-packages/celery/app/amqp.py", line 334, in as_task_v2 expires = expires and expires.isoformat() AttributeError: 'str' object has no attribute 'isoformat' ```
non_priority
tasks with expires fail with attributeerror str object has no attribute isoformat checklist i have included the output of celery a proj report in the issue if you are not able to do this then at least specify the celery version affected software celery latentcall kombu py billiard py amqp platform system darwin arch imp cpython loader celery loaders default loader settings transport amqp results disabled steps to reproduce create a task that retries via raise self retry call the task with send task and set expires expected behavior the task should retry until the expires time is hit or the max retries value is hit actual behavior traceback most recent call last file usr lib site packages celery app task py line in retry s apply async file usr lib site packages celery canvas py line in apply async return apply args kwargs options file usr lib site packages celery app task py line in apply async options file usr lib site packages celery app base py line in send task root id parent id shadow chain file usr lib site packages celery app amqp py line in as task expires expires and expires isoformat attributeerror str object has no attribute isoformat
0
295,822
25,507,483,757
IssuesEvent
2022-11-28 10:32:16
Sexy-Sisters/TOJ-server-v2
https://api.github.com/repos/Sexy-Sisters/TOJ-server-v2
closed
TDD for User Domain
✅ TEST ⚙️SET
## 📑 describe > 유저 도메인에 관한 TDD ## ✅ Things to do - [x] test setting - [x] sign-up test - [x] sign-in test - [x] update user information test - [x] find the current user profile - [x] find the user profile ## 🙋🏿What I want to say > nothing
1.0
TDD for User Domain - ## 📑 describe > 유저 도메인에 관한 TDD ## ✅ Things to do - [x] test setting - [x] sign-up test - [x] sign-in test - [x] update user information test - [x] find the current user profile - [x] find the user profile ## 🙋🏿What I want to say > nothing
non_priority
tdd for user domain 📑 describe 유저 도메인에 관한 tdd ✅ things to do test setting sign up test sign in test update user information test find the current user profile find the user profile 🙋🏿what i want to say nothing
0
1,876
11,014,648,693
IssuesEvent
2019-12-04 23:18:06
dfernandezm/moneycol
https://api.github.com/repos/dfernandezm/moneycol
closed
Terraform automation
automation myiac
- [ ] Setup buckets in GCP object storage for terraform state through myiac (gcloud client?) - [ ] Backup terraform state file in GCP cloud storage - [ ] Myiac: Deploy the backend skeleton with GraphQL endpoint/status endpoint (it must have been Dockerized first)
1.0
Terraform automation - - [ ] Setup buckets in GCP object storage for terraform state through myiac (gcloud client?) - [ ] Backup terraform state file in GCP cloud storage - [ ] Myiac: Deploy the backend skeleton with GraphQL endpoint/status endpoint (it must have been Dockerized first)
non_priority
terraform automation setup buckets in gcp object storage for terraform state through myiac gcloud client backup terraform state file in gcp cloud storage myiac deploy the backend skeleton with graphql endpoint status endpoint it must have been dockerized first
0
52,557
6,260,920,353
IssuesEvent
2017-07-14 22:02:32
geoffhumphrey/brewcompetitiononlineentry
https://api.github.com/repos/geoffhumphrey/brewcompetitiononlineentry
closed
2.1.9: Setup Breaks on Input of Admin User Info
bug confirmed in latest master commit v2.1.10
White screen with the following message appears when going through setup: ` You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'brewerStaff ) ... ` A fix is available in the latest commit and [here](https://github.com/geoffhumphrey/brewcompetitiononlineentry/commit/0c96d50f9b726acae24e8b2b529e96ac20d53b3c). Basically a comma is missing on line 281 in the /includes/process/process_brewer.inc.php file. DOH!
1.0
2.1.9: Setup Breaks on Input of Admin User Info - White screen with the following message appears when going through setup: ` You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'brewerStaff ) ... ` A fix is available in the latest commit and [here](https://github.com/geoffhumphrey/brewcompetitiononlineentry/commit/0c96d50f9b726acae24e8b2b529e96ac20d53b3c). Basically a comma is missing on line 281 in the /includes/process/process_brewer.inc.php file. DOH!
non_priority
setup breaks on input of admin user info white screen with the following message appears when going through setup you have an error in your sql syntax check the manual that corresponds to your mysql server version for the right syntax to use near brewerstaff a fix is available in the latest commit and basically a comma is missing on line in the includes process process brewer inc php file doh
0
10,424
3,109,769,772
IssuesEvent
2015-09-02 00:09:32
OpenMS/OpenMS
https://api.github.com/repos/OpenMS/OpenMS
opened
failed tests with boost 1.58
(Unit) Tests contrib
I get a couple of failed tests when compiling against boost 1.58 ``` 99% tests passed, 5 tests failed out of 1735 Total Test time (real) = 194.53 sec The following tests FAILED: 326 - SvmTheoreticalSpectrumGenerator_test (Failed) 328 - SvmTheoreticalSpectrumGeneratorSet_test (Failed) 490 - IonizationSimulation_test (Failed) 491 - MSSim_test (Failed) 494 - RawTandemMSSignalSimulation_test (Failed) Errors while running CTest ``` This may have something to do with the random number generator in boost, but I am not sure about this ``` 326: checking void simulate(RichPeakSpectrum &spectrum, const AASequence &peptide, boost::random::mt19937_64&rng, Size precursor_charge) ... SVM model file loaded: testModel_11__1_class.svm 326: SVM model file loaded: testModel_11__1_reg.svm 326: 326: + line 103: TEST_EQUAL(exp.size(),1): got 1, expected 1 326: - line 106: TEST_EQUAL(spec.size(),exp[0].size()): got 8, expected 7 326: + line 111: TEST_REAL_SIMILAR(spec[i].getPosition()[0],(exp[0][i]).getPosition()[0]): got 147.112804913371, expected 147.112804913371 326: + line 112: TEST_REAL_SIMILAR(spec[i].getIntensity(),(exp[0][i]).getIntensity()): got 0.235752, expected 0.235752 326: + line 111: TEST_REAL_SIMILAR(spec[i].getPosition()[0],(exp[0][i]).getPosition()[0]): got 204.134269009071, expected 204.134269009071 326: + line 112: TEST_REAL_SIMILAR(spec[i].getIntensity(),(exp[0][i]).getIntensity()): got 0.466184, expected 0.466184 326: - line 111: TEST_REAL_SIMILAR(spec[i].getPosition()[0],(exp[0][i]).getPosition()[0]): got 216.134269009071, expected 303.202683296171 (absolute: 87.0684142871 [1e-05], relative: 1.40284409634016 [1.00001], message: "ratio of numbers is large" 326: - line 112: TEST_REAL_SIMILAR(spec[i].getIntensity(),(exp[0][i]).getIntensity()): got 0.490215, expected 0.734385 (absolute: 0.24417 [1e-05], relative: 1.49809 [1.00001], message: "ratio of numbers is large" 326: - line 111: TEST_REAL_SIMILAR(spec[i].getPosition()[0],(exp[0][i]).getPosition()[0]): got 303.202683296171, expected 333.184490732371 (absolute: 29.9818074362 [1e-05], relative: 1.09888371405643 [1.00001], message: "ratio of numbers is large" 326: - line 112: TEST_REAL_SIMILAR(spec[i].getIntensity(),(exp[0][i]).getIntensity()): got 0.734385, expected 0.957302 (absolute: 0.222917 [1e-05], relative: 1.30354 [1.00001], message: "ratio of numbers is large" 326: - line 111: TEST_REAL_SIMILAR(spec[i].getPosition()[0],(exp[0][i]).getPosition()[0]): got 333.184490732371, expected 431.261261551371 (absolute: 98.076770819 [1e-05], relative: 1.29436175316389 [1.00001], message: "ratio of numbers is large" 326: - line 112: TEST_REAL_SIMILAR(spec[i].getIntensity(),(exp[0][i]).getIntensity()): got 0.0317678, expected 0.707035 (absolute: 0.675267 [1e-05], relative: 22.2564 [1.00001], message: "ratio of numbers is large" 326: - line 111: TEST_REAL_SIMILAR(spec[i].getPosition()[0],(exp[0][i]).getPosition()[0]): got 431.261261551371, expected 518.293290710871 (absolute: 87.0320291595 [1e-05], relative: 1.20180813098404 [1.00001], message: "ratio of numbers is large" 326: - line 112: TEST_REAL_SIMILAR(spec[i].getIntensity(),(exp[0][i]).getIntensity()): got 0.707035, expected 0.584489 (absolute: 0.122546 [1e-05], relative: 1.20966 [1.00001], message: "ratio of numbers is large" 326: - line 111: TEST_REAL_SIMILAR(spec[i].getPosition()[0],(exp[0][i]).getPosition()[0]): got 518.293290710871, expected 665.361704997971 (absolute: 147.0684142871 [1e-05], relative: 1.28375519599219 [1.00001], message: "ratio of numbers is large" 326: - line 112: TEST_REAL_SIMILAR(spec[i].getIntensity(),(exp[0][i]).getIntensity()): got 0.584489, expected 0.631471 (absolute: 0.0469818 [1e-05], relative: 1.08038 [1.00001], message: "ratio of numbers is large" 326: : failed 326: ``` all works fine when compiling against boost 1.52
1.0
failed tests with boost 1.58 - I get a couple of failed tests when compiling against boost 1.58 ``` 99% tests passed, 5 tests failed out of 1735 Total Test time (real) = 194.53 sec The following tests FAILED: 326 - SvmTheoreticalSpectrumGenerator_test (Failed) 328 - SvmTheoreticalSpectrumGeneratorSet_test (Failed) 490 - IonizationSimulation_test (Failed) 491 - MSSim_test (Failed) 494 - RawTandemMSSignalSimulation_test (Failed) Errors while running CTest ``` This may have something to do with the random number generator in boost, but I am not sure about this ``` 326: checking void simulate(RichPeakSpectrum &spectrum, const AASequence &peptide, boost::random::mt19937_64&rng, Size precursor_charge) ... SVM model file loaded: testModel_11__1_class.svm 326: SVM model file loaded: testModel_11__1_reg.svm 326: 326: + line 103: TEST_EQUAL(exp.size(),1): got 1, expected 1 326: - line 106: TEST_EQUAL(spec.size(),exp[0].size()): got 8, expected 7 326: + line 111: TEST_REAL_SIMILAR(spec[i].getPosition()[0],(exp[0][i]).getPosition()[0]): got 147.112804913371, expected 147.112804913371 326: + line 112: TEST_REAL_SIMILAR(spec[i].getIntensity(),(exp[0][i]).getIntensity()): got 0.235752, expected 0.235752 326: + line 111: TEST_REAL_SIMILAR(spec[i].getPosition()[0],(exp[0][i]).getPosition()[0]): got 204.134269009071, expected 204.134269009071 326: + line 112: TEST_REAL_SIMILAR(spec[i].getIntensity(),(exp[0][i]).getIntensity()): got 0.466184, expected 0.466184 326: - line 111: TEST_REAL_SIMILAR(spec[i].getPosition()[0],(exp[0][i]).getPosition()[0]): got 216.134269009071, expected 303.202683296171 (absolute: 87.0684142871 [1e-05], relative: 1.40284409634016 [1.00001], message: "ratio of numbers is large" 326: - line 112: TEST_REAL_SIMILAR(spec[i].getIntensity(),(exp[0][i]).getIntensity()): got 0.490215, expected 0.734385 (absolute: 0.24417 [1e-05], relative: 1.49809 [1.00001], message: "ratio of numbers is large" 326: - line 111: TEST_REAL_SIMILAR(spec[i].getPosition()[0],(exp[0][i]).getPosition()[0]): got 303.202683296171, expected 333.184490732371 (absolute: 29.9818074362 [1e-05], relative: 1.09888371405643 [1.00001], message: "ratio of numbers is large" 326: - line 112: TEST_REAL_SIMILAR(spec[i].getIntensity(),(exp[0][i]).getIntensity()): got 0.734385, expected 0.957302 (absolute: 0.222917 [1e-05], relative: 1.30354 [1.00001], message: "ratio of numbers is large" 326: - line 111: TEST_REAL_SIMILAR(spec[i].getPosition()[0],(exp[0][i]).getPosition()[0]): got 333.184490732371, expected 431.261261551371 (absolute: 98.076770819 [1e-05], relative: 1.29436175316389 [1.00001], message: "ratio of numbers is large" 326: - line 112: TEST_REAL_SIMILAR(spec[i].getIntensity(),(exp[0][i]).getIntensity()): got 0.0317678, expected 0.707035 (absolute: 0.675267 [1e-05], relative: 22.2564 [1.00001], message: "ratio of numbers is large" 326: - line 111: TEST_REAL_SIMILAR(spec[i].getPosition()[0],(exp[0][i]).getPosition()[0]): got 431.261261551371, expected 518.293290710871 (absolute: 87.0320291595 [1e-05], relative: 1.20180813098404 [1.00001], message: "ratio of numbers is large" 326: - line 112: TEST_REAL_SIMILAR(spec[i].getIntensity(),(exp[0][i]).getIntensity()): got 0.707035, expected 0.584489 (absolute: 0.122546 [1e-05], relative: 1.20966 [1.00001], message: "ratio of numbers is large" 326: - line 111: TEST_REAL_SIMILAR(spec[i].getPosition()[0],(exp[0][i]).getPosition()[0]): got 518.293290710871, expected 665.361704997971 (absolute: 147.0684142871 [1e-05], relative: 1.28375519599219 [1.00001], message: "ratio of numbers is large" 326: - line 112: TEST_REAL_SIMILAR(spec[i].getIntensity(),(exp[0][i]).getIntensity()): got 0.584489, expected 0.631471 (absolute: 0.0469818 [1e-05], relative: 1.08038 [1.00001], message: "ratio of numbers is large" 326: : failed 326: ``` all works fine when compiling against boost 1.52
non_priority
failed tests with boost i get a couple of failed tests when compiling against boost tests passed tests failed out of total test time real sec the following tests failed svmtheoreticalspectrumgenerator test failed svmtheoreticalspectrumgeneratorset test failed ionizationsimulation test failed mssim test failed rawtandemmssignalsimulation test failed errors while running ctest this may have something to do with the random number generator in boost but i am not sure about this checking void simulate richpeakspectrum spectrum const aasequence peptide boost random rng size precursor charge svm model file loaded testmodel class svm svm model file loaded testmodel reg svm line test equal exp size got expected line test equal spec size exp size got expected line test real similar spec getposition exp getposition got expected line test real similar spec getintensity exp getintensity got expected line test real similar spec getposition exp getposition got expected line test real similar spec getintensity exp getintensity got expected line test real similar spec getposition exp getposition got expected absolute relative message ratio of numbers is large line test real similar spec getintensity exp getintensity got expected absolute relative message ratio of numbers is large line test real similar spec getposition exp getposition got expected absolute relative message ratio of numbers is large line test real similar spec getintensity exp getintensity got expected absolute relative message ratio of numbers is large line test real similar spec getposition exp getposition got expected absolute relative message ratio of numbers is large line test real similar spec getintensity exp getintensity got expected absolute relative message ratio of numbers is large line test real similar spec getposition exp getposition got expected absolute relative message ratio of numbers is large line test real similar spec getintensity exp getintensity got expected absolute relative message ratio of numbers is large line test real similar spec getposition exp getposition got expected absolute relative message ratio of numbers is large line test real similar spec getintensity exp getintensity got expected absolute relative message ratio of numbers is large failed all works fine when compiling against boost
0
131,763
18,249,411,320
IssuesEvent
2021-10-02 00:58:37
ghc-dev/Larry-Mcmahon
https://api.github.com/repos/ghc-dev/Larry-Mcmahon
closed
CVE-2015-8315 (High) detected in ms-0.7.0.tgz - autoclosed
security vulnerability
## CVE-2015-8315 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>ms-0.7.0.tgz</b></p></summary> <p>Tiny ms conversion utility</p> <p>Library home page: <a href="https://registry.npmjs.org/ms/-/ms-0.7.0.tgz">https://registry.npmjs.org/ms/-/ms-0.7.0.tgz</a></p> <p>Path to dependency file: Larry-Mcmahon/package.json</p> <p>Path to vulnerable library: Larry-Mcmahon/node_modules/ms/package.json</p> <p> Dependency Hierarchy: - send-0.11.1.tgz (Root Library) - :x: **ms-0.7.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/ghc-dev/Larry-Mcmahon/commit/7c12062c8785c9911d7d2c69ba23b628b7521acb">7c12062c8785c9911d7d2c69ba23b628b7521acb</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The ms package before 0.7.1 for Node.js allows attackers to cause a denial of service (CPU consumption) via a long version string, aka a "regular expression denial of service (ReDoS)." <p>Publish Date: 2017-01-23 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2015-8315>CVE-2015-8315</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2015-8315">https://nvd.nist.gov/vuln/detail/CVE-2015-8315</a></p> <p>Release Date: 2017-01-23</p> <p>Fix Resolution: 0.7.1</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"ms","packageVersion":"0.7.0","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"send:0.11.1;ms:0.7.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"0.7.1"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2015-8315","vulnerabilityDetails":"The ms package before 0.7.1 for Node.js allows attackers to cause a denial of service (CPU consumption) via a long version string, aka a \"regular expression denial of service (ReDoS).\"","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2015-8315","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> -->
True
CVE-2015-8315 (High) detected in ms-0.7.0.tgz - autoclosed - ## CVE-2015-8315 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>ms-0.7.0.tgz</b></p></summary> <p>Tiny ms conversion utility</p> <p>Library home page: <a href="https://registry.npmjs.org/ms/-/ms-0.7.0.tgz">https://registry.npmjs.org/ms/-/ms-0.7.0.tgz</a></p> <p>Path to dependency file: Larry-Mcmahon/package.json</p> <p>Path to vulnerable library: Larry-Mcmahon/node_modules/ms/package.json</p> <p> Dependency Hierarchy: - send-0.11.1.tgz (Root Library) - :x: **ms-0.7.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/ghc-dev/Larry-Mcmahon/commit/7c12062c8785c9911d7d2c69ba23b628b7521acb">7c12062c8785c9911d7d2c69ba23b628b7521acb</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The ms package before 0.7.1 for Node.js allows attackers to cause a denial of service (CPU consumption) via a long version string, aka a "regular expression denial of service (ReDoS)." <p>Publish Date: 2017-01-23 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2015-8315>CVE-2015-8315</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2015-8315">https://nvd.nist.gov/vuln/detail/CVE-2015-8315</a></p> <p>Release Date: 2017-01-23</p> <p>Fix Resolution: 0.7.1</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"ms","packageVersion":"0.7.0","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"send:0.11.1;ms:0.7.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"0.7.1"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2015-8315","vulnerabilityDetails":"The ms package before 0.7.1 for Node.js allows attackers to cause a denial of service (CPU consumption) via a long version string, aka a \"regular expression denial of service (ReDoS).\"","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2015-8315","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> -->
non_priority
cve high detected in ms tgz autoclosed cve high severity vulnerability vulnerable library ms tgz tiny ms conversion utility library home page a href path to dependency file larry mcmahon package json path to vulnerable library larry mcmahon node modules ms package json dependency hierarchy send tgz root library x ms tgz vulnerable library found in head commit a href found in base branch master vulnerability details the ms package before for node js allows attackers to cause a denial of service cpu consumption via a long version string aka a regular expression denial of service redos publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree send ms isminimumfixversionavailable true minimumfixversion basebranches vulnerabilityidentifier cve vulnerabilitydetails the ms package before for node js allows attackers to cause a denial of service cpu consumption via a long version string aka a regular expression denial of service redos vulnerabilityurl
0
116,268
14,939,871,164
IssuesEvent
2021-01-25 17:29:59
DavidHieselmayr/Gaias-resurrection
https://api.github.com/repos/DavidHieselmayr/Gaias-resurrection
closed
Planung Wasserinsel
design planung sprint2
- [x] Inselaufbau - [x] Boss Gegner #31 - [x] Fähigkeiten - [x] Arenaumgebung - [x] Kampfmechaniken - [x] Kampfablauf - [x] Lebewesen - [ ] Design @JohnLimHTL
1.0
Planung Wasserinsel - - [x] Inselaufbau - [x] Boss Gegner #31 - [x] Fähigkeiten - [x] Arenaumgebung - [x] Kampfmechaniken - [x] Kampfablauf - [x] Lebewesen - [ ] Design @JohnLimHTL
non_priority
planung wasserinsel inselaufbau boss gegner fähigkeiten arenaumgebung kampfmechaniken kampfablauf lebewesen design johnlimhtl
0
94,423
15,962,373,081
IssuesEvent
2021-04-16 01:10:28
xinYG/bootstrap-timepicker
https://api.github.com/repos/xinYG/bootstrap-timepicker
reopened
CVE-2018-16487 (Medium) detected in lodash-4.17.4.js
security vulnerability
## CVE-2018-16487 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>lodash-4.17.4.js</b></p></summary> <p>A utility library delivering consistency, customization, performance, & extras.</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/lodash.js/4.17.4/lodash.js">https://cdnjs.cloudflare.com/ajax/libs/lodash.js/4.17.4/lodash.js</a></p> <p>Path to vulnerable library: bootstrap-timepicker/node_modules/bower/lib/node_modules/lodash/lodash.js</p> <p> Dependency Hierarchy: - :x: **lodash-4.17.4.js** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/xinYG/bootstrap-timepicker/commit/c92f0918f68b35842a2bf5ae212e5d75e70546e5">c92f0918f68b35842a2bf5ae212e5d75e70546e5</a></p> <p>Found in base branch: <b>gh-pages</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A prototype pollution vulnerability was found in lodash <4.17.11 where the functions merge, mergeWith, and defaultsDeep can be tricked into adding or modifying properties of Object.prototype. <p>Publish Date: 2019-02-01 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-16487>CVE-2018-16487</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.6</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16487">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16487</a></p> <p>Release Date: 2019-02-01</p> <p>Fix Resolution: 4.17.11</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"JavaScript","packageName":"lodash.js","packageVersion":"4.17.4","isTransitiveDependency":false,"dependencyTree":"lodash.js:4.17.4","isMinimumFixVersionAvailable":true,"minimumFixVersion":"4.17.11"}],"vulnerabilityIdentifier":"CVE-2018-16487","vulnerabilityDetails":"A prototype pollution vulnerability was found in lodash \u003c4.17.11 where the functions merge, mergeWith, and defaultsDeep can be tricked into adding or modifying properties of Object.prototype.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-16487","cvss3Severity":"medium","cvss3Score":"5.6","cvss3Metrics":{"A":"Low","AC":"High","PR":"None","S":"Unchanged","C":"Low","UI":"None","AV":"Network","I":"Low"},"extraData":{}}</REMEDIATE> -->
True
CVE-2018-16487 (Medium) detected in lodash-4.17.4.js - ## CVE-2018-16487 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>lodash-4.17.4.js</b></p></summary> <p>A utility library delivering consistency, customization, performance, & extras.</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/lodash.js/4.17.4/lodash.js">https://cdnjs.cloudflare.com/ajax/libs/lodash.js/4.17.4/lodash.js</a></p> <p>Path to vulnerable library: bootstrap-timepicker/node_modules/bower/lib/node_modules/lodash/lodash.js</p> <p> Dependency Hierarchy: - :x: **lodash-4.17.4.js** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/xinYG/bootstrap-timepicker/commit/c92f0918f68b35842a2bf5ae212e5d75e70546e5">c92f0918f68b35842a2bf5ae212e5d75e70546e5</a></p> <p>Found in base branch: <b>gh-pages</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A prototype pollution vulnerability was found in lodash <4.17.11 where the functions merge, mergeWith, and defaultsDeep can be tricked into adding or modifying properties of Object.prototype. <p>Publish Date: 2019-02-01 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-16487>CVE-2018-16487</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.6</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16487">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16487</a></p> <p>Release Date: 2019-02-01</p> <p>Fix Resolution: 4.17.11</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"JavaScript","packageName":"lodash.js","packageVersion":"4.17.4","isTransitiveDependency":false,"dependencyTree":"lodash.js:4.17.4","isMinimumFixVersionAvailable":true,"minimumFixVersion":"4.17.11"}],"vulnerabilityIdentifier":"CVE-2018-16487","vulnerabilityDetails":"A prototype pollution vulnerability was found in lodash \u003c4.17.11 where the functions merge, mergeWith, and defaultsDeep can be tricked into adding or modifying properties of Object.prototype.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-16487","cvss3Severity":"medium","cvss3Score":"5.6","cvss3Metrics":{"A":"Low","AC":"High","PR":"None","S":"Unchanged","C":"Low","UI":"None","AV":"Network","I":"Low"},"extraData":{}}</REMEDIATE> -->
non_priority
cve medium detected in lodash js cve medium severity vulnerability vulnerable library lodash js a utility library delivering consistency customization performance extras library home page a href path to vulnerable library bootstrap timepicker node modules bower lib node modules lodash lodash js dependency hierarchy x lodash js vulnerable library found in head commit a href found in base branch gh pages vulnerability details a prototype pollution vulnerability was found in lodash where the functions merge mergewith and defaultsdeep can be tricked into adding or modifying properties of object prototype publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact low availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution isopenpronvulnerability false ispackagebased true isdefaultbranch true packages vulnerabilityidentifier cve vulnerabilitydetails a prototype pollution vulnerability was found in lodash where the functions merge mergewith and defaultsdeep can be tricked into adding or modifying properties of object prototype vulnerabilityurl
0
116,032
11,893,943,996
IssuesEvent
2020-03-29 13:49:57
Onther-Tech/docs.tokamak.network
https://api.github.com/repos/Onther-Tech/docs.tokamak.network
opened
다국어지원 관련 오류
documentation invalid
![image](https://user-images.githubusercontent.com/8215282/77850696-30619980-720f-11ea-95d5-bd5efd8aacd2.png) - 한국어를 눌러도 우측 상단의 "English"가 "한국어"로 바뀌지 않음. 한국어 모드에서는 우측 상단이 "한국어"로 바뀌어야 함. - 한국어로 전환된 상태에서 "Getting Started"는 "빠르게 시작하기"로 수정 필요 - 한국어로 전환된 상태에서 "기초","고급","Getting Started"를 누르면 영문 페이지로 이동함 --> 국문 페이지로 이동하도록 수정 필요
1.0
다국어지원 관련 오류 - ![image](https://user-images.githubusercontent.com/8215282/77850696-30619980-720f-11ea-95d5-bd5efd8aacd2.png) - 한국어를 눌러도 우측 상단의 "English"가 "한국어"로 바뀌지 않음. 한국어 모드에서는 우측 상단이 "한국어"로 바뀌어야 함. - 한국어로 전환된 상태에서 "Getting Started"는 "빠르게 시작하기"로 수정 필요 - 한국어로 전환된 상태에서 "기초","고급","Getting Started"를 누르면 영문 페이지로 이동함 --> 국문 페이지로 이동하도록 수정 필요
non_priority
다국어지원 관련 오류 한국어를 눌러도 우측 상단의 english 가 한국어 로 바뀌지 않음 한국어 모드에서는 우측 상단이 한국어 로 바뀌어야 함 한국어로 전환된 상태에서 getting started 는 빠르게 시작하기 로 수정 필요 한국어로 전환된 상태에서 기초 고급 getting started 를 누르면 영문 페이지로 이동함 국문 페이지로 이동하도록 수정 필요
0
26,034
4,552,662,511
IssuesEvent
2016-09-13 00:04:31
bridgedotnet/Bridge
https://api.github.com/repos/bridgedotnet/Bridge
opened
Add ICollection<T>.CopyTo()
defect
[MSDN ICollection<T>.CopyTo Method (T[], Int32)](https://msdn.microsoft.com/en-us/library/0efx51xw(v=vs.110).aspx) > Copies the elements of the ICollection<T> to an Array, starting at a particular Array index. ```cs void CopyTo( T[] array, int arrayIndex ) ``` Related #1548, #1810 https://github.com/bridgedotnet/Bridge/issues/1025#issuecomment-246532630
1.0
Add ICollection<T>.CopyTo() - [MSDN ICollection<T>.CopyTo Method (T[], Int32)](https://msdn.microsoft.com/en-us/library/0efx51xw(v=vs.110).aspx) > Copies the elements of the ICollection<T> to an Array, starting at a particular Array index. ```cs void CopyTo( T[] array, int arrayIndex ) ``` Related #1548, #1810 https://github.com/bridgedotnet/Bridge/issues/1025#issuecomment-246532630
non_priority
add icollection copyto   copies the elements of the icollection to an array starting at a particular array index cs void copyto t array int arrayindex related
0
38,637
12,561,338,184
IssuesEvent
2020-06-08 01:10:23
kenferrara/atlasdb
https://api.github.com/repos/kenferrara/atlasdb
opened
CVE-2020-13692 (Medium) detected in postgresql-42.2.1.jar
security vulnerability
## CVE-2020-13692 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>postgresql-42.2.1.jar</b></p></summary> <p>Java JDBC 4.2 (JRE 8+) driver for PostgreSQL database</p> <p>Library home page: <a href="https://github.com/pgjdbc/pgjdbc">https://github.com/pgjdbc/pgjdbc</a></p> <p>Path to dependency file: /tmp/ws-scm/atlasdb/atlasdb-console-distribution/build.gradle</p> <p>Path to vulnerable library: le/caches/modules-2/files-2.1/org.postgresql/postgresql/42.2.1/b7f61848ac43ae9fa6e38935bfd75628b7fc9086/postgresql-42.2.1.jar,le/caches/modules-2/files-2.1/org.postgresql/postgresql/42.2.1/b7f61848ac43ae9fa6e38935bfd75628b7fc9086/postgresql-42.2.1.jar</p> <p> Dependency Hierarchy: - :x: **postgresql-42.2.1.jar** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> PostgreSQL JDBC Driver (aka PgJDBC) before 42.2.13 allows XXE. <p>Publish Date: 2020-06-04 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-13692>CVE-2020-13692</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.0</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: N/A - Attack Complexity: N/A - Privileges Required: N/A - User Interaction: N/A - Scope: N/A - Impact Metrics: - Confidentiality Impact: N/A - Integrity Impact: N/A - Availability Impact: N/A </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://jdbc.postgresql.org/documentation/changelog.html#version_42.2.13">https://jdbc.postgresql.org/documentation/changelog.html#version_42.2.13</a></p> <p>Release Date: 2020-06-04</p> <p>Fix Resolution: org.postgresql:postgresql:42.2.13</p> </p> </details> <p></p> *** <!-- REMEDIATE-OPEN-PR-START --> - [ ] Check this box to open an automated fix PR <!-- REMEDIATE-OPEN-PR-END --> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"org.postgresql","packageName":"postgresql","packageVersion":"42.2.1","isTransitiveDependency":false,"dependencyTree":"org.postgresql:postgresql:42.2.1","isMinimumFixVersionAvailable":true,"minimumFixVersion":"org.postgresql:postgresql:42.2.13"}],"vulnerabilityIdentifier":"CVE-2020-13692","vulnerabilityDetails":"PostgreSQL JDBC Driver (aka PgJDBC) before 42.2.13 allows XXE.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-13692","cvss3Severity":"medium","cvss3Score":"5.0","cvss3Metrics":{"A":"N/A","AC":"N/A","PR":"N/A","S":"N/A","C":"N/A","UI":"N/A","AV":"N/A","I":"N/A"},"extraData":{}}</REMEDIATE> -->
True
CVE-2020-13692 (Medium) detected in postgresql-42.2.1.jar - ## CVE-2020-13692 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>postgresql-42.2.1.jar</b></p></summary> <p>Java JDBC 4.2 (JRE 8+) driver for PostgreSQL database</p> <p>Library home page: <a href="https://github.com/pgjdbc/pgjdbc">https://github.com/pgjdbc/pgjdbc</a></p> <p>Path to dependency file: /tmp/ws-scm/atlasdb/atlasdb-console-distribution/build.gradle</p> <p>Path to vulnerable library: le/caches/modules-2/files-2.1/org.postgresql/postgresql/42.2.1/b7f61848ac43ae9fa6e38935bfd75628b7fc9086/postgresql-42.2.1.jar,le/caches/modules-2/files-2.1/org.postgresql/postgresql/42.2.1/b7f61848ac43ae9fa6e38935bfd75628b7fc9086/postgresql-42.2.1.jar</p> <p> Dependency Hierarchy: - :x: **postgresql-42.2.1.jar** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> PostgreSQL JDBC Driver (aka PgJDBC) before 42.2.13 allows XXE. <p>Publish Date: 2020-06-04 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-13692>CVE-2020-13692</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.0</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: N/A - Attack Complexity: N/A - Privileges Required: N/A - User Interaction: N/A - Scope: N/A - Impact Metrics: - Confidentiality Impact: N/A - Integrity Impact: N/A - Availability Impact: N/A </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://jdbc.postgresql.org/documentation/changelog.html#version_42.2.13">https://jdbc.postgresql.org/documentation/changelog.html#version_42.2.13</a></p> <p>Release Date: 2020-06-04</p> <p>Fix Resolution: org.postgresql:postgresql:42.2.13</p> </p> </details> <p></p> *** <!-- REMEDIATE-OPEN-PR-START --> - [ ] Check this box to open an automated fix PR <!-- REMEDIATE-OPEN-PR-END --> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"org.postgresql","packageName":"postgresql","packageVersion":"42.2.1","isTransitiveDependency":false,"dependencyTree":"org.postgresql:postgresql:42.2.1","isMinimumFixVersionAvailable":true,"minimumFixVersion":"org.postgresql:postgresql:42.2.13"}],"vulnerabilityIdentifier":"CVE-2020-13692","vulnerabilityDetails":"PostgreSQL JDBC Driver (aka PgJDBC) before 42.2.13 allows XXE.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-13692","cvss3Severity":"medium","cvss3Score":"5.0","cvss3Metrics":{"A":"N/A","AC":"N/A","PR":"N/A","S":"N/A","C":"N/A","UI":"N/A","AV":"N/A","I":"N/A"},"extraData":{}}</REMEDIATE> -->
non_priority
cve medium detected in postgresql jar cve medium severity vulnerability vulnerable library postgresql jar java jdbc jre driver for postgresql database library home page a href path to dependency file tmp ws scm atlasdb atlasdb console distribution build gradle path to vulnerable library le caches modules files org postgresql postgresql postgresql jar le caches modules files org postgresql postgresql postgresql jar dependency hierarchy x postgresql jar vulnerable library vulnerability details postgresql jdbc driver aka pgjdbc before allows xxe publish date url a href cvss score details base score metrics exploitability metrics attack vector n a attack complexity n a privileges required n a user interaction n a scope n a impact metrics confidentiality impact n a integrity impact n a availability impact n a for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org postgresql postgresql check this box to open an automated fix pr isopenpronvulnerability false ispackagebased true isdefaultbranch true packages vulnerabilityidentifier cve vulnerabilitydetails postgresql jdbc driver aka pgjdbc before allows xxe vulnerabilityurl
0
167,649
26,529,120,686
IssuesEvent
2023-01-19 11:03:39
hsmusic/hsmusic-wiki
https://api.github.com/repos/hsmusic/hsmusic-wiki
opened
Group timeline when clicking an album release date
type: needs design scope: client-side JS type: new feature
Horizontal with little thumbnails, button to select which group, etc. This is just a crazy client-side feature suggestion, not for current release! Lots of infrastructure (re-exposing album data & client-side content generation in the first place), shared with other client-side features, required first!
1.0
Group timeline when clicking an album release date - Horizontal with little thumbnails, button to select which group, etc. This is just a crazy client-side feature suggestion, not for current release! Lots of infrastructure (re-exposing album data & client-side content generation in the first place), shared with other client-side features, required first!
non_priority
group timeline when clicking an album release date horizontal with little thumbnails button to select which group etc this is just a crazy client side feature suggestion not for current release lots of infrastructure re exposing album data client side content generation in the first place shared with other client side features required first
0
170,112
20,842,026,202
IssuesEvent
2022-03-21 02:06:53
turkdevops/kiwiirc
https://api.github.com/repos/turkdevops/kiwiirc
opened
CVE-2022-24771 (High) detected in node-forge-0.9.0.tgz
security vulnerability
## CVE-2022-24771 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>node-forge-0.9.0.tgz</b></p></summary> <p>JavaScript implementations of network transports, cryptography, ciphers, PKI, message digests, and various utilities.</p> <p>Library home page: <a href="https://registry.npmjs.org/node-forge/-/node-forge-0.9.0.tgz">https://registry.npmjs.org/node-forge/-/node-forge-0.9.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/node-forge/package.json</p> <p> Dependency Hierarchy: - cli-service-4.3.1.tgz (Root Library) - webpack-dev-server-3.10.3.tgz - selfsigned-1.10.7.tgz - :x: **node-forge-0.9.0.tgz** (Vulnerable Library) <p>Found in base branch: <b>captcha-on-demand</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. Prior to version 1.3.0, RSA PKCS#1 v1.5 signature verification code is lenient in checking the digest algorithm structure. This can allow a crafted structure that steals padding bytes and uses unchecked portion of the PKCS#1 encoded message to forge a signature when a low public exponent is being used. The issue has been addressed in `node-forge` version 1.3.0. There are currently no known workarounds. <p>Publish Date: 2022-03-18 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-24771>CVE-2022-24771</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24771">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24771</a></p> <p>Release Date: 2022-03-18</p> <p>Fix Resolution: node-forge - 1.3.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2022-24771 (High) detected in node-forge-0.9.0.tgz - ## CVE-2022-24771 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>node-forge-0.9.0.tgz</b></p></summary> <p>JavaScript implementations of network transports, cryptography, ciphers, PKI, message digests, and various utilities.</p> <p>Library home page: <a href="https://registry.npmjs.org/node-forge/-/node-forge-0.9.0.tgz">https://registry.npmjs.org/node-forge/-/node-forge-0.9.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/node-forge/package.json</p> <p> Dependency Hierarchy: - cli-service-4.3.1.tgz (Root Library) - webpack-dev-server-3.10.3.tgz - selfsigned-1.10.7.tgz - :x: **node-forge-0.9.0.tgz** (Vulnerable Library) <p>Found in base branch: <b>captcha-on-demand</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. Prior to version 1.3.0, RSA PKCS#1 v1.5 signature verification code is lenient in checking the digest algorithm structure. This can allow a crafted structure that steals padding bytes and uses unchecked portion of the PKCS#1 encoded message to forge a signature when a low public exponent is being used. The issue has been addressed in `node-forge` version 1.3.0. There are currently no known workarounds. <p>Publish Date: 2022-03-18 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-24771>CVE-2022-24771</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24771">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24771</a></p> <p>Release Date: 2022-03-18</p> <p>Fix Resolution: node-forge - 1.3.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in node forge tgz cve high severity vulnerability vulnerable library node forge tgz javascript implementations of network transports cryptography ciphers pki message digests and various utilities library home page a href path to dependency file package json path to vulnerable library node modules node forge package json dependency hierarchy cli service tgz root library webpack dev server tgz selfsigned tgz x node forge tgz vulnerable library found in base branch captcha on demand vulnerability details forge also called node forge is a native implementation of transport layer security in javascript prior to version rsa pkcs signature verification code is lenient in checking the digest algorithm structure this can allow a crafted structure that steals padding bytes and uses unchecked portion of the pkcs encoded message to forge a signature when a low public exponent is being used the issue has been addressed in node forge version there are currently no known workarounds publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact high availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution node forge step up your open source security game with whitesource
0
102,426
16,566,211,272
IssuesEvent
2021-05-29 13:14:42
AlexRogalskiy/github-action-random-quote
https://api.github.com/repos/AlexRogalskiy/github-action-random-quote
opened
CVE-2020-11023 (Medium) detected in jquery-1.8.1.min.js
security vulnerability
## CVE-2020-11023 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jquery-1.8.1.min.js</b></p></summary> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.8.1/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/1.8.1/jquery.min.js</a></p> <p>Path to dependency file: github-action-random-quote/node_modules/redeyed/examples/browser/index.html</p> <p>Path to vulnerable library: github-action-random-quote/node_modules/redeyed/examples/browser/index.html</p> <p> Dependency Hierarchy: - :x: **jquery-1.8.1.min.js** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/AlexRogalskiy/github-action-random-quote/commit/99c135aa691d6abe5673bace94251bc0966b49e0">99c135aa691d6abe5673bace94251bc0966b49e0</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0. <p>Publish Date: 2020-04-29 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11023>CVE-2020-11023</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11023">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11023</a></p> <p>Release Date: 2020-04-29</p> <p>Fix Resolution: jquery - 3.5.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2020-11023 (Medium) detected in jquery-1.8.1.min.js - ## CVE-2020-11023 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jquery-1.8.1.min.js</b></p></summary> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.8.1/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/1.8.1/jquery.min.js</a></p> <p>Path to dependency file: github-action-random-quote/node_modules/redeyed/examples/browser/index.html</p> <p>Path to vulnerable library: github-action-random-quote/node_modules/redeyed/examples/browser/index.html</p> <p> Dependency Hierarchy: - :x: **jquery-1.8.1.min.js** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/AlexRogalskiy/github-action-random-quote/commit/99c135aa691d6abe5673bace94251bc0966b49e0">99c135aa691d6abe5673bace94251bc0966b49e0</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0. <p>Publish Date: 2020-04-29 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11023>CVE-2020-11023</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11023">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11023</a></p> <p>Release Date: 2020-04-29</p> <p>Fix Resolution: jquery - 3.5.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in jquery min js cve medium severity vulnerability vulnerable library jquery min js javascript library for dom operations library home page a href path to dependency file github action random quote node modules redeyed examples browser index html path to vulnerable library github action random quote node modules redeyed examples browser index html dependency hierarchy x jquery min js vulnerable library found in head commit a href vulnerability details in jquery versions greater than or equal to and before passing html containing elements from untrusted sources even after sanitizing it to one of jquery s dom manipulation methods i e html append and others may execute untrusted code this problem is patched in jquery publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution jquery step up your open source security game with whitesource
0
89,906
18,048,114,502
IssuesEvent
2021-09-19 08:48:47
edudata-plus/tools
https://api.github.com/repos/edudata-plus/tools
closed
人物リスト対応: 第10+11桁
code2broader
社会科・歴史における人物リストは以下のように、第10桁目と11桁目の連番になるので、それらに対応すること: ``` 8220265230000000 [ウ アの(ア)から(コ)までについては,例えば,次に掲げる人物を取り上げ,人物の働きを通して学習できるよう指導すること。] -> 8220265230100000 [卑弥呼《ひみこ》] -> 8220265230200000 [聖徳太子《しょうとくたいし》] ... -> 8220265231000000 [紫式部《むらさきしきぶ》] ```
1.0
人物リスト対応: 第10+11桁 - 社会科・歴史における人物リストは以下のように、第10桁目と11桁目の連番になるので、それらに対応すること: ``` 8220265230000000 [ウ アの(ア)から(コ)までについては,例えば,次に掲げる人物を取り上げ,人物の働きを通して学習できるよう指導すること。] -> 8220265230100000 [卑弥呼《ひみこ》] -> 8220265230200000 [聖徳太子《しょうとくたいし》] ... -> 8220265231000000 [紫式部《むらさきしきぶ》] ```
non_priority
人物リスト対応 社会科・歴史における人物リストは以下のように、 、それらに対応すること:
0
63,685
14,656,761,998
IssuesEvent
2020-12-28 14:08:29
fu1771695yongxie/Boostnote
https://api.github.com/repos/fu1771695yongxie/Boostnote
opened
CVE-2020-28275 (High) detected in cache-base-1.0.1.tgz
security vulnerability
## CVE-2020-28275 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>cache-base-1.0.1.tgz</b></p></summary> <p>Basic object cache with `get`, `set`, `del`, and `has` methods for node.js/javascript projects.</p> <p>Library home page: <a href="https://registry.npmjs.org/cache-base/-/cache-base-1.0.1.tgz">https://registry.npmjs.org/cache-base/-/cache-base-1.0.1.tgz</a></p> <p>Path to dependency file: Boostnote/package.json</p> <p>Path to vulnerable library: Boostnote/node_modules/cache-base/package.json</p> <p> Dependency Hierarchy: - ava-0.25.0.tgz (Root Library) - chokidar-1.7.0.tgz - readdirp-2.2.1.tgz - micromatch-3.1.10.tgz - snapdragon-0.8.2.tgz - base-0.11.2.tgz - :x: **cache-base-1.0.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/fu1771695yongxie/Boostnote/commit/11e9dea15d65583ed8c71129e7f8b2449bca784a">11e9dea15d65583ed8c71129e7f8b2449bca784a</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Prototype pollution vulnerability in 'cache-base' versions 0.7.0 through 4.0.0 allows attacker to cause a denial of service and may lead to remote code execution. <p>Publish Date: 2020-11-07 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-28275>CVE-2020-28275</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2020-28275 (High) detected in cache-base-1.0.1.tgz - ## CVE-2020-28275 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>cache-base-1.0.1.tgz</b></p></summary> <p>Basic object cache with `get`, `set`, `del`, and `has` methods for node.js/javascript projects.</p> <p>Library home page: <a href="https://registry.npmjs.org/cache-base/-/cache-base-1.0.1.tgz">https://registry.npmjs.org/cache-base/-/cache-base-1.0.1.tgz</a></p> <p>Path to dependency file: Boostnote/package.json</p> <p>Path to vulnerable library: Boostnote/node_modules/cache-base/package.json</p> <p> Dependency Hierarchy: - ava-0.25.0.tgz (Root Library) - chokidar-1.7.0.tgz - readdirp-2.2.1.tgz - micromatch-3.1.10.tgz - snapdragon-0.8.2.tgz - base-0.11.2.tgz - :x: **cache-base-1.0.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/fu1771695yongxie/Boostnote/commit/11e9dea15d65583ed8c71129e7f8b2449bca784a">11e9dea15d65583ed8c71129e7f8b2449bca784a</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Prototype pollution vulnerability in 'cache-base' versions 0.7.0 through 4.0.0 allows attacker to cause a denial of service and may lead to remote code execution. <p>Publish Date: 2020-11-07 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-28275>CVE-2020-28275</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in cache base tgz cve high severity vulnerability vulnerable library cache base tgz basic object cache with get set del and has methods for node js javascript projects library home page a href path to dependency file boostnote package json path to vulnerable library boostnote node modules cache base package json dependency hierarchy ava tgz root library chokidar tgz readdirp tgz micromatch tgz snapdragon tgz base tgz x cache base tgz vulnerable library found in head commit a href found in base branch master vulnerability details prototype pollution vulnerability in cache base versions through allows attacker to cause a denial of service and may lead to remote code execution publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href step up your open source security game with whitesource
0
8,922
6,689,643,621
IssuesEvent
2017-10-09 04:01:25
openebs/openebs
https://api.github.com/repos/openebs/openebs
opened
Create YSCB benchmark k8s jobs to test Cassandra DB on OpenEBS
application area/ci area/performance
<!-- This form is for bug reports and feature requests ONLY! --> <!-- Thanks for filing an issue! Before hitting the button, please answer these questions.--> ## Is this a BUG REPORT or FEATURE REQUEST? FEATURE REQUEST <!-- If this is a BUG REPORT, please: - Fill in as much of the template below as you can. If you leave out information, we can't help you as well. If this is a FEATURE REQUEST, please: - Describe *in detail* the feature/behavior/change you'd like to see. In both cases, be ready for followup questions, and please respond in a timely manner. If we can't reproduce a bug or think a feature already exists, we might close your issue. If we're wrong, PLEASE feel free to reopen it and explain why. --> **What happened**: YCSB is a popular benchmark tool for NoSQL. It have ready adapters for different NoSQL DB like Cassandra, Mongo, Redis and others. The K8s YAML files to deploy a cassandra statefulset can be found here : https://github.com/openebs/openebs/tree/master/k8s/demo/cassandra Benchmarking cassandra on OpenEBS using popular a BM tool like YCSB will help us identify bottlenecks and optimize OpenEBS for better application performance. **What you expected to happen**: Create the YSCB test container with requisite adapters for cassandra and also the K8s job YAMLs to run the benchmark tests & capture metrics. <!-- **Environment**: - kubectl get nodes - kubectl get pods --all-namespaces - kubectl get services - kubectl get sc - kubectl get pv - kubectl get pvc - OS (e.g. from /etc/os-release): - Kernel (e.g. `uname -a`): - Install tools: - Others: -->
True
Create YSCB benchmark k8s jobs to test Cassandra DB on OpenEBS - <!-- This form is for bug reports and feature requests ONLY! --> <!-- Thanks for filing an issue! Before hitting the button, please answer these questions.--> ## Is this a BUG REPORT or FEATURE REQUEST? FEATURE REQUEST <!-- If this is a BUG REPORT, please: - Fill in as much of the template below as you can. If you leave out information, we can't help you as well. If this is a FEATURE REQUEST, please: - Describe *in detail* the feature/behavior/change you'd like to see. In both cases, be ready for followup questions, and please respond in a timely manner. If we can't reproduce a bug or think a feature already exists, we might close your issue. If we're wrong, PLEASE feel free to reopen it and explain why. --> **What happened**: YCSB is a popular benchmark tool for NoSQL. It have ready adapters for different NoSQL DB like Cassandra, Mongo, Redis and others. The K8s YAML files to deploy a cassandra statefulset can be found here : https://github.com/openebs/openebs/tree/master/k8s/demo/cassandra Benchmarking cassandra on OpenEBS using popular a BM tool like YCSB will help us identify bottlenecks and optimize OpenEBS for better application performance. **What you expected to happen**: Create the YSCB test container with requisite adapters for cassandra and also the K8s job YAMLs to run the benchmark tests & capture metrics. <!-- **Environment**: - kubectl get nodes - kubectl get pods --all-namespaces - kubectl get services - kubectl get sc - kubectl get pv - kubectl get pvc - OS (e.g. from /etc/os-release): - Kernel (e.g. `uname -a`): - Install tools: - Others: -->
non_priority
create yscb benchmark jobs to test cassandra db on openebs is this a bug report or feature request feature request if this is a bug report please fill in as much of the template below as you can if you leave out information we can t help you as well if this is a feature request please describe in detail the feature behavior change you d like to see in both cases be ready for followup questions and please respond in a timely manner if we can t reproduce a bug or think a feature already exists we might close your issue if we re wrong please feel free to reopen it and explain why what happened ycsb is a popular benchmark tool for nosql it have ready adapters for different nosql db like cassandra mongo redis and others the yaml files to deploy a cassandra statefulset can be found here benchmarking cassandra on openebs using popular a bm tool like ycsb will help us identify bottlenecks and optimize openebs for better application performance what you expected to happen create the yscb test container with requisite adapters for cassandra and also the job yamls to run the benchmark tests capture metrics environment kubectl get nodes kubectl get pods all namespaces kubectl get services kubectl get sc kubectl get pv kubectl get pvc os e g from etc os release kernel e g uname a install tools others
0
139,550
12,867,608,453
IssuesEvent
2020-07-10 07:15:32
EOSIO/eosio.cdt
https://api.github.com/repos/EOSIO/eosio.cdt
closed
[docs] as of eosio 2.0-rc1 deferred transaction are deprecated
documentation
As of eosio 2.0-rc1 deferred transaction are deprecated, the current documentation is saying they are considered to be deprecated. Change it to be explicit about it. https://developers.eos.io/manuals/eosio.cdt/latest/best-practices/deferred_transactions/#gatsby-focus-wrapper
1.0
[docs] as of eosio 2.0-rc1 deferred transaction are deprecated - As of eosio 2.0-rc1 deferred transaction are deprecated, the current documentation is saying they are considered to be deprecated. Change it to be explicit about it. https://developers.eos.io/manuals/eosio.cdt/latest/best-practices/deferred_transactions/#gatsby-focus-wrapper
non_priority
as of eosio deferred transaction are deprecated as of eosio deferred transaction are deprecated the current documentation is saying they are considered to be deprecated change it to be explicit about it
0
4,488
11,219,704,111
IssuesEvent
2020-01-07 14:26:08
mitmedialab/MediaCloud-Web-Tools
https://api.github.com/repos/mitmedialab/MediaCloud-Web-Tools
closed
validate release_history json before commit
architecture enhancement
We should set up a hook to do this automatically, so it doesn't keep biting us! Lets try husky: https://jakebinstein.com/blog/validating-json-against-a-schema-on-commit/
1.0
validate release_history json before commit - We should set up a hook to do this automatically, so it doesn't keep biting us! Lets try husky: https://jakebinstein.com/blog/validating-json-against-a-schema-on-commit/
non_priority
validate release history json before commit we should set up a hook to do this automatically so it doesn t keep biting us lets try husky
0
156,580
12,323,291,772
IssuesEvent
2020-05-13 11:55:04
cwerner/ldndc2nc
https://api.github.com/repos/cwerner/ldndc2nc
opened
rewrite read_ldndc_txt
testing
read_ldndc_txt is a big mess right now and well worth a rewrite (with proper testing)
1.0
rewrite read_ldndc_txt - read_ldndc_txt is a big mess right now and well worth a rewrite (with proper testing)
non_priority
rewrite read ldndc txt read ldndc txt is a big mess right now and well worth a rewrite with proper testing
0
178,320
21,509,361,148
IssuesEvent
2022-04-28 01:32:42
bsbtd/Teste
https://api.github.com/repos/bsbtd/Teste
closed
CVE-2016-1000031 (High) detected in commons-fileupload-1.2.jar - autoclosed
security vulnerability
## CVE-2016-1000031 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>commons-fileupload-1.2.jar</b></p></summary> <p>The FileUpload component provides a simple yet flexible means of adding support for multipart file upload functionality to servlets and web applications.</p> <p>Library home page: <a href="http://jakarta.apache.org/commons/fileupload/">http://jakarta.apache.org/commons/fileupload/</a></p> <p>Path to vulnerable library: /upload-1.2.jar</p> <p> Dependency Hierarchy: - :x: **commons-fileupload-1.2.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/bsbtd/Teste/commit/64dde89c50c07496423c4d4a865f2e16b92399ad">64dde89c50c07496423c4d4a865f2e16b92399ad</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Apache Commons FileUpload before 1.3.3 DiskFileItem File Manipulation Remote Code Execution <p>Publish Date: 2016-10-25 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-1000031>CVE-2016-1000031</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000031">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000031</a></p> <p>Release Date: 2016-10-25</p> <p>Fix Resolution: 1.3.3</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2016-1000031 (High) detected in commons-fileupload-1.2.jar - autoclosed - ## CVE-2016-1000031 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>commons-fileupload-1.2.jar</b></p></summary> <p>The FileUpload component provides a simple yet flexible means of adding support for multipart file upload functionality to servlets and web applications.</p> <p>Library home page: <a href="http://jakarta.apache.org/commons/fileupload/">http://jakarta.apache.org/commons/fileupload/</a></p> <p>Path to vulnerable library: /upload-1.2.jar</p> <p> Dependency Hierarchy: - :x: **commons-fileupload-1.2.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/bsbtd/Teste/commit/64dde89c50c07496423c4d4a865f2e16b92399ad">64dde89c50c07496423c4d4a865f2e16b92399ad</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Apache Commons FileUpload before 1.3.3 DiskFileItem File Manipulation Remote Code Execution <p>Publish Date: 2016-10-25 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-1000031>CVE-2016-1000031</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000031">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000031</a></p> <p>Release Date: 2016-10-25</p> <p>Fix Resolution: 1.3.3</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in commons fileupload jar autoclosed cve high severity vulnerability vulnerable library commons fileupload jar the fileupload component provides a simple yet flexible means of adding support for multipart file upload functionality to servlets and web applications library home page a href path to vulnerable library upload jar dependency hierarchy x commons fileupload jar vulnerable library found in head commit a href vulnerability details apache commons fileupload before diskfileitem file manipulation remote code execution publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
0